[PATCHv9 1/4] libvirt/qemu - persistent modification of devices.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Now, qemudDomainAttachDeviceFlags() and qemudDomainDetachDeviceFlags()
doesn't support VIR_DOMAIN_DEVICE_MODIFY_CONFIG. By this, virsh's
at(de)tatch-device --persistent cannot modify qemu config.
(Xen allows it.)

This patch is a base patch for adding support of devices in
step by step manner. Following patches will add some device
support.

Signed-off-by: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>

Changelog: v8->v9
  - removed unnecessary comments.
---
 src/qemu/qemu_driver.c |  134 +++++++++++++++++++++++++++++++++++++++++++-----
 1 files changed, 120 insertions(+), 14 deletions(-)

diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
index 04a5f65..49af487 100644
--- a/src/qemu/qemu_driver.c
+++ b/src/qemu/qemu_driver.c
@@ -3918,16 +3918,117 @@ cleanup:
     return ret;
 }
 
-static int qemudDomainAttachDeviceFlags(virDomainPtr dom,
-                                        const char *xml,
-                                        unsigned int flags) {
-    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
-        qemuReportError(VIR_ERR_OPERATION_INVALID,
-                        "%s", _("cannot modify the persistent configuration of a domain"));
+static int qemuDomainAttachDevicePersistent(virDomainDefPtr vmdef,
+                                            virDomainDeviceDefPtr newdev)
+{
+
+    switch(newdev->type) {
+    default:
+        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
+                        _("the device is not supported for now"));
         return -1;
     }
 
-    return qemudDomainAttachDevice(dom, xml);
+    return 0;
+}
+
+static int qemuDomainDetachDevicePersistent(virDomainDefPtr vmdef,
+                                            virDomainDeviceDefPtr device)
+{
+    switch(device->type) {
+    default:
+        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
+                        _("the device is not supported for now"));
+        return -1;
+    }
+    return 0;
+}
+
+static int qemuDomainModifyDevicePersistent(virDomainPtr dom,
+                                            const char *xml,
+                                            unsigned int attach,
+                                            unsigned int flags)
+{
+    struct qemud_driver *driver;
+    virDomainDeviceDefPtr device;
+    virDomainDefPtr vmdef;
+    virDomainObjPtr vm;
+    int ret = -1;
+
+    /*
+     * When both of MODIFY_CONFIG and MODIFY_LIVE are passed at the same time,
+     * return error for now. We should support this later.
+     */
+    if (flags & VIR_DOMAIN_DEVICE_MODIFY_LIVE) {
+        qemuReportError(VIR_ERR_OPERATION_INVALID, "%s",
+                        _("cannot modify active domain and its definition "
+                          "at the same time."));
+        return -1;
+    }
+
+    driver = dom->conn->privateData;
+    qemuDriverLock(driver);
+    vm = virDomainFindByName(&driver->domains, dom->name);
+    if (!vm) {
+        qemuReportError(VIR_ERR_NO_DOMAIN, _("no domain with name : '%s'"),
+                        dom->name);
+        goto unlock_out;
+    }
+
+    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
+        goto unlock_out;
+
+    if (virDomainObjIsActive(vm)) {
+        qemuReportError(VIR_ERR_OPERATION_INVALID, "%s",
+                        _("cannot modify active domain's definition"));
+        goto endjob;
+    }
+
+    vmdef = virDomainObjGetPersistentDef(driver->caps, vm);
+
+    if (!vmdef)
+        goto endjob;
+
+    device = virDomainDeviceDefParse(driver->caps,
+                                     vmdef, xml, VIR_DOMAIN_XML_INACTIVE);
+    if (!device)
+        goto endjob;
+
+    if (attach)
+        ret = qemuDomainAttachDevicePersistent(vmdef, device);
+    else
+        ret = qemuDomainDetachDevicePersistent(vmdef, device);
+
+    if (!ret)
+        ret = virDomainSaveConfig(driver->configDir, vmdef);
+
+    virDomainDeviceDefFree(device);
+
+endjob:
+    if (qemuDomainObjEndJob(vm) == 0)
+        vm = NULL;
+unlock_out:
+    if (vm)
+        virDomainObjUnlock(vm);
+    qemuDriverUnlock(driver);
+    return ret;
+}
+
+static int qemudDomainAttachDeviceFlags(virDomainPtr dom,
+                                        const char *xml,
+                                        unsigned int flags)
+{
+    int ret = -1;
+
+    virCheckFlags((VIR_DOMAIN_DEVICE_MODIFY_CONFIG |
+                   VIR_DOMAIN_DEVICE_MODIFY_LIVE), -1);
+
+    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG)
+        ret = qemuDomainModifyDevicePersistent(dom, xml, 1, flags);
+    else if (flags & VIR_DOMAIN_DEVICE_MODIFY_LIVE)
+        ret = qemudDomainAttachDevice(dom, xml);
+
+    return ret;
 }
 
 
@@ -4141,14 +4242,19 @@ cleanup:
 
 static int qemudDomainDetachDeviceFlags(virDomainPtr dom,
                                         const char *xml,
-                                        unsigned int flags) {
-    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
-        qemuReportError(VIR_ERR_OPERATION_INVALID,
-                        "%s", _("cannot modify the persistent configuration of a domain"));
-        return -1;
-    }
+                                        unsigned int flags)
+{
+    int ret = -1;
+
+    virCheckFlags((VIR_DOMAIN_DEVICE_MODIFY_CONFIG |
+                   VIR_DOMAIN_DEVICE_MODIFY_LIVE), -1);
 
-    return qemudDomainDetachDevice(dom, xml);
+    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG)
+        ret = qemuDomainModifyDevicePersistent(dom, xml, 0, flags);
+    else if (flags & VIR_DOMAIN_DEVICE_MODIFY_LIVE)
+        ret = qemudDomainDetachDevice(dom, xml);
+
+    return ret;
 }
 
 static int qemudDomainGetAutostart(virDomainPtr dom,
-- 
1.7.4.1


--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list


[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]