mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-05 12:35:20 +00:00
1bb787fdc9
So far, qemuDomainGetHostdevPath has no knowledge of the reasong it is called and thus reports /dev/vfio/vfio for every VFIO backed device. This is suboptimal, as we want it to: a) report /dev/vfio/vfio on every addition or domain startup b) report /dev/vfio/vfio only on last VFIO device being unplugged If a domain is being stopped then namespace and CGroup die with it so no need to worry about that. I mean, even when a domain that's exiting has more than one VFIO devices assigned to it, this function does not clean /dev/vfio/vfio in CGroup nor in the namespace. But that doesn't matter. Signed-off-by: Michal Privoznik <mprivozn@redhat.com> Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
8244 lines
247 KiB
C
8244 lines
247 KiB
C
/*
|
|
* qemu_domain.c: QEMU domain private state
|
|
*
|
|
* Copyright (C) 2006-2016 Red Hat, Inc.
|
|
* Copyright (C) 2006 Daniel P. Berrange
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
* Author: Daniel P. Berrange <berrange@redhat.com>
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include "qemu_domain.h"
|
|
#include "qemu_alias.h"
|
|
#include "qemu_cgroup.h"
|
|
#include "qemu_command.h"
|
|
#include "qemu_process.h"
|
|
#include "qemu_parse_command.h"
|
|
#include "qemu_capabilities.h"
|
|
#include "qemu_migration.h"
|
|
#include "qemu_security.h"
|
|
#include "viralloc.h"
|
|
#include "virlog.h"
|
|
#include "virerror.h"
|
|
#include "c-ctype.h"
|
|
#include "cpu/cpu.h"
|
|
#include "viruuid.h"
|
|
#include "virfile.h"
|
|
#include "domain_addr.h"
|
|
#include "domain_event.h"
|
|
#include "virtime.h"
|
|
#include "virnetdevopenvswitch.h"
|
|
#include "virstoragefile.h"
|
|
#include "virstring.h"
|
|
#include "virthreadjob.h"
|
|
#include "viratomic.h"
|
|
#include "virprocess.h"
|
|
#include "vircrypto.h"
|
|
#include "secret_util.h"
|
|
#include "logging/log_manager.h"
|
|
#include "locking/domain_lock.h"
|
|
|
|
#include "storage/storage_driver.h"
|
|
|
|
#ifdef MAJOR_IN_MKDEV
|
|
# include <sys/mkdev.h>
|
|
#elif MAJOR_IN_SYSMACROS
|
|
# include <sys/sysmacros.h>
|
|
#endif
|
|
#include <sys/time.h>
|
|
#include <fcntl.h>
|
|
#if defined(HAVE_SYS_MOUNT_H)
|
|
# include <sys/mount.h>
|
|
#endif
|
|
#ifdef WITH_SELINUX
|
|
# include <selinux/selinux.h>
|
|
#endif
|
|
|
|
#include <libxml/xpathInternals.h>
|
|
#include "dosname.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_QEMU
|
|
|
|
VIR_LOG_INIT("qemu.qemu_domain");
|
|
|
|
#define QEMU_NAMESPACE_HREF "http://libvirt.org/schemas/domain/qemu/1.0"
|
|
|
|
VIR_ENUM_IMPL(qemuDomainJob, QEMU_JOB_LAST,
|
|
"none",
|
|
"query",
|
|
"destroy",
|
|
"suspend",
|
|
"modify",
|
|
"abort",
|
|
"migration operation",
|
|
"none", /* async job is never stored in job.active */
|
|
"async nested",
|
|
);
|
|
|
|
VIR_ENUM_IMPL(qemuDomainAsyncJob, QEMU_ASYNC_JOB_LAST,
|
|
"none",
|
|
"migration out",
|
|
"migration in",
|
|
"save",
|
|
"dump",
|
|
"snapshot",
|
|
"start",
|
|
);
|
|
|
|
VIR_ENUM_IMPL(qemuDomainNamespace, QEMU_DOMAIN_NS_LAST,
|
|
"mount",
|
|
);
|
|
|
|
|
|
#define PROC_MOUNTS "/proc/mounts"
|
|
#define DEVPREFIX "/dev/"
|
|
#define DEV_VFIO "/dev/vfio/vfio"
|
|
|
|
|
|
struct _qemuDomainLogContext {
|
|
int refs;
|
|
int writefd;
|
|
int readfd; /* Only used if manager == NULL */
|
|
off_t pos;
|
|
ino_t inode; /* Only used if manager != NULL */
|
|
char *path;
|
|
virLogManagerPtr manager;
|
|
};
|
|
|
|
const char *
|
|
qemuDomainAsyncJobPhaseToString(qemuDomainAsyncJob job,
|
|
int phase ATTRIBUTE_UNUSED)
|
|
{
|
|
switch (job) {
|
|
case QEMU_ASYNC_JOB_MIGRATION_OUT:
|
|
case QEMU_ASYNC_JOB_MIGRATION_IN:
|
|
return qemuMigrationJobPhaseTypeToString(phase);
|
|
|
|
case QEMU_ASYNC_JOB_SAVE:
|
|
case QEMU_ASYNC_JOB_DUMP:
|
|
case QEMU_ASYNC_JOB_SNAPSHOT:
|
|
case QEMU_ASYNC_JOB_START:
|
|
case QEMU_ASYNC_JOB_NONE:
|
|
case QEMU_ASYNC_JOB_LAST:
|
|
; /* fall through */
|
|
}
|
|
|
|
return "none";
|
|
}
|
|
|
|
int
|
|
qemuDomainAsyncJobPhaseFromString(qemuDomainAsyncJob job,
|
|
const char *phase)
|
|
{
|
|
if (!phase)
|
|
return 0;
|
|
|
|
switch (job) {
|
|
case QEMU_ASYNC_JOB_MIGRATION_OUT:
|
|
case QEMU_ASYNC_JOB_MIGRATION_IN:
|
|
return qemuMigrationJobPhaseTypeFromString(phase);
|
|
|
|
case QEMU_ASYNC_JOB_SAVE:
|
|
case QEMU_ASYNC_JOB_DUMP:
|
|
case QEMU_ASYNC_JOB_SNAPSHOT:
|
|
case QEMU_ASYNC_JOB_START:
|
|
case QEMU_ASYNC_JOB_NONE:
|
|
case QEMU_ASYNC_JOB_LAST:
|
|
; /* fall through */
|
|
}
|
|
|
|
if (STREQ(phase, "none"))
|
|
return 0;
|
|
else
|
|
return -1;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainNamespaceEnabled(virDomainObjPtr vm,
|
|
qemuDomainNamespace ns)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
return priv->namespaces &&
|
|
virBitmapIsBitSet(priv->namespaces, ns);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainEnableNamespace(virDomainObjPtr vm,
|
|
qemuDomainNamespace ns)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
if (!priv->namespaces &&
|
|
!(priv->namespaces = virBitmapNew(QEMU_DOMAIN_NS_LAST)))
|
|
return -1;
|
|
|
|
if (virBitmapSetBit(priv->namespaces, ns) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to enable namespace: %s"),
|
|
qemuDomainNamespaceTypeToString(ns));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void qemuDomainEventQueue(virQEMUDriverPtr driver,
|
|
virObjectEventPtr event)
|
|
{
|
|
if (event)
|
|
virObjectEventStateQueue(driver->domainEventState, event);
|
|
}
|
|
|
|
|
|
void
|
|
qemuDomainEventEmitJobCompleted(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virObjectEventPtr event;
|
|
virTypedParameterPtr params = NULL;
|
|
int nparams = 0;
|
|
int type;
|
|
|
|
if (!priv->job.completed)
|
|
return;
|
|
|
|
if (qemuDomainJobInfoToParams(priv->job.completed, &type,
|
|
¶ms, &nparams) < 0) {
|
|
VIR_WARN("Could not get stats for completed job; domain %s",
|
|
vm->def->name);
|
|
}
|
|
|
|
event = virDomainEventJobCompletedNewFromObj(vm, params, nparams);
|
|
qemuDomainEventQueue(driver, event);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainObjInitJob(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
memset(&priv->job, 0, sizeof(priv->job));
|
|
|
|
if (virCondInit(&priv->job.cond) < 0)
|
|
return -1;
|
|
|
|
if (virCondInit(&priv->job.asyncCond) < 0) {
|
|
virCondDestroy(&priv->job.cond);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
qemuDomainObjResetJob(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
struct qemuDomainJobObj *job = &priv->job;
|
|
|
|
job->active = QEMU_JOB_NONE;
|
|
job->owner = 0;
|
|
job->ownerAPI = NULL;
|
|
job->started = 0;
|
|
}
|
|
|
|
static void
|
|
qemuDomainObjResetAsyncJob(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
struct qemuDomainJobObj *job = &priv->job;
|
|
|
|
job->asyncJob = QEMU_ASYNC_JOB_NONE;
|
|
job->asyncOwner = 0;
|
|
job->asyncOwnerAPI = NULL;
|
|
job->asyncStarted = 0;
|
|
job->phase = 0;
|
|
job->mask = QEMU_JOB_DEFAULT_MASK;
|
|
job->dump_memory_only = false;
|
|
job->abortJob = false;
|
|
job->spiceMigration = false;
|
|
job->spiceMigrated = false;
|
|
job->postcopyEnabled = false;
|
|
VIR_FREE(job->current);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjRestoreJob(virDomainObjPtr obj,
|
|
struct qemuDomainJobObj *job)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
memset(job, 0, sizeof(*job));
|
|
job->active = priv->job.active;
|
|
job->owner = priv->job.owner;
|
|
job->asyncJob = priv->job.asyncJob;
|
|
job->asyncOwner = priv->job.asyncOwner;
|
|
job->phase = priv->job.phase;
|
|
|
|
qemuDomainObjResetJob(priv);
|
|
qemuDomainObjResetAsyncJob(priv);
|
|
}
|
|
|
|
static void
|
|
qemuDomainObjFreeJob(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
VIR_FREE(priv->job.current);
|
|
VIR_FREE(priv->job.completed);
|
|
virCondDestroy(&priv->job.cond);
|
|
virCondDestroy(&priv->job.asyncCond);
|
|
}
|
|
|
|
static bool
|
|
qemuDomainTrackJob(qemuDomainJob job)
|
|
{
|
|
return (QEMU_DOMAIN_TRACK_JOBS & JOB_MASK(job)) != 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainJobInfoUpdateTime(qemuDomainJobInfoPtr jobInfo)
|
|
{
|
|
unsigned long long now;
|
|
|
|
if (!jobInfo->started)
|
|
return 0;
|
|
|
|
if (virTimeMillisNow(&now) < 0)
|
|
return -1;
|
|
|
|
if (now < jobInfo->started) {
|
|
VIR_WARN("Async job starts in the future");
|
|
jobInfo->started = 0;
|
|
return 0;
|
|
}
|
|
|
|
jobInfo->timeElapsed = now - jobInfo->started;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
qemuDomainJobInfoUpdateDowntime(qemuDomainJobInfoPtr jobInfo)
|
|
{
|
|
unsigned long long now;
|
|
|
|
if (!jobInfo->stopped)
|
|
return 0;
|
|
|
|
if (virTimeMillisNow(&now) < 0)
|
|
return -1;
|
|
|
|
if (now < jobInfo->stopped) {
|
|
VIR_WARN("Guest's CPUs stopped in the future");
|
|
jobInfo->stopped = 0;
|
|
return 0;
|
|
}
|
|
|
|
jobInfo->stats.downtime = now - jobInfo->stopped;
|
|
jobInfo->stats.downtime_set = true;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
qemuDomainJobInfoToInfo(qemuDomainJobInfoPtr jobInfo,
|
|
virDomainJobInfoPtr info)
|
|
{
|
|
info->type = jobInfo->type;
|
|
info->timeElapsed = jobInfo->timeElapsed;
|
|
info->timeRemaining = jobInfo->timeRemaining;
|
|
|
|
info->memTotal = jobInfo->stats.ram_total;
|
|
info->memRemaining = jobInfo->stats.ram_remaining;
|
|
info->memProcessed = jobInfo->stats.ram_transferred;
|
|
|
|
info->fileTotal = jobInfo->stats.disk_total;
|
|
info->fileRemaining = jobInfo->stats.disk_remaining;
|
|
info->fileProcessed = jobInfo->stats.disk_transferred;
|
|
|
|
info->dataTotal = info->memTotal + info->fileTotal;
|
|
info->dataRemaining = info->memRemaining + info->fileRemaining;
|
|
info->dataProcessed = info->memProcessed + info->fileProcessed;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
qemuDomainJobInfoToParams(qemuDomainJobInfoPtr jobInfo,
|
|
int *type,
|
|
virTypedParameterPtr *params,
|
|
int *nparams)
|
|
{
|
|
qemuMonitorMigrationStats *stats = &jobInfo->stats;
|
|
virTypedParameterPtr par = NULL;
|
|
int maxpar = 0;
|
|
int npar = 0;
|
|
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_TIME_ELAPSED,
|
|
jobInfo->timeElapsed) < 0)
|
|
goto error;
|
|
|
|
if (jobInfo->timeDeltaSet &&
|
|
jobInfo->timeElapsed > jobInfo->timeDelta &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_TIME_ELAPSED_NET,
|
|
jobInfo->timeElapsed - jobInfo->timeDelta) < 0)
|
|
goto error;
|
|
|
|
if (jobInfo->type == VIR_DOMAIN_JOB_BOUNDED &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_TIME_REMAINING,
|
|
jobInfo->timeRemaining) < 0)
|
|
goto error;
|
|
|
|
if (stats->downtime_set &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DOWNTIME,
|
|
stats->downtime) < 0)
|
|
goto error;
|
|
|
|
if (stats->downtime_set &&
|
|
jobInfo->timeDeltaSet &&
|
|
stats->downtime > jobInfo->timeDelta &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DOWNTIME_NET,
|
|
stats->downtime - jobInfo->timeDelta) < 0)
|
|
goto error;
|
|
|
|
if (stats->setup_time_set &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_SETUP_TIME,
|
|
stats->setup_time) < 0)
|
|
goto error;
|
|
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DATA_TOTAL,
|
|
stats->ram_total +
|
|
stats->disk_total) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DATA_PROCESSED,
|
|
stats->ram_transferred +
|
|
stats->disk_transferred) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DATA_REMAINING,
|
|
stats->ram_remaining +
|
|
stats->disk_remaining) < 0)
|
|
goto error;
|
|
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_TOTAL,
|
|
stats->ram_total) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_PROCESSED,
|
|
stats->ram_transferred) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_REMAINING,
|
|
stats->ram_remaining) < 0)
|
|
goto error;
|
|
|
|
if (stats->ram_bps &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_BPS,
|
|
stats->ram_bps) < 0)
|
|
goto error;
|
|
|
|
if (stats->ram_duplicate_set) {
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_CONSTANT,
|
|
stats->ram_duplicate) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_NORMAL,
|
|
stats->ram_normal) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_NORMAL_BYTES,
|
|
stats->ram_normal_bytes) < 0)
|
|
goto error;
|
|
}
|
|
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_DIRTY_RATE,
|
|
stats->ram_dirty_rate) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_MEMORY_ITERATION,
|
|
stats->ram_iteration) < 0)
|
|
goto error;
|
|
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DISK_TOTAL,
|
|
stats->disk_total) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DISK_PROCESSED,
|
|
stats->disk_transferred) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DISK_REMAINING,
|
|
stats->disk_remaining) < 0)
|
|
goto error;
|
|
|
|
if (stats->disk_bps &&
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_DISK_BPS,
|
|
stats->disk_bps) < 0)
|
|
goto error;
|
|
|
|
if (stats->xbzrle_set) {
|
|
if (virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_COMPRESSION_CACHE,
|
|
stats->xbzrle_cache_size) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_COMPRESSION_BYTES,
|
|
stats->xbzrle_bytes) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_COMPRESSION_PAGES,
|
|
stats->xbzrle_pages) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_COMPRESSION_CACHE_MISSES,
|
|
stats->xbzrle_cache_miss) < 0 ||
|
|
virTypedParamsAddULLong(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_COMPRESSION_OVERFLOW,
|
|
stats->xbzrle_overflow) < 0)
|
|
goto error;
|
|
}
|
|
|
|
if (stats->cpu_throttle_percentage &&
|
|
virTypedParamsAddInt(&par, &npar, &maxpar,
|
|
VIR_DOMAIN_JOB_AUTO_CONVERGE_THROTTLE,
|
|
stats->cpu_throttle_percentage) < 0)
|
|
goto error;
|
|
|
|
*type = jobInfo->type;
|
|
*params = par;
|
|
*nparams = npar;
|
|
return 0;
|
|
|
|
error:
|
|
virTypedParamsFree(par, npar);
|
|
return -1;
|
|
}
|
|
|
|
|
|
/* qemuDomainGetMasterKeyFilePath:
|
|
* @libDir: Directory path to domain lib files
|
|
*
|
|
* Generate a path to the domain master key file for libDir.
|
|
* It's up to the caller to handle checking if path exists.
|
|
*
|
|
* Returns path to memory containing the name of the file. It is up to the
|
|
* caller to free; otherwise, NULL on failure.
|
|
*/
|
|
char *
|
|
qemuDomainGetMasterKeyFilePath(const char *libDir)
|
|
{
|
|
if (!libDir) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("invalid path for master key file"));
|
|
return NULL;
|
|
}
|
|
return virFileBuildPath(libDir, "master-key.aes", NULL);
|
|
}
|
|
|
|
|
|
/* qemuDomainWriteMasterKeyFile:
|
|
* @driver: qemu driver data
|
|
* @vm: Pointer to the vm object
|
|
*
|
|
* Get the desired path to the masterKey file and store it in the path.
|
|
*
|
|
* Returns 0 on success, -1 on failure with error message indicating failure
|
|
*/
|
|
int
|
|
qemuDomainWriteMasterKeyFile(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
char *path;
|
|
int fd = -1;
|
|
int ret = -1;
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
/* Only gets filled in if we have the capability */
|
|
if (!priv->masterKey)
|
|
return 0;
|
|
|
|
if (!(path = qemuDomainGetMasterKeyFilePath(priv->libDir)))
|
|
return -1;
|
|
|
|
if ((fd = open(path, O_WRONLY|O_TRUNC|O_CREAT, 0600)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to open domain master key file for write"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (safewrite(fd, priv->masterKey, priv->masterKeyLen) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to write master key file for domain"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virSecurityManagerDomainSetPathLabel(driver->securityManager,
|
|
vm->def, path) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_FORCE_CLOSE(fd);
|
|
VIR_FREE(path);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainMasterKeyFree(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
if (!priv->masterKey)
|
|
return;
|
|
|
|
VIR_DISPOSE_N(priv->masterKey, priv->masterKeyLen);
|
|
}
|
|
|
|
/* qemuDomainMasterKeyReadFile:
|
|
* @priv: pointer to domain private object
|
|
*
|
|
* Expected to be called during qemuProcessReconnect once the domain
|
|
* libDir has been generated through qemuStateInitialize calling
|
|
* virDomainObjListLoadAllConfigs which will restore the libDir path
|
|
* to the domain private object.
|
|
*
|
|
* This function will get the path to the master key file and if it
|
|
* exists, it will read the contents of the file saving it in priv->masterKey.
|
|
*
|
|
* Once the file exists, the validity checks may cause failures; however,
|
|
* if the file doesn't exist or the capability doesn't exist, we just
|
|
* return (mostly) quietly.
|
|
*
|
|
* Returns 0 on success or lack of capability
|
|
* -1 on failure with error message indicating failure
|
|
*/
|
|
int
|
|
qemuDomainMasterKeyReadFile(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
char *path;
|
|
int fd = -1;
|
|
uint8_t *masterKey = NULL;
|
|
ssize_t masterKeyLen = 0;
|
|
|
|
/* If we don't have the capability, then do nothing. */
|
|
if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_SECRET))
|
|
return 0;
|
|
|
|
if (!(path = qemuDomainGetMasterKeyFilePath(priv->libDir)))
|
|
return -1;
|
|
|
|
if (!virFileExists(path)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("domain master key file doesn't exist in %s"),
|
|
priv->libDir);
|
|
goto error;
|
|
}
|
|
|
|
if ((fd = open(path, O_RDONLY)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to open domain master key file for read"));
|
|
goto error;
|
|
}
|
|
|
|
if (VIR_ALLOC_N(masterKey, 1024) < 0)
|
|
goto error;
|
|
|
|
if ((masterKeyLen = saferead(fd, masterKey, 1024)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("unable to read domain master key file"));
|
|
goto error;
|
|
}
|
|
|
|
if (masterKeyLen != QEMU_DOMAIN_MASTER_KEY_LEN) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("invalid master key read, size=%zd"), masterKeyLen);
|
|
goto error;
|
|
}
|
|
|
|
ignore_value(VIR_REALLOC_N_QUIET(masterKey, masterKeyLen));
|
|
|
|
priv->masterKey = masterKey;
|
|
priv->masterKeyLen = masterKeyLen;
|
|
|
|
VIR_FORCE_CLOSE(fd);
|
|
VIR_FREE(path);
|
|
|
|
return 0;
|
|
|
|
error:
|
|
if (masterKeyLen > 0)
|
|
memset(masterKey, 0, masterKeyLen);
|
|
VIR_FREE(masterKey);
|
|
|
|
VIR_FORCE_CLOSE(fd);
|
|
VIR_FREE(path);
|
|
|
|
return -1;
|
|
}
|
|
|
|
|
|
/* qemuDomainMasterKeyRemove:
|
|
* @priv: Pointer to the domain private object
|
|
*
|
|
* Remove the traces of the master key, clear the heap, clear the file,
|
|
* delete the file.
|
|
*/
|
|
void
|
|
qemuDomainMasterKeyRemove(qemuDomainObjPrivatePtr priv)
|
|
{
|
|
char *path = NULL;
|
|
|
|
if (!priv->masterKey)
|
|
return;
|
|
|
|
/* Clear the contents */
|
|
qemuDomainMasterKeyFree(priv);
|
|
|
|
/* Delete the master key file */
|
|
path = qemuDomainGetMasterKeyFilePath(priv->libDir);
|
|
unlink(path);
|
|
|
|
VIR_FREE(path);
|
|
}
|
|
|
|
|
|
/* qemuDomainMasterKeyCreate:
|
|
* @vm: Pointer to the domain object
|
|
*
|
|
* As long as the underlying qemu has the secret capability,
|
|
* generate and store 'raw' in a file a random 32-byte key to
|
|
* be used as a secret shared with qemu to share sensitive data.
|
|
*
|
|
* Returns: 0 on success, -1 w/ error message on failure
|
|
*/
|
|
int
|
|
qemuDomainMasterKeyCreate(virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
/* If we don't have the capability, then do nothing. */
|
|
if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_SECRET))
|
|
return 0;
|
|
|
|
if (!(priv->masterKey =
|
|
virCryptoGenerateRandom(QEMU_DOMAIN_MASTER_KEY_LEN)))
|
|
return -1;
|
|
|
|
priv->masterKeyLen = QEMU_DOMAIN_MASTER_KEY_LEN;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainSecretPlainClear(qemuDomainSecretPlain secret)
|
|
{
|
|
VIR_FREE(secret.username);
|
|
VIR_DISPOSE_N(secret.secret, secret.secretlen);
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainSecretAESClear(qemuDomainSecretAES secret)
|
|
{
|
|
VIR_FREE(secret.username);
|
|
VIR_FREE(secret.alias);
|
|
VIR_FREE(secret.iv);
|
|
VIR_FREE(secret.ciphertext);
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainSecretInfoFree(qemuDomainSecretInfoPtr *secinfo)
|
|
{
|
|
if (!*secinfo)
|
|
return;
|
|
|
|
switch ((qemuDomainSecretInfoType) (*secinfo)->type) {
|
|
case VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN:
|
|
qemuDomainSecretPlainClear((*secinfo)->s.plain);
|
|
break;
|
|
|
|
case VIR_DOMAIN_SECRET_INFO_TYPE_AES:
|
|
qemuDomainSecretAESClear((*secinfo)->s.aes);
|
|
break;
|
|
|
|
case VIR_DOMAIN_SECRET_INFO_TYPE_LAST:
|
|
break;
|
|
}
|
|
|
|
VIR_FREE(*secinfo);
|
|
}
|
|
|
|
|
|
static virClassPtr qemuDomainDiskPrivateClass;
|
|
static void qemuDomainDiskPrivateDispose(void *obj);
|
|
|
|
static int
|
|
qemuDomainDiskPrivateOnceInit(void)
|
|
{
|
|
qemuDomainDiskPrivateClass = virClassNew(virClassForObject(),
|
|
"qemuDomainDiskPrivate",
|
|
sizeof(qemuDomainDiskPrivate),
|
|
qemuDomainDiskPrivateDispose);
|
|
if (!qemuDomainDiskPrivateClass)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(qemuDomainDiskPrivate)
|
|
|
|
static virObjectPtr
|
|
qemuDomainDiskPrivateNew(void)
|
|
{
|
|
qemuDomainDiskPrivatePtr priv;
|
|
|
|
if (qemuDomainDiskPrivateInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(priv = virObjectNew(qemuDomainDiskPrivateClass)))
|
|
return NULL;
|
|
|
|
return (virObjectPtr) priv;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainDiskPrivateDispose(void *obj)
|
|
{
|
|
qemuDomainDiskPrivatePtr priv = obj;
|
|
|
|
qemuDomainSecretInfoFree(&priv->secinfo);
|
|
qemuDomainSecretInfoFree(&priv->encinfo);
|
|
}
|
|
|
|
|
|
static virClassPtr qemuDomainHostdevPrivateClass;
|
|
static void qemuDomainHostdevPrivateDispose(void *obj);
|
|
|
|
static int
|
|
qemuDomainHostdevPrivateOnceInit(void)
|
|
{
|
|
qemuDomainHostdevPrivateClass =
|
|
virClassNew(virClassForObject(),
|
|
"qemuDomainHostdevPrivate",
|
|
sizeof(qemuDomainHostdevPrivate),
|
|
qemuDomainHostdevPrivateDispose);
|
|
if (!qemuDomainHostdevPrivateClass)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(qemuDomainHostdevPrivate)
|
|
|
|
static virObjectPtr
|
|
qemuDomainHostdevPrivateNew(void)
|
|
{
|
|
qemuDomainHostdevPrivatePtr priv;
|
|
|
|
if (qemuDomainHostdevPrivateInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(priv = virObjectNew(qemuDomainHostdevPrivateClass)))
|
|
return NULL;
|
|
|
|
return (virObjectPtr) priv;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainHostdevPrivateDispose(void *obj)
|
|
{
|
|
qemuDomainHostdevPrivatePtr priv = obj;
|
|
|
|
qemuDomainSecretInfoFree(&priv->secinfo);
|
|
}
|
|
|
|
|
|
static virClassPtr qemuDomainVcpuPrivateClass;
|
|
static void qemuDomainVcpuPrivateDispose(void *obj);
|
|
|
|
static int
|
|
qemuDomainVcpuPrivateOnceInit(void)
|
|
{
|
|
qemuDomainVcpuPrivateClass = virClassNew(virClassForObject(),
|
|
"qemuDomainVcpuPrivate",
|
|
sizeof(qemuDomainVcpuPrivate),
|
|
qemuDomainVcpuPrivateDispose);
|
|
if (!qemuDomainVcpuPrivateClass)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(qemuDomainVcpuPrivate)
|
|
|
|
static virObjectPtr
|
|
qemuDomainVcpuPrivateNew(void)
|
|
{
|
|
qemuDomainVcpuPrivatePtr priv;
|
|
|
|
if (qemuDomainVcpuPrivateInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(priv = virObjectNew(qemuDomainVcpuPrivateClass)))
|
|
return NULL;
|
|
|
|
return (virObjectPtr) priv;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainVcpuPrivateDispose(void *obj)
|
|
{
|
|
qemuDomainVcpuPrivatePtr priv = obj;
|
|
|
|
VIR_FREE(priv->type);
|
|
VIR_FREE(priv->alias);
|
|
return;
|
|
}
|
|
|
|
|
|
static virClassPtr qemuDomainChrSourcePrivateClass;
|
|
static void qemuDomainChrSourcePrivateDispose(void *obj);
|
|
|
|
static int
|
|
qemuDomainChrSourcePrivateOnceInit(void)
|
|
{
|
|
qemuDomainChrSourcePrivateClass =
|
|
virClassNew(virClassForObject(),
|
|
"qemuDomainChrSourcePrivate",
|
|
sizeof(qemuDomainChrSourcePrivate),
|
|
qemuDomainChrSourcePrivateDispose);
|
|
if (!qemuDomainChrSourcePrivateClass)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(qemuDomainChrSourcePrivate)
|
|
|
|
static virObjectPtr
|
|
qemuDomainChrSourcePrivateNew(void)
|
|
{
|
|
qemuDomainChrSourcePrivatePtr priv;
|
|
|
|
if (qemuDomainChrSourcePrivateInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(priv = virObjectNew(qemuDomainChrSourcePrivateClass)))
|
|
return NULL;
|
|
|
|
return (virObjectPtr) priv;
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainChrSourcePrivateDispose(void *obj)
|
|
{
|
|
qemuDomainChrSourcePrivatePtr priv = obj;
|
|
|
|
qemuDomainSecretInfoFree(&priv->secinfo);
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretPlainSetup:
|
|
* @conn: Pointer to connection
|
|
* @secinfo: Pointer to secret info
|
|
* @secretUsageType: The virSecretUsageType
|
|
* @username: username to use for authentication (may be NULL)
|
|
* @seclookupdef: Pointer to seclookupdef data
|
|
*
|
|
* Taking a secinfo, fill in the plaintext information
|
|
*
|
|
* Returns 0 on success, -1 on failure with error message
|
|
*/
|
|
static int
|
|
qemuDomainSecretPlainSetup(virConnectPtr conn,
|
|
qemuDomainSecretInfoPtr secinfo,
|
|
virSecretUsageType secretUsageType,
|
|
const char *username,
|
|
virSecretLookupTypeDefPtr seclookupdef)
|
|
{
|
|
secinfo->type = VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN;
|
|
if (VIR_STRDUP(secinfo->s.plain.username, username) < 0)
|
|
return -1;
|
|
|
|
return virSecretGetSecretString(conn, seclookupdef, secretUsageType,
|
|
&secinfo->s.plain.secret,
|
|
&secinfo->s.plain.secretlen);
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretAESSetup:
|
|
* @conn: Pointer to connection
|
|
* @priv: pointer to domain private object
|
|
* @secinfo: Pointer to secret info
|
|
* @srcalias: Alias of the disk/hostdev used to generate the secret alias
|
|
* @secretUsageType: The virSecretUsageType
|
|
* @username: username to use for authentication (may be NULL)
|
|
* @seclookupdef: Pointer to seclookupdef data
|
|
* @isLuks: True/False for is for luks (alias generation)
|
|
*
|
|
* Taking a secinfo, fill in the AES specific information using the
|
|
*
|
|
* Returns 0 on success, -1 on failure with error message
|
|
*/
|
|
static int
|
|
qemuDomainSecretAESSetup(virConnectPtr conn,
|
|
qemuDomainObjPrivatePtr priv,
|
|
qemuDomainSecretInfoPtr secinfo,
|
|
const char *srcalias,
|
|
virSecretUsageType secretUsageType,
|
|
const char *username,
|
|
virSecretLookupTypeDefPtr seclookupdef,
|
|
bool isLuks)
|
|
{
|
|
int ret = -1;
|
|
uint8_t *raw_iv = NULL;
|
|
size_t ivlen = QEMU_DOMAIN_AES_IV_LEN;
|
|
uint8_t *secret = NULL;
|
|
size_t secretlen = 0;
|
|
uint8_t *ciphertext = NULL;
|
|
size_t ciphertextlen = 0;
|
|
|
|
secinfo->type = VIR_DOMAIN_SECRET_INFO_TYPE_AES;
|
|
if (VIR_STRDUP(secinfo->s.aes.username, username) < 0)
|
|
return -1;
|
|
|
|
if (!(secinfo->s.aes.alias = qemuDomainGetSecretAESAlias(srcalias, isLuks)))
|
|
return -1;
|
|
|
|
/* Create a random initialization vector */
|
|
if (!(raw_iv = virCryptoGenerateRandom(ivlen)))
|
|
return -1;
|
|
|
|
/* Encode the IV and save that since qemu will need it */
|
|
if (!(secinfo->s.aes.iv = virStringEncodeBase64(raw_iv, ivlen)))
|
|
goto cleanup;
|
|
|
|
/* Grab the unencoded secret */
|
|
if (virSecretGetSecretString(conn, seclookupdef, secretUsageType,
|
|
&secret, &secretlen) < 0)
|
|
goto cleanup;
|
|
|
|
if (virCryptoEncryptData(VIR_CRYPTO_CIPHER_AES256CBC,
|
|
priv->masterKey, QEMU_DOMAIN_MASTER_KEY_LEN,
|
|
raw_iv, ivlen, secret, secretlen,
|
|
&ciphertext, &ciphertextlen) < 0)
|
|
goto cleanup;
|
|
|
|
/* Clear out the secret */
|
|
memset(secret, 0, secretlen);
|
|
|
|
/* Now encode the ciphertext and store to be passed to qemu */
|
|
if (!(secinfo->s.aes.ciphertext = virStringEncodeBase64(ciphertext,
|
|
ciphertextlen)))
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_DISPOSE_N(raw_iv, ivlen);
|
|
VIR_DISPOSE_N(secret, secretlen);
|
|
VIR_DISPOSE_N(ciphertext, ciphertextlen);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretSetup:
|
|
* @conn: Pointer to connection
|
|
* @priv: pointer to domain private object
|
|
* @secinfo: Pointer to secret info
|
|
* @srcalias: Alias of the disk/hostdev used to generate the secret alias
|
|
* @secretUsageType: The virSecretUsageType
|
|
* @username: username to use for authentication (may be NULL)
|
|
* @seclookupdef: Pointer to seclookupdef data
|
|
* @isLuks: True when is luks (generates different alias)
|
|
*
|
|
* If we have the encryption API present and can support a secret object, then
|
|
* build the AES secret; otherwise, build the Plain secret. This is the magic
|
|
* decision point for utilizing the AES secrets for an RBD disk. For now iSCSI
|
|
* disks and hostdevs will not be able to utilize this mechanism.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
static int
|
|
qemuDomainSecretSetup(virConnectPtr conn,
|
|
qemuDomainObjPrivatePtr priv,
|
|
qemuDomainSecretInfoPtr secinfo,
|
|
const char *srcalias,
|
|
virSecretUsageType secretUsageType,
|
|
const char *username,
|
|
virSecretLookupTypeDefPtr seclookupdef,
|
|
bool isLuks)
|
|
{
|
|
if (virCryptoHaveCipher(VIR_CRYPTO_CIPHER_AES256CBC) &&
|
|
virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_SECRET) &&
|
|
(secretUsageType == VIR_SECRET_USAGE_TYPE_CEPH ||
|
|
secretUsageType == VIR_SECRET_USAGE_TYPE_VOLUME ||
|
|
secretUsageType == VIR_SECRET_USAGE_TYPE_TLS)) {
|
|
if (qemuDomainSecretAESSetup(conn, priv, secinfo, srcalias,
|
|
secretUsageType, username,
|
|
seclookupdef, isLuks) < 0)
|
|
return -1;
|
|
} else {
|
|
if (qemuDomainSecretPlainSetup(conn, secinfo, secretUsageType,
|
|
username, seclookupdef) < 0)
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretDiskDestroy:
|
|
* @disk: Pointer to a disk definition
|
|
*
|
|
* Clear and destroy memory associated with the secret
|
|
*/
|
|
void
|
|
qemuDomainSecretDiskDestroy(virDomainDiskDefPtr disk)
|
|
{
|
|
qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
|
|
|
|
if (!diskPriv || !diskPriv->secinfo)
|
|
return;
|
|
|
|
qemuDomainSecretInfoFree(&diskPriv->secinfo);
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainSecretDiskCapable(virStorageSourcePtr src)
|
|
{
|
|
if (!virStorageSourceIsEmpty(src) &&
|
|
virStorageSourceGetActualType(src) == VIR_STORAGE_TYPE_NETWORK &&
|
|
src->auth &&
|
|
(src->protocol == VIR_STORAGE_NET_PROTOCOL_ISCSI ||
|
|
src->protocol == VIR_STORAGE_NET_PROTOCOL_RBD))
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainDiskHasEncryptionSecret(virStorageSourcePtr src)
|
|
{
|
|
if (!virStorageSourceIsEmpty(src) && src->encryption &&
|
|
src->encryption->format == VIR_STORAGE_ENCRYPTION_FORMAT_LUKS &&
|
|
src->encryption->nsecrets > 0)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretDiskPrepare:
|
|
* @conn: Pointer to connection
|
|
* @priv: pointer to domain private object
|
|
* @disk: Pointer to a disk definition
|
|
*
|
|
* For the right disk, generate the qemuDomainSecretInfo structure.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
qemuDomainSecretDiskPrepare(virConnectPtr conn,
|
|
qemuDomainObjPrivatePtr priv,
|
|
virDomainDiskDefPtr disk)
|
|
{
|
|
virStorageSourcePtr src = disk->src;
|
|
qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
|
|
qemuDomainSecretInfoPtr secinfo = NULL;
|
|
|
|
if (qemuDomainSecretDiskCapable(src)) {
|
|
virSecretUsageType secretUsageType = VIR_SECRET_USAGE_TYPE_ISCSI;
|
|
|
|
if (VIR_ALLOC(secinfo) < 0)
|
|
return -1;
|
|
|
|
if (src->protocol == VIR_STORAGE_NET_PROTOCOL_RBD)
|
|
secretUsageType = VIR_SECRET_USAGE_TYPE_CEPH;
|
|
|
|
if (qemuDomainSecretSetup(conn, priv, secinfo, disk->info.alias,
|
|
secretUsageType, src->auth->username,
|
|
&src->auth->seclookupdef, false) < 0)
|
|
goto error;
|
|
|
|
diskPriv->secinfo = secinfo;
|
|
}
|
|
|
|
if (qemuDomainDiskHasEncryptionSecret(src)) {
|
|
|
|
if (VIR_ALLOC(secinfo) < 0)
|
|
return -1;
|
|
|
|
if (qemuDomainSecretSetup(conn, priv, secinfo, disk->info.alias,
|
|
VIR_SECRET_USAGE_TYPE_VOLUME, NULL,
|
|
&src->encryption->secrets[0]->seclookupdef,
|
|
true) < 0)
|
|
goto error;
|
|
|
|
if (secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("luks encryption requires encrypted secrets "
|
|
"to be supported"));
|
|
goto error;
|
|
}
|
|
|
|
diskPriv->encinfo = secinfo;
|
|
}
|
|
|
|
return 0;
|
|
|
|
error:
|
|
qemuDomainSecretInfoFree(&secinfo);
|
|
return -1;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretHostdevDestroy:
|
|
* @disk: Pointer to a hostdev definition
|
|
*
|
|
* Clear and destroy memory associated with the secret
|
|
*/
|
|
void
|
|
qemuDomainSecretHostdevDestroy(virDomainHostdevDefPtr hostdev)
|
|
{
|
|
qemuDomainHostdevPrivatePtr hostdevPriv =
|
|
QEMU_DOMAIN_HOSTDEV_PRIVATE(hostdev);
|
|
|
|
if (!hostdevPriv || !hostdevPriv->secinfo)
|
|
return;
|
|
|
|
qemuDomainSecretInfoFree(&hostdevPriv->secinfo);
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretHostdevPrepare:
|
|
* @conn: Pointer to connection
|
|
* @priv: pointer to domain private object
|
|
* @hostdev: Pointer to a hostdev definition
|
|
*
|
|
* For the right host device, generate the qemuDomainSecretInfo structure.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
qemuDomainSecretHostdevPrepare(virConnectPtr conn,
|
|
qemuDomainObjPrivatePtr priv,
|
|
virDomainHostdevDefPtr hostdev)
|
|
{
|
|
qemuDomainSecretInfoPtr secinfo = NULL;
|
|
|
|
if (virHostdevIsSCSIDevice(hostdev)) {
|
|
virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
|
|
virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
|
|
|
|
if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI &&
|
|
iscsisrc->auth) {
|
|
|
|
qemuDomainHostdevPrivatePtr hostdevPriv =
|
|
QEMU_DOMAIN_HOSTDEV_PRIVATE(hostdev);
|
|
|
|
if (VIR_ALLOC(secinfo) < 0)
|
|
return -1;
|
|
|
|
if (qemuDomainSecretSetup(conn, priv, secinfo, hostdev->info->alias,
|
|
VIR_SECRET_USAGE_TYPE_ISCSI,
|
|
iscsisrc->auth->username,
|
|
&iscsisrc->auth->seclookupdef, false) < 0)
|
|
goto error;
|
|
|
|
hostdevPriv->secinfo = secinfo;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
|
|
error:
|
|
qemuDomainSecretInfoFree(&secinfo);
|
|
return -1;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretChardevDestroy:
|
|
* @disk: Pointer to a chardev definition
|
|
*
|
|
* Clear and destroy memory associated with the secret
|
|
*/
|
|
void
|
|
qemuDomainSecretChardevDestroy(virDomainChrSourceDefPtr dev)
|
|
{
|
|
qemuDomainChrSourcePrivatePtr chrSourcePriv =
|
|
QEMU_DOMAIN_CHR_SOURCE_PRIVATE(dev);
|
|
|
|
if (!chrSourcePriv || !chrSourcePriv->secinfo)
|
|
return;
|
|
|
|
qemuDomainSecretInfoFree(&chrSourcePriv->secinfo);
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretChardevPrepare:
|
|
* @conn: Pointer to connection
|
|
* @cfg: Pointer to driver config object
|
|
* @priv: pointer to domain private object
|
|
* @chrAlias: Alias of the chr device
|
|
* @dev: Pointer to a char source definition
|
|
*
|
|
* For a TCP character device, generate a qemuDomainSecretInfo to be used
|
|
* by the command line code to generate the secret for the tls-creds to use.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
int
|
|
qemuDomainSecretChardevPrepare(virConnectPtr conn,
|
|
virQEMUDriverConfigPtr cfg,
|
|
qemuDomainObjPrivatePtr priv,
|
|
const char *chrAlias,
|
|
virDomainChrSourceDefPtr dev)
|
|
{
|
|
virSecretLookupTypeDef seclookupdef = {0};
|
|
qemuDomainSecretInfoPtr secinfo = NULL;
|
|
char *charAlias = NULL;
|
|
|
|
if (dev->type != VIR_DOMAIN_CHR_TYPE_TCP)
|
|
return 0;
|
|
|
|
if (dev->data.tcp.haveTLS == VIR_TRISTATE_BOOL_YES &&
|
|
cfg->chardevTLSx509secretUUID) {
|
|
qemuDomainChrSourcePrivatePtr chrSourcePriv =
|
|
QEMU_DOMAIN_CHR_SOURCE_PRIVATE(dev);
|
|
|
|
if (virUUIDParse(cfg->chardevTLSx509secretUUID,
|
|
seclookupdef.u.uuid) < 0) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("malformed chardev TLS secret uuid in qemu.conf"));
|
|
goto error;
|
|
}
|
|
seclookupdef.type = VIR_SECRET_LOOKUP_TYPE_UUID;
|
|
|
|
if (VIR_ALLOC(secinfo) < 0)
|
|
goto error;
|
|
|
|
if (!(charAlias = qemuAliasChardevFromDevAlias(chrAlias)))
|
|
goto error;
|
|
|
|
if (qemuDomainSecretSetup(conn, priv, secinfo, charAlias,
|
|
VIR_SECRET_USAGE_TYPE_TLS, NULL,
|
|
&seclookupdef, false) < 0)
|
|
goto error;
|
|
|
|
if (secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("TLS X.509 requires encrypted secrets "
|
|
"to be supported"));
|
|
goto error;
|
|
}
|
|
|
|
chrSourcePriv->secinfo = secinfo;
|
|
}
|
|
|
|
VIR_FREE(charAlias);
|
|
return 0;
|
|
|
|
error:
|
|
qemuDomainSecretInfoFree(&secinfo);
|
|
return -1;
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretDestroy:
|
|
* @vm: Domain object
|
|
*
|
|
* Once completed with the generation of the command line it is
|
|
* expect to remove the secrets
|
|
*/
|
|
void
|
|
qemuDomainSecretDestroy(virDomainObjPtr vm)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < vm->def->ndisks; i++)
|
|
qemuDomainSecretDiskDestroy(vm->def->disks[i]);
|
|
|
|
for (i = 0; i < vm->def->nhostdevs; i++)
|
|
qemuDomainSecretHostdevDestroy(vm->def->hostdevs[i]);
|
|
|
|
for (i = 0; i < vm->def->nserials; i++)
|
|
qemuDomainSecretChardevDestroy(vm->def->serials[i]->source);
|
|
|
|
for (i = 0; i < vm->def->nparallels; i++)
|
|
qemuDomainSecretChardevDestroy(vm->def->parallels[i]->source);
|
|
|
|
for (i = 0; i < vm->def->nchannels; i++)
|
|
qemuDomainSecretChardevDestroy(vm->def->channels[i]->source);
|
|
|
|
for (i = 0; i < vm->def->nconsoles; i++)
|
|
qemuDomainSecretChardevDestroy(vm->def->consoles[i]->source);
|
|
|
|
for (i = 0; i < vm->def->nsmartcards; i++) {
|
|
if (vm->def->smartcards[i]->type ==
|
|
VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH)
|
|
qemuDomainSecretChardevDestroy(vm->def->smartcards[i]->data.passthru);
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nrngs; i++) {
|
|
if (vm->def->rngs[i]->backend == VIR_DOMAIN_RNG_BACKEND_EGD)
|
|
qemuDomainSecretChardevDestroy(vm->def->rngs[i]->source.chardev);
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nredirdevs; i++)
|
|
qemuDomainSecretChardevDestroy(vm->def->redirdevs[i]->source);
|
|
}
|
|
|
|
|
|
/* qemuDomainSecretPrepare:
|
|
* @conn: Pointer to connection
|
|
* @driver: Pointer to driver object
|
|
* @vm: Domain object
|
|
*
|
|
* For any objects that may require an auth/secret setup, create a
|
|
* qemuDomainSecretInfo and save it in the approriate place within
|
|
* the private structures. This will be used by command line build
|
|
* code in order to pass the secret along to qemu in order to provide
|
|
* the necessary authentication data.
|
|
*
|
|
* Returns 0 on success, -1 on failure with error message set
|
|
*/
|
|
int
|
|
qemuDomainSecretPrepare(virConnectPtr conn,
|
|
virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
size_t i;
|
|
int ret = -1;
|
|
|
|
for (i = 0; i < vm->def->ndisks; i++) {
|
|
if (qemuDomainSecretDiskPrepare(conn, priv, vm->def->disks[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nhostdevs; i++) {
|
|
if (qemuDomainSecretHostdevPrepare(conn, priv,
|
|
vm->def->hostdevs[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nserials; i++) {
|
|
if (qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->serials[i]->info.alias,
|
|
vm->def->serials[i]->source) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nparallels; i++) {
|
|
if (qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->parallels[i]->info.alias,
|
|
vm->def->parallels[i]->source) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nchannels; i++) {
|
|
if (qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->channels[i]->info.alias,
|
|
vm->def->channels[i]->source) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nconsoles; i++) {
|
|
if (qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->consoles[i]->info.alias,
|
|
vm->def->consoles[i]->source) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nsmartcards; i++)
|
|
if (vm->def->smartcards[i]->type ==
|
|
VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH &&
|
|
qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->smartcards[i]->info.alias,
|
|
vm->def->smartcards[i]->data.passthru) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < vm->def->nrngs; i++) {
|
|
if (vm->def->rngs[i]->backend == VIR_DOMAIN_RNG_BACKEND_EGD &&
|
|
qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->rngs[i]->info.alias,
|
|
vm->def->rngs[i]->source.chardev) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
for (i = 0; i < vm->def->nredirdevs; i++) {
|
|
if (qemuDomainSecretChardevPrepare(conn, cfg, priv,
|
|
vm->def->redirdevs[i]->info.alias,
|
|
vm->def->redirdevs[i]->source) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* This is the old way of setting up per-domain directories */
|
|
static int
|
|
qemuDomainSetPrivatePathsOld(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int ret = -1;
|
|
|
|
if (!priv->libDir &&
|
|
virAsprintf(&priv->libDir, "%s/domain-%s",
|
|
cfg->libDir, vm->def->name) < 0)
|
|
goto cleanup;
|
|
|
|
if (!priv->channelTargetDir &&
|
|
virAsprintf(&priv->channelTargetDir, "%s/domain-%s",
|
|
cfg->channelTargetDir, vm->def->name) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainSetPrivatePaths(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
char *domname = virDomainObjGetShortName(vm->def);
|
|
int ret = -1;
|
|
|
|
if (!domname)
|
|
goto cleanup;
|
|
|
|
if (!priv->libDir &&
|
|
virAsprintf(&priv->libDir, "%s/domain-%s", cfg->libDir, domname) < 0)
|
|
goto cleanup;
|
|
|
|
if (!priv->channelTargetDir &&
|
|
virAsprintf(&priv->channelTargetDir, "%s/domain-%s",
|
|
cfg->channelTargetDir, domname) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
VIR_FREE(domname);
|
|
return ret;
|
|
}
|
|
|
|
|
|
void
|
|
qemuDomainClearPrivatePaths(virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
VIR_FREE(priv->libDir);
|
|
VIR_FREE(priv->channelTargetDir);
|
|
}
|
|
|
|
|
|
static void *
|
|
qemuDomainObjPrivateAlloc(void)
|
|
{
|
|
qemuDomainObjPrivatePtr priv;
|
|
|
|
if (VIR_ALLOC(priv) < 0)
|
|
return NULL;
|
|
|
|
if (qemuDomainObjInitJob(priv) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to init qemu driver mutexes"));
|
|
goto error;
|
|
}
|
|
|
|
if (!(priv->devs = virChrdevAlloc()))
|
|
goto error;
|
|
|
|
priv->migMaxBandwidth = QEMU_DOMAIN_MIG_BANDWIDTH_MAX;
|
|
|
|
return priv;
|
|
|
|
error:
|
|
VIR_FREE(priv);
|
|
return NULL;
|
|
}
|
|
|
|
static void
|
|
qemuDomainObjPrivateFree(void *data)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = data;
|
|
|
|
virObjectUnref(priv->qemuCaps);
|
|
|
|
virBitmapFree(priv->namespaces);
|
|
|
|
virCgroupFree(&priv->cgroup);
|
|
virDomainPCIAddressSetFree(priv->pciaddrs);
|
|
virDomainUSBAddressSetFree(priv->usbaddrs);
|
|
virDomainChrSourceDefFree(priv->monConfig);
|
|
qemuDomainObjFreeJob(priv);
|
|
VIR_FREE(priv->lockState);
|
|
VIR_FREE(priv->origname);
|
|
|
|
virStringListFree(priv->qemuDevices);
|
|
virChrdevFree(priv->devs);
|
|
|
|
/* This should never be non-NULL if we get here, but just in case... */
|
|
if (priv->mon) {
|
|
VIR_ERROR(_("Unexpected QEMU monitor still active during domain deletion"));
|
|
qemuMonitorClose(priv->mon);
|
|
}
|
|
if (priv->agent) {
|
|
VIR_ERROR(_("Unexpected QEMU agent still active during domain deletion"));
|
|
qemuAgentClose(priv->agent);
|
|
}
|
|
VIR_FREE(priv->cleanupCallbacks);
|
|
virBitmapFree(priv->autoNodeset);
|
|
virBitmapFree(priv->autoCpuset);
|
|
|
|
VIR_FREE(priv->libDir);
|
|
VIR_FREE(priv->channelTargetDir);
|
|
qemuDomainMasterKeyFree(priv);
|
|
|
|
VIR_FREE(priv);
|
|
}
|
|
|
|
|
|
static void
|
|
qemuDomainObjPrivateXMLFormatVcpus(virBufferPtr buf,
|
|
virDomainDefPtr def)
|
|
{
|
|
size_t i;
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
pid_t tid;
|
|
|
|
virBufferAddLit(buf, "<vcpus>\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(def, i);
|
|
tid = QEMU_DOMAIN_VCPU_PRIVATE(vcpu)->tid;
|
|
|
|
if (!vcpu->online || tid == 0)
|
|
continue;
|
|
|
|
virBufferAsprintf(buf, "<vcpu id='%zu' pid='%d'/>\n", i, tid);
|
|
}
|
|
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</vcpus>\n");
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainObjPrivateXMLFormat(virBufferPtr buf,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
const char *monitorpath;
|
|
qemuDomainJob job;
|
|
|
|
/* priv->monitor_chr is set only for qemu */
|
|
if (priv->monConfig) {
|
|
switch (priv->monConfig->type) {
|
|
case VIR_DOMAIN_CHR_TYPE_UNIX:
|
|
monitorpath = priv->monConfig->data.nix.path;
|
|
break;
|
|
default:
|
|
case VIR_DOMAIN_CHR_TYPE_PTY:
|
|
monitorpath = priv->monConfig->data.file.path;
|
|
break;
|
|
}
|
|
|
|
virBufferEscapeString(buf, "<monitor path='%s'", monitorpath);
|
|
if (priv->monJSON)
|
|
virBufferAddLit(buf, " json='1'");
|
|
virBufferAsprintf(buf, " type='%s'/>\n",
|
|
virDomainChrTypeToString(priv->monConfig->type));
|
|
}
|
|
|
|
if (priv->namespaces) {
|
|
ssize_t ns = -1;
|
|
|
|
virBufferAddLit(buf, "<namespaces>\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
while ((ns = virBitmapNextSetBit(priv->namespaces, ns)) >= 0)
|
|
virBufferAsprintf(buf, "<%s/>\n", qemuDomainNamespaceTypeToString(ns));
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</namespaces>\n");
|
|
}
|
|
|
|
qemuDomainObjPrivateXMLFormatVcpus(buf, vm->def);
|
|
|
|
if (priv->qemuCaps) {
|
|
size_t i;
|
|
virBufferAddLit(buf, "<qemuCaps>\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
for (i = 0; i < QEMU_CAPS_LAST; i++) {
|
|
if (virQEMUCapsGet(priv->qemuCaps, i)) {
|
|
virBufferAsprintf(buf, "<flag name='%s'/>\n",
|
|
virQEMUCapsTypeToString(i));
|
|
}
|
|
}
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</qemuCaps>\n");
|
|
}
|
|
|
|
if (priv->lockState)
|
|
virBufferAsprintf(buf, "<lockstate>%s</lockstate>\n", priv->lockState);
|
|
|
|
job = priv->job.active;
|
|
if (!qemuDomainTrackJob(job))
|
|
priv->job.active = QEMU_JOB_NONE;
|
|
|
|
if (priv->job.active || priv->job.asyncJob) {
|
|
virBufferAsprintf(buf, "<job type='%s' async='%s'",
|
|
qemuDomainJobTypeToString(priv->job.active),
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob));
|
|
if (priv->job.phase) {
|
|
virBufferAsprintf(buf, " phase='%s'",
|
|
qemuDomainAsyncJobPhaseToString(
|
|
priv->job.asyncJob, priv->job.phase));
|
|
}
|
|
if (priv->job.asyncJob != QEMU_ASYNC_JOB_MIGRATION_OUT) {
|
|
virBufferAddLit(buf, "/>\n");
|
|
} else {
|
|
size_t i;
|
|
virDomainDiskDefPtr disk;
|
|
qemuDomainDiskPrivatePtr diskPriv;
|
|
|
|
virBufferAddLit(buf, ">\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
|
|
for (i = 0; i < vm->def->ndisks; i++) {
|
|
disk = vm->def->disks[i];
|
|
diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
|
|
virBufferAsprintf(buf, "<disk dev='%s' migrating='%s'/>\n",
|
|
disk->dst,
|
|
diskPriv->migrating ? "yes" : "no");
|
|
}
|
|
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</job>\n");
|
|
}
|
|
}
|
|
priv->job.active = job;
|
|
|
|
if (priv->fakeReboot)
|
|
virBufferAddLit(buf, "<fakereboot/>\n");
|
|
|
|
if (priv->qemuDevices && *priv->qemuDevices) {
|
|
char **tmp = priv->qemuDevices;
|
|
virBufferAddLit(buf, "<devices>\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
while (*tmp) {
|
|
virBufferAsprintf(buf, "<device alias='%s'/>\n", *tmp);
|
|
tmp++;
|
|
}
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</devices>\n");
|
|
}
|
|
|
|
if (priv->autoNodeset) {
|
|
char *nodeset = virBitmapFormat(priv->autoNodeset);
|
|
|
|
if (!nodeset)
|
|
return -1;
|
|
|
|
virBufferAsprintf(buf, "<numad nodeset='%s'/>\n", nodeset);
|
|
VIR_FREE(nodeset);
|
|
}
|
|
|
|
/* Various per-domain paths */
|
|
virBufferEscapeString(buf, "<libDir path='%s'/>\n", priv->libDir);
|
|
virBufferEscapeString(buf, "<channelTargetDir path='%s'/>\n",
|
|
priv->channelTargetDir);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainObjPrivateXMLParseVcpu(xmlNodePtr node,
|
|
unsigned int idx,
|
|
virDomainDefPtr def)
|
|
{
|
|
virDomainVcpuDefPtr vcpu;
|
|
char *idstr;
|
|
char *pidstr;
|
|
unsigned int tmp;
|
|
int ret = -1;
|
|
|
|
idstr = virXMLPropString(node, "id");
|
|
|
|
if (idstr &&
|
|
(virStrToLong_uip(idstr, NULL, 10, &idx) < 0)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot parse vcpu index '%s'"), idstr);
|
|
goto cleanup;
|
|
}
|
|
if (!(vcpu = virDomainDefGetVcpu(def, idx))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("invalid vcpu index '%u'"), idx);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!(pidstr = virXMLPropString(node, "pid")))
|
|
goto cleanup;
|
|
|
|
if (virStrToLong_uip(pidstr, NULL, 10, &tmp) < 0)
|
|
goto cleanup;
|
|
|
|
QEMU_DOMAIN_VCPU_PRIVATE(vcpu)->tid = tmp;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_FREE(idstr);
|
|
VIR_FREE(pidstr);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt,
|
|
virDomainObjPtr vm,
|
|
virDomainDefParserConfigPtr config)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virQEMUDriverPtr driver = config->priv;
|
|
char *monitorpath;
|
|
char *tmp = NULL;
|
|
int n;
|
|
size_t i;
|
|
xmlNodePtr *nodes = NULL;
|
|
xmlNodePtr node = NULL;
|
|
virQEMUCapsPtr qemuCaps = NULL;
|
|
virCapsPtr caps = NULL;
|
|
|
|
if (VIR_ALLOC(priv->monConfig) < 0)
|
|
goto error;
|
|
|
|
if (!(monitorpath =
|
|
virXPathString("string(./monitor[1]/@path)", ctxt))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("no monitor path"));
|
|
goto error;
|
|
}
|
|
|
|
tmp = virXPathString("string(./monitor[1]/@type)", ctxt);
|
|
if (tmp)
|
|
priv->monConfig->type = virDomainChrTypeFromString(tmp);
|
|
else
|
|
priv->monConfig->type = VIR_DOMAIN_CHR_TYPE_PTY;
|
|
VIR_FREE(tmp);
|
|
|
|
priv->monJSON = virXPathBoolean("count(./monitor[@json = '1']) > 0",
|
|
ctxt) > 0;
|
|
|
|
switch (priv->monConfig->type) {
|
|
case VIR_DOMAIN_CHR_TYPE_PTY:
|
|
priv->monConfig->data.file.path = monitorpath;
|
|
break;
|
|
case VIR_DOMAIN_CHR_TYPE_UNIX:
|
|
priv->monConfig->data.nix.path = monitorpath;
|
|
break;
|
|
default:
|
|
VIR_FREE(monitorpath);
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("unsupported monitor type '%s'"),
|
|
virDomainChrTypeToString(priv->monConfig->type));
|
|
goto error;
|
|
}
|
|
|
|
if ((node = virXPathNode("./namespaces", ctxt))) {
|
|
xmlNodePtr next;
|
|
|
|
for (next = node->children; next; next = next->next) {
|
|
int ns = qemuDomainNamespaceTypeFromString((const char *) next->name);
|
|
|
|
if (ns < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("malformed namespace name: %s"),
|
|
next->name);
|
|
goto error;
|
|
}
|
|
|
|
if (qemuDomainEnableNamespace(vm, ns) < 0)
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
if (priv->namespaces &&
|
|
virBitmapIsAllClear(priv->namespaces)) {
|
|
virBitmapFree(priv->namespaces);
|
|
priv->namespaces = NULL;
|
|
}
|
|
|
|
if ((n = virXPathNodeSet("./vcpus/vcpu", ctxt, &nodes)) < 0)
|
|
goto error;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
if (qemuDomainObjPrivateXMLParseVcpu(nodes[i], i, vm->def) < 0)
|
|
goto error;
|
|
}
|
|
VIR_FREE(nodes);
|
|
|
|
if ((n = virXPathNodeSet("./qemuCaps/flag", ctxt, &nodes)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("failed to parse qemu capabilities flags"));
|
|
goto error;
|
|
}
|
|
if (n > 0) {
|
|
if (!(qemuCaps = virQEMUCapsNew()))
|
|
goto error;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
char *str = virXMLPropString(nodes[i], "name");
|
|
if (str) {
|
|
int flag = virQEMUCapsTypeFromString(str);
|
|
if (flag < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unknown qemu capabilities flag %s"), str);
|
|
VIR_FREE(str);
|
|
goto error;
|
|
}
|
|
VIR_FREE(str);
|
|
virQEMUCapsSet(qemuCaps, flag);
|
|
}
|
|
}
|
|
|
|
priv->qemuCaps = qemuCaps;
|
|
qemuCaps = NULL;
|
|
}
|
|
VIR_FREE(nodes);
|
|
|
|
priv->lockState = virXPathString("string(./lockstate)", ctxt);
|
|
|
|
if ((tmp = virXPathString("string(./job[1]/@type)", ctxt))) {
|
|
int type;
|
|
|
|
if ((type = qemuDomainJobTypeFromString(tmp)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unknown job type %s"), tmp);
|
|
VIR_FREE(tmp);
|
|
goto error;
|
|
}
|
|
VIR_FREE(tmp);
|
|
priv->job.active = type;
|
|
}
|
|
|
|
if ((tmp = virXPathString("string(./job[1]/@async)", ctxt))) {
|
|
int async;
|
|
|
|
if ((async = qemuDomainAsyncJobTypeFromString(tmp)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unknown async job type %s"), tmp);
|
|
VIR_FREE(tmp);
|
|
goto error;
|
|
}
|
|
VIR_FREE(tmp);
|
|
priv->job.asyncJob = async;
|
|
|
|
if ((tmp = virXPathString("string(./job[1]/@phase)", ctxt))) {
|
|
priv->job.phase = qemuDomainAsyncJobPhaseFromString(async, tmp);
|
|
if (priv->job.phase < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unknown job phase %s"), tmp);
|
|
VIR_FREE(tmp);
|
|
goto error;
|
|
}
|
|
VIR_FREE(tmp);
|
|
}
|
|
}
|
|
|
|
if ((n = virXPathNodeSet("./job[1]/disk[@migrating='yes']",
|
|
ctxt, &nodes)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to parse list of disks marked for migration"));
|
|
goto error;
|
|
}
|
|
if (n > 0) {
|
|
if (priv->job.asyncJob != QEMU_ASYNC_JOB_MIGRATION_OUT) {
|
|
VIR_WARN("Found disks marked for migration but we were not "
|
|
"migrating");
|
|
n = 0;
|
|
}
|
|
for (i = 0; i < n; i++) {
|
|
char *dst = virXMLPropString(nodes[i], "dev");
|
|
virDomainDiskDefPtr disk;
|
|
|
|
if (dst && (disk = virDomainDiskByName(vm->def, dst, false)))
|
|
QEMU_DOMAIN_DISK_PRIVATE(disk)->migrating = true;
|
|
VIR_FREE(dst);
|
|
}
|
|
}
|
|
VIR_FREE(nodes);
|
|
|
|
priv->fakeReboot = virXPathBoolean("boolean(./fakereboot)", ctxt) == 1;
|
|
|
|
if ((n = virXPathNodeSet("./devices/device", ctxt, &nodes)) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to parse qemu device list"));
|
|
goto error;
|
|
}
|
|
if (n > 0) {
|
|
/* NULL-terminated list */
|
|
if (VIR_ALLOC_N(priv->qemuDevices, n + 1) < 0)
|
|
goto error;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
priv->qemuDevices[i] = virXMLPropString(nodes[i], "alias");
|
|
if (!priv->qemuDevices[i]) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("failed to parse qemu device list"));
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
VIR_FREE(nodes);
|
|
|
|
if (!(caps = virQEMUDriverGetCapabilities(driver, false)))
|
|
goto error;
|
|
|
|
if ((tmp = virXPathString("string(./numad/@nodeset)", ctxt))) {
|
|
if (virBitmapParse(tmp, &priv->autoNodeset,
|
|
caps->host.nnumaCell_max) < 0)
|
|
goto error;
|
|
|
|
if (!(priv->autoCpuset = virCapabilitiesGetCpusForNodemask(caps,
|
|
priv->autoNodeset)))
|
|
goto error;
|
|
}
|
|
virObjectUnref(caps);
|
|
VIR_FREE(tmp);
|
|
|
|
if ((tmp = virXPathString("string(./libDir/@path)", ctxt)))
|
|
priv->libDir = tmp;
|
|
if ((tmp = virXPathString("string(./channelTargetDir/@path)", ctxt)))
|
|
priv->channelTargetDir = tmp;
|
|
tmp = NULL;
|
|
|
|
if (qemuDomainSetPrivatePathsOld(driver, vm) < 0)
|
|
goto error;
|
|
|
|
return 0;
|
|
|
|
error:
|
|
VIR_FREE(nodes);
|
|
VIR_FREE(tmp);
|
|
virBitmapFree(priv->namespaces);
|
|
priv->namespaces = NULL;
|
|
virDomainChrSourceDefFree(priv->monConfig);
|
|
priv->monConfig = NULL;
|
|
virStringListFree(priv->qemuDevices);
|
|
priv->qemuDevices = NULL;
|
|
virObjectUnref(qemuCaps);
|
|
virObjectUnref(caps);
|
|
return -1;
|
|
}
|
|
|
|
|
|
virDomainXMLPrivateDataCallbacks virQEMUDriverPrivateDataCallbacks = {
|
|
.alloc = qemuDomainObjPrivateAlloc,
|
|
.free = qemuDomainObjPrivateFree,
|
|
.diskNew = qemuDomainDiskPrivateNew,
|
|
.vcpuNew = qemuDomainVcpuPrivateNew,
|
|
.hostdevNew = qemuDomainHostdevPrivateNew,
|
|
.chrSourceNew = qemuDomainChrSourcePrivateNew,
|
|
.parse = qemuDomainObjPrivateXMLParse,
|
|
.format = qemuDomainObjPrivateXMLFormat,
|
|
};
|
|
|
|
|
|
static void
|
|
qemuDomainDefNamespaceFree(void *nsdata)
|
|
{
|
|
qemuDomainCmdlineDefPtr cmd = nsdata;
|
|
|
|
qemuDomainCmdlineDefFree(cmd);
|
|
}
|
|
|
|
static int
|
|
qemuDomainDefNamespaceParse(xmlDocPtr xml ATTRIBUTE_UNUSED,
|
|
xmlNodePtr root ATTRIBUTE_UNUSED,
|
|
xmlXPathContextPtr ctxt,
|
|
void **data)
|
|
{
|
|
qemuDomainCmdlineDefPtr cmd = NULL;
|
|
bool uses_qemu_ns = false;
|
|
xmlNodePtr *nodes = NULL;
|
|
int n;
|
|
size_t i;
|
|
|
|
if (xmlXPathRegisterNs(ctxt, BAD_CAST "qemu", BAD_CAST QEMU_NAMESPACE_HREF) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Failed to register xml namespace '%s'"),
|
|
QEMU_NAMESPACE_HREF);
|
|
return -1;
|
|
}
|
|
|
|
if (VIR_ALLOC(cmd) < 0)
|
|
return -1;
|
|
|
|
/* first handle the extra command-line arguments */
|
|
n = virXPathNodeSet("./qemu:commandline/qemu:arg", ctxt, &nodes);
|
|
if (n < 0)
|
|
goto error;
|
|
uses_qemu_ns |= n > 0;
|
|
|
|
if (n && VIR_ALLOC_N(cmd->args, n) < 0)
|
|
goto error;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
cmd->args[cmd->num_args] = virXMLPropString(nodes[i], "value");
|
|
if (cmd->args[cmd->num_args] == NULL) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("No qemu command-line argument specified"));
|
|
goto error;
|
|
}
|
|
cmd->num_args++;
|
|
}
|
|
|
|
VIR_FREE(nodes);
|
|
|
|
/* now handle the extra environment variables */
|
|
n = virXPathNodeSet("./qemu:commandline/qemu:env", ctxt, &nodes);
|
|
if (n < 0)
|
|
goto error;
|
|
uses_qemu_ns |= n > 0;
|
|
|
|
if (n && VIR_ALLOC_N(cmd->env_name, n) < 0)
|
|
goto error;
|
|
|
|
if (n && VIR_ALLOC_N(cmd->env_value, n) < 0)
|
|
goto error;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
char *tmp;
|
|
|
|
tmp = virXMLPropString(nodes[i], "name");
|
|
if (tmp == NULL) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("No qemu environment name specified"));
|
|
goto error;
|
|
}
|
|
if (tmp[0] == '\0') {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("Empty qemu environment name specified"));
|
|
goto error;
|
|
}
|
|
if (!c_isalpha(tmp[0]) && tmp[0] != '_') {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("Invalid environment name, it must begin with a letter or underscore"));
|
|
goto error;
|
|
}
|
|
if (strspn(tmp, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_") != strlen(tmp)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("Invalid environment name, it must contain only alphanumerics and underscore"));
|
|
goto error;
|
|
}
|
|
|
|
cmd->env_name[cmd->num_env] = tmp;
|
|
|
|
cmd->env_value[cmd->num_env] = virXMLPropString(nodes[i], "value");
|
|
/* a NULL value for command is allowed, since it might be empty */
|
|
cmd->num_env++;
|
|
}
|
|
|
|
VIR_FREE(nodes);
|
|
|
|
if (uses_qemu_ns)
|
|
*data = cmd;
|
|
else
|
|
VIR_FREE(cmd);
|
|
|
|
return 0;
|
|
|
|
error:
|
|
VIR_FREE(nodes);
|
|
qemuDomainDefNamespaceFree(cmd);
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
qemuDomainDefNamespaceFormatXML(virBufferPtr buf,
|
|
void *nsdata)
|
|
{
|
|
qemuDomainCmdlineDefPtr cmd = nsdata;
|
|
size_t i;
|
|
|
|
if (!cmd->num_args && !cmd->num_env)
|
|
return 0;
|
|
|
|
virBufferAddLit(buf, "<qemu:commandline>\n");
|
|
virBufferAdjustIndent(buf, 2);
|
|
|
|
for (i = 0; i < cmd->num_args; i++)
|
|
virBufferEscapeString(buf, "<qemu:arg value='%s'/>\n",
|
|
cmd->args[i]);
|
|
for (i = 0; i < cmd->num_env; i++) {
|
|
virBufferAsprintf(buf, "<qemu:env name='%s'", cmd->env_name[i]);
|
|
if (cmd->env_value[i])
|
|
virBufferEscapeString(buf, " value='%s'", cmd->env_value[i]);
|
|
virBufferAddLit(buf, "/>\n");
|
|
}
|
|
|
|
virBufferAdjustIndent(buf, -2);
|
|
virBufferAddLit(buf, "</qemu:commandline>\n");
|
|
return 0;
|
|
}
|
|
|
|
static const char *
|
|
qemuDomainDefNamespaceHref(void)
|
|
{
|
|
return "xmlns:qemu='" QEMU_NAMESPACE_HREF "'";
|
|
}
|
|
|
|
|
|
virDomainXMLNamespace virQEMUDriverDomainXMLNamespace = {
|
|
.parse = qemuDomainDefNamespaceParse,
|
|
.free = qemuDomainDefNamespaceFree,
|
|
.format = qemuDomainDefNamespaceFormatXML,
|
|
.href = qemuDomainDefNamespaceHref,
|
|
};
|
|
|
|
|
|
static int
|
|
qemuDomainDefAddImplicitInputDevice(virDomainDef *def)
|
|
{
|
|
if (ARCH_IS_X86(def->os.arch)) {
|
|
if (virDomainDefMaybeAddInput(def,
|
|
VIR_DOMAIN_INPUT_TYPE_MOUSE,
|
|
VIR_DOMAIN_INPUT_BUS_PS2) < 0)
|
|
return -1;
|
|
|
|
if (virDomainDefMaybeAddInput(def,
|
|
VIR_DOMAIN_INPUT_TYPE_KBD,
|
|
VIR_DOMAIN_INPUT_BUS_PS2) < 0)
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefAddDefaultDevices(virDomainDefPtr def,
|
|
virQEMUCapsPtr qemuCaps)
|
|
{
|
|
bool addDefaultUSB = true;
|
|
int usbModel = -1; /* "default for machinetype" */
|
|
int pciRoot; /* index within def->controllers */
|
|
bool addImplicitSATA = false;
|
|
bool addPCIRoot = false;
|
|
bool addPCIeRoot = false;
|
|
bool addDefaultMemballoon = true;
|
|
bool addDefaultUSBKBD = false;
|
|
bool addDefaultUSBMouse = false;
|
|
bool addPanicDevice = false;
|
|
int ret = -1;
|
|
|
|
/* add implicit input devices */
|
|
if (qemuDomainDefAddImplicitInputDevice(def) < 0)
|
|
goto cleanup;
|
|
|
|
/* Add implicit PCI root controller if the machine has one */
|
|
switch (def->os.arch) {
|
|
case VIR_ARCH_I686:
|
|
case VIR_ARCH_X86_64:
|
|
if (STREQ(def->os.machine, "isapc")) {
|
|
addDefaultUSB = false;
|
|
break;
|
|
}
|
|
if (qemuDomainMachineIsQ35(def)) {
|
|
addPCIeRoot = true;
|
|
addImplicitSATA = true;
|
|
|
|
/* Prefer adding USB3 controller if supported
|
|
* (nec-usb-xhci). Failing that, add a USB2 controller set
|
|
* if the ich9-usb-ehci1 device is supported. Otherwise
|
|
* don't add anything.
|
|
*/
|
|
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NEC_USB_XHCI))
|
|
usbModel = VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI;
|
|
else if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_ICH9_USB_EHCI1))
|
|
usbModel = VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_EHCI1;
|
|
else
|
|
addDefaultUSB = false;
|
|
break;
|
|
}
|
|
if (qemuDomainMachineIsI440FX(def))
|
|
addPCIRoot = true;
|
|
break;
|
|
|
|
case VIR_ARCH_ARMV7L:
|
|
case VIR_ARCH_AARCH64:
|
|
addDefaultUSB = false;
|
|
addDefaultMemballoon = false;
|
|
if (qemuDomainMachineIsVirt(def))
|
|
addPCIeRoot = virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_GPEX);
|
|
break;
|
|
|
|
case VIR_ARCH_PPC64:
|
|
case VIR_ARCH_PPC64LE:
|
|
addPCIRoot = true;
|
|
addDefaultUSBKBD = true;
|
|
addDefaultUSBMouse = true;
|
|
/* For pSeries guests, the firmware provides the same
|
|
* functionality as the pvpanic device, so automatically
|
|
* add the definition if not already present */
|
|
if (qemuDomainMachineIsPSeries(def))
|
|
addPanicDevice = true;
|
|
break;
|
|
|
|
case VIR_ARCH_ALPHA:
|
|
case VIR_ARCH_PPC:
|
|
case VIR_ARCH_PPCEMB:
|
|
case VIR_ARCH_SH4:
|
|
case VIR_ARCH_SH4EB:
|
|
addPCIRoot = true;
|
|
break;
|
|
|
|
case VIR_ARCH_S390:
|
|
case VIR_ARCH_S390X:
|
|
addDefaultUSB = false;
|
|
addPanicDevice = true;
|
|
break;
|
|
|
|
case VIR_ARCH_SPARC:
|
|
case VIR_ARCH_SPARC64:
|
|
addPCIRoot = true;
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (addDefaultUSB &&
|
|
virDomainControllerFind(def, VIR_DOMAIN_CONTROLLER_TYPE_USB, 0) < 0 &&
|
|
virDomainDefAddUSBController(def, 0, usbModel) < 0)
|
|
goto cleanup;
|
|
|
|
if (addImplicitSATA &&
|
|
virDomainDefMaybeAddController(
|
|
def, VIR_DOMAIN_CONTROLLER_TYPE_SATA, 0, -1) < 0)
|
|
goto cleanup;
|
|
|
|
pciRoot = virDomainControllerFind(def, VIR_DOMAIN_CONTROLLER_TYPE_PCI, 0);
|
|
|
|
/* NB: any machine that sets addPCIRoot to true must also return
|
|
* true from the function qemuDomainSupportsPCI().
|
|
*/
|
|
if (addPCIRoot) {
|
|
if (pciRoot >= 0) {
|
|
if (def->controllers[pciRoot]->model != VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT) {
|
|
virReportError(VIR_ERR_XML_ERROR,
|
|
_("The PCI controller with index='0' must be "
|
|
"model='pci-root' for this machine type, "
|
|
"but model='%s' was found instead"),
|
|
virDomainControllerModelPCITypeToString(def->controllers[pciRoot]->model));
|
|
goto cleanup;
|
|
}
|
|
} else if (!virDomainDefAddController(def, VIR_DOMAIN_CONTROLLER_TYPE_PCI, 0,
|
|
VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT)) {
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
/* When a machine has a pcie-root, make sure that there is always
|
|
* a dmi-to-pci-bridge controller added as bus 1, and a pci-bridge
|
|
* as bus 2, so that standard PCI devices can be connected
|
|
*
|
|
* NB: any machine that sets addPCIeRoot to true must also return
|
|
* true from the function qemuDomainSupportsPCI().
|
|
*/
|
|
if (addPCIeRoot) {
|
|
if (pciRoot >= 0) {
|
|
if (def->controllers[pciRoot]->model != VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT) {
|
|
virReportError(VIR_ERR_XML_ERROR,
|
|
_("The PCI controller with index='0' must be "
|
|
"model='pcie-root' for this machine type, "
|
|
"but model='%s' was found instead"),
|
|
virDomainControllerModelPCITypeToString(def->controllers[pciRoot]->model));
|
|
goto cleanup;
|
|
}
|
|
} else if (!virDomainDefAddController(def, VIR_DOMAIN_CONTROLLER_TYPE_PCI, 0,
|
|
VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT)) {
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (addDefaultMemballoon && !def->memballoon) {
|
|
virDomainMemballoonDefPtr memballoon;
|
|
if (VIR_ALLOC(memballoon) < 0)
|
|
goto cleanup;
|
|
|
|
memballoon->model = VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO;
|
|
def->memballoon = memballoon;
|
|
}
|
|
|
|
if (addDefaultUSBKBD &&
|
|
def->ngraphics > 0 &&
|
|
virDomainDefMaybeAddInput(def,
|
|
VIR_DOMAIN_INPUT_TYPE_KBD,
|
|
VIR_DOMAIN_INPUT_BUS_USB) < 0)
|
|
goto cleanup;
|
|
|
|
if (addDefaultUSBMouse &&
|
|
def->ngraphics > 0 &&
|
|
virDomainDefMaybeAddInput(def,
|
|
VIR_DOMAIN_INPUT_TYPE_MOUSE,
|
|
VIR_DOMAIN_INPUT_BUS_USB) < 0)
|
|
goto cleanup;
|
|
|
|
if (addPanicDevice) {
|
|
size_t j;
|
|
for (j = 0; j < def->npanics; j++) {
|
|
if (def->panics[j]->model == VIR_DOMAIN_PANIC_MODEL_DEFAULT ||
|
|
(ARCH_IS_PPC64(def->os.arch) &&
|
|
def->panics[j]->model == VIR_DOMAIN_PANIC_MODEL_PSERIES) ||
|
|
(ARCH_IS_S390(def->os.arch) &&
|
|
def->panics[j]->model == VIR_DOMAIN_PANIC_MODEL_S390))
|
|
break;
|
|
}
|
|
|
|
if (j == def->npanics) {
|
|
virDomainPanicDefPtr panic;
|
|
if (VIR_ALLOC(panic) < 0 ||
|
|
VIR_APPEND_ELEMENT_COPY(def->panics,
|
|
def->npanics, panic) < 0) {
|
|
VIR_FREE(panic);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainDefEnableDefaultFeatures:
|
|
* @def: domain definition
|
|
* @qemuCaps: QEMU capabilities
|
|
*
|
|
* Make sure that features that should be enabled by default are actually
|
|
* enabled and configure default values related to those features.
|
|
*/
|
|
static void
|
|
qemuDomainDefEnableDefaultFeatures(virDomainDefPtr def,
|
|
virQEMUCapsPtr qemuCaps)
|
|
{
|
|
virGICVersion version;
|
|
|
|
/* The virt machine type always uses GIC: if the relevant element
|
|
* was not included in the domain XML, we need to choose a suitable
|
|
* GIC version ourselves */
|
|
if (def->features[VIR_DOMAIN_FEATURE_GIC] == VIR_TRISTATE_SWITCH_ABSENT &&
|
|
qemuDomainMachineIsVirt(def)) {
|
|
|
|
VIR_DEBUG("Looking for usable GIC version in domain capabilities");
|
|
for (version = VIR_GIC_VERSION_LAST - 1;
|
|
version > VIR_GIC_VERSION_NONE;
|
|
version--) {
|
|
if (virQEMUCapsSupportsGICVersion(qemuCaps,
|
|
def->virtType,
|
|
version)) {
|
|
VIR_DEBUG("Using GIC version %s",
|
|
virGICVersionTypeToString(version));
|
|
def->gic_version = version;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Even if we haven't found a usable GIC version in the domain
|
|
* capabilities, we still want to enable this */
|
|
def->features[VIR_DOMAIN_FEATURE_GIC] = VIR_TRISTATE_SWITCH_ON;
|
|
}
|
|
|
|
/* Use the default GIC version if no version was specified */
|
|
if (def->features[VIR_DOMAIN_FEATURE_GIC] == VIR_TRISTATE_SWITCH_ON &&
|
|
def->gic_version == VIR_GIC_VERSION_NONE)
|
|
def->gic_version = VIR_GIC_VERSION_DEFAULT;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuCanonicalizeMachine(virDomainDefPtr def, virQEMUCapsPtr qemuCaps)
|
|
{
|
|
const char *canon;
|
|
|
|
if (!(canon = virQEMUCapsGetCanonicalMachine(qemuCaps, def->os.machine)))
|
|
return 0;
|
|
|
|
if (STRNEQ(canon, def->os.machine)) {
|
|
char *tmp;
|
|
if (VIR_STRDUP(tmp, canon) < 0)
|
|
return -1;
|
|
VIR_FREE(def->os.machine);
|
|
def->os.machine = tmp;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainRecheckInternalPaths(virDomainDefPtr def,
|
|
virQEMUDriverConfigPtr cfg,
|
|
unsigned int flags)
|
|
{
|
|
size_t i = 0;
|
|
size_t j = 0;
|
|
|
|
for (i = 0; i < def->ngraphics; ++i) {
|
|
virDomainGraphicsDefPtr graphics = def->graphics[i];
|
|
|
|
for (j = 0; j < graphics->nListens; ++j) {
|
|
virDomainGraphicsListenDefPtr glisten = &graphics->listens[j];
|
|
|
|
/* This will happen only if we parse XML from old libvirts where
|
|
* unix socket was available only for VNC graphics. In this
|
|
* particular case we should follow the behavior and if we remove
|
|
* the auto-generated socket base on config option from qemu.conf
|
|
* we need to change the listen type to address. */
|
|
if (graphics->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
|
|
glisten->type == VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET &&
|
|
glisten->socket &&
|
|
STRPREFIX(glisten->socket, cfg->libDir)) {
|
|
if (flags & VIR_DOMAIN_DEF_PARSE_INACTIVE) {
|
|
VIR_FREE(glisten->socket);
|
|
glisten->type = VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS;
|
|
} else {
|
|
glisten->fromConfig = true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefVcpusPostParse(virDomainDefPtr def)
|
|
{
|
|
unsigned int maxvcpus = virDomainDefGetVcpusMax(def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
virDomainVcpuDefPtr prevvcpu;
|
|
size_t i;
|
|
bool has_order = false;
|
|
|
|
/* vcpu 0 needs to be present, first, and non-hotpluggable */
|
|
vcpu = virDomainDefGetVcpu(def, 0);
|
|
if (!vcpu->online) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("vcpu 0 can't be offline"));
|
|
return -1;
|
|
}
|
|
if (vcpu->hotpluggable == VIR_TRISTATE_BOOL_YES) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("vcpu0 can't be hotpluggable"));
|
|
return -1;
|
|
}
|
|
if (vcpu->order != 0 && vcpu->order != 1) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("vcpu0 must be enabled first"));
|
|
return -1;
|
|
}
|
|
|
|
if (vcpu->order != 0)
|
|
has_order = true;
|
|
|
|
prevvcpu = vcpu;
|
|
|
|
/* all online vcpus or non online vcpu need to have order set */
|
|
for (i = 1; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(def, i);
|
|
|
|
if (vcpu->online &&
|
|
(vcpu->order != 0) != has_order) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("all vcpus must have either set or unset order"));
|
|
return -1;
|
|
}
|
|
|
|
/* few conditions for non-hotpluggable (thus online) vcpus */
|
|
if (vcpu->hotpluggable == VIR_TRISTATE_BOOL_NO) {
|
|
/* they can be ordered only at the beginning */
|
|
if (prevvcpu->hotpluggable == VIR_TRISTATE_BOOL_YES) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("online non-hotpluggable vcpus need to be "
|
|
"ordered prior to hotplugable vcpus"));
|
|
return -1;
|
|
}
|
|
|
|
/* they need to be in order (qemu doesn't support any order yet).
|
|
* Also note that multiple vcpus may share order on some platforms */
|
|
if (prevvcpu->order > vcpu->order) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("online non-hotpluggable vcpus must be ordered "
|
|
"in ascending order"));
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
prevvcpu = vcpu;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefPostParse(virDomainDefPtr def,
|
|
virCapsPtr caps,
|
|
unsigned int parseFlags,
|
|
void *opaque,
|
|
void *parseOpaque)
|
|
{
|
|
virQEMUDriverPtr driver = opaque;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
virQEMUCapsPtr qemuCaps = parseOpaque;
|
|
int ret = -1;
|
|
|
|
if (def->os.bootloader || def->os.bootloaderArgs) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("bootloader is not supported by QEMU"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!def->os.machine) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("missing machine type"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (def->os.loader &&
|
|
def->os.loader->type == VIR_DOMAIN_LOADER_TYPE_PFLASH &&
|
|
def->os.loader->readonly == VIR_TRISTATE_SWITCH_ON &&
|
|
!def->os.loader->nvram) {
|
|
if (virAsprintf(&def->os.loader->nvram, "%s/%s_VARS.fd",
|
|
cfg->nvramDir, def->name) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
/* check for emulator and create a default one if needed */
|
|
if (!def->emulator &&
|
|
!(def->emulator = virDomainDefGetDefaultEmulator(def, caps)))
|
|
goto cleanup;
|
|
|
|
if (qemuCaps) {
|
|
virObjectRef(qemuCaps);
|
|
} else {
|
|
if (!(qemuCaps = virQEMUCapsCacheLookup(caps,
|
|
driver->qemuCapsCache,
|
|
def->emulator)))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainDefAddDefaultDevices(def, qemuCaps) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuCanonicalizeMachine(def, qemuCaps) < 0)
|
|
goto cleanup;
|
|
|
|
qemuDomainDefEnableDefaultFeatures(def, qemuCaps);
|
|
|
|
if (qemuDomainRecheckInternalPaths(def, cfg, parseFlags) < 0)
|
|
goto cleanup;
|
|
|
|
if (virSecurityManagerVerify(driver->securityManager, def) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainDefVcpusPostParse(def) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(qemuCaps);
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefValidateVideo(const virDomainDef *def)
|
|
{
|
|
size_t i;
|
|
virDomainVideoDefPtr video;
|
|
|
|
for (i = 0; i < def->nvideos; i++) {
|
|
video = def->videos[i];
|
|
|
|
switch (video->type) {
|
|
case VIR_DOMAIN_VIDEO_TYPE_XEN:
|
|
case VIR_DOMAIN_VIDEO_TYPE_VBOX:
|
|
case VIR_DOMAIN_VIDEO_TYPE_PARALLELS:
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("video type '%s' is not supported with QEMU"),
|
|
virDomainVideoTypeToString(video->type));
|
|
return -1;
|
|
case VIR_DOMAIN_VIDEO_TYPE_VGA:
|
|
case VIR_DOMAIN_VIDEO_TYPE_CIRRUS:
|
|
case VIR_DOMAIN_VIDEO_TYPE_VMVGA:
|
|
case VIR_DOMAIN_VIDEO_TYPE_QXL:
|
|
case VIR_DOMAIN_VIDEO_TYPE_VIRTIO:
|
|
case VIR_DOMAIN_VIDEO_TYPE_LAST:
|
|
break;
|
|
}
|
|
|
|
if (!video->primary &&
|
|
video->type != VIR_DOMAIN_VIDEO_TYPE_QXL &&
|
|
video->type != VIR_DOMAIN_VIDEO_TYPE_VIRTIO) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("video type '%s' is only valid as primary "
|
|
"video device"),
|
|
virDomainVideoTypeToString(video->type));
|
|
return -1;
|
|
}
|
|
|
|
if (video->accel && video->accel->accel2d == VIR_TRISTATE_SWITCH_ON) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("qemu does not support the accel2d setting"));
|
|
return -1;
|
|
}
|
|
|
|
if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL) {
|
|
if (video->vram > (UINT_MAX / 1024)) {
|
|
virReportError(VIR_ERR_OVERFLOW,
|
|
_("value for 'vram' must be less than '%u'"),
|
|
UINT_MAX / 1024);
|
|
return -1;
|
|
}
|
|
if (video->ram > (UINT_MAX / 1024)) {
|
|
virReportError(VIR_ERR_OVERFLOW,
|
|
_("value for 'ram' must be less than '%u'"),
|
|
UINT_MAX / 1024);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (video->type == VIR_DOMAIN_VIDEO_TYPE_VGA ||
|
|
video->type == VIR_DOMAIN_VIDEO_TYPE_VMVGA) {
|
|
if (video->vram && video->vram < 1024) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
"%s", _("value for 'vram' must be at least "
|
|
"1 MiB (1024 KiB)"));
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefValidate(const virDomainDef *def,
|
|
virCapsPtr caps,
|
|
void *opaque)
|
|
{
|
|
virQEMUDriverPtr driver = opaque;
|
|
virQEMUCapsPtr qemuCaps = NULL;
|
|
unsigned int topologycpus;
|
|
int ret = -1;
|
|
|
|
if (!(qemuCaps = virQEMUCapsCacheLookup(caps,
|
|
driver->qemuCapsCache,
|
|
def->emulator)))
|
|
goto cleanup;
|
|
|
|
if (def->mem.min_guarantee) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Parameter 'min_guarantee' not supported by QEMU."));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (def->os.loader &&
|
|
def->os.loader->secure == VIR_TRISTATE_BOOL_YES) {
|
|
/* These are the QEMU implementation limitations. But we
|
|
* have to live with them for now. */
|
|
|
|
if (!qemuDomainMachineIsQ35(def)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Secure boot is supported with q35 machine types only"));
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Now, technically it is possible to have secure boot on
|
|
* 32bits too, but that would require some -cpu xxx magic
|
|
* too. Not worth it unless we are explicitly asked. */
|
|
if (def->os.arch != VIR_ARCH_X86_64) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Secure boot is supported for x86_64 architecture only"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (def->features[VIR_DOMAIN_FEATURE_SMM] != VIR_TRISTATE_SWITCH_ON) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Secure boot requires SMM feature enabled"));
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
/* qemu as of 2.5.0 rejects SMP topologies that don't match the cpu count */
|
|
if (virDomainDefGetVcpusTopology(def, &topologycpus) == 0 &&
|
|
topologycpus != virDomainDefGetVcpusMax(def)) {
|
|
/* presence of query-hotpluggable-cpus should be a good enough witness */
|
|
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QUERY_HOTPLUGGABLE_CPUS)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("CPU topology doesn't match maximum vcpu count"));
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
/* Memory locking can only work properly if the memory locking limit
|
|
* for the QEMU process has been raised appropriately: the default one
|
|
* is extrememly low, so there's no way the guest will fit in there */
|
|
if (def->mem.locked && !virMemoryLimitIsSet(def->mem.hard_limit)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Setting <memoryBacking><locked> requires "
|
|
"<memtune><hard_limit> to be set as well"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainDefValidateVideo(def) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnref(qemuCaps);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDeviceDefValidate(const virDomainDeviceDef *dev,
|
|
const virDomainDef *def ATTRIBUTE_UNUSED,
|
|
void *opaque)
|
|
{
|
|
virQEMUDriverPtr driver = opaque;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int ret = -1;
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_NET) {
|
|
const virDomainNetDef *net = dev->data.net;
|
|
|
|
if (net->guestIP.nroutes || net->guestIP.nips) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Invalid attempt to set network interface "
|
|
"guest-side IP route and/or address info, "
|
|
"not supported by QEMU"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (STREQ_NULLABLE(net->model, "virtio") &&
|
|
net->driver.virtio.rx_queue_size & (net->driver.virtio.rx_queue_size - 1)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("rx_queue_size has to be a power of two"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (net->mtu &&
|
|
!qemuDomainNetSupportsMTU(net->type)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("setting MTU on interface type %s is not supported yet"),
|
|
virDomainNetTypeToString(net->type));
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static const char *
|
|
qemuDomainDefaultNetModel(const virDomainDef *def,
|
|
virQEMUCapsPtr qemuCaps)
|
|
{
|
|
if (ARCH_IS_S390(def->os.arch))
|
|
return "virtio";
|
|
|
|
if (def->os.arch == VIR_ARCH_ARMV7L ||
|
|
def->os.arch == VIR_ARCH_AARCH64) {
|
|
if (STREQ(def->os.machine, "versatilepb"))
|
|
return "smc91c111";
|
|
|
|
if (qemuDomainMachineIsVirt(def))
|
|
return "virtio";
|
|
|
|
/* Incomplete. vexpress (and a few others) use this, but not all
|
|
* arm boards */
|
|
return "lan9118";
|
|
}
|
|
|
|
/* Try several network devices in turn; each of these devices is
|
|
* less likely be supported out-of-the-box by the guest operating
|
|
* system than the previous one */
|
|
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_RTL8139))
|
|
return "rtl8139";
|
|
else if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_E1000))
|
|
return "e1000";
|
|
else if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VIRTIO_NET))
|
|
return "virtio";
|
|
|
|
/* We've had no luck detecting support for any network device,
|
|
* but we have to return something: might as well be rtl8139 */
|
|
return "rtl8139";
|
|
}
|
|
|
|
|
|
/*
|
|
* Clear auto generated unix socket path, i.e., the one which starts with our
|
|
* channel directory.
|
|
*/
|
|
static void
|
|
qemuDomainChrDefDropDefaultPath(virDomainChrDefPtr chr,
|
|
virQEMUDriverPtr driver)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
|
|
chr->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO &&
|
|
chr->source->type == VIR_DOMAIN_CHR_TYPE_UNIX &&
|
|
chr->source->data.nix.path &&
|
|
STRPREFIX(chr->source->data.nix.path, cfg->channelTargetDir)) {
|
|
VIR_FREE(chr->source->data.nix.path);
|
|
}
|
|
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainShmemDefPostParse(virDomainShmemDefPtr shm)
|
|
{
|
|
/* This was the default since the introduction of this device. */
|
|
if (shm->model != VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL && !shm->size)
|
|
shm->size = 4 << 20;
|
|
|
|
/* Nothing more to check/change for IVSHMEM */
|
|
if (shm->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM)
|
|
return 0;
|
|
|
|
if (!shm->server.enabled) {
|
|
if (shm->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("shmem model '%s' is supported "
|
|
"only with server option enabled"),
|
|
virDomainShmemModelTypeToString(shm->model));
|
|
return -1;
|
|
}
|
|
|
|
if (shm->msi.enabled) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("shmem model '%s' doesn't support "
|
|
"msi"),
|
|
virDomainShmemModelTypeToString(shm->model));
|
|
}
|
|
} else {
|
|
if (shm->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("shmem model '%s' is supported "
|
|
"only with server option disabled"),
|
|
virDomainShmemModelTypeToString(shm->model));
|
|
return -1;
|
|
}
|
|
|
|
if (shm->size) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("shmem model '%s' does not support size setting"),
|
|
virDomainShmemModelTypeToString(shm->model));
|
|
return -1;
|
|
}
|
|
shm->msi.enabled = true;
|
|
if (!shm->msi.ioeventfd)
|
|
shm->msi.ioeventfd = VIR_TRISTATE_SWITCH_ON;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define QEMU_USB_NEC_XHCI_MAXPORTS 15
|
|
|
|
|
|
static int
|
|
qemuDomainDeviceDefPostParse(virDomainDeviceDefPtr dev,
|
|
const virDomainDef *def,
|
|
virCapsPtr caps,
|
|
unsigned int parseFlags,
|
|
void *opaque,
|
|
void *parseOpaque)
|
|
{
|
|
virQEMUDriverPtr driver = opaque;
|
|
virQEMUCapsPtr qemuCaps = parseOpaque;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int ret = -1;
|
|
|
|
if (qemuCaps) {
|
|
virObjectRef(qemuCaps);
|
|
} else {
|
|
qemuCaps = virQEMUCapsCacheLookup(caps, driver->qemuCapsCache,
|
|
def->emulator);
|
|
}
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_NET) {
|
|
if (dev->data.net->type != VIR_DOMAIN_NET_TYPE_HOSTDEV &&
|
|
!dev->data.net->model) {
|
|
if (VIR_STRDUP(dev->data.net->model,
|
|
qemuDomainDefaultNetModel(def, qemuCaps)) < 0)
|
|
goto cleanup;
|
|
}
|
|
if (dev->data.net->type == VIR_DOMAIN_NET_TYPE_VHOSTUSER &&
|
|
!dev->data.net->ifname) {
|
|
if (virNetDevOpenvswitchGetVhostuserIfname(
|
|
dev->data.net->data.vhostuser->data.nix.path,
|
|
&dev->data.net->ifname) < 0)
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
/* set default disk types and drivers */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
|
|
virDomainDiskDefPtr disk = dev->data.disk;
|
|
|
|
/* assign default storage format and driver according to config */
|
|
if (cfg->allowDiskFormatProbing) {
|
|
/* default disk format for drives */
|
|
if (virDomainDiskGetFormat(disk) == VIR_STORAGE_FILE_NONE &&
|
|
(virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_FILE ||
|
|
virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_BLOCK))
|
|
virDomainDiskSetFormat(disk, VIR_STORAGE_FILE_AUTO);
|
|
|
|
/* default disk format for mirrored drive */
|
|
if (disk->mirror &&
|
|
disk->mirror->format == VIR_STORAGE_FILE_NONE)
|
|
disk->mirror->format = VIR_STORAGE_FILE_AUTO;
|
|
} else {
|
|
/* default driver if probing is forbidden */
|
|
if (!virDomainDiskGetDriver(disk) &&
|
|
virDomainDiskSetDriver(disk, "qemu") < 0)
|
|
goto cleanup;
|
|
|
|
/* default disk format for drives */
|
|
if (virDomainDiskGetFormat(disk) == VIR_STORAGE_FILE_NONE &&
|
|
(virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_FILE ||
|
|
virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_BLOCK))
|
|
virDomainDiskSetFormat(disk, VIR_STORAGE_FILE_RAW);
|
|
|
|
/* default disk format for mirrored drive */
|
|
if (disk->mirror &&
|
|
disk->mirror->format == VIR_STORAGE_FILE_NONE)
|
|
disk->mirror->format = VIR_STORAGE_FILE_RAW;
|
|
}
|
|
}
|
|
|
|
/* set the default console type for S390 arches */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_CHR &&
|
|
dev->data.chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
|
|
dev->data.chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_NONE &&
|
|
ARCH_IS_S390(def->os.arch))
|
|
dev->data.chr->targetType = VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO;
|
|
|
|
/* set the default USB model to none for s390 unless an address is found */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER &&
|
|
dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
|
|
dev->data.controller->model == -1 &&
|
|
dev->data.controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
|
|
ARCH_IS_S390(def->os.arch))
|
|
dev->data.controller->model = VIR_DOMAIN_CONTROLLER_MODEL_USB_NONE;
|
|
|
|
/* forbid usb model 'qusb1' and 'qusb2' in this kind of hyperviosr */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER &&
|
|
dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
|
|
(dev->data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_QUSB1 ||
|
|
dev->data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_QUSB2)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("USB controller model type 'qusb1' or 'qusb2' "
|
|
"is not supported in %s"),
|
|
virDomainVirtTypeToString(def->virtType));
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
/* set the default SCSI controller model for S390 arches */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER &&
|
|
dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI &&
|
|
dev->data.controller->model == -1 &&
|
|
ARCH_IS_S390(def->os.arch))
|
|
dev->data.controller->model = VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_SCSI;
|
|
|
|
/* clear auto generated unix socket path for inactive definitions */
|
|
if ((parseFlags & VIR_DOMAIN_DEF_PARSE_INACTIVE) &&
|
|
dev->type == VIR_DOMAIN_DEVICE_CHR)
|
|
qemuDomainChrDefDropDefaultPath(dev->data.chr, driver);
|
|
|
|
/* forbid capabilities mode hostdev in this kind of hypervisor */
|
|
if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV &&
|
|
dev->data.hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("hostdev mode 'capabilities' is not "
|
|
"supported in %s"),
|
|
virDomainVirtTypeToString(def->virtType));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_VIDEO &&
|
|
dev->data.video->type == VIR_DOMAIN_VIDEO_TYPE_QXL) {
|
|
if (dev->data.video->vgamem) {
|
|
if (dev->data.video->vgamem < 1024) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("value for 'vgamem' must be at least 1 MiB "
|
|
"(1024 KiB)"));
|
|
goto cleanup;
|
|
}
|
|
if (dev->data.video->vgamem != VIR_ROUND_UP_POWER_OF_TWO(dev->data.video->vgamem)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("value for 'vgamem' must be power of two"));
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
dev->data.video->vgamem = QEMU_QXL_VGAMEM_DEFAULT;
|
|
}
|
|
}
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_PANIC &&
|
|
dev->data.panic->model == VIR_DOMAIN_PANIC_MODEL_DEFAULT) {
|
|
if (qemuDomainMachineIsPSeries(def))
|
|
dev->data.panic->model = VIR_DOMAIN_PANIC_MODEL_PSERIES;
|
|
else if (ARCH_IS_S390(def->os.arch))
|
|
dev->data.panic->model = VIR_DOMAIN_PANIC_MODEL_S390;
|
|
else
|
|
dev->data.panic->model = VIR_DOMAIN_PANIC_MODEL_ISA;
|
|
}
|
|
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
|
|
virDomainControllerDefPtr cont = dev->data.controller;
|
|
|
|
if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
|
|
cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI &&
|
|
cont->opts.usbopts.ports > QEMU_USB_NEC_XHCI_MAXPORTS) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("nec-xhci controller only supports up to %u ports"),
|
|
QEMU_USB_NEC_XHCI_MAXPORTS);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI) {
|
|
if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_EXPANDER_BUS &&
|
|
!qemuDomainMachineIsI440FX(def)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("pci-expander-bus controllers are only supported "
|
|
"on 440fx-based machinetypes"));
|
|
goto cleanup;
|
|
}
|
|
if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_EXPANDER_BUS &&
|
|
!qemuDomainMachineIsQ35(def)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("pcie-expander-bus controllers are only supported "
|
|
"on q35-based machinetypes"));
|
|
goto cleanup;
|
|
}
|
|
|
|
/* if a PCI expander bus has a NUMA node set, make sure
|
|
* that NUMA node is configured in the guest <cpu><numa>
|
|
* array. NUMA cell id's in this array are numbered
|
|
* from 0 .. size-1.
|
|
*/
|
|
if ((cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_EXPANDER_BUS ||
|
|
cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_EXPANDER_BUS) &&
|
|
(int) virDomainNumaGetNodeCount(def->numa)
|
|
<= cont->opts.pciopts.numaNode) {
|
|
virReportError(VIR_ERR_XML_ERROR,
|
|
_("%s with index %d is "
|
|
"configured for a NUMA node (%d) "
|
|
"not present in the domain's "
|
|
"<cpu><numa> array (%zu)"),
|
|
virDomainControllerModelPCITypeToString(cont->model),
|
|
cont->idx, cont->opts.pciopts.numaNode,
|
|
virDomainNumaGetNodeCount(def->numa));
|
|
goto cleanup;
|
|
}
|
|
} else if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
|
|
cont->model == -1) {
|
|
/* Pick a suitable default model for the USB controller if none
|
|
* has been selected by the user.
|
|
*
|
|
* We rely on device availability instead of setting the model
|
|
* unconditionally because, for some machine types, there's a
|
|
* chance we will get away with using the legacy USB controller
|
|
* when the relevant device is not available.
|
|
*
|
|
* See qemuBuildControllerDevCommandLine() */
|
|
if (ARCH_IS_PPC64(def->os.arch)) {
|
|
/* Default USB controller for ppc64 is pci-ohci */
|
|
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_PCI_OHCI))
|
|
cont->model = VIR_DOMAIN_CONTROLLER_MODEL_USB_PCI_OHCI;
|
|
} else {
|
|
/* Default USB controller for anything else is piix3-uhci */
|
|
if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX3_USB_UHCI))
|
|
cont->model = VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX3_UHCI;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (dev->type == VIR_DOMAIN_DEVICE_SHMEM &&
|
|
qemuDomainShmemDefPostParse(dev->data.shmem) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnref(qemuCaps);
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDefAssignAddresses(virDomainDef *def,
|
|
virCapsPtr caps,
|
|
unsigned int parseFlags ATTRIBUTE_UNUSED,
|
|
void *opaque,
|
|
void *parseOpaque)
|
|
{
|
|
virQEMUDriverPtr driver = opaque;
|
|
virQEMUCapsPtr qemuCaps = parseOpaque;
|
|
int ret = -1;
|
|
bool newDomain = parseFlags & VIR_DOMAIN_DEF_PARSE_ABI_UPDATE;
|
|
|
|
if (qemuCaps) {
|
|
virObjectRef(qemuCaps);
|
|
} else {
|
|
if (!(qemuCaps = virQEMUCapsCacheLookup(caps,
|
|
driver->qemuCapsCache,
|
|
def->emulator)))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainAssignAddresses(def, qemuCaps, driver, NULL, newDomain) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(qemuCaps);
|
|
return ret;
|
|
}
|
|
|
|
|
|
virDomainDefParserConfig virQEMUDriverDomainDefParserConfig = {
|
|
.devicesPostParseCallback = qemuDomainDeviceDefPostParse,
|
|
.domainPostParseCallback = qemuDomainDefPostParse,
|
|
.assignAddressesCallback = qemuDomainDefAssignAddresses,
|
|
.domainValidateCallback = qemuDomainDefValidate,
|
|
.deviceValidateCallback = qemuDomainDeviceDefValidate,
|
|
|
|
.features = VIR_DOMAIN_DEF_FEATURE_MEMORY_HOTPLUG |
|
|
VIR_DOMAIN_DEF_FEATURE_OFFLINE_VCPUPIN |
|
|
VIR_DOMAIN_DEF_FEATURE_INDIVIDUAL_VCPUS,
|
|
};
|
|
|
|
|
|
static void
|
|
qemuDomainObjSaveJob(virQEMUDriverPtr driver, virDomainObjPtr obj)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
if (virDomainObjIsActive(obj)) {
|
|
if (virDomainSaveStatus(driver->xmlopt, cfg->stateDir, obj, driver->caps) < 0)
|
|
VIR_WARN("Failed to save status on vm %s", obj->def->name);
|
|
}
|
|
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjSetJobPhase(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
int phase)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
unsigned long long me = virThreadSelfID();
|
|
|
|
if (!priv->job.asyncJob)
|
|
return;
|
|
|
|
VIR_DEBUG("Setting '%s' phase to '%s'",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
qemuDomainAsyncJobPhaseToString(priv->job.asyncJob, phase));
|
|
|
|
if (priv->job.asyncOwner && me != priv->job.asyncOwner) {
|
|
VIR_WARN("'%s' async job is owned by thread %llu",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
priv->job.asyncOwner);
|
|
}
|
|
|
|
priv->job.phase = phase;
|
|
priv->job.asyncOwner = me;
|
|
qemuDomainObjSaveJob(driver, obj);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjSetAsyncJobMask(virDomainObjPtr obj,
|
|
unsigned long long allowedJobs)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
if (!priv->job.asyncJob)
|
|
return;
|
|
|
|
priv->job.mask = allowedJobs | JOB_MASK(QEMU_JOB_DESTROY);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjDiscardAsyncJob(virQEMUDriverPtr driver, virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
if (priv->job.active == QEMU_JOB_ASYNC_NESTED)
|
|
qemuDomainObjResetJob(priv);
|
|
qemuDomainObjResetAsyncJob(priv);
|
|
qemuDomainObjSaveJob(driver, obj);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjReleaseAsyncJob(virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
VIR_DEBUG("Releasing ownership of '%s' async job",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob));
|
|
|
|
if (priv->job.asyncOwner != virThreadSelfID()) {
|
|
VIR_WARN("'%s' async job is owned by thread %llu",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
priv->job.asyncOwner);
|
|
}
|
|
priv->job.asyncOwner = 0;
|
|
}
|
|
|
|
static bool
|
|
qemuDomainNestedJobAllowed(qemuDomainObjPrivatePtr priv, qemuDomainJob job)
|
|
{
|
|
return !priv->job.asyncJob || (priv->job.mask & JOB_MASK(job)) != 0;
|
|
}
|
|
|
|
bool
|
|
qemuDomainJobAllowed(qemuDomainObjPrivatePtr priv, qemuDomainJob job)
|
|
{
|
|
return !priv->job.active && qemuDomainNestedJobAllowed(priv, job);
|
|
}
|
|
|
|
/* Give up waiting for mutex after 30 seconds */
|
|
#define QEMU_JOB_WAIT_TIME (1000ull * 30)
|
|
|
|
/*
|
|
* obj must be locked before calling
|
|
*/
|
|
static int ATTRIBUTE_NONNULL(1)
|
|
qemuDomainObjBeginJobInternal(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainJob job,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
unsigned long long now;
|
|
unsigned long long then;
|
|
bool nested = job == QEMU_JOB_ASYNC_NESTED;
|
|
bool async = job == QEMU_JOB_ASYNC;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
const char *blocker = NULL;
|
|
int ret = -1;
|
|
unsigned long long duration = 0;
|
|
unsigned long long asyncDuration = 0;
|
|
const char *jobStr;
|
|
|
|
if (async)
|
|
jobStr = qemuDomainAsyncJobTypeToString(asyncJob);
|
|
else
|
|
jobStr = qemuDomainJobTypeToString(job);
|
|
|
|
VIR_DEBUG("Starting %s: %s (vm=%p name=%s, current job=%s async=%s)",
|
|
async ? "async job" : "job", jobStr, obj, obj->def->name,
|
|
qemuDomainJobTypeToString(priv->job.active),
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob));
|
|
|
|
if (virTimeMillisNow(&now) < 0) {
|
|
virObjectUnref(cfg);
|
|
return -1;
|
|
}
|
|
|
|
priv->jobs_queued++;
|
|
then = now + QEMU_JOB_WAIT_TIME;
|
|
|
|
retry:
|
|
if (cfg->maxQueuedJobs &&
|
|
priv->jobs_queued > cfg->maxQueuedJobs) {
|
|
goto error;
|
|
}
|
|
|
|
while (!nested && !qemuDomainNestedJobAllowed(priv, job)) {
|
|
VIR_DEBUG("Waiting for async job (vm=%p name=%s)", obj, obj->def->name);
|
|
if (virCondWaitUntil(&priv->job.asyncCond, &obj->parent.lock, then) < 0)
|
|
goto error;
|
|
}
|
|
|
|
while (priv->job.active) {
|
|
VIR_DEBUG("Waiting for job (vm=%p name=%s)", obj, obj->def->name);
|
|
if (virCondWaitUntil(&priv->job.cond, &obj->parent.lock, then) < 0)
|
|
goto error;
|
|
}
|
|
|
|
/* No job is active but a new async job could have been started while obj
|
|
* was unlocked, so we need to recheck it. */
|
|
if (!nested && !qemuDomainNestedJobAllowed(priv, job))
|
|
goto retry;
|
|
|
|
qemuDomainObjResetJob(priv);
|
|
|
|
ignore_value(virTimeMillisNow(&now));
|
|
|
|
if (job != QEMU_JOB_ASYNC) {
|
|
VIR_DEBUG("Started job: %s (async=%s vm=%p name=%s)",
|
|
qemuDomainJobTypeToString(job),
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
obj, obj->def->name);
|
|
priv->job.active = job;
|
|
priv->job.owner = virThreadSelfID();
|
|
priv->job.ownerAPI = virThreadJobGet();
|
|
priv->job.started = now;
|
|
} else {
|
|
VIR_DEBUG("Started async job: %s (vm=%p name=%s)",
|
|
qemuDomainAsyncJobTypeToString(asyncJob),
|
|
obj, obj->def->name);
|
|
qemuDomainObjResetAsyncJob(priv);
|
|
if (VIR_ALLOC(priv->job.current) < 0)
|
|
goto cleanup;
|
|
priv->job.asyncJob = asyncJob;
|
|
priv->job.asyncOwner = virThreadSelfID();
|
|
priv->job.asyncOwnerAPI = virThreadJobGet();
|
|
priv->job.asyncStarted = now;
|
|
priv->job.current->started = now;
|
|
}
|
|
|
|
if (qemuDomainTrackJob(job))
|
|
qemuDomainObjSaveJob(driver, obj);
|
|
|
|
virObjectUnref(cfg);
|
|
return 0;
|
|
|
|
error:
|
|
ignore_value(virTimeMillisNow(&now));
|
|
if (priv->job.active && priv->job.started)
|
|
duration = now - priv->job.started;
|
|
if (priv->job.asyncJob && priv->job.asyncStarted)
|
|
asyncDuration = now - priv->job.asyncStarted;
|
|
|
|
VIR_WARN("Cannot start job (%s, %s) for domain %s; "
|
|
"current job is (%s, %s) owned by (%llu %s, %llu %s) "
|
|
"for (%llus, %llus)",
|
|
qemuDomainJobTypeToString(job),
|
|
qemuDomainAsyncJobTypeToString(asyncJob),
|
|
obj->def->name,
|
|
qemuDomainJobTypeToString(priv->job.active),
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
priv->job.owner, NULLSTR(priv->job.ownerAPI),
|
|
priv->job.asyncOwner, NULLSTR(priv->job.asyncOwnerAPI),
|
|
duration / 1000, asyncDuration / 1000);
|
|
|
|
if (nested || qemuDomainNestedJobAllowed(priv, job))
|
|
blocker = priv->job.ownerAPI;
|
|
else
|
|
blocker = priv->job.asyncOwnerAPI;
|
|
|
|
ret = -1;
|
|
if (errno == ETIMEDOUT) {
|
|
if (blocker) {
|
|
virReportError(VIR_ERR_OPERATION_TIMEOUT,
|
|
_("cannot acquire state change lock (held by %s)"),
|
|
blocker);
|
|
} else {
|
|
virReportError(VIR_ERR_OPERATION_TIMEOUT, "%s",
|
|
_("cannot acquire state change lock"));
|
|
}
|
|
ret = -2;
|
|
} else if (cfg->maxQueuedJobs &&
|
|
priv->jobs_queued > cfg->maxQueuedJobs) {
|
|
if (blocker) {
|
|
virReportError(VIR_ERR_OPERATION_FAILED,
|
|
_("cannot acquire state change lock (held by %s) "
|
|
"due to max_queued limit"),
|
|
blocker);
|
|
} else {
|
|
virReportError(VIR_ERR_OPERATION_FAILED, "%s",
|
|
_("cannot acquire state change lock "
|
|
"due to max_queued limit"));
|
|
}
|
|
ret = -2;
|
|
} else {
|
|
virReportSystemError(errno, "%s", _("cannot acquire job mutex"));
|
|
}
|
|
|
|
cleanup:
|
|
priv->jobs_queued--;
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* obj must be locked before calling
|
|
*
|
|
* This must be called by anything that will change the VM state
|
|
* in any way, or anything that will use the QEMU monitor.
|
|
*
|
|
* Successful calls must be followed by EndJob eventually
|
|
*/
|
|
int qemuDomainObjBeginJob(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainJob job)
|
|
{
|
|
if (qemuDomainObjBeginJobInternal(driver, obj, job,
|
|
QEMU_ASYNC_JOB_NONE) < 0)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
int qemuDomainObjBeginAsyncJob(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
if (qemuDomainObjBeginJobInternal(driver, obj, QEMU_JOB_ASYNC,
|
|
asyncJob) < 0)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
qemuDomainObjBeginNestedJob(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
if (asyncJob != priv->job.asyncJob) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("unexpected async job %d"), asyncJob);
|
|
return -1;
|
|
}
|
|
|
|
if (priv->job.asyncOwner != virThreadSelfID()) {
|
|
VIR_WARN("This thread doesn't seem to be the async job owner: %llu",
|
|
priv->job.asyncOwner);
|
|
}
|
|
|
|
return qemuDomainObjBeginJobInternal(driver, obj,
|
|
QEMU_JOB_ASYNC_NESTED,
|
|
QEMU_ASYNC_JOB_NONE);
|
|
}
|
|
|
|
|
|
/*
|
|
* obj must be locked and have a reference before calling
|
|
*
|
|
* To be called after completing the work associated with the
|
|
* earlier qemuDomainBeginJob() call
|
|
*/
|
|
void
|
|
qemuDomainObjEndJob(virQEMUDriverPtr driver, virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
qemuDomainJob job = priv->job.active;
|
|
|
|
priv->jobs_queued--;
|
|
|
|
VIR_DEBUG("Stopping job: %s (async=%s vm=%p name=%s)",
|
|
qemuDomainJobTypeToString(job),
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
obj, obj->def->name);
|
|
|
|
qemuDomainObjResetJob(priv);
|
|
if (qemuDomainTrackJob(job))
|
|
qemuDomainObjSaveJob(driver, obj);
|
|
virCondSignal(&priv->job.cond);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjEndAsyncJob(virQEMUDriverPtr driver, virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
priv->jobs_queued--;
|
|
|
|
VIR_DEBUG("Stopping async job: %s (vm=%p name=%s)",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
obj, obj->def->name);
|
|
|
|
qemuDomainObjResetAsyncJob(priv);
|
|
qemuDomainObjSaveJob(driver, obj);
|
|
virCondBroadcast(&priv->job.asyncCond);
|
|
}
|
|
|
|
void
|
|
qemuDomainObjAbortAsyncJob(virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
VIR_DEBUG("Requesting abort of async job: %s (vm=%p name=%s)",
|
|
qemuDomainAsyncJobTypeToString(priv->job.asyncJob),
|
|
obj, obj->def->name);
|
|
|
|
priv->job.abortJob = true;
|
|
virDomainObjBroadcast(obj);
|
|
}
|
|
|
|
/*
|
|
* obj must be locked before calling
|
|
*
|
|
* To be called immediately before any QEMU monitor API call
|
|
* Must have already either called qemuDomainObjBeginJob() and checked
|
|
* that the VM is still active; may not be used for nested async jobs.
|
|
*
|
|
* To be followed with qemuDomainObjExitMonitor() once complete
|
|
*/
|
|
static int
|
|
qemuDomainObjEnterMonitorInternal(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
if (asyncJob != QEMU_ASYNC_JOB_NONE) {
|
|
int ret;
|
|
if ((ret = qemuDomainObjBeginNestedJob(driver, obj, asyncJob)) < 0)
|
|
return ret;
|
|
if (!virDomainObjIsActive(obj)) {
|
|
virReportError(VIR_ERR_OPERATION_FAILED, "%s",
|
|
_("domain is no longer running"));
|
|
qemuDomainObjEndJob(driver, obj);
|
|
return -1;
|
|
}
|
|
} else if (priv->job.asyncOwner == virThreadSelfID()) {
|
|
VIR_WARN("This thread seems to be the async job owner; entering"
|
|
" monitor without asking for a nested job is dangerous");
|
|
}
|
|
|
|
VIR_DEBUG("Entering monitor (mon=%p vm=%p name=%s)",
|
|
priv->mon, obj, obj->def->name);
|
|
virObjectLock(priv->mon);
|
|
virObjectRef(priv->mon);
|
|
ignore_value(virTimeMillisNow(&priv->monStart));
|
|
virObjectUnlock(obj);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void ATTRIBUTE_NONNULL(1)
|
|
qemuDomainObjExitMonitorInternal(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
bool hasRefs;
|
|
|
|
hasRefs = virObjectUnref(priv->mon);
|
|
|
|
if (hasRefs)
|
|
virObjectUnlock(priv->mon);
|
|
|
|
virObjectLock(obj);
|
|
VIR_DEBUG("Exited monitor (mon=%p vm=%p name=%s)",
|
|
priv->mon, obj, obj->def->name);
|
|
|
|
priv->monStart = 0;
|
|
if (!hasRefs)
|
|
priv->mon = NULL;
|
|
|
|
if (priv->job.active == QEMU_JOB_ASYNC_NESTED)
|
|
qemuDomainObjEndJob(driver, obj);
|
|
}
|
|
|
|
void qemuDomainObjEnterMonitor(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj)
|
|
{
|
|
ignore_value(qemuDomainObjEnterMonitorInternal(driver, obj,
|
|
QEMU_ASYNC_JOB_NONE));
|
|
}
|
|
|
|
/* obj must NOT be locked before calling
|
|
*
|
|
* Should be paired with an earlier qemuDomainObjEnterMonitor() call
|
|
*
|
|
* Returns -1 if the domain is no longer alive after exiting the monitor.
|
|
* In that case, the caller should be careful when using obj's data,
|
|
* e.g. the live definition in vm->def has been freed by qemuProcessStop
|
|
* and replaced by the persistent definition, so pointers stolen
|
|
* from the live definition could no longer be valid.
|
|
*/
|
|
int qemuDomainObjExitMonitor(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjExitMonitorInternal(driver, obj);
|
|
if (!virDomainObjIsActive(obj)) {
|
|
if (!virGetLastError())
|
|
virReportError(VIR_ERR_OPERATION_FAILED, "%s",
|
|
_("domain is no longer running"));
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* obj must be locked before calling
|
|
*
|
|
* To be called immediately before any QEMU monitor API call.
|
|
* Must have already either called qemuDomainObjBeginJob()
|
|
* and checked that the VM is still active, with asyncJob of
|
|
* QEMU_ASYNC_JOB_NONE; or already called qemuDomainObjBeginAsyncJob,
|
|
* with the same asyncJob.
|
|
*
|
|
* Returns 0 if job was started, in which case this must be followed with
|
|
* qemuDomainObjExitMonitor(); -2 if waiting for the nested job times out;
|
|
* or -1 if the job could not be started (probably because the vm exited
|
|
* in the meantime).
|
|
*/
|
|
int
|
|
qemuDomainObjEnterMonitorAsync(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
return qemuDomainObjEnterMonitorInternal(driver, obj, asyncJob);
|
|
}
|
|
|
|
|
|
/*
|
|
* obj must be locked before calling
|
|
*
|
|
* To be called immediately before any QEMU agent API call.
|
|
* Must have already called qemuDomainObjBeginJob() and checked
|
|
* that the VM is still active.
|
|
*
|
|
* To be followed with qemuDomainObjExitAgent() once complete
|
|
*/
|
|
qemuAgentPtr
|
|
qemuDomainObjEnterAgent(virDomainObjPtr obj)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
qemuAgentPtr agent = priv->agent;
|
|
|
|
VIR_DEBUG("Entering agent (agent=%p vm=%p name=%s)",
|
|
priv->agent, obj, obj->def->name);
|
|
|
|
virObjectLock(agent);
|
|
virObjectRef(agent);
|
|
virObjectUnlock(obj);
|
|
|
|
return agent;
|
|
}
|
|
|
|
|
|
/* obj must NOT be locked before calling
|
|
*
|
|
* Should be paired with an earlier qemuDomainObjEnterAgent() call
|
|
*/
|
|
void
|
|
qemuDomainObjExitAgent(virDomainObjPtr obj, qemuAgentPtr agent)
|
|
{
|
|
virObjectUnlock(agent);
|
|
virObjectUnref(agent);
|
|
virObjectLock(obj);
|
|
|
|
VIR_DEBUG("Exited agent (agent=%p vm=%p name=%s)",
|
|
agent, obj, obj->def->name);
|
|
}
|
|
|
|
void qemuDomainObjEnterRemote(virDomainObjPtr obj)
|
|
{
|
|
VIR_DEBUG("Entering remote (vm=%p name=%s)",
|
|
obj, obj->def->name);
|
|
virObjectUnlock(obj);
|
|
}
|
|
|
|
void qemuDomainObjExitRemote(virDomainObjPtr obj)
|
|
{
|
|
virObjectLock(obj);
|
|
VIR_DEBUG("Exited remote (vm=%p name=%s)",
|
|
obj, obj->def->name);
|
|
}
|
|
|
|
|
|
virDomainDefPtr
|
|
qemuDomainDefCopy(virQEMUDriverPtr driver,
|
|
virDomainDefPtr src,
|
|
unsigned int flags)
|
|
{
|
|
virBuffer buf = VIR_BUFFER_INITIALIZER;
|
|
virDomainDefPtr ret = NULL;
|
|
virCapsPtr caps = NULL;
|
|
char *xml = NULL;
|
|
|
|
if (qemuDomainDefFormatBuf(driver, src, flags, &buf) < 0)
|
|
goto cleanup;
|
|
|
|
xml = virBufferContentAndReset(&buf);
|
|
|
|
if (!(caps = virQEMUDriverGetCapabilities(driver, false)))
|
|
goto cleanup;
|
|
|
|
if (!(ret = virDomainDefParseString(xml, caps, driver->xmlopt, NULL,
|
|
VIR_DOMAIN_DEF_PARSE_INACTIVE |
|
|
VIR_DOMAIN_DEF_PARSE_SKIP_VALIDATE)))
|
|
goto cleanup;
|
|
|
|
cleanup:
|
|
VIR_FREE(xml);
|
|
virObjectUnref(caps);
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
qemuDomainDefFormatBuf(virQEMUDriverPtr driver,
|
|
virDomainDefPtr def,
|
|
unsigned int flags,
|
|
virBuffer *buf)
|
|
{
|
|
int ret = -1;
|
|
virDomainDefPtr copy = NULL;
|
|
virCapsPtr caps = NULL;
|
|
|
|
if (!(caps = virQEMUDriverGetCapabilities(driver, false)))
|
|
goto cleanup;
|
|
|
|
if (!(flags & (VIR_DOMAIN_XML_UPDATE_CPU | VIR_DOMAIN_XML_MIGRATABLE)))
|
|
goto format;
|
|
|
|
if (!(copy = virDomainDefCopy(def, caps, driver->xmlopt, NULL,
|
|
flags & VIR_DOMAIN_XML_MIGRATABLE)))
|
|
goto cleanup;
|
|
|
|
def = copy;
|
|
|
|
/* Update guest CPU requirements according to host CPU */
|
|
if ((flags & VIR_DOMAIN_XML_UPDATE_CPU) &&
|
|
def->cpu &&
|
|
(def->cpu->mode != VIR_CPU_MODE_CUSTOM ||
|
|
def->cpu->model)) {
|
|
if (virCPUUpdate(def->os.arch, def->cpu, caps->host.cpu) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((flags & VIR_DOMAIN_XML_MIGRATABLE)) {
|
|
size_t i;
|
|
int toremove = 0;
|
|
virDomainControllerDefPtr usb = NULL, pci = NULL;
|
|
|
|
/* If only the default USB controller is present, we can remove it
|
|
* and make the XML compatible with older versions of libvirt which
|
|
* didn't support USB controllers in the XML but always added the
|
|
* default one to qemu anyway.
|
|
*/
|
|
for (i = 0; i < def->ncontrollers; i++) {
|
|
if (def->controllers[i]->type == VIR_DOMAIN_CONTROLLER_TYPE_USB) {
|
|
if (usb) {
|
|
usb = NULL;
|
|
break;
|
|
}
|
|
usb = def->controllers[i];
|
|
}
|
|
}
|
|
|
|
/* In order to maintain compatibility with version of libvirt that
|
|
* didn't support <controller type='usb'/> (<= 0.9.4), we need to
|
|
* drop the default USB controller, ie. a USB controller at index
|
|
* zero with no model or with the default piix3-ohci model.
|
|
*
|
|
* However, we only need to do so for x86 i440fx machine types,
|
|
* because other architectures and machine types were introduced
|
|
* when libvirt already supported <controller type='usb'/>.
|
|
*/
|
|
if (ARCH_IS_X86(def->os.arch) && qemuDomainMachineIsI440FX(def) &&
|
|
usb && usb->idx == 0 &&
|
|
(usb->model == -1 ||
|
|
usb->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX3_UHCI)) {
|
|
VIR_DEBUG("Removing default USB controller from domain '%s'"
|
|
" for migration compatibility", def->name);
|
|
toremove++;
|
|
} else {
|
|
usb = NULL;
|
|
}
|
|
|
|
/* Remove the default PCI controller if there is only one present
|
|
* and its model is pci-root */
|
|
for (i = 0; i < def->ncontrollers; i++) {
|
|
if (def->controllers[i]->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI) {
|
|
if (pci) {
|
|
pci = NULL;
|
|
break;
|
|
}
|
|
pci = def->controllers[i];
|
|
}
|
|
}
|
|
|
|
if (pci && pci->idx == 0 &&
|
|
pci->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT) {
|
|
VIR_DEBUG("Removing default pci-root from domain '%s'"
|
|
" for migration compatibility", def->name);
|
|
toremove++;
|
|
} else {
|
|
pci = NULL;
|
|
}
|
|
|
|
if (toremove) {
|
|
virDomainControllerDefPtr *controllers = def->controllers;
|
|
int ncontrollers = def->ncontrollers;
|
|
|
|
if (VIR_ALLOC_N(def->controllers, ncontrollers - toremove) < 0) {
|
|
def->controllers = controllers;
|
|
goto cleanup;
|
|
}
|
|
|
|
def->ncontrollers = 0;
|
|
for (i = 0; i < ncontrollers; i++) {
|
|
if (controllers[i] != usb && controllers[i] != pci)
|
|
def->controllers[def->ncontrollers++] = controllers[i];
|
|
}
|
|
|
|
VIR_FREE(controllers);
|
|
virDomainControllerDefFree(pci);
|
|
virDomainControllerDefFree(usb);
|
|
}
|
|
|
|
/* Remove the panic device for selected models if present */
|
|
for (i = 0; i < def->npanics; i++) {
|
|
if (def->panics[i]->model == VIR_DOMAIN_PANIC_MODEL_S390 ||
|
|
def->panics[i]->model == VIR_DOMAIN_PANIC_MODEL_PSERIES) {
|
|
VIR_DELETE_ELEMENT(def->panics, i, def->npanics);
|
|
break;
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < def->nchannels; i++)
|
|
qemuDomainChrDefDropDefaultPath(def->channels[i], driver);
|
|
}
|
|
|
|
format:
|
|
ret = virDomainDefFormatInternal(def, caps,
|
|
virDomainDefFormatConvertXMLFlags(flags),
|
|
buf);
|
|
|
|
cleanup:
|
|
virDomainDefFree(copy);
|
|
virObjectUnref(caps);
|
|
return ret;
|
|
}
|
|
|
|
char *qemuDomainDefFormatXML(virQEMUDriverPtr driver,
|
|
virDomainDefPtr def,
|
|
unsigned int flags)
|
|
{
|
|
virBuffer buf = VIR_BUFFER_INITIALIZER;
|
|
|
|
if (qemuDomainDefFormatBuf(driver, def, flags, &buf) < 0) {
|
|
virBufferFreeAndReset(&buf);
|
|
return NULL;
|
|
}
|
|
|
|
if (virBufferError(&buf)) {
|
|
virReportOOMError();
|
|
virBufferFreeAndReset(&buf);
|
|
return NULL;
|
|
}
|
|
|
|
return virBufferContentAndReset(&buf);
|
|
}
|
|
|
|
char *qemuDomainFormatXML(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
unsigned int flags)
|
|
{
|
|
virDomainDefPtr def;
|
|
|
|
if ((flags & VIR_DOMAIN_XML_INACTIVE) && vm->newDef) {
|
|
def = vm->newDef;
|
|
} else {
|
|
def = vm->def;
|
|
if (virDomainObjIsActive(vm))
|
|
flags &= ~VIR_DOMAIN_XML_UPDATE_CPU;
|
|
}
|
|
|
|
return qemuDomainDefFormatXML(driver, def, flags);
|
|
}
|
|
|
|
char *
|
|
qemuDomainDefFormatLive(virQEMUDriverPtr driver,
|
|
virDomainDefPtr def,
|
|
bool inactive,
|
|
bool compatible)
|
|
{
|
|
unsigned int flags = QEMU_DOMAIN_FORMAT_LIVE_FLAGS;
|
|
|
|
if (inactive)
|
|
flags |= VIR_DOMAIN_XML_INACTIVE;
|
|
if (compatible)
|
|
flags |= VIR_DOMAIN_XML_MIGRATABLE;
|
|
|
|
return qemuDomainDefFormatXML(driver, def, flags);
|
|
}
|
|
|
|
|
|
void qemuDomainObjTaint(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
virDomainTaintFlags taint,
|
|
qemuDomainLogContextPtr logCtxt)
|
|
{
|
|
virErrorPtr orig_err = NULL;
|
|
bool closeLog = false;
|
|
char *timestamp = NULL;
|
|
char uuidstr[VIR_UUID_STRING_BUFLEN];
|
|
|
|
if (!virDomainObjTaint(obj, taint))
|
|
return;
|
|
|
|
virUUIDFormat(obj->def->uuid, uuidstr);
|
|
|
|
VIR_WARN("Domain id=%d name='%s' uuid=%s is tainted: %s",
|
|
obj->def->id,
|
|
obj->def->name,
|
|
uuidstr,
|
|
virDomainTaintTypeToString(taint));
|
|
|
|
/* We don't care about errors logging taint info, so
|
|
* preserve original error, and clear any error that
|
|
* is raised */
|
|
orig_err = virSaveLastError();
|
|
|
|
if (!(timestamp = virTimeStringNow()))
|
|
goto cleanup;
|
|
|
|
if (logCtxt == NULL) {
|
|
logCtxt = qemuDomainLogContextNew(driver, obj,
|
|
QEMU_DOMAIN_LOG_CONTEXT_MODE_ATTACH);
|
|
if (!logCtxt) {
|
|
VIR_WARN("Unable to open domainlog");
|
|
goto cleanup;
|
|
}
|
|
closeLog = true;
|
|
}
|
|
|
|
if (qemuDomainLogContextWrite(logCtxt,
|
|
"%s: Domain id=%d is tainted: %s\n",
|
|
timestamp,
|
|
obj->def->id,
|
|
virDomainTaintTypeToString(taint)) < 0)
|
|
virResetLastError();
|
|
|
|
cleanup:
|
|
VIR_FREE(timestamp);
|
|
if (closeLog)
|
|
qemuDomainLogContextFree(logCtxt);
|
|
if (orig_err) {
|
|
virSetError(orig_err);
|
|
virFreeError(orig_err);
|
|
}
|
|
}
|
|
|
|
|
|
void qemuDomainObjCheckTaint(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
qemuDomainLogContextPtr logCtxt)
|
|
{
|
|
size_t i;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
qemuDomainObjPrivatePtr priv = obj->privateData;
|
|
|
|
if (virQEMUDriverIsPrivileged(driver) &&
|
|
(!cfg->clearEmulatorCapabilities ||
|
|
cfg->user == 0 ||
|
|
cfg->group == 0))
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_HIGH_PRIVILEGES, logCtxt);
|
|
|
|
if (priv->hookRun)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_HOOK, logCtxt);
|
|
|
|
if (obj->def->namespaceData) {
|
|
qemuDomainCmdlineDefPtr qemucmd = obj->def->namespaceData;
|
|
if (qemucmd->num_args || qemucmd->num_env)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_CUSTOM_ARGV, logCtxt);
|
|
}
|
|
|
|
if (obj->def->cpu && obj->def->cpu->mode == VIR_CPU_MODE_HOST_PASSTHROUGH)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_HOST_CPU, logCtxt);
|
|
|
|
for (i = 0; i < obj->def->ndisks; i++)
|
|
qemuDomainObjCheckDiskTaint(driver, obj, obj->def->disks[i], logCtxt);
|
|
|
|
for (i = 0; i < obj->def->nhostdevs; i++)
|
|
qemuDomainObjCheckHostdevTaint(driver, obj, obj->def->hostdevs[i],
|
|
logCtxt);
|
|
|
|
for (i = 0; i < obj->def->nnets; i++)
|
|
qemuDomainObjCheckNetTaint(driver, obj, obj->def->nets[i], logCtxt);
|
|
|
|
if (obj->def->os.dtb)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_CUSTOM_DTB, logCtxt);
|
|
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
|
|
void qemuDomainObjCheckDiskTaint(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
virDomainDiskDefPtr disk,
|
|
qemuDomainLogContextPtr logCtxt)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int format = virDomainDiskGetFormat(disk);
|
|
|
|
if ((!format || format == VIR_STORAGE_FILE_AUTO) &&
|
|
cfg->allowDiskFormatProbing)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_DISK_PROBING, logCtxt);
|
|
|
|
if (disk->rawio == VIR_TRISTATE_BOOL_YES)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_HIGH_PRIVILEGES,
|
|
logCtxt);
|
|
|
|
if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM &&
|
|
virStorageSourceGetActualType(disk->src) == VIR_STORAGE_TYPE_BLOCK &&
|
|
disk->src->path)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_CDROM_PASSTHROUGH,
|
|
logCtxt);
|
|
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
|
|
void qemuDomainObjCheckHostdevTaint(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
virDomainHostdevDefPtr hostdev,
|
|
qemuDomainLogContextPtr logCtxt)
|
|
{
|
|
if (!virHostdevIsSCSIDevice(hostdev))
|
|
return;
|
|
|
|
if (hostdev->source.subsys.u.scsi.rawio == VIR_TRISTATE_BOOL_YES)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_HIGH_PRIVILEGES, logCtxt);
|
|
}
|
|
|
|
|
|
void qemuDomainObjCheckNetTaint(virQEMUDriverPtr driver,
|
|
virDomainObjPtr obj,
|
|
virDomainNetDefPtr net,
|
|
qemuDomainLogContextPtr logCtxt)
|
|
{
|
|
/* script is only useful for NET_TYPE_ETHERNET (qemu) and
|
|
* NET_TYPE_BRIDGE (xen), but could be (incorrectly) specified for
|
|
* any interface type. In any case, it's adding user sauce into
|
|
* the soup, so it should taint the domain.
|
|
*/
|
|
if (net->script != NULL)
|
|
qemuDomainObjTaint(driver, obj, VIR_DOMAIN_TAINT_SHELL_SCRIPTS, logCtxt);
|
|
}
|
|
|
|
|
|
qemuDomainLogContextPtr qemuDomainLogContextNew(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
qemuDomainLogContextMode mode)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
qemuDomainLogContextPtr ctxt = NULL;
|
|
|
|
if (VIR_ALLOC(ctxt) < 0)
|
|
goto error;
|
|
|
|
VIR_DEBUG("Context new %p stdioLogD=%d", ctxt, cfg->stdioLogD);
|
|
ctxt->writefd = -1;
|
|
ctxt->readfd = -1;
|
|
virAtomicIntSet(&ctxt->refs, 1);
|
|
|
|
if (virAsprintf(&ctxt->path, "%s/%s.log", cfg->logDir, vm->def->name) < 0)
|
|
goto error;
|
|
|
|
if (cfg->stdioLogD) {
|
|
ctxt->manager = virLogManagerNew(virQEMUDriverIsPrivileged(driver));
|
|
if (!ctxt->manager)
|
|
goto error;
|
|
|
|
ctxt->writefd = virLogManagerDomainOpenLogFile(ctxt->manager,
|
|
"qemu",
|
|
vm->def->uuid,
|
|
vm->def->name,
|
|
ctxt->path,
|
|
0,
|
|
&ctxt->inode,
|
|
&ctxt->pos);
|
|
if (ctxt->writefd < 0)
|
|
goto error;
|
|
} else {
|
|
if ((ctxt->writefd = open(ctxt->path, O_WRONLY | O_CREAT | O_APPEND, S_IRUSR | S_IWUSR)) < 0) {
|
|
virReportSystemError(errno, _("failed to create logfile %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
if (virSetCloseExec(ctxt->writefd) < 0) {
|
|
virReportSystemError(errno, _("failed to set close-on-exec flag on %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
|
|
/* For unprivileged startup we must truncate the file since
|
|
* we can't rely on logrotate. We don't use O_TRUNC since
|
|
* it is better for SELinux policy if we truncate afterwards */
|
|
if (mode == QEMU_DOMAIN_LOG_CONTEXT_MODE_START &&
|
|
!virQEMUDriverIsPrivileged(driver) &&
|
|
ftruncate(ctxt->writefd, 0) < 0) {
|
|
virReportSystemError(errno, _("failed to truncate %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
|
|
if (mode == QEMU_DOMAIN_LOG_CONTEXT_MODE_START) {
|
|
if ((ctxt->readfd = open(ctxt->path, O_RDONLY, S_IRUSR | S_IWUSR)) < 0) {
|
|
virReportSystemError(errno, _("failed to open logfile %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
if (virSetCloseExec(ctxt->readfd) < 0) {
|
|
virReportSystemError(errno, _("failed to set close-on-exec flag on %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
if ((ctxt->pos = lseek(ctxt->writefd, 0, SEEK_END)) < 0) {
|
|
virReportSystemError(errno, _("failed to seek in log file %s"),
|
|
ctxt->path);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ctxt;
|
|
|
|
error:
|
|
qemuDomainLogContextFree(ctxt);
|
|
ctxt = NULL;
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
int qemuDomainLogContextWrite(qemuDomainLogContextPtr ctxt,
|
|
const char *fmt, ...)
|
|
{
|
|
va_list argptr;
|
|
char *message = NULL;
|
|
int ret = -1;
|
|
|
|
va_start(argptr, fmt);
|
|
|
|
if (virVasprintf(&message, fmt, argptr) < 0)
|
|
goto cleanup;
|
|
if (!ctxt->manager &&
|
|
lseek(ctxt->writefd, 0, SEEK_END) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to seek to end of domain logfile"));
|
|
goto cleanup;
|
|
}
|
|
if (safewrite(ctxt->writefd, message, strlen(message)) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to write to domain logfile"));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
va_end(argptr);
|
|
VIR_FREE(message);
|
|
return ret;
|
|
}
|
|
|
|
|
|
ssize_t qemuDomainLogContextRead(qemuDomainLogContextPtr ctxt,
|
|
char **msg)
|
|
{
|
|
VIR_DEBUG("Context read %p manager=%p inode=%llu pos=%llu",
|
|
ctxt, ctxt->manager,
|
|
(unsigned long long)ctxt->inode,
|
|
(unsigned long long)ctxt->pos);
|
|
char *buf;
|
|
size_t buflen;
|
|
if (ctxt->manager) {
|
|
buf = virLogManagerDomainReadLogFile(ctxt->manager,
|
|
ctxt->path,
|
|
ctxt->inode,
|
|
ctxt->pos,
|
|
1024 * 128,
|
|
0);
|
|
if (!buf)
|
|
return -1;
|
|
buflen = strlen(buf);
|
|
} else {
|
|
ssize_t got;
|
|
|
|
buflen = 1024 * 128;
|
|
|
|
/* Best effort jump to start of messages */
|
|
ignore_value(lseek(ctxt->readfd, ctxt->pos, SEEK_SET));
|
|
|
|
if (VIR_ALLOC_N(buf, buflen) < 0)
|
|
return -1;
|
|
|
|
got = saferead(ctxt->readfd, buf, buflen - 1);
|
|
if (got < 0) {
|
|
VIR_FREE(buf);
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to read from log file"));
|
|
return -1;
|
|
}
|
|
|
|
buf[got] = '\0';
|
|
|
|
ignore_value(VIR_REALLOC_N_QUIET(buf, got + 1));
|
|
buflen = got;
|
|
}
|
|
|
|
*msg = buf;
|
|
|
|
return buflen;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainLogAppendMessage:
|
|
*
|
|
* This is a best-effort attempt to add a log message to the qemu log file
|
|
* either by using virtlogd or the legacy approach */
|
|
int
|
|
qemuDomainLogAppendMessage(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *fmt,
|
|
...)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
virLogManagerPtr manager = NULL;
|
|
va_list ap;
|
|
char *path = NULL;
|
|
int writefd = -1;
|
|
char *message = NULL;
|
|
int ret = -1;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
if (virVasprintf(&message, fmt, ap) < 0)
|
|
goto cleanup;
|
|
|
|
VIR_DEBUG("Append log message (vm='%s' message='%s) stdioLogD=%d",
|
|
vm->def->name, message, cfg->stdioLogD);
|
|
|
|
if (virAsprintf(&path, "%s/%s.log", cfg->logDir, vm->def->name) < 0)
|
|
goto cleanup;
|
|
|
|
if (cfg->stdioLogD) {
|
|
if (!(manager = virLogManagerNew(virQEMUDriverIsPrivileged(driver))))
|
|
goto cleanup;
|
|
|
|
if (virLogManagerDomainAppendMessage(manager, "qemu", vm->def->uuid,
|
|
vm->def->name, path, message, 0) < 0)
|
|
goto cleanup;
|
|
} else {
|
|
if ((writefd = open(path, O_WRONLY | O_CREAT | O_APPEND, S_IRUSR | S_IWUSR)) < 0) {
|
|
virReportSystemError(errno, _("failed to create logfile %s"),
|
|
path);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (safewrite(writefd, message, strlen(message)) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
va_end(ap);
|
|
VIR_FREE(message);
|
|
VIR_FORCE_CLOSE(writefd);
|
|
virLogManagerFree(manager);
|
|
virObjectUnref(cfg);
|
|
VIR_FREE(path);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int qemuDomainLogContextGetWriteFD(qemuDomainLogContextPtr ctxt)
|
|
{
|
|
return ctxt->writefd;
|
|
}
|
|
|
|
|
|
void qemuDomainLogContextMarkPosition(qemuDomainLogContextPtr ctxt)
|
|
{
|
|
if (ctxt->manager)
|
|
virLogManagerDomainGetLogFilePosition(ctxt->manager,
|
|
ctxt->path,
|
|
0,
|
|
&ctxt->inode,
|
|
&ctxt->pos);
|
|
else
|
|
ctxt->pos = lseek(ctxt->writefd, 0, SEEK_END);
|
|
}
|
|
|
|
|
|
void qemuDomainLogContextRef(qemuDomainLogContextPtr ctxt)
|
|
{
|
|
VIR_DEBUG("Context ref %p", ctxt);
|
|
virAtomicIntInc(&ctxt->refs);
|
|
}
|
|
|
|
|
|
virLogManagerPtr qemuDomainLogContextGetManager(qemuDomainLogContextPtr ctxt)
|
|
{
|
|
return ctxt->manager;
|
|
}
|
|
|
|
|
|
void qemuDomainLogContextFree(qemuDomainLogContextPtr ctxt)
|
|
{
|
|
bool lastRef;
|
|
|
|
if (!ctxt)
|
|
return;
|
|
|
|
lastRef = virAtomicIntDecAndTest(&ctxt->refs);
|
|
VIR_DEBUG("Context free %p lastref=%d", ctxt, lastRef);
|
|
if (!lastRef)
|
|
return;
|
|
|
|
virLogManagerFree(ctxt->manager);
|
|
VIR_FREE(ctxt->path);
|
|
VIR_FORCE_CLOSE(ctxt->writefd);
|
|
VIR_FORCE_CLOSE(ctxt->readfd);
|
|
VIR_FREE(ctxt);
|
|
}
|
|
|
|
|
|
/* Locate an appropriate 'qemu-img' binary. */
|
|
const char *
|
|
qemuFindQemuImgBinary(virQEMUDriverPtr driver)
|
|
{
|
|
if (!driver->qemuImgBinary)
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("unable to find qemu-img"));
|
|
|
|
return driver->qemuImgBinary;
|
|
}
|
|
|
|
int
|
|
qemuDomainSnapshotWriteMetadata(virDomainObjPtr vm,
|
|
virDomainSnapshotObjPtr snapshot,
|
|
virCapsPtr caps,
|
|
char *snapshotDir)
|
|
{
|
|
char *newxml = NULL;
|
|
int ret = -1;
|
|
char *snapDir = NULL;
|
|
char *snapFile = NULL;
|
|
char uuidstr[VIR_UUID_STRING_BUFLEN];
|
|
|
|
virUUIDFormat(vm->def->uuid, uuidstr);
|
|
newxml = virDomainSnapshotDefFormat(
|
|
uuidstr, snapshot->def, caps,
|
|
virDomainDefFormatConvertXMLFlags(QEMU_DOMAIN_FORMAT_LIVE_FLAGS),
|
|
1);
|
|
if (newxml == NULL)
|
|
return -1;
|
|
|
|
if (virAsprintf(&snapDir, "%s/%s", snapshotDir, vm->def->name) < 0)
|
|
goto cleanup;
|
|
if (virFileMakePath(snapDir) < 0) {
|
|
virReportSystemError(errno, _("cannot create snapshot directory '%s'"),
|
|
snapDir);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virAsprintf(&snapFile, "%s/%s.xml", snapDir, snapshot->def->name) < 0)
|
|
goto cleanup;
|
|
|
|
ret = virXMLSaveFile(snapFile, NULL, "snapshot-edit", newxml);
|
|
|
|
cleanup:
|
|
VIR_FREE(snapFile);
|
|
VIR_FREE(snapDir);
|
|
VIR_FREE(newxml);
|
|
return ret;
|
|
}
|
|
|
|
/* The domain is expected to be locked and inactive. Return -1 on normal
|
|
* failure, 1 if we skipped a disk due to try_all. */
|
|
static int
|
|
qemuDomainSnapshotForEachQcow2Raw(virQEMUDriverPtr driver,
|
|
virDomainDefPtr def,
|
|
const char *name,
|
|
const char *op,
|
|
bool try_all,
|
|
int ndisks)
|
|
{
|
|
const char *qemuimgarg[] = { NULL, "snapshot", NULL, NULL, NULL, NULL };
|
|
size_t i;
|
|
bool skipped = false;
|
|
|
|
qemuimgarg[0] = qemuFindQemuImgBinary(driver);
|
|
if (qemuimgarg[0] == NULL) {
|
|
/* qemuFindQemuImgBinary set the error */
|
|
return -1;
|
|
}
|
|
|
|
qemuimgarg[2] = op;
|
|
qemuimgarg[3] = name;
|
|
|
|
for (i = 0; i < ndisks; i++) {
|
|
/* FIXME: we also need to handle LVM here */
|
|
if (def->disks[i]->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
|
|
int format = virDomainDiskGetFormat(def->disks[i]);
|
|
|
|
if (format > 0 && format != VIR_STORAGE_FILE_QCOW2) {
|
|
if (try_all) {
|
|
/* Continue on even in the face of error, since other
|
|
* disks in this VM may have the same snapshot name.
|
|
*/
|
|
VIR_WARN("skipping snapshot action on %s",
|
|
def->disks[i]->dst);
|
|
skipped = true;
|
|
continue;
|
|
} else if (STREQ(op, "-c") && i) {
|
|
/* We must roll back partial creation by deleting
|
|
* all earlier snapshots. */
|
|
qemuDomainSnapshotForEachQcow2Raw(driver, def, name,
|
|
"-d", false, i);
|
|
}
|
|
virReportError(VIR_ERR_OPERATION_INVALID,
|
|
_("Disk device '%s' does not support"
|
|
" snapshotting"),
|
|
def->disks[i]->dst);
|
|
return -1;
|
|
}
|
|
|
|
qemuimgarg[4] = virDomainDiskGetSource(def->disks[i]);
|
|
|
|
if (virRun(qemuimgarg, NULL) < 0) {
|
|
if (try_all) {
|
|
VIR_WARN("skipping snapshot action on %s",
|
|
def->disks[i]->dst);
|
|
skipped = true;
|
|
continue;
|
|
} else if (STREQ(op, "-c") && i) {
|
|
/* We must roll back partial creation by deleting
|
|
* all earlier snapshots. */
|
|
qemuDomainSnapshotForEachQcow2Raw(driver, def, name,
|
|
"-d", false, i);
|
|
}
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
return skipped ? 1 : 0;
|
|
}
|
|
|
|
/* The domain is expected to be locked and inactive. Return -1 on normal
|
|
* failure, 1 if we skipped a disk due to try_all. */
|
|
int
|
|
qemuDomainSnapshotForEachQcow2(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainSnapshotObjPtr snap,
|
|
const char *op,
|
|
bool try_all)
|
|
{
|
|
/* Prefer action on the disks in use at the time the snapshot was
|
|
* created; but fall back to current definition if dealing with a
|
|
* snapshot created prior to libvirt 0.9.5. */
|
|
virDomainDefPtr def = snap->def->dom;
|
|
|
|
if (!def)
|
|
def = vm->def;
|
|
return qemuDomainSnapshotForEachQcow2Raw(driver, def, snap->def->name,
|
|
op, try_all, def->ndisks);
|
|
}
|
|
|
|
/* Discard one snapshot (or its metadata), without reparenting any children. */
|
|
int
|
|
qemuDomainSnapshotDiscard(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainSnapshotObjPtr snap,
|
|
bool update_current,
|
|
bool metadata_only)
|
|
{
|
|
char *snapFile = NULL;
|
|
int ret = -1;
|
|
qemuDomainObjPrivatePtr priv;
|
|
virDomainSnapshotObjPtr parentsnap = NULL;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
if (!metadata_only) {
|
|
if (!virDomainObjIsActive(vm)) {
|
|
/* Ignore any skipped disks */
|
|
if (qemuDomainSnapshotForEachQcow2(driver, vm, snap, "-d",
|
|
true) < 0)
|
|
goto cleanup;
|
|
} else {
|
|
priv = vm->privateData;
|
|
qemuDomainObjEnterMonitor(driver, vm);
|
|
/* we continue on even in the face of error */
|
|
qemuMonitorDeleteSnapshot(priv->mon, snap->def->name);
|
|
ignore_value(qemuDomainObjExitMonitor(driver, vm));
|
|
}
|
|
}
|
|
|
|
if (virAsprintf(&snapFile, "%s/%s/%s.xml", cfg->snapshotDir,
|
|
vm->def->name, snap->def->name) < 0)
|
|
goto cleanup;
|
|
|
|
if (snap == vm->current_snapshot) {
|
|
if (update_current && snap->def->parent) {
|
|
parentsnap = virDomainSnapshotFindByName(vm->snapshots,
|
|
snap->def->parent);
|
|
if (!parentsnap) {
|
|
VIR_WARN("missing parent snapshot matching name '%s'",
|
|
snap->def->parent);
|
|
} else {
|
|
parentsnap->def->current = true;
|
|
if (qemuDomainSnapshotWriteMetadata(vm, parentsnap, driver->caps,
|
|
cfg->snapshotDir) < 0) {
|
|
VIR_WARN("failed to set parent snapshot '%s' as current",
|
|
snap->def->parent);
|
|
parentsnap->def->current = false;
|
|
parentsnap = NULL;
|
|
}
|
|
}
|
|
}
|
|
vm->current_snapshot = parentsnap;
|
|
}
|
|
|
|
if (unlink(snapFile) < 0)
|
|
VIR_WARN("Failed to unlink %s", snapFile);
|
|
virDomainSnapshotObjListRemove(vm->snapshots, snap);
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_FREE(snapFile);
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
/* Hash iterator callback to discard multiple snapshots. */
|
|
int qemuDomainSnapshotDiscardAll(void *payload,
|
|
const void *name ATTRIBUTE_UNUSED,
|
|
void *data)
|
|
{
|
|
virDomainSnapshotObjPtr snap = payload;
|
|
virQEMUSnapRemovePtr curr = data;
|
|
int err;
|
|
|
|
if (snap->def->current)
|
|
curr->current = true;
|
|
err = qemuDomainSnapshotDiscard(curr->driver, curr->vm, snap, false,
|
|
curr->metadata_only);
|
|
if (err && !curr->err)
|
|
curr->err = err;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
qemuDomainSnapshotDiscardAllMetadata(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
virQEMUSnapRemove rem;
|
|
|
|
rem.driver = driver;
|
|
rem.vm = vm;
|
|
rem.metadata_only = true;
|
|
rem.err = 0;
|
|
virDomainSnapshotForEach(vm->snapshots, qemuDomainSnapshotDiscardAll,
|
|
&rem);
|
|
|
|
return rem.err;
|
|
}
|
|
|
|
/*
|
|
* The caller must hold a lock the vm.
|
|
*/
|
|
void
|
|
qemuDomainRemoveInactive(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
bool haveJob = true;
|
|
char *snapDir;
|
|
virQEMUDriverConfigPtr cfg;
|
|
|
|
if (vm->persistent) {
|
|
/* Short-circuit, we don't want to remove a persistent domain */
|
|
return;
|
|
}
|
|
|
|
cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
if (qemuDomainObjBeginJob(driver, vm, QEMU_JOB_MODIFY) < 0)
|
|
haveJob = false;
|
|
|
|
/* Remove any snapshot metadata prior to removing the domain */
|
|
if (qemuDomainSnapshotDiscardAllMetadata(driver, vm) < 0) {
|
|
VIR_WARN("unable to remove all snapshots for domain %s",
|
|
vm->def->name);
|
|
}
|
|
else if (virAsprintf(&snapDir, "%s/%s", cfg->snapshotDir,
|
|
vm->def->name) < 0) {
|
|
VIR_WARN("unable to remove snapshot directory %s/%s",
|
|
cfg->snapshotDir, vm->def->name);
|
|
} else {
|
|
if (rmdir(snapDir) < 0 && errno != ENOENT)
|
|
VIR_WARN("unable to remove snapshot directory %s", snapDir);
|
|
VIR_FREE(snapDir);
|
|
}
|
|
|
|
virObjectRef(vm);
|
|
|
|
virDomainObjListRemove(driver->domains, vm);
|
|
/*
|
|
* virDomainObjListRemove() leaves the domain unlocked so it can
|
|
* be unref'd for other drivers that depend on that, but we still
|
|
* need to reset a job and we have a reference from the API that
|
|
* called this function. So we need to lock it back. This is
|
|
* just a workaround for the qemu driver.
|
|
*
|
|
* XXX: Ideally, the global handling of domain objects and object
|
|
* lists would be refactored so we don't need hacks like
|
|
* this, but since that requires refactor of all drivers,
|
|
* it's a work for another day.
|
|
*/
|
|
virObjectLock(vm);
|
|
virObjectUnref(cfg);
|
|
|
|
if (haveJob)
|
|
qemuDomainObjEndJob(driver, vm);
|
|
|
|
virObjectUnref(vm);
|
|
}
|
|
|
|
void
|
|
qemuDomainSetFakeReboot(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
bool value)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
if (priv->fakeReboot == value)
|
|
goto cleanup;
|
|
|
|
priv->fakeReboot = value;
|
|
|
|
if (virDomainSaveStatus(driver->xmlopt, cfg->stateDir, vm, driver->caps) < 0)
|
|
VIR_WARN("Failed to save status on vm %s", vm->def->name);
|
|
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
static void
|
|
qemuDomainCheckRemoveOptionalDisk(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
size_t diskIndex)
|
|
{
|
|
char uuid[VIR_UUID_STRING_BUFLEN];
|
|
virObjectEventPtr event = NULL;
|
|
virDomainDiskDefPtr disk = vm->def->disks[diskIndex];
|
|
const char *src = virDomainDiskGetSource(disk);
|
|
|
|
virUUIDFormat(vm->def->uuid, uuid);
|
|
|
|
VIR_DEBUG("Dropping disk '%s' on domain '%s' (UUID '%s') "
|
|
"due to inaccessible source '%s'",
|
|
disk->dst, vm->def->name, uuid, src);
|
|
|
|
if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM ||
|
|
disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY) {
|
|
|
|
event = virDomainEventDiskChangeNewFromObj(vm, src, NULL,
|
|
disk->info.alias,
|
|
VIR_DOMAIN_EVENT_DISK_CHANGE_MISSING_ON_START);
|
|
ignore_value(virDomainDiskSetSource(disk, NULL));
|
|
/* keeping the old startup policy would be invalid for new images */
|
|
disk->startupPolicy = VIR_DOMAIN_STARTUP_POLICY_DEFAULT;
|
|
} else {
|
|
event = virDomainEventDiskChangeNewFromObj(vm, src, NULL,
|
|
disk->info.alias,
|
|
VIR_DOMAIN_EVENT_DISK_DROP_MISSING_ON_START);
|
|
virDomainDiskRemove(vm->def, diskIndex);
|
|
virDomainDiskDefFree(disk);
|
|
}
|
|
|
|
qemuDomainEventQueue(driver, event);
|
|
}
|
|
|
|
static int
|
|
qemuDomainCheckDiskStartupPolicy(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
size_t diskIndex,
|
|
bool cold_boot)
|
|
{
|
|
int startupPolicy = vm->def->disks[diskIndex]->startupPolicy;
|
|
int device = vm->def->disks[diskIndex]->device;
|
|
|
|
switch ((virDomainStartupPolicy) startupPolicy) {
|
|
case VIR_DOMAIN_STARTUP_POLICY_OPTIONAL:
|
|
/* Once started with an optional disk, qemu saves its section
|
|
* in the migration stream, so later, when restoring from it
|
|
* we must make sure the sections match. */
|
|
if (!cold_boot &&
|
|
device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
|
|
device != VIR_DOMAIN_DISK_DEVICE_CDROM)
|
|
return -1;
|
|
break;
|
|
|
|
case VIR_DOMAIN_STARTUP_POLICY_DEFAULT:
|
|
case VIR_DOMAIN_STARTUP_POLICY_MANDATORY:
|
|
return -1;
|
|
|
|
case VIR_DOMAIN_STARTUP_POLICY_REQUISITE:
|
|
if (cold_boot)
|
|
return -1;
|
|
break;
|
|
|
|
case VIR_DOMAIN_STARTUP_POLICY_LAST:
|
|
/* this should never happen */
|
|
break;
|
|
}
|
|
|
|
qemuDomainCheckRemoveOptionalDisk(driver, vm, diskIndex);
|
|
virResetLastError();
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainCheckDiskPresence(virConnectPtr conn,
|
|
virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
unsigned int flags)
|
|
{
|
|
size_t i;
|
|
bool pretend = flags & VIR_QEMU_PROCESS_START_PRETEND;
|
|
bool cold_boot = flags & VIR_QEMU_PROCESS_START_COLD;
|
|
|
|
VIR_DEBUG("Checking for disk presence");
|
|
for (i = vm->def->ndisks; i > 0; i--) {
|
|
size_t idx = i - 1;
|
|
virDomainDiskDefPtr disk = vm->def->disks[idx];
|
|
virStorageFileFormat format = virDomainDiskGetFormat(disk);
|
|
|
|
if (virStorageTranslateDiskSourcePool(conn, vm->def->disks[idx]) < 0) {
|
|
if (pretend ||
|
|
qemuDomainCheckDiskStartupPolicy(driver, vm, idx, cold_boot) < 0)
|
|
return -1;
|
|
continue;
|
|
}
|
|
|
|
if (pretend)
|
|
continue;
|
|
|
|
if (virStorageSourceIsEmpty(disk->src))
|
|
continue;
|
|
|
|
/* There is no need to check the backing chain for disks
|
|
* without backing support, the fact that the file exists is
|
|
* more than enough */
|
|
if (virStorageSourceIsLocalStorage(disk->src) &&
|
|
format > VIR_STORAGE_FILE_NONE &&
|
|
format < VIR_STORAGE_FILE_BACKING &&
|
|
virFileExists(virDomainDiskGetSource(disk)))
|
|
continue;
|
|
|
|
if (qemuDomainDetermineDiskChain(driver, vm, disk, true, true) >= 0)
|
|
continue;
|
|
|
|
if (qemuDomainCheckDiskStartupPolicy(driver, vm, idx, cold_boot) >= 0)
|
|
continue;
|
|
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* The vm must be locked when any of the following cleanup functions is
|
|
* called.
|
|
*/
|
|
int
|
|
qemuDomainCleanupAdd(virDomainObjPtr vm,
|
|
qemuDomainCleanupCallback cb)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
size_t i;
|
|
|
|
VIR_DEBUG("vm=%s, cb=%p", vm->def->name, cb);
|
|
|
|
for (i = 0; i < priv->ncleanupCallbacks; i++) {
|
|
if (priv->cleanupCallbacks[i] == cb)
|
|
return 0;
|
|
}
|
|
|
|
if (VIR_RESIZE_N(priv->cleanupCallbacks,
|
|
priv->ncleanupCallbacks_max,
|
|
priv->ncleanupCallbacks, 1) < 0)
|
|
return -1;
|
|
|
|
priv->cleanupCallbacks[priv->ncleanupCallbacks++] = cb;
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
qemuDomainCleanupRemove(virDomainObjPtr vm,
|
|
qemuDomainCleanupCallback cb)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
size_t i;
|
|
|
|
VIR_DEBUG("vm=%s, cb=%p", vm->def->name, cb);
|
|
|
|
for (i = 0; i < priv->ncleanupCallbacks; i++) {
|
|
if (priv->cleanupCallbacks[i] == cb)
|
|
VIR_DELETE_ELEMENT_INPLACE(priv->cleanupCallbacks,
|
|
i, priv->ncleanupCallbacks);
|
|
}
|
|
|
|
VIR_SHRINK_N(priv->cleanupCallbacks,
|
|
priv->ncleanupCallbacks_max,
|
|
priv->ncleanupCallbacks_max - priv->ncleanupCallbacks);
|
|
}
|
|
|
|
void
|
|
qemuDomainCleanupRun(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
size_t i;
|
|
|
|
VIR_DEBUG("driver=%p, vm=%s", driver, vm->def->name);
|
|
|
|
/* run cleanup callbacks in reverse order */
|
|
for (i = 0; i < priv->ncleanupCallbacks; i++) {
|
|
if (priv->cleanupCallbacks[priv->ncleanupCallbacks - (i + 1)])
|
|
priv->cleanupCallbacks[i](driver, vm);
|
|
}
|
|
|
|
VIR_FREE(priv->cleanupCallbacks);
|
|
priv->ncleanupCallbacks = 0;
|
|
priv->ncleanupCallbacks_max = 0;
|
|
}
|
|
|
|
static void
|
|
qemuDomainGetImageIds(virQEMUDriverConfigPtr cfg,
|
|
virDomainObjPtr vm,
|
|
virStorageSourcePtr src,
|
|
uid_t *uid, gid_t *gid)
|
|
{
|
|
virSecurityLabelDefPtr vmlabel;
|
|
virSecurityDeviceLabelDefPtr disklabel;
|
|
|
|
if (uid)
|
|
*uid = -1;
|
|
if (gid)
|
|
*gid = -1;
|
|
|
|
if (cfg) {
|
|
if (uid)
|
|
*uid = cfg->user;
|
|
|
|
if (gid)
|
|
*gid = cfg->group;
|
|
}
|
|
|
|
if (vm && (vmlabel = virDomainDefGetSecurityLabelDef(vm->def, "dac")) &&
|
|
vmlabel->label)
|
|
virParseOwnershipIds(vmlabel->label, uid, gid);
|
|
|
|
if ((disklabel = virStorageSourceGetSecurityLabelDef(src, "dac")) &&
|
|
disklabel->label)
|
|
virParseOwnershipIds(disklabel->label, uid, gid);
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainStorageFileInit(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virStorageSourcePtr src)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
uid_t uid;
|
|
gid_t gid;
|
|
int ret = -1;
|
|
|
|
qemuDomainGetImageIds(cfg, vm, src, &uid, &gid);
|
|
|
|
if (virStorageFileInitAs(src, uid, gid) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
char *
|
|
qemuDomainStorageAlias(const char *device, int depth)
|
|
{
|
|
char *alias;
|
|
|
|
device = qemuAliasDiskDriveSkipPrefix(device);
|
|
|
|
if (!depth)
|
|
ignore_value(VIR_STRDUP(alias, device));
|
|
else
|
|
ignore_value(virAsprintf(&alias, "%s.%d", device, depth));
|
|
return alias;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainDetermineDiskChain(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainDiskDefPtr disk,
|
|
bool force_probe,
|
|
bool report_broken)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int ret = 0;
|
|
uid_t uid;
|
|
gid_t gid;
|
|
|
|
if (virStorageSourceIsEmpty(disk->src))
|
|
goto cleanup;
|
|
|
|
if (disk->src->backingStore) {
|
|
if (force_probe)
|
|
virStorageSourceBackingStoreClear(disk->src);
|
|
else
|
|
goto cleanup;
|
|
}
|
|
|
|
qemuDomainGetImageIds(cfg, vm, disk->src, &uid, &gid);
|
|
|
|
if (virStorageFileGetMetadata(disk->src,
|
|
uid, gid,
|
|
cfg->allowDiskFormatProbing,
|
|
report_broken) < 0)
|
|
ret = -1;
|
|
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainDiskChainElementRevoke:
|
|
*
|
|
* Revoke access to a single backing chain element. This restores the labels,
|
|
* removes cgroup ACLs for devices and removes locks.
|
|
*/
|
|
void
|
|
qemuDomainDiskChainElementRevoke(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virStorageSourcePtr elem)
|
|
{
|
|
if (qemuTeardownImageCgroup(vm, elem) < 0)
|
|
VIR_WARN("Failed to teardown cgroup for disk path %s",
|
|
NULLSTR(elem->path));
|
|
|
|
if (qemuSecurityRestoreImageLabel(driver, vm, elem) < 0)
|
|
VIR_WARN("Unable to restore security label on %s", NULLSTR(elem->path));
|
|
|
|
if (qemuDomainNamespaceTeardownDisk(driver, vm, elem) < 0)
|
|
VIR_WARN("Unable to remove /dev entry for %s", NULLSTR(elem->path));
|
|
|
|
if (virDomainLockImageDetach(driver->lockManager, vm, elem) < 0)
|
|
VIR_WARN("Unable to release lock on %s", NULLSTR(elem->path));
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainDiskChainElementPrepare:
|
|
*
|
|
* Allow a VM access to a single element of a disk backing chain; this helper
|
|
* ensures that the lock manager, cgroup device controller, and security manager
|
|
* labelling are all aware of each new file before it is added to a chain */
|
|
int
|
|
qemuDomainDiskChainElementPrepare(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virStorageSourcePtr elem,
|
|
bool readonly)
|
|
{
|
|
bool was_readonly = elem->readonly;
|
|
virQEMUDriverConfigPtr cfg = NULL;
|
|
int ret = -1;
|
|
|
|
cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
elem->readonly = readonly;
|
|
|
|
if (virDomainLockImageAttach(driver->lockManager, cfg->uri, vm, elem) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainNamespaceSetupDisk(driver, vm, elem) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuSetupImageCgroup(vm, elem) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuSecuritySetImageLabel(driver, vm, elem) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
elem->readonly = was_readonly;
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainDiskSourceDiffers(virDomainDiskDefPtr disk,
|
|
virDomainDiskDefPtr origDisk)
|
|
{
|
|
char *diskSrc = NULL, *origDiskSrc = NULL;
|
|
bool diskEmpty, origDiskEmpty;
|
|
bool ret = true;
|
|
|
|
diskEmpty = virStorageSourceIsEmpty(disk->src);
|
|
origDiskEmpty = virStorageSourceIsEmpty(origDisk->src);
|
|
|
|
if (diskEmpty && origDiskEmpty)
|
|
return false;
|
|
|
|
if (diskEmpty ^ origDiskEmpty)
|
|
return true;
|
|
|
|
/* This won't be a network storage, so no need to get the diskPriv
|
|
* in order to fetch the secret, thus NULL for param2 */
|
|
if (qemuGetDriveSourceString(disk->src, NULL, &diskSrc) < 0 ||
|
|
qemuGetDriveSourceString(origDisk->src, NULL, &origDiskSrc) < 0)
|
|
goto cleanup;
|
|
|
|
/* So far in qemu disk sources are considered different
|
|
* if either path to disk or its format changes. */
|
|
ret = virDomainDiskGetFormat(disk) != virDomainDiskGetFormat(origDisk) ||
|
|
STRNEQ_NULLABLE(diskSrc, origDiskSrc);
|
|
cleanup:
|
|
VIR_FREE(diskSrc);
|
|
VIR_FREE(origDiskSrc);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/*
|
|
* Makes sure the @disk differs from @orig_disk only by the source
|
|
* path and nothing else. Fields that are being checked and the
|
|
* information whether they are nullable (may not be specified) or is
|
|
* taken from the virDomainDiskDefFormat() code.
|
|
*/
|
|
bool
|
|
qemuDomainDiskChangeSupported(virDomainDiskDefPtr disk,
|
|
virDomainDiskDefPtr orig_disk)
|
|
{
|
|
#define CHECK_EQ(field, field_name, nullable) \
|
|
do { \
|
|
if (nullable && !disk->field) \
|
|
break; \
|
|
if (disk->field != orig_disk->field) { \
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, \
|
|
_("cannot modify field '%s' of the disk"), \
|
|
field_name); \
|
|
return false; \
|
|
} \
|
|
} while (0)
|
|
|
|
CHECK_EQ(device, "device", false);
|
|
CHECK_EQ(bus, "bus", false);
|
|
if (STRNEQ(disk->dst, orig_disk->dst)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"target");
|
|
return false;
|
|
}
|
|
CHECK_EQ(tray_status, "tray", true);
|
|
CHECK_EQ(removable, "removable", true);
|
|
|
|
if (disk->geometry.cylinders &&
|
|
disk->geometry.heads &&
|
|
disk->geometry.sectors) {
|
|
CHECK_EQ(geometry.cylinders, "geometry cylinders", false);
|
|
CHECK_EQ(geometry.heads, "geometry heads", false);
|
|
CHECK_EQ(geometry.sectors, "geometry sectors", false);
|
|
CHECK_EQ(geometry.trans, "BIOS-translation-modus", true);
|
|
}
|
|
|
|
CHECK_EQ(blockio.logical_block_size,
|
|
"blockio logical_block_size", false);
|
|
CHECK_EQ(blockio.physical_block_size,
|
|
"blockio physical_block_size", false);
|
|
|
|
CHECK_EQ(blkdeviotune.total_bytes_sec,
|
|
"blkdeviotune total_bytes_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.read_bytes_sec,
|
|
"blkdeviotune read_bytes_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.write_bytes_sec,
|
|
"blkdeviotune write_bytes_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.total_iops_sec,
|
|
"blkdeviotune total_iops_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.read_iops_sec,
|
|
"blkdeviotune read_iops_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.write_iops_sec,
|
|
"blkdeviotune write_iops_sec",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.total_bytes_sec_max,
|
|
"blkdeviotune total_bytes_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.read_bytes_sec_max,
|
|
"blkdeviotune read_bytes_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.write_bytes_sec_max,
|
|
"blkdeviotune write_bytes_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.total_iops_sec_max,
|
|
"blkdeviotune total_iops_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.read_iops_sec_max,
|
|
"blkdeviotune read_iops_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.write_iops_sec_max,
|
|
"blkdeviotune write_iops_sec_max",
|
|
true);
|
|
CHECK_EQ(blkdeviotune.size_iops_sec,
|
|
"blkdeviotune size_iops_sec",
|
|
true);
|
|
|
|
if (disk->serial && STRNEQ_NULLABLE(disk->serial, orig_disk->serial)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"serial");
|
|
return false;
|
|
}
|
|
|
|
if (disk->wwn && STRNEQ_NULLABLE(disk->wwn, orig_disk->wwn)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"wwn");
|
|
return false;
|
|
}
|
|
|
|
if (disk->vendor && STRNEQ_NULLABLE(disk->vendor, orig_disk->vendor)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"vendor");
|
|
return false;
|
|
}
|
|
|
|
if (disk->product && STRNEQ_NULLABLE(disk->product, orig_disk->product)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"product");
|
|
return false;
|
|
}
|
|
|
|
CHECK_EQ(cachemode, "cache", true);
|
|
CHECK_EQ(error_policy, "error_policy", true);
|
|
CHECK_EQ(rerror_policy, "rerror_policy", true);
|
|
CHECK_EQ(iomode, "io", true);
|
|
CHECK_EQ(ioeventfd, "ioeventfd", true);
|
|
CHECK_EQ(event_idx, "event_idx", true);
|
|
CHECK_EQ(copy_on_read, "copy_on_read", true);
|
|
/* "snapshot" is a libvirt internal field and thus can be changed */
|
|
/* startupPolicy is allowed to be updated. Therefore not checked here. */
|
|
CHECK_EQ(transient, "transient", true);
|
|
|
|
/* Note: For some address types the address auto generation for
|
|
* @disk has still not happened at this point (e.g. driver
|
|
* specific addresses) therefore we can't catch these possible
|
|
* address modifications here. */
|
|
if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
|
|
!virDomainDeviceInfoAddressIsEqual(&disk->info, &orig_disk->info)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"address");
|
|
return false;
|
|
}
|
|
|
|
CHECK_EQ(info.bootIndex, "boot order", true);
|
|
CHECK_EQ(rawio, "rawio", true);
|
|
CHECK_EQ(sgio, "sgio", true);
|
|
CHECK_EQ(discard, "discard", true);
|
|
CHECK_EQ(iothread, "iothread", true);
|
|
|
|
if (disk->domain_name &&
|
|
STRNEQ_NULLABLE(disk->domain_name, orig_disk->domain_name)) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("cannot modify field '%s' of the disk"),
|
|
"backenddomain");
|
|
return false;
|
|
}
|
|
|
|
/* checks for fields stored in disk->src */
|
|
/* unfortunately 'readonly' and 'shared' can't be converted to tristate
|
|
* values thus we need to ignore the check if the new value is 'false' */
|
|
CHECK_EQ(src->readonly, "readonly", true);
|
|
CHECK_EQ(src->shared, "shared", true);
|
|
|
|
#undef CHECK_EQ
|
|
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
qemuDomainDiskBlockJobIsActive(virDomainDiskDefPtr disk)
|
|
{
|
|
qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
|
|
|
|
if (disk->mirror) {
|
|
virReportError(VIR_ERR_BLOCK_COPY_ACTIVE,
|
|
_("disk '%s' already in active block job"),
|
|
disk->dst);
|
|
|
|
return true;
|
|
}
|
|
|
|
if (diskPriv->blockjob) {
|
|
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
|
_("disk '%s' already in active block job"),
|
|
disk->dst);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainHasBlockjob:
|
|
* @vm: domain object
|
|
* @copy_only: Reject only block copy job
|
|
*
|
|
* Return true if @vm has at least one disk involved in a current block
|
|
* copy/commit/pull job. If @copy_only is true this returns true only if the
|
|
* disk is involved in a block copy.
|
|
* */
|
|
bool
|
|
qemuDomainHasBlockjob(virDomainObjPtr vm,
|
|
bool copy_only)
|
|
{
|
|
size_t i;
|
|
for (i = 0; i < vm->def->ndisks; i++) {
|
|
virDomainDiskDefPtr disk = vm->def->disks[i];
|
|
qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
|
|
|
|
if (!copy_only && diskPriv->blockjob)
|
|
return true;
|
|
|
|
if (disk->mirror && disk->mirrorJob == VIR_DOMAIN_BLOCK_JOB_TYPE_COPY)
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainUpdateDeviceList(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
int asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
char **aliases;
|
|
int rc;
|
|
|
|
if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_DEL_EVENT))
|
|
return 0;
|
|
|
|
if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
|
|
return -1;
|
|
rc = qemuMonitorGetDeviceAliases(priv->mon, &aliases);
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0)
|
|
return -1;
|
|
if (rc < 0)
|
|
return -1;
|
|
|
|
virStringListFree(priv->qemuDevices);
|
|
priv->qemuDevices = aliases;
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainUpdateMemoryDeviceInfo(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
int asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
virHashTablePtr meminfo = NULL;
|
|
int rc;
|
|
size_t i;
|
|
|
|
if (vm->def->nmems == 0)
|
|
return 0;
|
|
|
|
if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
|
|
return -1;
|
|
|
|
rc = qemuMonitorGetMemoryDeviceInfo(priv->mon, &meminfo);
|
|
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0)
|
|
return -1;
|
|
|
|
/* if qemu doesn't support the info request, just carry on */
|
|
if (rc == -2)
|
|
return 0;
|
|
|
|
if (rc < 0)
|
|
return -1;
|
|
|
|
for (i = 0; i < vm->def->nmems; i++) {
|
|
virDomainMemoryDefPtr mem = vm->def->mems[i];
|
|
qemuMonitorMemoryDeviceInfoPtr dimm;
|
|
|
|
if (!mem->info.alias)
|
|
continue;
|
|
|
|
if (!(dimm = virHashLookup(meminfo, mem->info.alias)))
|
|
continue;
|
|
|
|
mem->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM;
|
|
mem->info.addr.dimm.slot = dimm->slot;
|
|
mem->info.addr.dimm.base = dimm->address;
|
|
}
|
|
|
|
virHashFree(meminfo);
|
|
return 0;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainDefCheckABIStability(virQEMUDriverPtr driver,
|
|
virDomainDefPtr src,
|
|
virDomainDefPtr dst)
|
|
{
|
|
virDomainDefPtr migratableDefSrc = NULL;
|
|
virDomainDefPtr migratableDefDst = NULL;
|
|
const unsigned int flags = VIR_DOMAIN_XML_SECURE |
|
|
VIR_DOMAIN_XML_UPDATE_CPU |
|
|
VIR_DOMAIN_XML_MIGRATABLE;
|
|
const unsigned int check_flags = VIR_DOMAIN_DEF_ABI_CHECK_SKIP_VOLATILE;
|
|
bool ret = false;
|
|
|
|
if (!(migratableDefSrc = qemuDomainDefCopy(driver, src, flags)) ||
|
|
!(migratableDefDst = qemuDomainDefCopy(driver, dst, flags)))
|
|
goto cleanup;
|
|
|
|
if (!virDomainDefCheckABIStabilityFlags(migratableDefSrc,
|
|
migratableDefDst,
|
|
check_flags))
|
|
goto cleanup;
|
|
|
|
/* Force update any skipped values from the volatile flag */
|
|
dst->mem.cur_balloon = src->mem.cur_balloon;
|
|
|
|
ret = true;
|
|
|
|
cleanup:
|
|
virDomainDefFree(migratableDefSrc);
|
|
virDomainDefFree(migratableDefDst);
|
|
return ret;
|
|
}
|
|
|
|
bool
|
|
qemuDomainAgentAvailable(virDomainObjPtr vm,
|
|
bool reportError)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
if (virDomainObjGetState(vm, NULL) != VIR_DOMAIN_RUNNING) {
|
|
if (reportError) {
|
|
virReportError(VIR_ERR_OPERATION_INVALID, "%s",
|
|
_("domain is not running"));
|
|
}
|
|
return false;
|
|
}
|
|
if (priv->agentError) {
|
|
if (reportError) {
|
|
virReportError(VIR_ERR_AGENT_UNRESPONSIVE, "%s",
|
|
_("QEMU guest agent is not "
|
|
"available due to an error"));
|
|
}
|
|
return false;
|
|
}
|
|
if (!priv->agent) {
|
|
if (qemuFindAgentConfig(vm->def)) {
|
|
if (reportError) {
|
|
virReportError(VIR_ERR_AGENT_UNRESPONSIVE, "%s",
|
|
_("QEMU guest agent is not connected"));
|
|
}
|
|
return false;
|
|
} else {
|
|
if (reportError) {
|
|
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
|
|
_("QEMU guest agent is not configured"));
|
|
}
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
|
|
static unsigned long long
|
|
qemuDomainGetMemorySizeAlignment(virDomainDefPtr def)
|
|
{
|
|
/* PPC requires the memory sizes to be rounded to 256MiB increments, so
|
|
* round them to the size always. */
|
|
if (ARCH_IS_PPC64(def->os.arch))
|
|
return 256 * 1024;
|
|
|
|
/* Align memory size. QEMU requires rounding to next 4KiB block.
|
|
* We'll take the "traditional" path and round it to 1MiB*/
|
|
|
|
return 1024;
|
|
}
|
|
|
|
|
|
static unsigned long long
|
|
qemuDomainGetMemoryModuleSizeAlignment(const virDomainDef *def,
|
|
const virDomainMemoryDef *mem ATTRIBUTE_UNUSED)
|
|
{
|
|
/* PPC requires the memory sizes to be rounded to 256MiB increments, so
|
|
* round them to the size always. */
|
|
if (ARCH_IS_PPC64(def->os.arch))
|
|
return 256 * 1024;
|
|
|
|
/* dimm memory modules require 2MiB alignment rather than the 1MiB we are
|
|
* using elsewhere. */
|
|
return 2048;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainAlignMemorySizes(virDomainDefPtr def)
|
|
{
|
|
unsigned long long maxmemkb = virMemoryMaxValue(false) >> 10;
|
|
unsigned long long maxmemcapped = virMemoryMaxValue(true) >> 10;
|
|
unsigned long long initialmem = 0;
|
|
unsigned long long hotplugmem = 0;
|
|
unsigned long long mem;
|
|
unsigned long long align = qemuDomainGetMemorySizeAlignment(def);
|
|
size_t ncells = virDomainNumaGetNodeCount(def->numa);
|
|
size_t i;
|
|
|
|
/* align NUMA cell sizes if relevant */
|
|
for (i = 0; i < ncells; i++) {
|
|
mem = VIR_ROUND_UP(virDomainNumaGetNodeMemorySize(def->numa, i), align);
|
|
initialmem += mem;
|
|
|
|
if (mem > maxmemkb) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("memory size of NUMA node '%zu' overflowed after "
|
|
"alignment"), i);
|
|
return -1;
|
|
}
|
|
virDomainNumaSetNodeMemorySize(def->numa, i, mem);
|
|
}
|
|
|
|
/* align initial memory size, if NUMA is present calculate it as total of
|
|
* individual aligned NUMA node sizes */
|
|
if (initialmem == 0)
|
|
initialmem = VIR_ROUND_UP(virDomainDefGetMemoryInitial(def), align);
|
|
|
|
if (initialmem > maxmemcapped) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("initial memory size overflowed after alignment"));
|
|
return -1;
|
|
}
|
|
|
|
def->mem.max_memory = VIR_ROUND_UP(def->mem.max_memory, align);
|
|
if (def->mem.max_memory > maxmemkb) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("maximum memory size overflowed after alignment"));
|
|
return -1;
|
|
}
|
|
|
|
/* Align memory module sizes */
|
|
for (i = 0; i < def->nmems; i++) {
|
|
align = qemuDomainGetMemoryModuleSizeAlignment(def, def->mems[i]);
|
|
def->mems[i]->size = VIR_ROUND_UP(def->mems[i]->size, align);
|
|
hotplugmem += def->mems[i]->size;
|
|
|
|
if (def->mems[i]->size > maxmemkb) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("size of memory module '%zu' overflowed after "
|
|
"alignment"), i);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
virDomainDefSetMemoryTotal(def, initialmem + hotplugmem);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainMemoryDeviceAlignSize:
|
|
* @mem: memory device definition object
|
|
*
|
|
* Aligns the size of the memory module as qemu enforces it. The size is updated
|
|
* inplace. Default rounding is now to 1 MiB (qemu requires rouding to page,
|
|
* size so this should be safe).
|
|
*/
|
|
void
|
|
qemuDomainMemoryDeviceAlignSize(virDomainDefPtr def,
|
|
virDomainMemoryDefPtr mem)
|
|
{
|
|
mem->size = VIR_ROUND_UP(mem->size, qemuDomainGetMemorySizeAlignment(def));
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainGetMonitor:
|
|
* @vm: domain object
|
|
*
|
|
* Returns the monitor pointer corresponding to the domain object @vm.
|
|
*/
|
|
qemuMonitorPtr
|
|
qemuDomainGetMonitor(virDomainObjPtr vm)
|
|
{
|
|
return ((qemuDomainObjPrivatePtr) vm->privateData)->mon;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainSupportsBlockJobs:
|
|
* @vm: domain object
|
|
* @modern: pointer to bool that returns whether modern block jobs are supported
|
|
*
|
|
* Returns -1 in case when qemu does not support block jobs at all. Otherwise
|
|
* returns 0 and optionally fills @modern to denote that modern (async) block
|
|
* jobs are supported.
|
|
*/
|
|
int
|
|
qemuDomainSupportsBlockJobs(virDomainObjPtr vm,
|
|
bool *modern)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
bool asynchronous = virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKJOB_ASYNC);
|
|
bool synchronous = virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKJOB_SYNC);
|
|
|
|
if (!synchronous && !asynchronous) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("block jobs not supported with this QEMU binary"));
|
|
return -1;
|
|
}
|
|
|
|
if (modern)
|
|
*modern = asynchronous;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuFindAgentConfig:
|
|
* @def: domain definition
|
|
*
|
|
* Returns the pointer to the channel definition that is used to access the
|
|
* guest agent if the agent is configured or NULL otherwise.
|
|
*/
|
|
virDomainChrDefPtr
|
|
qemuFindAgentConfig(virDomainDefPtr def)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < def->nchannels; i++) {
|
|
virDomainChrDefPtr channel = def->channels[i];
|
|
|
|
if (channel->targetType != VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO)
|
|
continue;
|
|
|
|
if (STREQ_NULLABLE(channel->target.name, "org.qemu.guest_agent.0"))
|
|
return channel;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineIsQ35(const virDomainDef *def)
|
|
{
|
|
return (STRPREFIX(def->os.machine, "pc-q35") ||
|
|
STREQ(def->os.machine, "q35"));
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineIsI440FX(const virDomainDef *def)
|
|
{
|
|
return (STREQ(def->os.machine, "pc") ||
|
|
STRPREFIX(def->os.machine, "pc-0.") ||
|
|
STRPREFIX(def->os.machine, "pc-1.") ||
|
|
STRPREFIX(def->os.machine, "pc-i440") ||
|
|
STRPREFIX(def->os.machine, "rhel"));
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineHasPCIRoot(const virDomainDef *def)
|
|
{
|
|
int root = virDomainControllerFind(def, VIR_DOMAIN_CONTROLLER_TYPE_PCI, 0);
|
|
|
|
if (root < 0)
|
|
return false;
|
|
|
|
if (def->controllers[root]->model != VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineHasPCIeRoot(const virDomainDef *def)
|
|
{
|
|
int root = virDomainControllerFind(def, VIR_DOMAIN_CONTROLLER_TYPE_PCI, 0);
|
|
|
|
if (root < 0)
|
|
return false;
|
|
|
|
if (def->controllers[root]->model != VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineNeedsFDC(const virDomainDef *def)
|
|
{
|
|
char *p = STRSKIP(def->os.machine, "pc-q35-");
|
|
|
|
if (p) {
|
|
if (STRPREFIX(p, "1.") ||
|
|
STRPREFIX(p, "2.0") ||
|
|
STRPREFIX(p, "2.1") ||
|
|
STRPREFIX(p, "2.2") ||
|
|
STRPREFIX(p, "2.3"))
|
|
return false;
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineIsS390CCW(const virDomainDef *def)
|
|
{
|
|
return STRPREFIX(def->os.machine, "s390-ccw");
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineIsVirt(const virDomainDef *def)
|
|
{
|
|
if (def->os.arch != VIR_ARCH_ARMV7L &&
|
|
def->os.arch != VIR_ARCH_AARCH64)
|
|
return false;
|
|
|
|
if (STRNEQ(def->os.machine, "virt") &&
|
|
!STRPREFIX(def->os.machine, "virt-"))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineIsPSeries(const virDomainDef *def)
|
|
{
|
|
if (!ARCH_IS_PPC64(def->os.arch))
|
|
return false;
|
|
|
|
if (STRNEQ(def->os.machine, "pseries") &&
|
|
!STRPREFIX(def->os.machine, "pseries-"))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
static bool
|
|
qemuCheckMemoryDimmConflict(const virDomainDef *def,
|
|
const virDomainMemoryDef *mem)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < def->nmems; i++) {
|
|
virDomainMemoryDefPtr tmp = def->mems[i];
|
|
|
|
if (tmp == mem ||
|
|
tmp->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM)
|
|
continue;
|
|
|
|
if (mem->info.addr.dimm.slot == tmp->info.addr.dimm.slot) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("memory device slot '%u' is already being "
|
|
"used by another memory device"),
|
|
mem->info.addr.dimm.slot);
|
|
return true;
|
|
}
|
|
|
|
if (mem->info.addr.dimm.base != 0 &&
|
|
mem->info.addr.dimm.base == tmp->info.addr.dimm.base) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("memory device base '0x%llx' is already being "
|
|
"used by another memory device"),
|
|
mem->info.addr.dimm.base);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
static int
|
|
qemuDomainDefValidateMemoryHotplugDevice(const virDomainMemoryDef *mem,
|
|
const virDomainDef *def)
|
|
{
|
|
switch ((virDomainMemoryModel) mem->model) {
|
|
case VIR_DOMAIN_MEMORY_MODEL_DIMM:
|
|
if (mem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM &&
|
|
mem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("only 'dimm' addresses are supported for the "
|
|
"pc-dimm device"));
|
|
return -1;
|
|
}
|
|
|
|
if (virDomainNumaGetNodeCount(def->numa) != 0) {
|
|
if (mem->targetNode == -1) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("target NUMA node needs to be specified for "
|
|
"memory device"));
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (mem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM) {
|
|
if (mem->info.addr.dimm.slot >= def->mem.memory_slots) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("memory device slot '%u' exceeds slots "
|
|
"count '%u'"),
|
|
mem->info.addr.dimm.slot, def->mem.memory_slots);
|
|
return -1;
|
|
}
|
|
|
|
|
|
if (qemuCheckMemoryDimmConflict(def, mem))
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case VIR_DOMAIN_MEMORY_MODEL_NONE:
|
|
case VIR_DOMAIN_MEMORY_MODEL_LAST:
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainDefValidateMemoryHotplug:
|
|
* @def: domain definition
|
|
* @qemuCaps: qemu capabilities object
|
|
* @mem: definition of memory device that is to be added to @def with hotplug,
|
|
* NULL in case of regular VM startup
|
|
*
|
|
* Validates that the domain definition and memory modules have valid
|
|
* configuration and are possibly able to accept @mem via hotplug if it's
|
|
* non-NULL.
|
|
*
|
|
* Returns 0 on success; -1 and a libvirt error on error.
|
|
*/
|
|
int
|
|
qemuDomainDefValidateMemoryHotplug(const virDomainDef *def,
|
|
virQEMUCapsPtr qemuCaps,
|
|
const virDomainMemoryDef *mem)
|
|
{
|
|
unsigned int nmems = def->nmems;
|
|
unsigned long long hotplugSpace;
|
|
unsigned long long hotplugMemory = 0;
|
|
size_t i;
|
|
|
|
hotplugSpace = def->mem.max_memory - virDomainDefGetMemoryInitial(def);
|
|
|
|
if (mem) {
|
|
nmems++;
|
|
hotplugMemory = mem->size;
|
|
|
|
if (qemuDomainDefValidateMemoryHotplugDevice(mem, def) < 0)
|
|
return -1;
|
|
}
|
|
|
|
if (!virDomainDefHasMemoryHotplug(def)) {
|
|
if (nmems) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("cannot use/hotplug a memory device when domain "
|
|
"'maxMemory' is not defined"));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_PC_DIMM)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("memory hotplug isn't supported by this QEMU binary"));
|
|
return -1;
|
|
}
|
|
|
|
if (!ARCH_IS_PPC64(def->os.arch)) {
|
|
/* due to guest support, qemu would silently enable NUMA with one node
|
|
* once the memory hotplug backend is enabled. To avoid possible
|
|
* confusion we will enforce user originated numa configuration along
|
|
* with memory hotplug. */
|
|
if (virDomainNumaGetNodeCount(def->numa) == 0) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("At least one numa node has to be configured when "
|
|
"enabling memory hotplug"));
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (nmems > def->mem.memory_slots) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("memory device count '%u' exceeds slots count '%u'"),
|
|
nmems, def->mem.memory_slots);
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < def->nmems; i++) {
|
|
hotplugMemory += def->mems[i]->size;
|
|
|
|
/* already existing devices don't need to be checked on hotplug */
|
|
if (!mem &&
|
|
qemuDomainDefValidateMemoryHotplugDevice(def->mems[i], def) < 0)
|
|
return -1;
|
|
}
|
|
|
|
if (hotplugMemory > hotplugSpace) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("memory device total size exceeds hotplug space"));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainMachineHasBuiltinIDE(const virDomainDef *def)
|
|
{
|
|
return qemuDomainMachineIsI440FX(def) ||
|
|
STREQ(def->os.machine, "malta") ||
|
|
STREQ(def->os.machine, "sun4u") ||
|
|
STREQ(def->os.machine, "g3beige");
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainUpdateCurrentMemorySize:
|
|
*
|
|
* Updates the current balloon size from the monitor if necessary. In case when
|
|
* the balloon is not present for the domain, the function recalculates the
|
|
* maximum size to reflect possible changes.
|
|
*
|
|
* Returns 0 on success and updates vm->def->mem.cur_balloon if necessary, -1 on
|
|
* error and reports libvirt error.
|
|
*/
|
|
int
|
|
qemuDomainUpdateCurrentMemorySize(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
unsigned long long balloon;
|
|
int ret = -1;
|
|
|
|
/* inactive domain doesn't need size update */
|
|
if (!virDomainObjIsActive(vm))
|
|
return 0;
|
|
|
|
/* if no balloning is available, the current size equals to the current
|
|
* full memory size */
|
|
if (!virDomainDefHasMemballoon(vm->def)) {
|
|
vm->def->mem.cur_balloon = virDomainDefGetMemoryTotal(vm->def);
|
|
return 0;
|
|
}
|
|
|
|
/* current size is always automagically updated via the event */
|
|
if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BALLOON_EVENT))
|
|
return 0;
|
|
|
|
/* here we need to ask the monitor */
|
|
|
|
/* Don't delay if someone's using the monitor, just use existing most
|
|
* recent data instead */
|
|
if (qemuDomainJobAllowed(priv, QEMU_JOB_QUERY)) {
|
|
if (qemuDomainObjBeginJob(driver, vm, QEMU_JOB_QUERY) < 0)
|
|
return -1;
|
|
|
|
if (!virDomainObjIsActive(vm)) {
|
|
virReportError(VIR_ERR_OPERATION_INVALID, "%s",
|
|
_("domain is not running"));
|
|
goto endjob;
|
|
}
|
|
|
|
qemuDomainObjEnterMonitor(driver, vm);
|
|
ret = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0)
|
|
ret = -1;
|
|
|
|
endjob:
|
|
qemuDomainObjEndJob(driver, vm);
|
|
|
|
if (ret < 0)
|
|
return -1;
|
|
|
|
vm->def->mem.cur_balloon = balloon;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainGetMemLockLimitBytes:
|
|
*
|
|
* @def: domain definition
|
|
*
|
|
* Returns the size of the memory in bytes that needs to be set as
|
|
* RLIMIT_MEMLOCK for the QEMU process.
|
|
* If a mem.hard_limit is set, then that value is preferred; otherwise, the
|
|
* value returned may depend upon the architecture or devices present.
|
|
*/
|
|
unsigned long long
|
|
qemuDomainGetMemLockLimitBytes(virDomainDefPtr def)
|
|
{
|
|
unsigned long long memKB;
|
|
|
|
/* prefer the hard limit */
|
|
if (virMemoryLimitIsSet(def->mem.hard_limit)) {
|
|
memKB = def->mem.hard_limit;
|
|
goto done;
|
|
}
|
|
|
|
if (ARCH_IS_PPC64(def->os.arch)) {
|
|
unsigned long long maxMemory;
|
|
unsigned long long memory;
|
|
unsigned long long baseLimit;
|
|
unsigned long long passthroughLimit;
|
|
size_t nPCIHostBridges;
|
|
size_t i;
|
|
bool usesVFIO = false;
|
|
|
|
/* TODO: Detect at runtime once we start using more than just
|
|
* the default PCI Host Bridge */
|
|
nPCIHostBridges = 1;
|
|
|
|
for (i = 0; i < def->nhostdevs; i++) {
|
|
virDomainHostdevDefPtr dev = def->hostdevs[i];
|
|
|
|
if (dev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
|
|
dev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI &&
|
|
dev->source.subsys.u.pci.backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
|
|
usesVFIO = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
memory = virDomainDefGetMemoryTotal(def);
|
|
|
|
if (def->mem.max_memory)
|
|
maxMemory = def->mem.max_memory;
|
|
else
|
|
maxMemory = memory;
|
|
|
|
/* baseLimit := maxMemory / 128 (a)
|
|
* + 4 MiB * #PHBs + 8 MiB (b)
|
|
*
|
|
* (a) is the hash table
|
|
*
|
|
* (b) is accounting for the 32-bit DMA window - it could be either the
|
|
* KVM accelerated TCE tables for emulated devices, or the VFIO
|
|
* userspace view. The 4 MiB per-PHB (including the default one) covers
|
|
* a 2GiB DMA window: default is 1GiB, but it's possible it'll be
|
|
* increased to help performance. The 8 MiB extra should be plenty for
|
|
* the TCE table index for any reasonable number of PHBs and several
|
|
* spapr-vlan or spapr-vscsi devices (512kB + a tiny bit each) */
|
|
baseLimit = maxMemory / 128 +
|
|
4096 * nPCIHostBridges +
|
|
8192;
|
|
|
|
/* passthroughLimit := max( 2 GiB * #PHBs, (c)
|
|
* memory (d)
|
|
* + memory * 1/512 * #PHBs + 8 MiB ) (e)
|
|
*
|
|
* (c) is the pre-DDW VFIO DMA window accounting. We're allowing 2 GiB
|
|
* rather than 1 GiB
|
|
*
|
|
* (d) is the with-DDW (and memory pre-registration and related
|
|
* features) DMA window accounting - assuming that we only account RAM
|
|
* once, even if mapped to multiple PHBs
|
|
*
|
|
* (e) is the with-DDW userspace view and overhead for the 64-bit DMA
|
|
* window. This is based a bit on expected guest behaviour, but there
|
|
* really isn't a way to completely avoid that. We assume the guest
|
|
* requests a 64-bit DMA window (per PHB) just big enough to map all
|
|
* its RAM. 4 kiB page size gives the 1/512; it will be less with 64
|
|
* kiB pages, less still if the guest is mapped with hugepages (unlike
|
|
* the default 32-bit DMA window, DDW windows can use large IOMMU
|
|
* pages). 8 MiB is for second and further level overheads, like (b) */
|
|
passthroughLimit = MAX(2 * 1024 * 1024 * nPCIHostBridges,
|
|
memory +
|
|
memory / 512 * nPCIHostBridges + 8192);
|
|
|
|
if (usesVFIO)
|
|
memKB = baseLimit + passthroughLimit;
|
|
else
|
|
memKB = baseLimit;
|
|
|
|
goto done;
|
|
}
|
|
|
|
/* For device passthrough using VFIO the guest memory and MMIO memory
|
|
* regions need to be locked persistent in order to allow DMA.
|
|
*
|
|
* Currently the below limit is based on assumptions about the x86 platform.
|
|
*
|
|
* The chosen value of 1GiB below originates from x86 systems where it was
|
|
* used as space reserved for the MMIO region for the whole system.
|
|
*
|
|
* On x86_64 systems the MMIO regions of the IOMMU mapped devices don't
|
|
* count towards the locked memory limit since the memory is owned by the
|
|
* device. Emulated devices though do count, but the regions are usually
|
|
* small. Although it's not guaranteed that the limit will be enough for all
|
|
* configurations it didn't pose a problem for now.
|
|
*
|
|
* http://www.redhat.com/archives/libvir-list/2015-November/msg00329.html
|
|
*
|
|
* Note that this may not be valid for all platforms.
|
|
*/
|
|
memKB = virDomainDefGetMemoryTotal(def) + 1024 * 1024;
|
|
|
|
done:
|
|
return memKB << 10;
|
|
}
|
|
|
|
|
|
/**
|
|
* @def: domain definition
|
|
*
|
|
* Returns true if the locked memory limit needs to be set or updated because
|
|
* of domain configuration, VFIO passthrough devices or architecture-specific
|
|
* requirements.
|
|
* */
|
|
bool
|
|
qemuDomainRequiresMemLock(virDomainDefPtr def)
|
|
{
|
|
size_t i;
|
|
|
|
if (def->mem.locked)
|
|
return true;
|
|
|
|
for (i = 0; i < def->nhostdevs; i++) {
|
|
virDomainHostdevDefPtr dev = def->hostdevs[i];
|
|
|
|
if (dev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
|
|
dev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI &&
|
|
dev->source.subsys.u.pci.backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO)
|
|
return true;
|
|
}
|
|
|
|
/* ppc64 KVM domains need to lock some memory even when VFIO is not used */
|
|
if (ARCH_IS_PPC64(def->os.arch) && def->virtType == VIR_DOMAIN_VIRT_KVM)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* qemuDomainAdjustMaxMemLock:
|
|
* @vm: domain
|
|
*
|
|
* Adjust the memory locking limit for the QEMU process associated to @vm, in
|
|
* order to comply with VFIO or architecture requirements.
|
|
*
|
|
* The limit will not be changed unless doing so is needed; the first time
|
|
* the limit is changed, the original (default) limit is stored in @vm and
|
|
* that value will be restored if qemuDomainAdjustMaxMemLock() is called once
|
|
* memory locking is no longer required.
|
|
*
|
|
* Returns: 0 on success, <0 on failure
|
|
*/
|
|
int
|
|
qemuDomainAdjustMaxMemLock(virDomainObjPtr vm)
|
|
{
|
|
unsigned long long bytes = 0;
|
|
int ret = -1;
|
|
|
|
if (qemuDomainRequiresMemLock(vm->def)) {
|
|
/* If this is the first time adjusting the limit, save the current
|
|
* value so that we can restore it once memory locking is no longer
|
|
* required. Failing to obtain the current limit is not a critical
|
|
* failure, it just means we'll be unable to lower it later */
|
|
if (!vm->original_memlock) {
|
|
if (virProcessGetMaxMemLock(vm->pid, &(vm->original_memlock)) < 0)
|
|
vm->original_memlock = 0;
|
|
}
|
|
bytes = qemuDomainGetMemLockLimitBytes(vm->def);
|
|
} else {
|
|
/* Once memory locking is no longer required, we can restore the
|
|
* original, usually very low, limit */
|
|
bytes = vm->original_memlock;
|
|
vm->original_memlock = 0;
|
|
}
|
|
|
|
/* Trying to set the memory locking limit to zero is a no-op */
|
|
if (virProcessSetMaxMemLock(vm->pid, bytes) < 0)
|
|
goto out;
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* qemuDomainHasVcpuPids:
|
|
* @vm: Domain object
|
|
*
|
|
* Returns true if we were able to successfully detect vCPU pids for the VM.
|
|
*/
|
|
bool
|
|
qemuDomainHasVcpuPids(virDomainObjPtr vm)
|
|
{
|
|
size_t i;
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(vm->def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(vm->def, i);
|
|
|
|
if (QEMU_DOMAIN_VCPU_PRIVATE(vcpu)->tid > 0)
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainGetVcpuPid:
|
|
* @vm: domain object
|
|
* @vcpu: cpu id
|
|
*
|
|
* Returns the vCPU pid. If @vcpu is offline or out of range 0 is returned.
|
|
*/
|
|
pid_t
|
|
qemuDomainGetVcpuPid(virDomainObjPtr vm,
|
|
unsigned int vcpuid)
|
|
{
|
|
virDomainVcpuDefPtr vcpu = virDomainDefGetVcpu(vm->def, vcpuid);
|
|
return QEMU_DOMAIN_VCPU_PRIVATE(vcpu)->tid;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainValidateVcpuInfo:
|
|
*
|
|
* Validates vcpu thread information. If vcpu thread IDs are reported by qemu,
|
|
* this function validates that online vcpus have thread info present and
|
|
* offline vcpus don't.
|
|
*
|
|
* Returns 0 on success -1 on error.
|
|
*/
|
|
int
|
|
qemuDomainValidateVcpuInfo(virDomainObjPtr vm)
|
|
{
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(vm->def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
qemuDomainVcpuPrivatePtr vcpupriv;
|
|
size_t i;
|
|
|
|
if (!qemuDomainHasVcpuPids(vm))
|
|
return 0;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(vm->def, i);
|
|
vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
|
|
|
|
if (vcpu->online && vcpupriv->tid == 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("qemu didn't report thread id for vcpu '%zu'"), i);
|
|
return -1;
|
|
}
|
|
|
|
if (!vcpu->online && vcpupriv->tid != 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("qemu reported thread id for inactive vcpu '%zu'"),
|
|
i);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainSupportsNewVcpuHotplug(virDomainObjPtr vm)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
return virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_QUERY_HOTPLUGGABLE_CPUS);
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainRefreshVcpuInfo:
|
|
* @driver: qemu driver data
|
|
* @vm: domain object
|
|
* @asyncJob: current asynchronous job type
|
|
* @state: refresh vcpu state
|
|
*
|
|
* Updates vCPU information private data of @vm. Due to historical reasons this
|
|
* function returns success even if some data were not reported by qemu.
|
|
*
|
|
* If @state is true, the vcpu state is refreshed as reported by the monitor.
|
|
*
|
|
* Returns 0 on success and -1 on fatal error.
|
|
*/
|
|
int
|
|
qemuDomainRefreshVcpuInfo(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
int asyncJob,
|
|
bool state)
|
|
{
|
|
virDomainVcpuDefPtr vcpu;
|
|
qemuDomainVcpuPrivatePtr vcpupriv;
|
|
qemuMonitorCPUInfoPtr info = NULL;
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(vm->def);
|
|
size_t i;
|
|
bool hotplug;
|
|
int rc;
|
|
int ret = -1;
|
|
|
|
hotplug = qemuDomainSupportsNewVcpuHotplug(vm);
|
|
|
|
if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
|
|
return -1;
|
|
|
|
rc = qemuMonitorGetCPUInfo(qemuDomainGetMonitor(vm), &info, maxvcpus, hotplug);
|
|
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0)
|
|
goto cleanup;
|
|
|
|
if (rc < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(vm->def, i);
|
|
vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
|
|
|
|
/*
|
|
* Current QEMU *can* report info about host threads mapped
|
|
* to vCPUs, but it is not in a manner we can correctly
|
|
* deal with. The TCG CPU emulation does have a separate vCPU
|
|
* thread, but it runs every vCPU in that same thread. So it
|
|
* is impossible to setup different affinity per thread.
|
|
*
|
|
* What's more the 'query-cpus' command returns bizarre
|
|
* data for the threads. It gives the TCG thread for the
|
|
* vCPU 0, but for vCPUs 1-> N, it actually replies with
|
|
* the main process thread ID.
|
|
*
|
|
* The result is that when we try to set affinity for
|
|
* vCPU 1, it will actually change the affinity of the
|
|
* emulator thread :-( When you try to set affinity for
|
|
* vCPUs 2, 3.... it will fail if the affinity was
|
|
* different from vCPU 1.
|
|
*
|
|
* We *could* allow vcpu pinning with TCG, if we made the
|
|
* restriction that all vCPUs had the same mask. This would
|
|
* at least let us separate emulator from vCPUs threads, as
|
|
* we do for KVM. It would need some changes to our cgroups
|
|
* CPU layout though, and error reporting for the config
|
|
* restrictions.
|
|
*
|
|
* Just disable CPU pinning with TCG until someone wants
|
|
* to try to do this hard work.
|
|
*/
|
|
if (vm->def->virtType != VIR_DOMAIN_VIRT_QEMU)
|
|
vcpupriv->tid = info[i].tid;
|
|
|
|
vcpupriv->socket_id = info[i].socket_id;
|
|
vcpupriv->core_id = info[i].core_id;
|
|
vcpupriv->thread_id = info[i].thread_id;
|
|
vcpupriv->vcpus = info[i].vcpus;
|
|
VIR_FREE(vcpupriv->type);
|
|
VIR_STEAL_PTR(vcpupriv->type, info[i].type);
|
|
VIR_FREE(vcpupriv->alias);
|
|
VIR_STEAL_PTR(vcpupriv->alias, info[i].alias);
|
|
vcpupriv->enable_id = info[i].id;
|
|
vcpupriv->qemu_id = info[i].qemu_id;
|
|
|
|
if (hotplug && state) {
|
|
vcpu->online = info[i].online;
|
|
if (info[i].hotpluggable)
|
|
vcpu->hotpluggable = VIR_TRISTATE_BOOL_YES;
|
|
else
|
|
vcpu->hotpluggable = VIR_TRISTATE_BOOL_NO;
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
qemuMonitorCPUInfoFree(info, maxvcpus);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* qemuDomainGetVcpuHalted:
|
|
* @vm: domain object
|
|
* @vcpu: cpu id
|
|
*
|
|
* Returns the vCPU halted state.
|
|
*/
|
|
bool
|
|
qemuDomainGetVcpuHalted(virDomainObjPtr vm,
|
|
unsigned int vcpuid)
|
|
{
|
|
virDomainVcpuDefPtr vcpu = virDomainDefGetVcpu(vm->def, vcpuid);
|
|
return QEMU_DOMAIN_VCPU_PRIVATE(vcpu)->halted;
|
|
}
|
|
|
|
/**
|
|
* qemuDomainRefreshVcpuHalted:
|
|
* @driver: qemu driver data
|
|
* @vm: domain object
|
|
* @asyncJob: current asynchronous job type
|
|
*
|
|
* Updates vCPU halted state in the private data of @vm.
|
|
*
|
|
* Returns 0 on success and -1 on error
|
|
*/
|
|
int
|
|
qemuDomainRefreshVcpuHalted(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
int asyncJob)
|
|
{
|
|
virDomainVcpuDefPtr vcpu;
|
|
qemuDomainVcpuPrivatePtr vcpupriv;
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(vm->def);
|
|
virBitmapPtr haltedmap = NULL;
|
|
size_t i;
|
|
int ret = -1;
|
|
|
|
/* Not supported currently for TCG, see qemuDomainRefreshVcpuInfo */
|
|
if (vm->def->virtType == VIR_DOMAIN_VIRT_QEMU)
|
|
return 0;
|
|
|
|
if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
|
|
return -1;
|
|
|
|
haltedmap = qemuMonitorGetCpuHalted(qemuDomainGetMonitor(vm), maxvcpus);
|
|
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0 || !haltedmap)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(vm->def, i);
|
|
vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
|
|
vcpupriv->halted = virBitmapIsBitSet(haltedmap, vcpupriv->qemu_id);
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virBitmapFree(haltedmap);
|
|
return ret;
|
|
}
|
|
|
|
bool
|
|
qemuDomainSupportsNicdev(virDomainDefPtr def,
|
|
virDomainNetDefPtr net)
|
|
{
|
|
/* non-virtio ARM nics require legacy -net nic */
|
|
if (((def->os.arch == VIR_ARCH_ARMV7L) ||
|
|
(def->os.arch == VIR_ARCH_AARCH64)) &&
|
|
net->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_MMIO &&
|
|
net->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
qemuDomainSupportsNetdev(virDomainDefPtr def,
|
|
virQEMUCapsPtr qemuCaps,
|
|
virDomainNetDefPtr net)
|
|
{
|
|
if (!qemuDomainSupportsNicdev(def, net))
|
|
return false;
|
|
return virQEMUCapsGet(qemuCaps, QEMU_CAPS_NETDEV);
|
|
}
|
|
|
|
bool
|
|
qemuDomainNetSupportsMTU(virDomainNetType type)
|
|
{
|
|
switch (type) {
|
|
case VIR_DOMAIN_NET_TYPE_NETWORK:
|
|
case VIR_DOMAIN_NET_TYPE_BRIDGE:
|
|
case VIR_DOMAIN_NET_TYPE_ETHERNET:
|
|
case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
|
|
return true;
|
|
case VIR_DOMAIN_NET_TYPE_USER:
|
|
case VIR_DOMAIN_NET_TYPE_SERVER:
|
|
case VIR_DOMAIN_NET_TYPE_CLIENT:
|
|
case VIR_DOMAIN_NET_TYPE_MCAST:
|
|
case VIR_DOMAIN_NET_TYPE_INTERNAL:
|
|
case VIR_DOMAIN_NET_TYPE_DIRECT:
|
|
case VIR_DOMAIN_NET_TYPE_HOSTDEV:
|
|
case VIR_DOMAIN_NET_TYPE_UDP:
|
|
case VIR_DOMAIN_NET_TYPE_LAST:
|
|
break;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
int
|
|
qemuDomainNetVLAN(virDomainNetDefPtr def)
|
|
{
|
|
return qemuDomainDeviceAliasIndex(&def->info, "net");
|
|
}
|
|
|
|
|
|
virDomainDiskDefPtr
|
|
qemuDomainDiskByName(virDomainDefPtr def,
|
|
const char *name)
|
|
{
|
|
virDomainDiskDefPtr ret;
|
|
|
|
if (!(ret = virDomainDiskByName(def, name, true))) {
|
|
virReportError(VIR_ERR_INVALID_ARG, "%s",
|
|
_("No device found for specified path"));
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainDefValidateDiskLunSource:
|
|
* @src: disk source struct
|
|
*
|
|
* Validate whether the disk source is valid for disk device='lun'.
|
|
*
|
|
* Returns 0 if the configuration is valid -1 and a libvirt error if the soure
|
|
* is invalid.
|
|
*/
|
|
int
|
|
qemuDomainDefValidateDiskLunSource(const virStorageSource *src)
|
|
{
|
|
if (virStorageSourceGetActualType(src) == VIR_STORAGE_TYPE_NETWORK) {
|
|
if (src->protocol != VIR_STORAGE_NET_PROTOCOL_ISCSI) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("disk device='lun' is not supported "
|
|
"for protocol='%s'"),
|
|
virStorageNetProtocolTypeToString(src->protocol));
|
|
return -1;
|
|
}
|
|
} else if (!virStorageSourceIsBlockLocal(src)) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("disk device='lun' is only valid for block "
|
|
"type disk source"));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainPrepareChannel(virDomainChrDefPtr channel,
|
|
const char *domainChannelTargetDir)
|
|
{
|
|
if (channel->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO &&
|
|
channel->source->type == VIR_DOMAIN_CHR_TYPE_UNIX &&
|
|
!channel->source->data.nix.path) {
|
|
if (virAsprintf(&channel->source->data.nix.path,
|
|
"%s/%s", domainChannelTargetDir,
|
|
channel->target.name ? channel->target.name
|
|
: "unknown.sock") < 0)
|
|
return -1;
|
|
|
|
channel->source->data.nix.listen = true;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* qemuProcessPrepareDomainChardevSourceTLS:
|
|
* @source: pointer to host interface data for char devices
|
|
* @cfg: driver configuration
|
|
*
|
|
* Updates host interface TLS encryption setting based on qemu.conf
|
|
* for char devices. This will be presented as "tls='yes|no'" in
|
|
* live XML of a guest.
|
|
*/
|
|
void
|
|
qemuDomainPrepareChardevSourceTLS(virDomainChrSourceDefPtr source,
|
|
virQEMUDriverConfigPtr cfg)
|
|
{
|
|
if (source->type == VIR_DOMAIN_CHR_TYPE_TCP) {
|
|
if (source->data.tcp.haveTLS == VIR_TRISTATE_BOOL_ABSENT) {
|
|
if (cfg->chardevTLS)
|
|
source->data.tcp.haveTLS = VIR_TRISTATE_BOOL_YES;
|
|
else
|
|
source->data.tcp.haveTLS = VIR_TRISTATE_BOOL_NO;
|
|
source->data.tcp.tlsFromConfig = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/* qemuProcessPrepareDomainChardevSource:
|
|
* @def: live domain definition
|
|
* @driver: qemu driver
|
|
*
|
|
* Iterate through all devices that use virDomainChrSourceDefPtr as host
|
|
* interface part.
|
|
*/
|
|
void
|
|
qemuDomainPrepareChardevSource(virDomainDefPtr def,
|
|
virQEMUDriverPtr driver)
|
|
{
|
|
size_t i;
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
|
|
for (i = 0; i < def->nserials; i++)
|
|
qemuDomainPrepareChardevSourceTLS(def->serials[i]->source, cfg);
|
|
|
|
for (i = 0; i < def->nparallels; i++)
|
|
qemuDomainPrepareChardevSourceTLS(def->parallels[i]->source, cfg);
|
|
|
|
for (i = 0; i < def->nchannels; i++)
|
|
qemuDomainPrepareChardevSourceTLS(def->channels[i]->source, cfg);
|
|
|
|
for (i = 0; i < def->nconsoles; i++)
|
|
qemuDomainPrepareChardevSourceTLS(def->consoles[i]->source, cfg);
|
|
|
|
for (i = 0; i < def->nrngs; i++)
|
|
if (def->rngs[i]->backend == VIR_DOMAIN_RNG_BACKEND_EGD)
|
|
qemuDomainPrepareChardevSourceTLS(def->rngs[i]->source.chardev, cfg);
|
|
|
|
for (i = 0; i < def->nsmartcards; i++)
|
|
if (def->smartcards[i]->type == VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH)
|
|
qemuDomainPrepareChardevSourceTLS(def->smartcards[i]->data.passthru,
|
|
cfg);
|
|
|
|
for (i = 0; i < def->nredirdevs; i++)
|
|
qemuDomainPrepareChardevSourceTLS(def->redirdevs[i]->source, cfg);
|
|
|
|
virObjectUnref(cfg);
|
|
}
|
|
|
|
|
|
|
|
int
|
|
qemuDomainPrepareShmemChardev(virDomainShmemDefPtr shmem)
|
|
{
|
|
if (!shmem->server.enabled ||
|
|
shmem->server.chr.data.nix.path)
|
|
return 0;
|
|
|
|
return virAsprintf(&shmem->server.chr.data.nix.path,
|
|
"/var/lib/libvirt/shmem-%s-sock",
|
|
shmem->name);
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainVcpuHotplugIsInOrder:
|
|
* @def: domain definition
|
|
*
|
|
* Returns true if online vcpus were added in order (clustered behind vcpu0
|
|
* with increasing order).
|
|
*/
|
|
bool
|
|
qemuDomainVcpuHotplugIsInOrder(virDomainDefPtr def)
|
|
{
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
unsigned int prevorder = 0;
|
|
size_t seenonlinevcpus = 0;
|
|
size_t i;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(def, i);
|
|
|
|
if (!vcpu->online)
|
|
break;
|
|
|
|
if (vcpu->order < prevorder)
|
|
break;
|
|
|
|
if (vcpu->order > prevorder)
|
|
prevorder = vcpu->order;
|
|
|
|
seenonlinevcpus++;
|
|
}
|
|
|
|
return seenonlinevcpus == virDomainDefGetVcpus(def);
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainVcpuPersistOrder:
|
|
* @def: domain definition
|
|
*
|
|
* Saves the order of vcpus detected from qemu to the domain definition.
|
|
* The private data note the order only for the entry describing the
|
|
* hotpluggable entity. This function copies the order into the definition part
|
|
* of all sub entities.
|
|
*/
|
|
void
|
|
qemuDomainVcpuPersistOrder(virDomainDefPtr def)
|
|
{
|
|
size_t maxvcpus = virDomainDefGetVcpusMax(def);
|
|
virDomainVcpuDefPtr vcpu;
|
|
qemuDomainVcpuPrivatePtr vcpupriv;
|
|
unsigned int prevorder = 0;
|
|
size_t i;
|
|
|
|
for (i = 0; i < maxvcpus; i++) {
|
|
vcpu = virDomainDefGetVcpu(def, i);
|
|
vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
|
|
|
|
if (!vcpu->online) {
|
|
vcpu->order = 0;
|
|
} else {
|
|
if (vcpupriv->enable_id != 0)
|
|
prevorder = vcpupriv->enable_id;
|
|
|
|
vcpu->order = prevorder;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainCheckMonitor(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
qemuDomainAsyncJob asyncJob)
|
|
{
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
int ret;
|
|
|
|
if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
|
|
return -1;
|
|
|
|
ret = qemuMonitorCheck(priv->mon);
|
|
|
|
if (qemuDomainObjExitMonitor(driver, vm) < 0)
|
|
return -1;
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainSupportsVideoVga(virDomainVideoDefPtr video,
|
|
virQEMUCapsPtr qemuCaps)
|
|
{
|
|
if (video->type == VIR_DOMAIN_VIDEO_TYPE_VIRTIO &&
|
|
!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VIRTIO_VGA))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainGetHostdevPath:
|
|
* @def: domain definition
|
|
* @dev: host device definition
|
|
* @teardown: true if device will be removed
|
|
* @npaths: number of items in @path and @perms arrays
|
|
* @path: resulting path to @dev
|
|
* @perms: Optional pointer to VIR_CGROUP_DEVICE_* perms
|
|
*
|
|
* For given device @dev fetch its host path and store it at
|
|
* @path. If a device requires other paths to be present/allowed
|
|
* they are stored in the @path array after the actual path.
|
|
* Optionally, caller can get @perms on the path (e.g. rw/ro).
|
|
*
|
|
* The caller is responsible for freeing the memory.
|
|
*
|
|
* Returns 0 on success, -1 otherwise.
|
|
*/
|
|
int
|
|
qemuDomainGetHostdevPath(virDomainDefPtr def,
|
|
virDomainHostdevDefPtr dev,
|
|
bool teardown,
|
|
size_t *npaths,
|
|
char ***path,
|
|
int **perms)
|
|
{
|
|
int ret = -1;
|
|
virDomainHostdevSubsysUSBPtr usbsrc = &dev->source.subsys.u.usb;
|
|
virDomainHostdevSubsysPCIPtr pcisrc = &dev->source.subsys.u.pci;
|
|
virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
|
|
virDomainHostdevSubsysSCSIVHostPtr hostsrc = &dev->source.subsys.u.scsi_host;
|
|
virPCIDevicePtr pci = NULL;
|
|
virUSBDevicePtr usb = NULL;
|
|
virSCSIDevicePtr scsi = NULL;
|
|
virSCSIVHostDevicePtr host = NULL;
|
|
char *tmpPath = NULL;
|
|
bool freeTmpPath = false;
|
|
bool includeVFIO = false;
|
|
char **tmpPaths = NULL;
|
|
int *tmpPerms = NULL;
|
|
size_t i, tmpNpaths = 0;
|
|
int perm = 0;
|
|
|
|
*npaths = 0;
|
|
|
|
switch ((virDomainHostdevMode) dev->mode) {
|
|
case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
|
|
switch ((virDomainHostdevSubsysType) dev->source.subsys.type) {
|
|
case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
|
|
if (pcisrc->backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
|
|
pci = virPCIDeviceNew(pcisrc->addr.domain,
|
|
pcisrc->addr.bus,
|
|
pcisrc->addr.slot,
|
|
pcisrc->addr.function);
|
|
if (!pci)
|
|
goto cleanup;
|
|
|
|
if (!(tmpPath = virPCIDeviceGetIOMMUGroupDev(pci)))
|
|
goto cleanup;
|
|
freeTmpPath = true;
|
|
|
|
perm = VIR_CGROUP_DEVICE_RW;
|
|
if (teardown) {
|
|
size_t nvfios = 0;
|
|
for (i = 0; i < def->nhostdevs; i++) {
|
|
virDomainHostdevDefPtr tmp = def->hostdevs[i];
|
|
if (tmp->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
|
|
tmp->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI &&
|
|
tmp->source.subsys.u.pci.backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO)
|
|
nvfios++;
|
|
}
|
|
|
|
if (nvfios == 0)
|
|
includeVFIO = true;
|
|
} else {
|
|
includeVFIO = true;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
|
|
if (dev->missing)
|
|
break;
|
|
usb = virUSBDeviceNew(usbsrc->bus,
|
|
usbsrc->device,
|
|
NULL);
|
|
if (!usb)
|
|
goto cleanup;
|
|
|
|
if (!(tmpPath = (char *) virUSBDeviceGetPath(usb)))
|
|
goto cleanup;
|
|
perm = VIR_CGROUP_DEVICE_RW;
|
|
break;
|
|
|
|
case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
|
|
if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
|
|
virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
|
|
/* Follow qemuSetupDiskCgroup() and qemuSetImageCgroupInternal()
|
|
* which does nothing for non local storage
|
|
*/
|
|
VIR_DEBUG("Not updating /dev for hostdev iSCSI path '%s'", iscsisrc->path);
|
|
} else {
|
|
virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
|
|
scsi = virSCSIDeviceNew(NULL,
|
|
scsihostsrc->adapter,
|
|
scsihostsrc->bus,
|
|
scsihostsrc->target,
|
|
scsihostsrc->unit,
|
|
dev->readonly,
|
|
dev->shareable);
|
|
|
|
if (!scsi)
|
|
goto cleanup;
|
|
|
|
if (!(tmpPath = (char *) virSCSIDeviceGetPath(scsi)))
|
|
goto cleanup;
|
|
perm = virSCSIDeviceGetReadonly(scsi) ?
|
|
VIR_CGROUP_DEVICE_READ : VIR_CGROUP_DEVICE_RW;
|
|
}
|
|
break;
|
|
|
|
case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST: {
|
|
if (hostsrc->protocol ==
|
|
VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_HOST_PROTOCOL_TYPE_VHOST) {
|
|
if (!(host = virSCSIVHostDeviceNew(hostsrc->wwpn)))
|
|
goto cleanup;
|
|
|
|
if (!(tmpPath = (char *) virSCSIVHostDeviceGetPath(host)))
|
|
goto cleanup;
|
|
perm = VIR_CGROUP_DEVICE_RW;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
|
|
break;
|
|
}
|
|
break;
|
|
|
|
case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
|
|
case VIR_DOMAIN_HOSTDEV_MODE_LAST:
|
|
/* nada */
|
|
break;
|
|
}
|
|
|
|
if (tmpPath) {
|
|
size_t toAlloc = 1;
|
|
|
|
if (includeVFIO)
|
|
toAlloc = 2;
|
|
|
|
if (VIR_ALLOC_N(tmpPaths, toAlloc) < 0 ||
|
|
VIR_ALLOC_N(tmpPerms, toAlloc) < 0 ||
|
|
VIR_STRDUP(tmpPaths[0], tmpPath) < 0)
|
|
goto cleanup;
|
|
tmpNpaths = toAlloc;
|
|
tmpPerms[0] = perm;
|
|
|
|
if (includeVFIO) {
|
|
if (VIR_STRDUP(tmpPaths[1], DEV_VFIO) < 0)
|
|
goto cleanup;
|
|
tmpPerms[1] = VIR_CGROUP_DEVICE_RW;
|
|
}
|
|
}
|
|
|
|
*npaths = tmpNpaths;
|
|
tmpNpaths = 0;
|
|
*path = tmpPaths;
|
|
tmpPaths = NULL;
|
|
if (perms) {
|
|
*perms = tmpPerms;
|
|
tmpPerms = NULL;
|
|
}
|
|
ret = 0;
|
|
cleanup:
|
|
for (i = 0; i < tmpNpaths; i++)
|
|
VIR_FREE(tmpPaths[i]);
|
|
VIR_FREE(tmpPaths);
|
|
VIR_FREE(tmpPerms);
|
|
virPCIDeviceFree(pci);
|
|
virUSBDeviceFree(usb);
|
|
virSCSIDeviceFree(scsi);
|
|
virSCSIVHostDeviceFree(host);
|
|
if (freeTmpPath)
|
|
VIR_FREE(tmpPath);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* qemuDomainGetPreservedMounts:
|
|
*
|
|
* Process list of mounted filesystems and:
|
|
* a) save all FSs mounted under /dev to @devPath
|
|
* b) generate backup path for all the entries in a)
|
|
*
|
|
* Any of the return pointers can be NULL.
|
|
*
|
|
* Returns 0 on success, -1 otherwise (with error reported)
|
|
*/
|
|
static int
|
|
qemuDomainGetPreservedMounts(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
char ***devPath,
|
|
char ***devSavePath,
|
|
size_t *ndevPath)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
char **paths = NULL, **mounts = NULL;
|
|
size_t i, nmounts;
|
|
|
|
if (virFileGetMountSubtree(PROC_MOUNTS, "/dev",
|
|
&mounts, &nmounts) < 0)
|
|
goto error;
|
|
|
|
if (!nmounts) {
|
|
if (ndevPath)
|
|
*ndevPath = 0;
|
|
return 0;
|
|
}
|
|
|
|
if (VIR_ALLOC_N(paths, nmounts) < 0)
|
|
goto error;
|
|
|
|
for (i = 0; i < nmounts; i++) {
|
|
const char *suffix = mounts[i] + strlen(DEVPREFIX);
|
|
|
|
if (STREQ(mounts[i], "/dev"))
|
|
suffix = "dev";
|
|
|
|
if (virAsprintf(&paths[i], "%s/%s.%s",
|
|
cfg->stateDir, vm->def->name, suffix) < 0)
|
|
goto error;
|
|
}
|
|
|
|
if (devPath)
|
|
*devPath = mounts;
|
|
else
|
|
virStringListFreeCount(mounts, nmounts);
|
|
|
|
if (devSavePath)
|
|
*devSavePath = paths;
|
|
else
|
|
virStringListFreeCount(paths, nmounts);
|
|
|
|
if (ndevPath)
|
|
*ndevPath = nmounts;
|
|
|
|
virObjectUnref(cfg);
|
|
return 0;
|
|
|
|
error:
|
|
virStringListFreeCount(mounts, nmounts);
|
|
virStringListFreeCount(paths, nmounts);
|
|
virObjectUnref(cfg);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainCreateDeviceRecursive(const char *device,
|
|
const char *path,
|
|
bool allow_noent,
|
|
unsigned int ttl)
|
|
{
|
|
char *devicePath = NULL;
|
|
char *target = NULL;
|
|
struct stat sb;
|
|
int ret = -1;
|
|
bool isLink = false;
|
|
bool create = false;
|
|
#ifdef WITH_SELINUX
|
|
char *tcon = NULL;
|
|
#endif
|
|
|
|
if (!ttl) {
|
|
virReportSystemError(ELOOP,
|
|
_("Too many levels of symbolic links: %s"),
|
|
device);
|
|
return ret;
|
|
}
|
|
|
|
if (lstat(device, &sb) < 0) {
|
|
if (errno == ENOENT && allow_noent) {
|
|
/* Ignore non-existent device. */
|
|
return 0;
|
|
}
|
|
virReportSystemError(errno, _("Unable to stat %s"), device);
|
|
return ret;
|
|
}
|
|
|
|
isLink = S_ISLNK(sb.st_mode);
|
|
|
|
/* Here, @device might be whatever path in the system. We
|
|
* should create the path in the namespace iff it's "/dev"
|
|
* prefixed. However, if it is a symlink, we need to traverse
|
|
* it too (it might point to something in "/dev"). Just
|
|
* consider:
|
|
*
|
|
* /var/sym1 -> /var/sym2 -> /dev/sda (because users can)
|
|
*
|
|
* This means, "/var/sym1" is not created (it's shared with
|
|
* the parent namespace), nor "/var/sym2", but "/dev/sda".
|
|
*
|
|
* TODO Remove all `.' and `..' from the @device path.
|
|
* Otherwise we might get fooled with `/dev/../var/my_image'.
|
|
* For now, lets hope callers play nice.
|
|
*/
|
|
if (STRPREFIX(device, DEVPREFIX)) {
|
|
if (virAsprintf(&devicePath, "%s/%s",
|
|
path, device + strlen(DEVPREFIX)) < 0)
|
|
goto cleanup;
|
|
|
|
if (virFileMakeParentPath(devicePath) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to create %s"),
|
|
devicePath);
|
|
goto cleanup;
|
|
}
|
|
create = true;
|
|
}
|
|
|
|
if (isLink) {
|
|
/* We are dealing with a symlink. Create a dangling symlink and descend
|
|
* down one level which hopefully creates the symlink's target. */
|
|
if (virFileReadLink(device, &target) < 0) {
|
|
virReportSystemError(errno,
|
|
_("unable to resolve symlink %s"),
|
|
device);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (create &&
|
|
symlink(target, devicePath) < 0) {
|
|
if (errno == EEXIST) {
|
|
ret = 0;
|
|
} else {
|
|
virReportSystemError(errno,
|
|
_("unable to create symlink %s"),
|
|
devicePath);
|
|
}
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Tricky part. If the target starts with a slash then we need to take
|
|
* it as it is. Otherwise we need to replace the last component in the
|
|
* original path with the link target:
|
|
* /dev/rtc -> rtc0 (want /dev/rtc0)
|
|
* /dev/disk/by-id/ata-SanDisk_SDSSDXPS480G_161101402485 -> ../../sda
|
|
* (want /dev/disk/by-id/../../sda)
|
|
* /dev/stdout -> /proc/self/fd/1 (no change needed)
|
|
*/
|
|
if (IS_RELATIVE_FILE_NAME(target)) {
|
|
char *c = NULL, *tmp = NULL, *devTmp = NULL;
|
|
|
|
if (VIR_STRDUP(devTmp, device) < 0)
|
|
goto cleanup;
|
|
|
|
if ((c = strrchr(devTmp, '/')))
|
|
*(c + 1) = '\0';
|
|
|
|
if (virAsprintf(&tmp, "%s%s", devTmp, target) < 0) {
|
|
VIR_FREE(devTmp);
|
|
goto cleanup;
|
|
}
|
|
VIR_FREE(devTmp);
|
|
VIR_FREE(target);
|
|
target = tmp;
|
|
tmp = NULL;
|
|
}
|
|
|
|
if (qemuDomainCreateDeviceRecursive(target, path,
|
|
allow_noent, ttl - 1) < 0)
|
|
goto cleanup;
|
|
} else {
|
|
if (create &&
|
|
mknod(devicePath, sb.st_mode, sb.st_rdev) < 0) {
|
|
if (errno == EEXIST) {
|
|
ret = 0;
|
|
} else {
|
|
virReportSystemError(errno,
|
|
_("Failed to make device %s"),
|
|
devicePath);
|
|
}
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Set the file permissions again: mknod() is affected by the
|
|
* current umask, and as such might not have set them correctly */
|
|
if (create &&
|
|
chmod(devicePath, sb.st_mode) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Failed to set permissions for device %s"),
|
|
devicePath);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (!create) {
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (lchown(devicePath, sb.st_uid, sb.st_gid) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Failed to chown device %s"),
|
|
devicePath);
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Symlinks don't have ACLs. */
|
|
if (!isLink &&
|
|
virFileCopyACLs(device, devicePath) < 0 &&
|
|
errno != ENOTSUP) {
|
|
virReportSystemError(errno,
|
|
_("Failed to copy ACLs on device %s"),
|
|
devicePath);
|
|
goto cleanup;
|
|
}
|
|
|
|
#ifdef WITH_SELINUX
|
|
if (lgetfilecon_raw(device, &tcon) < 0 &&
|
|
(errno != ENOTSUP && errno != ENODATA)) {
|
|
virReportSystemError(errno,
|
|
_("Unable to get SELinux label from %s"),
|
|
device);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (tcon &&
|
|
lsetfilecon_raw(devicePath, (VIR_SELINUX_CTX_CONST char *) tcon) < 0) {
|
|
VIR_WARNINGS_NO_WLOGICALOP_EQUAL_EXPR
|
|
if (errno != EOPNOTSUPP && errno != ENOTSUP) {
|
|
VIR_WARNINGS_RESET
|
|
virReportSystemError(errno,
|
|
_("Unable to set SELinux label on %s"),
|
|
devicePath);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
VIR_FREE(target);
|
|
VIR_FREE(devicePath);
|
|
#ifdef WITH_SELINUX
|
|
freecon(tcon);
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainCreateDevice(const char *device,
|
|
const char *path,
|
|
bool allow_noent)
|
|
{
|
|
long symloop_max = sysconf(_SC_SYMLOOP_MAX);
|
|
|
|
return qemuDomainCreateDeviceRecursive(device, path,
|
|
allow_noent, symloop_max);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainPopulateDevices(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm ATTRIBUTE_UNUSED,
|
|
const char *path)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
const char *const *devices = (const char *const *) cfg->cgroupDeviceACL;
|
|
size_t i;
|
|
int ret = -1;
|
|
|
|
if (!devices)
|
|
devices = defaultDeviceACL;
|
|
|
|
for (i = 0; devices[i]; i++) {
|
|
if (qemuDomainCreateDevice(devices[i], path, true) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupDev(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *path)
|
|
{
|
|
char *mount_options = NULL;
|
|
char *opts = NULL;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("Setting up /dev/ for domain %s", vm->def->name);
|
|
|
|
mount_options = virSecurityManagerGetMountOptions(driver->securityManager,
|
|
vm->def);
|
|
|
|
if (!mount_options &&
|
|
VIR_STRDUP(mount_options, "") < 0)
|
|
goto cleanup;
|
|
|
|
/*
|
|
* tmpfs is limited to 64kb, since we only have device nodes in there
|
|
* and don't want to DOS the entire OS RAM usage
|
|
*/
|
|
if (virAsprintf(&opts,
|
|
"mode=755,size=65536%s", mount_options) < 0)
|
|
goto cleanup;
|
|
|
|
if (virFileSetupDev(path, opts) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainPopulateDevices(driver, vm, path) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
VIR_FREE(opts);
|
|
VIR_FREE(mount_options);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupDisk(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainDiskDefPtr disk,
|
|
const char *devPath)
|
|
{
|
|
virStorageSourcePtr next;
|
|
char *dst = NULL;
|
|
int ret = -1;
|
|
|
|
for (next = disk->src; next; next = next->backingStore) {
|
|
if (!next->path || !virStorageSourceIsLocalStorage(next)) {
|
|
/* Not creating device. Just continue. */
|
|
continue;
|
|
}
|
|
|
|
if (qemuDomainCreateDevice(next->path, devPath, false) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
VIR_FREE(dst);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupAllDisks(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
size_t i;
|
|
VIR_DEBUG("Setting up disks");
|
|
|
|
for (i = 0; i < vm->def->ndisks; i++) {
|
|
if (qemuDomainSetupDisk(driver,
|
|
vm->def->disks[i],
|
|
devPath) < 0)
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("Setup all disks");
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupHostdev(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainHostdevDefPtr dev,
|
|
const char *devPath)
|
|
{
|
|
int ret = -1;
|
|
char **path = NULL;
|
|
size_t i, npaths = 0;
|
|
|
|
if (qemuDomainGetHostdevPath(NULL, dev, false, &npaths, &path, NULL) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < npaths; i++) {
|
|
if (qemuDomainCreateDevice(path[i], devPath, false) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
for (i = 0; i < npaths; i++)
|
|
VIR_FREE(path[i]);
|
|
VIR_FREE(path);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupAllHostdevs(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
size_t i;
|
|
|
|
VIR_DEBUG("Setting up hostdevs");
|
|
for (i = 0; i < vm->def->nhostdevs; i++) {
|
|
if (qemuDomainSetupHostdev(driver,
|
|
vm->def->hostdevs[i],
|
|
devPath) < 0)
|
|
return -1;
|
|
}
|
|
VIR_DEBUG("Setup all hostdevs");
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupChardev(virDomainDefPtr def ATTRIBUTE_UNUSED,
|
|
virDomainChrDefPtr dev,
|
|
void *opaque)
|
|
{
|
|
const char *devPath = opaque;
|
|
|
|
if (dev->source->type != VIR_DOMAIN_CHR_TYPE_DEV)
|
|
return 0;
|
|
|
|
return qemuDomainCreateDevice(dev->source->data.file.path, devPath, false);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupAllChardevs(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
VIR_DEBUG("Setting up chardevs");
|
|
|
|
if (virDomainChrDefForeach(vm->def,
|
|
true,
|
|
qemuDomainSetupChardev,
|
|
(void *) devPath) < 0)
|
|
return -1;
|
|
|
|
VIR_DEBUG("Setup all chardevs");
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupTPM(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
virDomainTPMDefPtr dev = vm->def->tpm;
|
|
|
|
if (!dev)
|
|
return 0;
|
|
|
|
VIR_DEBUG("Setting up TPM");
|
|
|
|
switch (dev->type) {
|
|
case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
|
|
if (qemuDomainCreateDevice(dev->data.passthrough.source.data.file.path,
|
|
devPath, false) < 0)
|
|
return -1;
|
|
break;
|
|
|
|
case VIR_DOMAIN_TPM_TYPE_LAST:
|
|
/* nada */
|
|
break;
|
|
}
|
|
|
|
VIR_DEBUG("Setup TPM");
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupInput(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainInputDefPtr input,
|
|
const char *devPath)
|
|
{
|
|
int ret = -1;
|
|
|
|
switch ((virDomainInputType) input->type) {
|
|
case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
|
|
if (qemuDomainCreateDevice(input->source.evdev, devPath, false) < 0)
|
|
goto cleanup;
|
|
break;
|
|
|
|
case VIR_DOMAIN_INPUT_TYPE_MOUSE:
|
|
case VIR_DOMAIN_INPUT_TYPE_TABLET:
|
|
case VIR_DOMAIN_INPUT_TYPE_KBD:
|
|
case VIR_DOMAIN_INPUT_TYPE_LAST:
|
|
/* nada */
|
|
break;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupAllInputs(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
size_t i;
|
|
|
|
VIR_DEBUG("Setting up inputs");
|
|
for (i = 0; i < vm->def->ninputs; i++) {
|
|
if (qemuDomainSetupInput(driver,
|
|
vm->def->inputs[i],
|
|
devPath) < 0)
|
|
return -1;
|
|
}
|
|
VIR_DEBUG("Setup all inputs");
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupRNG(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainRNGDefPtr rng,
|
|
const char *devPath)
|
|
{
|
|
switch ((virDomainRNGBackend) rng->backend) {
|
|
case VIR_DOMAIN_RNG_BACKEND_RANDOM:
|
|
if (qemuDomainCreateDevice(rng->source.file, devPath, false) < 0)
|
|
return -1;
|
|
|
|
case VIR_DOMAIN_RNG_BACKEND_EGD:
|
|
case VIR_DOMAIN_RNG_BACKEND_LAST:
|
|
/* nada */
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainSetupAllRNGs(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *devPath)
|
|
{
|
|
size_t i;
|
|
|
|
VIR_DEBUG("Setting up RNGs");
|
|
for (i = 0; i < vm->def->nrngs; i++) {
|
|
if (qemuDomainSetupRNG(driver,
|
|
vm->def->rngs[i],
|
|
devPath) < 0)
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("Setup all RNGs");
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainBuildNamespace(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
char *devPath = NULL;
|
|
char **devMountsPath = NULL, **devMountsSavePath = NULL;
|
|
size_t ndevMountsPath = 0, i;
|
|
int ret = -1;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT)) {
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainGetPreservedMounts(driver, vm,
|
|
&devMountsPath, &devMountsSavePath,
|
|
&ndevMountsPath) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < ndevMountsPath; i++) {
|
|
if (STREQ(devMountsPath[i], "/dev")) {
|
|
devPath = devMountsSavePath[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!devPath) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Unable to find any /dev mount"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virProcessSetupPrivateMountNS() < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupDev(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
/* Save some mount points because we want to share them with the host */
|
|
for (i = 0; i < ndevMountsPath; i++) {
|
|
if (devMountsSavePath[i] == devPath)
|
|
continue;
|
|
|
|
if (virFileMakePath(devMountsSavePath[i]) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Failed to create %s"),
|
|
devMountsSavePath[i]);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virFileMoveMount(devMountsPath[i], devMountsSavePath[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainSetupAllDisks(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupAllHostdevs(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupAllChardevs(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupTPM(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupAllInputs(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemuDomainSetupAllRNGs(driver, vm, devPath) < 0)
|
|
goto cleanup;
|
|
|
|
if (virFileMoveMount(devPath, "/dev") < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < ndevMountsPath; i++) {
|
|
if (devMountsSavePath[i] == devPath)
|
|
continue;
|
|
|
|
if (virFileMakePath(devMountsPath[i]) < 0) {
|
|
virReportSystemError(errno, _("Cannot create %s"),
|
|
devMountsPath[i]);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virFileMoveMount(devMountsSavePath[i], devMountsPath[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
for (i = 0; i < ndevMountsPath; i++)
|
|
rmdir(devMountsSavePath[i]);
|
|
virStringListFreeCount(devMountsPath, ndevMountsPath);
|
|
virStringListFreeCount(devMountsSavePath, ndevMountsPath);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainCreateNamespace(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm)
|
|
{
|
|
virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
|
|
int ret = -1;
|
|
|
|
if (virBitmapIsBitSet(cfg->namespaces, QEMU_DOMAIN_NS_MOUNT) &&
|
|
qemuDomainEnableNamespace(vm, QEMU_DOMAIN_NS_MOUNT) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnref(cfg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
bool
|
|
qemuDomainNamespaceAvailable(qemuDomainNamespace ns ATTRIBUTE_UNUSED)
|
|
{
|
|
#if !defined(__linux__)
|
|
/* Namespaces are Linux specific. */
|
|
return false;
|
|
|
|
#else /* defined(__linux__) */
|
|
|
|
switch (ns) {
|
|
case QEMU_DOMAIN_NS_MOUNT:
|
|
# if !defined(HAVE_SYS_ACL_H) || !defined(WITH_SELINUX)
|
|
/* We can't create the exact copy of paths if either of
|
|
* these is not available. */
|
|
return false;
|
|
# else
|
|
if (virProcessNamespaceAvailable(VIR_PROCESS_NAMESPACE_MNT) < 0)
|
|
return false;
|
|
# endif
|
|
break;
|
|
case QEMU_DOMAIN_NS_LAST:
|
|
break;
|
|
}
|
|
|
|
return true;
|
|
#endif /* defined(__linux__) */
|
|
}
|
|
|
|
|
|
struct qemuDomainAttachDeviceMknodData {
|
|
virQEMUDriverPtr driver;
|
|
virDomainObjPtr vm;
|
|
const char *file;
|
|
const char *target;
|
|
struct stat sb;
|
|
void *acl;
|
|
#ifdef WITH_SELINUX
|
|
char *tcon;
|
|
#endif
|
|
};
|
|
|
|
|
|
static int
|
|
qemuDomainAttachDeviceMknodHelper(pid_t pid ATTRIBUTE_UNUSED,
|
|
void *opaque)
|
|
{
|
|
struct qemuDomainAttachDeviceMknodData *data = opaque;
|
|
int ret = -1;
|
|
bool delDevice = false;
|
|
bool isLink = S_ISLNK(data->sb.st_mode);
|
|
|
|
virSecurityManagerPostFork(data->driver->securityManager);
|
|
|
|
if (virFileMakeParentPath(data->file) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to create %s"), data->file);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (isLink) {
|
|
VIR_DEBUG("Creating symlink %s -> %s", data->file, data->target);
|
|
if (symlink(data->target, data->file) < 0) {
|
|
if (errno != EEXIST) {
|
|
virReportSystemError(errno,
|
|
_("Unable to create symlink %s"),
|
|
data->target);
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
delDevice = true;
|
|
}
|
|
} else {
|
|
VIR_DEBUG("Creating dev %s (%d,%d)",
|
|
data->file, major(data->sb.st_rdev), minor(data->sb.st_rdev));
|
|
if (mknod(data->file, data->sb.st_mode, data->sb.st_rdev) < 0) {
|
|
/* Because we are not removing devices on hotunplug, or
|
|
* we might be creating part of backing chain that
|
|
* already exist due to a different disk plugged to
|
|
* domain, accept EEXIST. */
|
|
if (errno != EEXIST) {
|
|
virReportSystemError(errno,
|
|
_("Unable to create device %s"),
|
|
data->file);
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
delDevice = true;
|
|
}
|
|
}
|
|
|
|
if (lchown(data->file, data->sb.st_uid, data->sb.st_gid) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Failed to chown device %s"),
|
|
data->file);
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Symlinks don't have ACLs. */
|
|
if (!isLink &&
|
|
virFileSetACLs(data->file, data->acl) < 0 &&
|
|
errno != ENOTSUP) {
|
|
virReportSystemError(errno,
|
|
_("Unable to set ACLs on %s"), data->file);
|
|
goto cleanup;
|
|
}
|
|
|
|
#ifdef WITH_SELINUX
|
|
if (data->tcon &&
|
|
lsetfilecon_raw(data->file, (VIR_SELINUX_CTX_CONST char *) data->tcon) < 0) {
|
|
VIR_WARNINGS_NO_WLOGICALOP_EQUAL_EXPR
|
|
if (errno != EOPNOTSUPP && errno != ENOTSUP) {
|
|
VIR_WARNINGS_RESET
|
|
virReportSystemError(errno,
|
|
_("Unable to set SELinux label on %s"),
|
|
data->file);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
if (ret < 0 && delDevice)
|
|
unlink(data->file);
|
|
#ifdef WITH_SELINUX
|
|
freecon(data->tcon);
|
|
#endif
|
|
virFileFreeACLs(&data->acl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainAttachDeviceMknodRecursive(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *file,
|
|
unsigned int ttl)
|
|
{
|
|
struct qemuDomainAttachDeviceMknodData data;
|
|
int ret = -1;
|
|
char *target = NULL;
|
|
bool isLink;
|
|
|
|
if (!ttl) {
|
|
virReportSystemError(ELOOP,
|
|
_("Too many levels of symbolic links: %s"),
|
|
file);
|
|
return ret;
|
|
}
|
|
|
|
memset(&data, 0, sizeof(data));
|
|
|
|
data.driver = driver;
|
|
data.vm = vm;
|
|
data.file = file;
|
|
|
|
if (lstat(file, &data.sb) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to access %s"), file);
|
|
return ret;
|
|
}
|
|
|
|
isLink = S_ISLNK(data.sb.st_mode);
|
|
|
|
if (isLink) {
|
|
if (virFileReadLink(file, &target) < 0) {
|
|
virReportSystemError(errno,
|
|
_("unable to resolve symlink %s"),
|
|
file);
|
|
return ret;
|
|
}
|
|
|
|
if (IS_RELATIVE_FILE_NAME(target)) {
|
|
char *c = NULL, *tmp = NULL, *fileTmp = NULL;
|
|
|
|
if (VIR_STRDUP(fileTmp, file) < 0)
|
|
goto cleanup;
|
|
|
|
if ((c = strrchr(fileTmp, '/')))
|
|
*(c + 1) = '\0';
|
|
|
|
if (virAsprintf(&tmp, "%s%s", fileTmp, target) < 0) {
|
|
VIR_FREE(fileTmp);
|
|
goto cleanup;
|
|
}
|
|
VIR_FREE(fileTmp);
|
|
VIR_FREE(target);
|
|
target = tmp;
|
|
tmp = NULL;
|
|
}
|
|
|
|
data.target = target;
|
|
}
|
|
|
|
/* Symlinks don't have ACLs. */
|
|
if (!isLink &&
|
|
virFileGetACLs(file, &data.acl) < 0 &&
|
|
errno != ENOTSUP) {
|
|
virReportSystemError(errno,
|
|
_("Unable to get ACLs on %s"), file);
|
|
goto cleanup;
|
|
}
|
|
|
|
#ifdef WITH_SELINUX
|
|
if (lgetfilecon_raw(file, &data.tcon) < 0 &&
|
|
(errno != ENOTSUP && errno != ENODATA)) {
|
|
virReportSystemError(errno,
|
|
_("Unable to get SELinux label from %s"), file);
|
|
goto cleanup;
|
|
}
|
|
#endif
|
|
|
|
if (STRPREFIX(file, DEVPREFIX)) {
|
|
if (virSecurityManagerPreFork(driver->securityManager) < 0)
|
|
goto cleanup;
|
|
|
|
if (virProcessRunInMountNamespace(vm->pid,
|
|
qemuDomainAttachDeviceMknodHelper,
|
|
&data) < 0) {
|
|
virSecurityManagerPostFork(driver->securityManager);
|
|
goto cleanup;
|
|
}
|
|
virSecurityManagerPostFork(driver->securityManager);
|
|
}
|
|
|
|
if (isLink &&
|
|
qemuDomainAttachDeviceMknodRecursive(driver, vm, target, ttl -1) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
#ifdef WITH_SELINUX
|
|
freecon(data.tcon);
|
|
#endif
|
|
virFileFreeACLs(&data.acl);
|
|
VIR_FREE(target);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainAttachDeviceMknod(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
const char *file)
|
|
{
|
|
long symloop_max = sysconf(_SC_SYMLOOP_MAX);
|
|
|
|
return qemuDomainAttachDeviceMknodRecursive(driver, vm, file, symloop_max);
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDetachDeviceUnlinkHelper(pid_t pid ATTRIBUTE_UNUSED,
|
|
void *opaque)
|
|
{
|
|
const char *path = opaque;
|
|
|
|
VIR_DEBUG("Unlinking %s", path);
|
|
if (unlink(path) < 0 && errno != ENOENT) {
|
|
virReportSystemError(errno,
|
|
_("Unable to remove device %s"), path);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemuDomainDetachDeviceUnlink(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainObjPtr vm,
|
|
const char *file)
|
|
{
|
|
if (virProcessRunInMountNamespace(vm->pid,
|
|
qemuDomainDetachDeviceUnlinkHelper,
|
|
(void *)file) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceSetupDisk(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virStorageSourcePtr src)
|
|
{
|
|
virStorageSourcePtr next;
|
|
struct stat sb;
|
|
int ret = -1;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
for (next = src; next; next = next->backingStore) {
|
|
if (virStorageSourceIsEmpty(next) ||
|
|
!virStorageSourceIsLocalStorage(next)) {
|
|
/* Not creating device. Just continue. */
|
|
continue;
|
|
}
|
|
|
|
if (stat(next->path, &sb) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to access %s"), next->path);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!S_ISBLK(sb.st_mode))
|
|
continue;
|
|
|
|
if (qemuDomainAttachDeviceMknod(driver,
|
|
vm,
|
|
next->path) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceTeardownDisk(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
|
|
virDomainObjPtr vm ATTRIBUTE_UNUSED,
|
|
virStorageSourcePtr src ATTRIBUTE_UNUSED)
|
|
{
|
|
/* While in hotplug case we create the whole backing chain,
|
|
* here we must limit ourselves. The disk we want to remove
|
|
* might be a part of backing chain of another disk.
|
|
* If you are reading these lines and have some spare time
|
|
* you can come up with and algorithm that checks for that.
|
|
* I don't, therefore: */
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceSetupHostdev(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainHostdevDefPtr hostdev)
|
|
{
|
|
int ret = -1;
|
|
char **path = NULL;
|
|
size_t i, npaths = 0;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
if (qemuDomainGetHostdevPath(NULL, hostdev, false, &npaths, &path, NULL) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < npaths; i++) {
|
|
if (qemuDomainAttachDeviceMknod(driver,
|
|
vm,
|
|
path[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
for (i = 0; i < npaths; i++)
|
|
VIR_FREE(path[i]);
|
|
VIR_FREE(path);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceTeardownHostdev(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainHostdevDefPtr hostdev)
|
|
{
|
|
int ret = -1;
|
|
char **path = NULL;
|
|
size_t i, npaths = 0;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
if (qemuDomainGetHostdevPath(vm->def, hostdev, true,
|
|
&npaths, &path, NULL) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < npaths; i++) {
|
|
if (qemuDomainDetachDeviceUnlink(driver, vm, path[i]) < 0)
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
for (i = 0; i < npaths; i++)
|
|
VIR_FREE(path[i]);
|
|
VIR_FREE(path);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceSetupChardev(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainChrDefPtr chr)
|
|
{
|
|
const char *path;
|
|
int ret = -1;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
if (chr->source->type != VIR_DOMAIN_CHR_TYPE_DEV)
|
|
return 0;
|
|
|
|
path = chr->source->data.file.path;
|
|
|
|
if (qemuDomainAttachDeviceMknod(driver,
|
|
vm,
|
|
path) < 0)
|
|
goto cleanup;
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceTeardownChardev(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainChrDefPtr chr)
|
|
{
|
|
int ret = -1;
|
|
const char *path = NULL;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
if (chr->source->type != VIR_DOMAIN_CHR_TYPE_DEV)
|
|
return 0;
|
|
|
|
path = chr->source->data.file.path;
|
|
|
|
if (qemuDomainDetachDeviceUnlink(driver, vm, path) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceSetupRNG(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainRNGDefPtr rng)
|
|
{
|
|
const char *path = NULL;
|
|
int ret = -1;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
switch ((virDomainRNGBackend) rng->backend) {
|
|
case VIR_DOMAIN_RNG_BACKEND_RANDOM:
|
|
path = rng->source.file;
|
|
break;
|
|
|
|
case VIR_DOMAIN_RNG_BACKEND_EGD:
|
|
case VIR_DOMAIN_RNG_BACKEND_LAST:
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainAttachDeviceMknod(driver,
|
|
vm,
|
|
path) < 0)
|
|
goto cleanup;
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
int
|
|
qemuDomainNamespaceTeardownRNG(virQEMUDriverPtr driver,
|
|
virDomainObjPtr vm,
|
|
virDomainRNGDefPtr rng)
|
|
{
|
|
int ret = -1;
|
|
const char *path = NULL;
|
|
|
|
if (!qemuDomainNamespaceEnabled(vm, QEMU_DOMAIN_NS_MOUNT))
|
|
return 0;
|
|
|
|
switch ((virDomainRNGBackend) rng->backend) {
|
|
case VIR_DOMAIN_RNG_BACKEND_RANDOM:
|
|
path = rng->source.file;
|
|
break;
|
|
|
|
case VIR_DOMAIN_RNG_BACKEND_EGD:
|
|
case VIR_DOMAIN_RNG_BACKEND_LAST:
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (qemuDomainDetachDeviceUnlink(driver, vm, path) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|