2010-12-16 10:10:54 -06:00
|
|
|
/*
|
|
|
|
* qemu_cgroup.c: QEMU cgroup management
|
|
|
|
*
|
domain_conf: split source data out from ChrDef
This opens up the possibility of reusing the smaller ChrSourceDef
for both qemu monitor and a passthrough smartcard device.
* src/conf/domain_conf.h (_virDomainChrDef): Factor host
details...
(_virDomainChrSourceDef): ...into new struct.
(virDomainChrSourceDefFree): New prototype.
* src/conf/domain_conf.c (virDomainChrDefFree)
(virDomainChrDefParseXML, virDomainChrDefFormat): Split...
(virDomainChrSourceDefClear, virDomainChrSourceDefFree)
(virDomainChrSourceDefParseXML, virDomainChrSourceDefFormat):
...into new functions.
(virDomainChrDefParseTargetXML): Update clients to reflect type
split.
* src/vmx/vmx.c (virVMXParseSerial, virVMXParseParallel)
(virVMXFormatSerial, virVMXFormatParallel): Likewise.
* src/xen/xen_driver.c (xenUnifiedDomainOpenConsole): Likewise.
* src/xen/xend_internal.c (xenDaemonParseSxprChar)
(xenDaemonFormatSxprChr): Likewise.
* src/vbox/vbox_tmpl.c (vboxDomainDumpXML, vboxAttachSerial)
(vboxAttachParallel): Likewise.
* src/security/security_dac.c (virSecurityDACSetChardevLabel)
(virSecurityDACSetChardevCallback)
(virSecurityDACRestoreChardevLabel)
(virSecurityDACRestoreChardevCallback): Likewise.
* src/security/security_selinux.c (SELinuxSetSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback)
(SELinuxRestoreSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback): Likewise.
* src/security/virt-aa-helper.c (get_files): Likewise.
* src/lxc/lxc_driver.c (lxcVmStart, lxcDomainOpenConsole):
Likewise.
* src/uml/uml_conf.c (umlBuildCommandLineChr): Likewise.
* src/uml/uml_driver.c (umlIdentifyOneChrPTY, umlIdentifyChrPTY)
(umlDomainOpenConsole): Likewise.
* src/qemu/qemu_command.c (qemuBuildChrChardevStr)
(qemuBuildChrArgStr, qemuBuildCommandLine)
(qemuParseCommandLineChr): Likewise.
* src/qemu/qemu_domain.c (qemuDomainObjPrivateXMLFormat)
(qemuDomainObjPrivateXMLParse): Likewise.
* src/qemu/qemu_cgroup.c (qemuSetupChardevCgroup): Likewise.
* src/qemu/qemu_hotplug.c (qemuDomainAttachNetDevice): Likewise.
* src/qemu/qemu_driver.c (qemudFindCharDevicePTYsMonitor)
(qemudFindCharDevicePTYs, qemuPrepareChardevDevice)
(qemuPrepareMonitorChr, qemudShutdownVMDaemon)
(qemuDomainOpenConsole): Likewise.
* src/qemu/qemu_command.h (qemuBuildChrChardevStr)
(qemuBuildChrArgStr): Delete, now that they are static.
* src/libvirt_private.syms (domain_conf.h): New exports.
* cfg.mk (useless_free_options): Update list.
* tests/qemuxml2argvtest.c (testCompareXMLToArgvFiles): Update
tests.
2011-01-07 16:45:01 -06:00
|
|
|
* Copyright (C) 2006-2011 Red Hat, Inc.
|
2010-12-16 10:10:54 -06:00
|
|
|
* Copyright (C) 2006 Daniel P. Berrange
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*
|
|
|
|
* Author: Daniel P. Berrange <berrange@redhat.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include "qemu_cgroup.h"
|
2011-07-20 21:10:31 -05:00
|
|
|
#include "qemu_domain.h"
|
2010-12-16 10:10:54 -06:00
|
|
|
#include "cgroup.h"
|
|
|
|
#include "logging.h"
|
|
|
|
#include "memory.h"
|
|
|
|
#include "virterror_internal.h"
|
|
|
|
#include "util.h"
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
#include "domain_audit.h"
|
2010-12-16 10:10:54 -06:00
|
|
|
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_QEMU
|
|
|
|
|
|
|
|
static const char *const defaultDeviceACL[] = {
|
|
|
|
"/dev/null", "/dev/full", "/dev/zero",
|
|
|
|
"/dev/random", "/dev/urandom",
|
|
|
|
"/dev/ptmx", "/dev/kvm", "/dev/kqemu",
|
2011-03-09 16:05:00 -06:00
|
|
|
"/dev/rtc", "/dev/hpet",
|
2010-12-16 10:10:54 -06:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
#define DEVICE_PTY_MAJOR 136
|
|
|
|
#define DEVICE_SND_MAJOR 116
|
|
|
|
|
2011-05-03 15:19:06 -05:00
|
|
|
bool qemuCgroupControllerActive(struct qemud_driver *driver,
|
|
|
|
int controller)
|
2010-12-16 10:10:54 -06:00
|
|
|
{
|
|
|
|
if (driver->cgroup == NULL)
|
2011-05-03 15:19:06 -05:00
|
|
|
return false;
|
|
|
|
if (controller < 0 || controller >= VIR_CGROUP_CONTROLLER_LAST)
|
|
|
|
return false;
|
2011-06-06 14:07:11 -05:00
|
|
|
if (!virCgroupMounted(driver->cgroup, controller))
|
|
|
|
return false;
|
2010-12-16 10:10:54 -06:00
|
|
|
if (driver->cgroupControllers & (1 << controller))
|
2011-05-03 15:19:06 -05:00
|
|
|
return true;
|
|
|
|
return false;
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
|
|
|
|
2011-02-15 20:18:40 -06:00
|
|
|
static int
|
2011-03-08 21:13:18 -06:00
|
|
|
qemuSetupDiskPathAllow(virDomainDiskDefPtr disk,
|
2011-02-15 20:18:40 -06:00
|
|
|
const char *path,
|
|
|
|
size_t depth ATTRIBUTE_UNUSED,
|
|
|
|
void *opaque)
|
2010-12-16 10:10:54 -06:00
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData *data = opaque;
|
2010-12-16 10:10:54 -06:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
VIR_DEBUG("Process path %s for disk", path);
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDevicePath(data->cgroup, path,
|
|
|
|
(disk->readonly ? VIR_CGROUP_DEVICE_READ
|
|
|
|
: VIR_CGROUP_DEVICE_RW));
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupPath(data->vm, data->cgroup, "allow", path,
|
|
|
|
disk->readonly ? "r" : "rw", rc);
|
2011-02-16 18:05:54 -06:00
|
|
|
if (rc < 0) {
|
|
|
|
if (rc == -EACCES) { /* Get this for root squash NFS */
|
2010-12-16 10:10:54 -06:00
|
|
|
VIR_DEBUG("Ignoring EACCES for %s", path);
|
|
|
|
} else {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to allow access for disk path %s"),
|
|
|
|
path);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int qemuSetupDiskCgroup(struct qemud_driver *driver,
|
2011-02-15 20:18:40 -06:00
|
|
|
virDomainObjPtr vm,
|
2010-12-16 10:10:54 -06:00
|
|
|
virCgroupPtr cgroup,
|
|
|
|
virDomainDiskDefPtr disk)
|
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData data = { vm, cgroup };
|
2010-12-16 10:10:54 -06:00
|
|
|
return virDomainDiskDefForeachPath(disk,
|
|
|
|
driver->allowDiskFormatProbing,
|
|
|
|
true,
|
2012-01-12 12:24:45 -06:00
|
|
|
driver->user, driver->group,
|
2010-12-16 10:10:54 -06:00
|
|
|
qemuSetupDiskPathAllow,
|
2011-02-15 20:18:40 -06:00
|
|
|
&data);
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-02-15 20:18:40 -06:00
|
|
|
static int
|
|
|
|
qemuTeardownDiskPathDeny(virDomainDiskDefPtr disk ATTRIBUTE_UNUSED,
|
|
|
|
const char *path,
|
|
|
|
size_t depth ATTRIBUTE_UNUSED,
|
|
|
|
void *opaque)
|
2010-12-16 10:10:54 -06:00
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData *data = opaque;
|
2010-12-16 10:10:54 -06:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
VIR_DEBUG("Process path %s for disk", path);
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupDenyDevicePath(data->cgroup, path,
|
|
|
|
VIR_CGROUP_DEVICE_RWM);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupPath(data->vm, data->cgroup, "deny", path, "rwm", rc);
|
2011-02-16 18:05:54 -06:00
|
|
|
if (rc < 0) {
|
|
|
|
if (rc == -EACCES) { /* Get this for root squash NFS */
|
2010-12-16 10:10:54 -06:00
|
|
|
VIR_DEBUG("Ignoring EACCES for %s", path);
|
|
|
|
} else {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to deny access for disk path %s"),
|
|
|
|
path);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int qemuTeardownDiskCgroup(struct qemud_driver *driver,
|
2011-02-15 20:18:40 -06:00
|
|
|
virDomainObjPtr vm,
|
2010-12-16 10:10:54 -06:00
|
|
|
virCgroupPtr cgroup,
|
|
|
|
virDomainDiskDefPtr disk)
|
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData data = { vm, cgroup };
|
2010-12-16 10:10:54 -06:00
|
|
|
return virDomainDiskDefForeachPath(disk,
|
|
|
|
driver->allowDiskFormatProbing,
|
|
|
|
true,
|
2012-01-12 12:24:45 -06:00
|
|
|
driver->user, driver->group,
|
2010-12-16 10:10:54 -06:00
|
|
|
qemuTeardownDiskPathDeny,
|
2011-02-15 20:18:40 -06:00
|
|
|
&data);
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-02-15 20:18:40 -06:00
|
|
|
static int
|
|
|
|
qemuSetupChardevCgroup(virDomainDefPtr def,
|
|
|
|
virDomainChrDefPtr dev,
|
|
|
|
void *opaque)
|
2010-12-16 10:10:54 -06:00
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData *data = opaque;
|
2010-12-16 10:10:54 -06:00
|
|
|
int rc;
|
|
|
|
|
domain_conf: split source data out from ChrDef
This opens up the possibility of reusing the smaller ChrSourceDef
for both qemu monitor and a passthrough smartcard device.
* src/conf/domain_conf.h (_virDomainChrDef): Factor host
details...
(_virDomainChrSourceDef): ...into new struct.
(virDomainChrSourceDefFree): New prototype.
* src/conf/domain_conf.c (virDomainChrDefFree)
(virDomainChrDefParseXML, virDomainChrDefFormat): Split...
(virDomainChrSourceDefClear, virDomainChrSourceDefFree)
(virDomainChrSourceDefParseXML, virDomainChrSourceDefFormat):
...into new functions.
(virDomainChrDefParseTargetXML): Update clients to reflect type
split.
* src/vmx/vmx.c (virVMXParseSerial, virVMXParseParallel)
(virVMXFormatSerial, virVMXFormatParallel): Likewise.
* src/xen/xen_driver.c (xenUnifiedDomainOpenConsole): Likewise.
* src/xen/xend_internal.c (xenDaemonParseSxprChar)
(xenDaemonFormatSxprChr): Likewise.
* src/vbox/vbox_tmpl.c (vboxDomainDumpXML, vboxAttachSerial)
(vboxAttachParallel): Likewise.
* src/security/security_dac.c (virSecurityDACSetChardevLabel)
(virSecurityDACSetChardevCallback)
(virSecurityDACRestoreChardevLabel)
(virSecurityDACRestoreChardevCallback): Likewise.
* src/security/security_selinux.c (SELinuxSetSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback)
(SELinuxRestoreSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback): Likewise.
* src/security/virt-aa-helper.c (get_files): Likewise.
* src/lxc/lxc_driver.c (lxcVmStart, lxcDomainOpenConsole):
Likewise.
* src/uml/uml_conf.c (umlBuildCommandLineChr): Likewise.
* src/uml/uml_driver.c (umlIdentifyOneChrPTY, umlIdentifyChrPTY)
(umlDomainOpenConsole): Likewise.
* src/qemu/qemu_command.c (qemuBuildChrChardevStr)
(qemuBuildChrArgStr, qemuBuildCommandLine)
(qemuParseCommandLineChr): Likewise.
* src/qemu/qemu_domain.c (qemuDomainObjPrivateXMLFormat)
(qemuDomainObjPrivateXMLParse): Likewise.
* src/qemu/qemu_cgroup.c (qemuSetupChardevCgroup): Likewise.
* src/qemu/qemu_hotplug.c (qemuDomainAttachNetDevice): Likewise.
* src/qemu/qemu_driver.c (qemudFindCharDevicePTYsMonitor)
(qemudFindCharDevicePTYs, qemuPrepareChardevDevice)
(qemuPrepareMonitorChr, qemudShutdownVMDaemon)
(qemuDomainOpenConsole): Likewise.
* src/qemu/qemu_command.h (qemuBuildChrChardevStr)
(qemuBuildChrArgStr): Delete, now that they are static.
* src/libvirt_private.syms (domain_conf.h): New exports.
* cfg.mk (useless_free_options): Update list.
* tests/qemuxml2argvtest.c (testCompareXMLToArgvFiles): Update
tests.
2011-01-07 16:45:01 -06:00
|
|
|
if (dev->source.type != VIR_DOMAIN_CHR_TYPE_DEV)
|
2010-12-16 10:10:54 -06:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
domain_conf: split source data out from ChrDef
This opens up the possibility of reusing the smaller ChrSourceDef
for both qemu monitor and a passthrough smartcard device.
* src/conf/domain_conf.h (_virDomainChrDef): Factor host
details...
(_virDomainChrSourceDef): ...into new struct.
(virDomainChrSourceDefFree): New prototype.
* src/conf/domain_conf.c (virDomainChrDefFree)
(virDomainChrDefParseXML, virDomainChrDefFormat): Split...
(virDomainChrSourceDefClear, virDomainChrSourceDefFree)
(virDomainChrSourceDefParseXML, virDomainChrSourceDefFormat):
...into new functions.
(virDomainChrDefParseTargetXML): Update clients to reflect type
split.
* src/vmx/vmx.c (virVMXParseSerial, virVMXParseParallel)
(virVMXFormatSerial, virVMXFormatParallel): Likewise.
* src/xen/xen_driver.c (xenUnifiedDomainOpenConsole): Likewise.
* src/xen/xend_internal.c (xenDaemonParseSxprChar)
(xenDaemonFormatSxprChr): Likewise.
* src/vbox/vbox_tmpl.c (vboxDomainDumpXML, vboxAttachSerial)
(vboxAttachParallel): Likewise.
* src/security/security_dac.c (virSecurityDACSetChardevLabel)
(virSecurityDACSetChardevCallback)
(virSecurityDACRestoreChardevLabel)
(virSecurityDACRestoreChardevCallback): Likewise.
* src/security/security_selinux.c (SELinuxSetSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback)
(SELinuxRestoreSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback): Likewise.
* src/security/virt-aa-helper.c (get_files): Likewise.
* src/lxc/lxc_driver.c (lxcVmStart, lxcDomainOpenConsole):
Likewise.
* src/uml/uml_conf.c (umlBuildCommandLineChr): Likewise.
* src/uml/uml_driver.c (umlIdentifyOneChrPTY, umlIdentifyChrPTY)
(umlDomainOpenConsole): Likewise.
* src/qemu/qemu_command.c (qemuBuildChrChardevStr)
(qemuBuildChrArgStr, qemuBuildCommandLine)
(qemuParseCommandLineChr): Likewise.
* src/qemu/qemu_domain.c (qemuDomainObjPrivateXMLFormat)
(qemuDomainObjPrivateXMLParse): Likewise.
* src/qemu/qemu_cgroup.c (qemuSetupChardevCgroup): Likewise.
* src/qemu/qemu_hotplug.c (qemuDomainAttachNetDevice): Likewise.
* src/qemu/qemu_driver.c (qemudFindCharDevicePTYsMonitor)
(qemudFindCharDevicePTYs, qemuPrepareChardevDevice)
(qemuPrepareMonitorChr, qemudShutdownVMDaemon)
(qemuDomainOpenConsole): Likewise.
* src/qemu/qemu_command.h (qemuBuildChrChardevStr)
(qemuBuildChrArgStr): Delete, now that they are static.
* src/libvirt_private.syms (domain_conf.h): New exports.
* cfg.mk (useless_free_options): Update list.
* tests/qemuxml2argvtest.c (testCompareXMLToArgvFiles): Update
tests.
2011-01-07 16:45:01 -06:00
|
|
|
VIR_DEBUG("Process path '%s' for disk", dev->source.data.file.path);
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDevicePath(data->cgroup, dev->source.data.file.path,
|
|
|
|
VIR_CGROUP_DEVICE_RW);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupPath(data->vm, data->cgroup, "allow",
|
|
|
|
dev->source.data.file.path, "rw", rc);
|
2011-02-16 18:05:54 -06:00
|
|
|
if (rc < 0) {
|
2010-12-16 10:10:54 -06:00
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to allow device %s for %s"),
|
domain_conf: split source data out from ChrDef
This opens up the possibility of reusing the smaller ChrSourceDef
for both qemu monitor and a passthrough smartcard device.
* src/conf/domain_conf.h (_virDomainChrDef): Factor host
details...
(_virDomainChrSourceDef): ...into new struct.
(virDomainChrSourceDefFree): New prototype.
* src/conf/domain_conf.c (virDomainChrDefFree)
(virDomainChrDefParseXML, virDomainChrDefFormat): Split...
(virDomainChrSourceDefClear, virDomainChrSourceDefFree)
(virDomainChrSourceDefParseXML, virDomainChrSourceDefFormat):
...into new functions.
(virDomainChrDefParseTargetXML): Update clients to reflect type
split.
* src/vmx/vmx.c (virVMXParseSerial, virVMXParseParallel)
(virVMXFormatSerial, virVMXFormatParallel): Likewise.
* src/xen/xen_driver.c (xenUnifiedDomainOpenConsole): Likewise.
* src/xen/xend_internal.c (xenDaemonParseSxprChar)
(xenDaemonFormatSxprChr): Likewise.
* src/vbox/vbox_tmpl.c (vboxDomainDumpXML, vboxAttachSerial)
(vboxAttachParallel): Likewise.
* src/security/security_dac.c (virSecurityDACSetChardevLabel)
(virSecurityDACSetChardevCallback)
(virSecurityDACRestoreChardevLabel)
(virSecurityDACRestoreChardevCallback): Likewise.
* src/security/security_selinux.c (SELinuxSetSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback)
(SELinuxRestoreSecurityChardevLabel)
(SELinuxSetSecurityChardevCallback): Likewise.
* src/security/virt-aa-helper.c (get_files): Likewise.
* src/lxc/lxc_driver.c (lxcVmStart, lxcDomainOpenConsole):
Likewise.
* src/uml/uml_conf.c (umlBuildCommandLineChr): Likewise.
* src/uml/uml_driver.c (umlIdentifyOneChrPTY, umlIdentifyChrPTY)
(umlDomainOpenConsole): Likewise.
* src/qemu/qemu_command.c (qemuBuildChrChardevStr)
(qemuBuildChrArgStr, qemuBuildCommandLine)
(qemuParseCommandLineChr): Likewise.
* src/qemu/qemu_domain.c (qemuDomainObjPrivateXMLFormat)
(qemuDomainObjPrivateXMLParse): Likewise.
* src/qemu/qemu_cgroup.c (qemuSetupChardevCgroup): Likewise.
* src/qemu/qemu_hotplug.c (qemuDomainAttachNetDevice): Likewise.
* src/qemu/qemu_driver.c (qemudFindCharDevicePTYsMonitor)
(qemudFindCharDevicePTYs, qemuPrepareChardevDevice)
(qemuPrepareMonitorChr, qemudShutdownVMDaemon)
(qemuDomainOpenConsole): Likewise.
* src/qemu/qemu_command.h (qemuBuildChrChardevStr)
(qemuBuildChrArgStr): Delete, now that they are static.
* src/libvirt_private.syms (domain_conf.h): New exports.
* cfg.mk (useless_free_options): Update list.
* tests/qemuxml2argvtest.c (testCompareXMLToArgvFiles): Update
tests.
2011-01-07 16:45:01 -06:00
|
|
|
dev->source.data.file.path, def->name);
|
2010-12-16 10:10:54 -06:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int qemuSetupHostUsbDeviceCgroup(usbDevice *dev ATTRIBUTE_UNUSED,
|
|
|
|
const char *path,
|
|
|
|
void *opaque)
|
|
|
|
{
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData *data = opaque;
|
2010-12-16 10:10:54 -06:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
VIR_DEBUG("Process path '%s' for USB device", path);
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDevicePath(data->cgroup, path,
|
|
|
|
VIR_CGROUP_DEVICE_RW);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupPath(data->vm, data->cgroup, "allow", path, "rw", rc);
|
2011-02-16 18:05:54 -06:00
|
|
|
if (rc < 0) {
|
2010-12-16 10:10:54 -06:00
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to allow device %s"),
|
|
|
|
path);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int qemuSetupCgroup(struct qemud_driver *driver,
|
2012-05-12 07:53:15 -05:00
|
|
|
virDomainObjPtr vm,
|
|
|
|
char *nodemask)
|
2010-12-16 10:10:54 -06:00
|
|
|
{
|
|
|
|
virCgroupPtr cgroup = NULL;
|
|
|
|
int rc;
|
|
|
|
unsigned int i;
|
|
|
|
const char *const *deviceACL =
|
|
|
|
driver->cgroupDeviceACL ?
|
|
|
|
(const char *const *)driver->cgroupDeviceACL :
|
|
|
|
defaultDeviceACL;
|
|
|
|
|
|
|
|
if (driver->cgroup == NULL)
|
|
|
|
return 0; /* Not supported, so claim success */
|
|
|
|
|
|
|
|
rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 1);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to create cgroup for %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
|
2011-02-15 20:18:40 -06:00
|
|
|
qemuCgroupData data = { vm, cgroup };
|
2010-12-16 10:10:54 -06:00
|
|
|
rc = virCgroupDenyAllDevices(cgroup);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroup(vm, cgroup, "deny", "all", rc == 0);
|
2010-12-16 10:10:54 -06:00
|
|
|
if (rc != 0) {
|
|
|
|
if (rc == -EPERM) {
|
2011-05-09 04:24:09 -05:00
|
|
|
VIR_WARN("Group devices ACL is not accessible, disabling whitelisting");
|
2010-12-16 10:10:54 -06:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to deny all devices for %s"), vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < vm->def->ndisks ; i++) {
|
2011-02-15 20:18:40 -06:00
|
|
|
if (qemuSetupDiskCgroup(driver, vm, cgroup, vm->def->disks[i]) < 0)
|
2010-12-16 10:10:54 -06:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_PTY_MAJOR,
|
|
|
|
VIR_CGROUP_DEVICE_RW);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupMajor(vm, cgroup, "allow", DEVICE_PTY_MAJOR,
|
|
|
|
"pty", "rw", rc == 0);
|
2010-12-16 10:10:54 -06:00
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc, "%s",
|
|
|
|
_("unable to allow /dev/pts/ devices"));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-02-25 12:55:44 -06:00
|
|
|
if (vm->def->nsounds &&
|
|
|
|
(!vm->def->ngraphics ||
|
|
|
|
((vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
|
|
|
|
driver->vncAllowHostAudio) ||
|
|
|
|
(vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_SDL)))) {
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_SND_MAJOR,
|
|
|
|
VIR_CGROUP_DEVICE_RW);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupMajor(vm, cgroup, "allow", DEVICE_SND_MAJOR,
|
|
|
|
"sound", "rw", rc == 0);
|
2010-12-16 10:10:54 -06:00
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc, "%s",
|
|
|
|
_("unable to allow /dev/snd/ devices"));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; deviceACL[i] != NULL ; i++) {
|
2011-03-08 21:13:18 -06:00
|
|
|
rc = virCgroupAllowDevicePath(cgroup, deviceACL[i],
|
|
|
|
VIR_CGROUP_DEVICE_RW);
|
Move qemu_audit.h helpers into shared code
The LXC and UML drivers can both make use of auditing. Move
the qemu_audit.{c,h} files to src/conf/domain_audit.{c,h}
* src/conf/domain_audit.c: Rename from src/qemu/qemu_audit.c
* src/conf/domain_audit.h: Rename from src/qemu/qemu_audit.h
* src/Makefile.am: Remove qemu_audit.{c,h}, add domain_audit.{c,h}
* src/qemu/qemu_audit.h, src/qemu/qemu_cgroup.c,
src/qemu/qemu_command.c, src/qemu/qemu_driver.c,
src/qemu/qemu_hotplug.c, src/qemu/qemu_migration.c,
src/qemu/qemu_process.c: Update for changed audit API names
2011-07-04 05:56:13 -05:00
|
|
|
virDomainAuditCgroupPath(vm, cgroup, "allow", deviceACL[i], "rw", rc);
|
2010-12-16 10:10:54 -06:00
|
|
|
if (rc < 0 &&
|
|
|
|
rc != -ENOENT) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("unable to allow device %s"),
|
|
|
|
deviceACL[i]);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (virDomainChrDefForeach(vm->def,
|
|
|
|
true,
|
|
|
|
qemuSetupChardevCgroup,
|
2011-02-15 20:18:40 -06:00
|
|
|
&data) < 0)
|
2010-12-16 10:10:54 -06:00
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
for (i = 0; i < vm->def->nhostdevs; i++) {
|
|
|
|
virDomainHostdevDefPtr hostdev = vm->def->hostdevs[i];
|
|
|
|
usbDevice *usb;
|
|
|
|
|
|
|
|
if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
|
|
|
|
continue;
|
|
|
|
if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if ((usb = usbGetDevice(hostdev->source.subsys.u.usb.bus,
|
|
|
|
hostdev->source.subsys.u.usb.device)) == NULL)
|
|
|
|
goto cleanup;
|
|
|
|
|
2011-02-15 20:18:40 -06:00
|
|
|
if (usbDeviceFileIterate(usb, qemuSetupHostUsbDeviceCgroup,
|
|
|
|
&data) < 0)
|
2010-12-16 10:10:54 -06:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->blkio.weight != 0) {
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_BLKIO)) {
|
2011-02-08 00:59:38 -06:00
|
|
|
rc = virCgroupSetBlkioWeight(cgroup, vm->def->blkio.weight);
|
|
|
|
if(rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set io weight for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-03-31 22:41:33 -05:00
|
|
|
} else {
|
|
|
|
qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
|
|
_("Block I/O tuning is not available on this host"));
|
2011-11-08 05:00:34 -06:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (vm->def->blkio.ndevices) {
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_BLKIO)) {
|
|
|
|
for (i = 0; i < vm->def->blkio.ndevices; i++) {
|
|
|
|
virBlkioDeviceWeightPtr dw = &vm->def->blkio.devices[i];
|
qemu: filter blkio 0-device-weight at two other places
filter 0-device-weight when:
- getting blkio parameters with --config
- starting up a domain
When testing with blkio, I found these issues:
(dom is down)
virsh blkiotune dom --device-weights /dev/sda,300,/dev/sdb,500
virsh blkiotune dom --device-weights /dev/sda,300,/dev/sdb,0
virsh blkiotune dom
weight : 800
device_weight : /dev/sda,200,/dev/sdb,0
# issue 1: shows 0 device weight of /dev/sdb that may confuse user
(continued)
virsh start dom
# issue 2: If /dev/sdb doesn't exist, libvirt refuses to bring the
# dom up because it wants to set the device weight to 0 of a
# non-existing device. Since 0 means no weight-limit, we really don't
# have to set it.
2011-11-29 20:11:08 -06:00
|
|
|
if (!dw->weight)
|
|
|
|
continue;
|
2011-11-08 05:00:34 -06:00
|
|
|
rc = virCgroupSetBlkioDeviceWeight(cgroup, dw->path,
|
|
|
|
dw->weight);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set io device weight "
|
|
|
|
"for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
|
|
_("Block I/O tuning is not available on this host"));
|
|
|
|
goto cleanup;
|
2011-02-08 00:59:38 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->mem.hard_limit != 0 ||
|
|
|
|
vm->def->mem.soft_limit != 0 ||
|
|
|
|
vm->def->mem.swap_hard_limit != 0) {
|
2011-05-03 15:19:06 -05:00
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_MEMORY)) {
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->mem.hard_limit != 0) {
|
|
|
|
rc = virCgroupSetMemoryHardLimit(cgroup, vm->def->mem.hard_limit);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set memory hard limit for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->mem.soft_limit != 0) {
|
|
|
|
rc = virCgroupSetMemorySoftLimit(cgroup, vm->def->mem.soft_limit);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set memory soft limit for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
|
|
|
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->mem.swap_hard_limit != 0) {
|
|
|
|
rc = virCgroupSetMemSwapHardLimit(cgroup, vm->def->mem.swap_hard_limit);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set swap hard limit for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
2011-03-31 22:41:33 -05:00
|
|
|
} else {
|
|
|
|
qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
|
|
_("Memory cgroup is not available on this host"));
|
2010-12-16 10:10:54 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-31 22:41:33 -05:00
|
|
|
if (vm->def->cputune.shares != 0) {
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
|
2011-03-29 08:41:25 -05:00
|
|
|
rc = virCgroupSetCpuShares(cgroup, vm->def->cputune.shares);
|
|
|
|
if(rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set io cpu shares for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-03-31 22:41:33 -05:00
|
|
|
} else {
|
|
|
|
qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
|
|
_("CPU tuning is not available on this host"));
|
2011-03-29 08:41:25 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-12 07:53:15 -05:00
|
|
|
if ((vm->def->numatune.memory.nodemask ||
|
|
|
|
(vm->def->numatune.memory.placement_mode ==
|
|
|
|
VIR_DOMAIN_NUMATUNE_MEM_PLACEMENT_MODE_AUTO)) &&
|
2011-12-20 02:34:59 -06:00
|
|
|
vm->def->numatune.memory.mode == VIR_DOMAIN_NUMATUNE_MEM_STRICT &&
|
|
|
|
qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPUSET)) {
|
2012-05-12 07:53:15 -05:00
|
|
|
char *mask = NULL;
|
|
|
|
if (vm->def->numatune.memory.placement_mode ==
|
|
|
|
VIR_DOMAIN_NUMATUNE_MEM_PLACEMENT_MODE_AUTO)
|
|
|
|
mask = virDomainCpuSetFormat(nodemask, VIR_DOMAIN_CPUMASK_LEN);
|
|
|
|
else
|
|
|
|
mask = virDomainCpuSetFormat(vm->def->numatune.memory.nodemask,
|
|
|
|
VIR_DOMAIN_CPUMASK_LEN);
|
2011-12-20 02:34:59 -06:00
|
|
|
if (!mask) {
|
|
|
|
qemuReportError(VIR_ERR_INTERNAL_ERROR,
|
|
|
|
_("failed to convert memory nodemask"));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = virCgroupSetCpusetMems(cgroup, mask);
|
|
|
|
VIR_FREE(mask);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to set cpuset.mems for domain %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
2010-12-16 10:10:54 -06:00
|
|
|
done:
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (cgroup) {
|
|
|
|
virCgroupRemove(cgroup);
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-07-20 21:10:31 -05:00
|
|
|
int qemuSetupCgroupVcpuBW(virCgroupPtr cgroup, unsigned long long period,
|
|
|
|
long long quota)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
unsigned long long old_period;
|
|
|
|
|
|
|
|
if (period == 0 && quota == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (period) {
|
|
|
|
/* get old period, and we can rollback if set quota failed */
|
|
|
|
rc = virCgroupGetCpuCfsPeriod(cgroup, &old_period);
|
|
|
|
if (rc < 0) {
|
|
|
|
virReportSystemError(-rc,
|
2011-07-21 04:32:57 -05:00
|
|
|
"%s", _("Unable to get cpu bandwidth period"));
|
2011-07-20 21:10:31 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = virCgroupSetCpuCfsPeriod(cgroup, period);
|
|
|
|
if (rc < 0) {
|
|
|
|
virReportSystemError(-rc,
|
2011-07-21 04:32:57 -05:00
|
|
|
"%s", _("Unable to set cpu bandwidth period"));
|
2011-07-20 21:10:31 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (quota) {
|
|
|
|
rc = virCgroupSetCpuCfsQuota(cgroup, quota);
|
|
|
|
if (rc < 0) {
|
|
|
|
virReportSystemError(-rc,
|
2011-07-21 04:32:57 -05:00
|
|
|
"%s", _("Unable to set cpu bandwidth quota"));
|
2011-07-20 21:10:31 -05:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (period) {
|
|
|
|
rc = virCgroupSetCpuCfsPeriod(cgroup, old_period);
|
|
|
|
if (rc < 0)
|
|
|
|
virReportSystemError(-rc,
|
2012-07-05 20:53:11 -05:00
|
|
|
"%s",
|
|
|
|
_("Unable to rollback cpu bandwidth period"));
|
2011-07-20 21:10:31 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int qemuSetupCgroupForVcpu(struct qemud_driver *driver, virDomainObjPtr vm)
|
|
|
|
{
|
|
|
|
virCgroupPtr cgroup = NULL;
|
|
|
|
virCgroupPtr cgroup_vcpu = NULL;
|
|
|
|
qemuDomainObjPrivatePtr priv = vm->privateData;
|
|
|
|
int rc;
|
|
|
|
unsigned int i;
|
|
|
|
unsigned long long period = vm->def->cputune.period;
|
|
|
|
long long quota = vm->def->cputune.quota;
|
2011-07-25 00:37:14 -05:00
|
|
|
long long vm_quota = 0;
|
2011-07-20 21:10:31 -05:00
|
|
|
|
|
|
|
if (driver->cgroup == NULL)
|
|
|
|
return 0; /* Not supported, so claim success */
|
|
|
|
|
|
|
|
rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to find cgroup for %s"),
|
|
|
|
vm->def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-07-25 00:37:14 -05:00
|
|
|
/* Set cpu bandwidth for the vm */
|
|
|
|
if (period || quota) {
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
|
|
|
|
/* Ensure that we can multiply by vcpus without overflowing. */
|
|
|
|
if (quota > LLONG_MAX / vm->def->vcpus) {
|
|
|
|
virReportSystemError(EINVAL,
|
|
|
|
_("%s"),
|
|
|
|
"Unable to set cpu bandwidth quota");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (quota > 0)
|
|
|
|
vm_quota = quota * vm->def->vcpus;
|
|
|
|
else
|
|
|
|
vm_quota = quota;
|
|
|
|
if (qemuSetupCgroupVcpuBW(cgroup, period, vm_quota) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-20 21:10:31 -05:00
|
|
|
if (priv->nvcpupids == 0 || priv->vcpupids[0] == vm->pid) {
|
|
|
|
/* If we does not know VCPU<->PID mapping or all vcpu runs in the same
|
2011-07-21 04:32:57 -05:00
|
|
|
* thread, we cannot control each vcpu.
|
2011-07-20 21:10:31 -05:00
|
|
|
*/
|
2011-07-25 00:37:14 -05:00
|
|
|
virCgroupFree(&cgroup);
|
2011-07-20 21:10:31 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < priv->nvcpupids; i++) {
|
|
|
|
rc = virCgroupForVcpu(cgroup, i, &cgroup_vcpu, 1);
|
|
|
|
if (rc < 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("Unable to create vcpu cgroup for %s(vcpu:"
|
|
|
|
" %d)"),
|
|
|
|
vm->def->name, i);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* move the thread for vcpu to sub dir */
|
|
|
|
rc = virCgroupAddTask(cgroup_vcpu, priv->vcpupids[i]);
|
|
|
|
if (rc < 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("unable to add vcpu %d task %d to cgroup"),
|
|
|
|
i, priv->vcpupids[i]);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (period || quota) {
|
|
|
|
if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
|
|
|
|
if (qemuSetupCgroupVcpuBW(cgroup_vcpu, period, quota) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
virCgroupFree(&cgroup_vcpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
virCgroupFree(&cgroup_vcpu);
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
virCgroupFree(&cgroup_vcpu);
|
|
|
|
if (cgroup) {
|
|
|
|
virCgroupRemove(cgroup);
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-12-16 10:10:54 -06:00
|
|
|
|
|
|
|
int qemuRemoveCgroup(struct qemud_driver *driver,
|
|
|
|
virDomainObjPtr vm,
|
|
|
|
int quiet)
|
|
|
|
{
|
|
|
|
virCgroupPtr cgroup;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (driver->cgroup == NULL)
|
|
|
|
return 0; /* Not supported, so claim success */
|
|
|
|
|
|
|
|
rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
|
|
|
|
if (rc != 0) {
|
|
|
|
if (!quiet)
|
|
|
|
qemuReportError(VIR_ERR_INTERNAL_ERROR,
|
2011-01-27 21:39:44 -06:00
|
|
|
_("Unable to find cgroup for %s"),
|
2010-12-16 10:10:54 -06:00
|
|
|
vm->def->name);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = virCgroupRemove(cgroup);
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int qemuAddToCgroup(struct qemud_driver *driver,
|
|
|
|
virDomainDefPtr def)
|
|
|
|
{
|
|
|
|
virCgroupPtr cgroup = NULL;
|
|
|
|
int ret = -1;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (driver->cgroup == NULL)
|
|
|
|
return 0; /* Not supported, so claim success */
|
|
|
|
|
|
|
|
rc = virCgroupForDomain(driver->cgroup, def->name, &cgroup, 0);
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("unable to find cgroup for domain %s"),
|
|
|
|
def->name);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = virCgroupAddTask(cgroup, getpid());
|
|
|
|
if (rc != 0) {
|
|
|
|
virReportSystemError(-rc,
|
|
|
|
_("unable to add domain %s task %d to cgroup"),
|
|
|
|
def->name, getpid());
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
virCgroupFree(&cgroup);
|
|
|
|
return ret;
|
|
|
|
}
|