2 * Copyright (C) 2009 Red Hat Inc.
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
21 #define _BSD_SOURCE /* for mkdtemp, usleep */
22 #define _GNU_SOURCE /* for vasprintf, GNU strerror_r, strchrnul */
34 #include <sys/select.h>
37 #include <rpc/types.h>
44 #ifdef HAVE_SYS_TYPES_H
45 #include <sys/types.h>
48 #ifdef HAVE_SYS_WAIT_H
52 #ifdef HAVE_SYS_SOCKET_H
53 #include <sys/socket.h>
61 #include "guestfs_protocol.h"
62 #include "ignore-value.h"
66 #define _(str) dgettext(PACKAGE, (str))
67 //#define N_(str) dgettext(PACKAGE, (str))
73 #define error guestfs_error
74 #define perrorf guestfs_perrorf
75 #define safe_malloc guestfs_safe_malloc
76 #define safe_realloc guestfs_safe_realloc
77 #define safe_strdup guestfs_safe_strdup
78 //#define safe_memdup guestfs_safe_memdup
80 static void default_error_cb (guestfs_h *g, void *data, const char *msg);
81 static void stdout_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
82 static void sock_read_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
83 static void sock_write_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
85 static void close_handles (void);
87 static int select_add_handle (guestfs_main_loop *ml, guestfs_h *g, int fd, int events, guestfs_handle_event_cb cb, void *data);
88 static int select_remove_handle (guestfs_main_loop *ml, guestfs_h *g, int watch);
89 static int select_add_timeout (guestfs_main_loop *ml, guestfs_h *g, int interval, guestfs_handle_timeout_cb cb, void *data);
90 static int select_remove_timeout (guestfs_main_loop *ml, guestfs_h *g, int timer);
91 static int select_main_loop_run (guestfs_main_loop *ml, guestfs_h *g);
92 static int select_main_loop_quit (guestfs_main_loop *ml, guestfs_h *g);
94 /* Default select-based main loop. */
95 struct select_handle_cb_data {
96 guestfs_handle_event_cb cb;
101 struct select_main_loop {
102 /* NB. These fields must be the same as in struct guestfs_main_loop: */
103 guestfs_add_handle_cb add_handle;
104 guestfs_remove_handle_cb remove_handle;
105 guestfs_add_timeout_cb add_timeout;
106 guestfs_remove_timeout_cb remove_timeout;
107 guestfs_main_loop_run_cb main_loop_run;
108 guestfs_main_loop_quit_cb main_loop_quit;
110 /* Additional private data: */
119 struct select_handle_cb_data *handle_cb_data;
122 /* Default main loop. */
123 static struct select_main_loop default_main_loop = {
124 .add_handle = select_add_handle,
125 .remove_handle = select_remove_handle,
126 .add_timeout = select_add_timeout,
127 .remove_timeout = select_remove_timeout,
128 .main_loop_run = select_main_loop_run,
129 .main_loop_quit = select_main_loop_quit,
131 /* XXX hopefully .rset, .wset, .xset are initialized to the empty
132 * set by the normal action of everything being initialized to zero.
137 .handle_cb_data = NULL,
140 #define UNIX_PATH_MAX 108
142 /* Also in guestfsd.c */
143 #define VMCHANNEL_PORT 6666
144 #define VMCHANNEL_ADDR "10.0.2.4"
146 /* GuestFS handle and connection. */
147 enum state { CONFIG, LAUNCHING, READY, BUSY, NO_HANDLE };
151 struct guestfs_h *next; /* Linked list of open handles. */
153 /* State: see the state machine diagram in the man page guestfs(3). */
156 int fd[2]; /* Stdin/stdout of qemu. */
157 int sock; /* Daemon communications socket. */
158 pid_t pid; /* Qemu PID. */
159 pid_t recoverypid; /* Recovery process PID. */
160 time_t start_t; /* The time when we started qemu. */
162 int stdout_watch; /* Watches qemu stdout for log messages. */
163 int sock_watch; /* Watches daemon comm socket. */
165 char *tmpdir; /* Temporary directory containing socket. */
167 char *qemu_help, *qemu_version; /* Output of qemu -help, qemu -version. */
169 char **cmdline; /* Qemu command line. */
175 char *path; /* Path to kernel, initrd. */
176 char *qemu; /* Qemu binary. */
177 char *append; /* Append to kernel command line. */
179 int memsize; /* Size of RAM (megabytes). */
181 int selinux; /* selinux enabled? */
186 guestfs_abort_cb abort_cb;
187 guestfs_error_handler_cb error_cb;
188 void * error_cb_data;
189 guestfs_send_cb send_cb;
191 guestfs_reply_cb reply_cb;
192 void * reply_cb_data;
193 guestfs_log_message_cb log_message_cb;
194 void * log_message_cb_data;
195 guestfs_subprocess_quit_cb subprocess_quit_cb;
196 void * subprocess_quit_cb_data;
197 guestfs_launch_done_cb launch_done_cb;
198 void * launch_done_cb_data;
200 /* Main loop used by this handle. */
201 guestfs_main_loop *main_loop;
203 /* Messages sent and received from the daemon. */
205 unsigned int msg_in_size, msg_in_allocated;
207 unsigned int msg_out_size, msg_out_pos;
212 static guestfs_h *handles = NULL;
213 static int atexit_handler_set = 0;
216 guestfs_create (void)
221 g = malloc (sizeof (*g));
224 memset (g, 0, sizeof (*g));
231 g->stdout_watch = -1;
235 g->error_cb = default_error_cb;
236 g->error_cb_data = NULL;
238 str = getenv ("LIBGUESTFS_DEBUG");
239 g->verbose = str != NULL && strcmp (str, "1") == 0;
241 str = getenv ("LIBGUESTFS_PATH");
242 g->path = str != NULL ? strdup (str) : strdup (GUESTFS_DEFAULT_PATH);
243 if (!g->path) goto error;
245 str = getenv ("LIBGUESTFS_QEMU");
246 g->qemu = str != NULL ? strdup (str) : strdup (QEMU);
247 if (!g->qemu) goto error;
249 str = getenv ("LIBGUESTFS_APPEND");
251 g->append = strdup (str);
252 if (!g->append) goto error;
255 /* Choose a suitable memory size. Previously we tried to choose
256 * a minimal memory size, but this isn't really necessary since
257 * recent QEMU and KVM don't do anything nasty like locking
258 * memory into core any more. Thus we can safely choose a
259 * large, generous amount of memory, and it'll just get swapped
260 * on smaller systems.
262 str = getenv ("LIBGUESTFS_MEMSIZE");
264 if (sscanf (str, "%d", &g->memsize) != 1 || g->memsize <= 256) {
265 fprintf (stderr, "libguestfs: non-numeric or too small value for LIBGUESTFS_MEMSIZE\n");
271 g->main_loop = guestfs_get_default_main_loop ();
273 /* Start with large serial numbers so they are easy to spot
274 * inside the protocol.
276 g->msg_next_serial = 0x00123400;
278 /* Link the handles onto a global list. This is the one area
279 * where the library needs to be made thread-safe. (XXX)
281 /* acquire mutex (XXX) */
284 if (!atexit_handler_set) {
285 atexit (close_handles);
286 atexit_handler_set = 1;
288 /* release mutex (XXX) */
291 fprintf (stderr, "new guestfs handle %p\n", g);
304 guestfs_close (guestfs_h *g)
310 if (g->state == NO_HANDLE) {
311 /* Not safe to call 'error' here, so ... */
312 fprintf (stderr, _("guestfs_close: called twice on the same handle\n"));
317 fprintf (stderr, "closing guestfs handle %p (state %d)\n", g, g->state);
319 /* Try to sync if autosync flag is set. */
320 if (g->autosync && g->state == READY) {
321 guestfs_umount_all (g);
325 /* Remove any handlers that might be called back before we kill the
328 g->log_message_cb = NULL;
330 if (g->state != CONFIG)
331 guestfs_kill_subprocess (g);
333 /* Close any sockets and deregister any handlers. */
334 if (g->stdout_watch >= 0)
335 g->main_loop->remove_handle (g->main_loop, g, g->stdout_watch);
336 if (g->sock_watch >= 0)
337 g->main_loop->remove_handle (g->main_loop, g, g->sock_watch);
338 g->stdout_watch = -1;
351 /* Remove tmpfiles. */
353 snprintf (filename, sizeof filename, "%s/sock", g->tmpdir);
356 snprintf (filename, sizeof filename, "%s/initrd", g->tmpdir);
359 snprintf (filename, sizeof filename, "%s/kernel", g->tmpdir);
368 for (i = 0; i < g->cmdline_size; ++i)
369 free (g->cmdline[i]);
373 /* Mark the handle as dead before freeing it. */
374 g->state = NO_HANDLE;
376 /* acquire mutex (XXX) */
380 for (gg = handles; gg->next != g; gg = gg->next)
384 /* release mutex (XXX) */
388 free (g->last_error);
393 free (g->qemu_version);
397 /* Close all open handles (called from atexit(3)). */
401 while (handles) guestfs_close (handles);
405 guestfs_last_error (guestfs_h *g)
407 return g->last_error;
411 set_last_error (guestfs_h *g, const char *msg)
413 free (g->last_error);
414 g->last_error = strdup (msg);
418 default_error_cb (guestfs_h *g, void *data, const char *msg)
420 fprintf (stderr, _("libguestfs: error: %s\n"), msg);
424 guestfs_error (guestfs_h *g, const char *fs, ...)
430 int err = vasprintf (&msg, fs, args);
435 if (g->error_cb) g->error_cb (g, g->error_cb_data, msg);
436 set_last_error (g, msg);
442 guestfs_perrorf (guestfs_h *g, const char *fs, ...)
449 int err = vasprintf (&msg, fs, args);
456 strerror_r (errnum, buf, sizeof buf);
460 buf = strerror_r (errnum, _buf, sizeof _buf);
463 msg = safe_realloc (g, msg, strlen (msg) + 2 + strlen (buf) + 1);
467 if (g->error_cb) g->error_cb (g, g->error_cb_data, msg);
468 set_last_error (g, msg);
474 guestfs_safe_malloc (guestfs_h *g, size_t nbytes)
476 void *ptr = malloc (nbytes);
477 if (nbytes > 0 && !ptr) g->abort_cb ();
481 /* Return 1 if an array of N objects, each of size S, cannot exist due
482 to size arithmetic overflow. S must be positive and N must be
483 nonnegative. This is a macro, not an inline function, so that it
484 works correctly even when SIZE_MAX < N.
486 By gnulib convention, SIZE_MAX represents overflow in size
487 calculations, so the conservative dividend to use here is
488 SIZE_MAX - 1, since SIZE_MAX might represent an overflowed value.
489 However, malloc (SIZE_MAX) fails on all known hosts where
490 sizeof (ptrdiff_t) <= sizeof (size_t), so do not bother to test for
491 exactly-SIZE_MAX allocations on such hosts; this avoids a test and
492 branch when S is known to be 1. */
493 # define xalloc_oversized(n, s) \
494 ((size_t) (sizeof (ptrdiff_t) <= sizeof (size_t) ? -1 : -2) / (s) < (n))
496 /* Technically we should add an autoconf test for this, testing for the desired
497 functionality, like what's done in gnulib, but for now, this is fine. */
498 #define HAVE_GNU_CALLOC (__GLIBC__ >= 2)
500 /* Allocate zeroed memory for N elements of S bytes, with error
501 checking. S must be nonzero. */
503 guestfs_safe_calloc (guestfs_h *g, size_t n, size_t s)
505 /* From gnulib's calloc function in xmalloc.c. */
507 /* Test for overflow, since some calloc implementations don't have
508 proper overflow checks. But omit overflow and size-zero tests if
509 HAVE_GNU_CALLOC, since GNU calloc catches overflow and never
510 returns NULL if successful. */
511 if ((! HAVE_GNU_CALLOC && xalloc_oversized (n, s))
512 || (! (p = calloc (n, s)) && (HAVE_GNU_CALLOC || n != 0)))
518 guestfs_safe_realloc (guestfs_h *g, void *ptr, int nbytes)
520 void *p = realloc (ptr, nbytes);
521 if (nbytes > 0 && !p) g->abort_cb ();
526 guestfs_safe_strdup (guestfs_h *g, const char *str)
528 char *s = strdup (str);
529 if (!s) g->abort_cb ();
534 guestfs_safe_memdup (guestfs_h *g, void *ptr, size_t size)
536 void *p = malloc (size);
537 if (!p) g->abort_cb ();
538 memcpy (p, ptr, size);
543 xwrite (int fd, const void *v_buf, size_t len)
545 const char *buf = v_buf;
549 r = write (fd, buf, len);
561 xread (int fd, void *v_buf, size_t len)
567 r = read (fd, buf, len);
569 if (errno == EINTR || errno == EAGAIN)
582 guestfs_set_out_of_memory_handler (guestfs_h *g, guestfs_abort_cb cb)
588 guestfs_get_out_of_memory_handler (guestfs_h *g)
594 guestfs_set_error_handler (guestfs_h *g, guestfs_error_handler_cb cb, void *data)
597 g->error_cb_data = data;
600 guestfs_error_handler_cb
601 guestfs_get_error_handler (guestfs_h *g, void **data_rtn)
603 if (data_rtn) *data_rtn = g->error_cb_data;
608 guestfs_set_verbose (guestfs_h *g, int v)
615 guestfs_get_verbose (guestfs_h *g)
621 guestfs_set_autosync (guestfs_h *g, int a)
628 guestfs_get_autosync (guestfs_h *g)
634 guestfs_set_path (guestfs_h *g, const char *path)
641 safe_strdup (g, GUESTFS_DEFAULT_PATH) : safe_strdup (g, path);
646 guestfs_get_path (guestfs_h *g)
652 guestfs_set_qemu (guestfs_h *g, const char *qemu)
657 g->qemu = qemu == NULL ? safe_strdup (g, QEMU) : safe_strdup (g, qemu);
662 guestfs_get_qemu (guestfs_h *g)
668 guestfs_set_append (guestfs_h *g, const char *append)
673 g->append = append ? safe_strdup (g, append) : NULL;
678 guestfs_get_append (guestfs_h *g)
684 guestfs_set_memsize (guestfs_h *g, int memsize)
686 g->memsize = memsize;
691 guestfs_get_memsize (guestfs_h *g)
697 guestfs_set_selinux (guestfs_h *g, int selinux)
699 g->selinux = selinux;
704 guestfs_get_selinux (guestfs_h *g)
710 guestfs_get_pid (guestfs_h *g)
715 error (g, "get_pid: no qemu subprocess");
720 struct guestfs_version *
721 guestfs_version (guestfs_h *g)
723 struct guestfs_version *r;
725 r = safe_malloc (g, sizeof *r);
726 r->major = PACKAGE_VERSION_MAJOR;
727 r->minor = PACKAGE_VERSION_MINOR;
728 r->release = PACKAGE_VERSION_RELEASE;
729 r->extra = safe_strdup (g, PACKAGE_VERSION_EXTRA);
733 /* Add a string to the current command line. */
735 incr_cmdline_size (guestfs_h *g)
737 if (g->cmdline == NULL) {
738 /* g->cmdline[0] is reserved for argv[0], set in guestfs_launch. */
740 g->cmdline = safe_malloc (g, sizeof (char *));
741 g->cmdline[0] = NULL;
745 g->cmdline = safe_realloc (g, g->cmdline, sizeof (char *) * g->cmdline_size);
749 add_cmdline (guestfs_h *g, const char *str)
751 if (g->state != CONFIG) {
753 _("command line cannot be altered after qemu subprocess launched"));
757 incr_cmdline_size (g);
758 g->cmdline[g->cmdline_size-1] = safe_strdup (g, str);
763 guestfs_config (guestfs_h *g,
764 const char *qemu_param, const char *qemu_value)
766 if (qemu_param[0] != '-') {
767 error (g, _("guestfs_config: parameter must begin with '-' character"));
771 /* A bit fascist, but the user will probably break the extra
772 * parameters that we add if they try to set any of these.
774 if (strcmp (qemu_param, "-kernel") == 0 ||
775 strcmp (qemu_param, "-initrd") == 0 ||
776 strcmp (qemu_param, "-nographic") == 0 ||
777 strcmp (qemu_param, "-serial") == 0 ||
778 strcmp (qemu_param, "-full-screen") == 0 ||
779 strcmp (qemu_param, "-std-vga") == 0 ||
780 strcmp (qemu_param, "-vnc") == 0) {
781 error (g, _("guestfs_config: parameter '%s' isn't allowed"), qemu_param);
785 if (add_cmdline (g, qemu_param) != 0) return -1;
787 if (qemu_value != NULL) {
788 if (add_cmdline (g, qemu_value) != 0) return -1;
795 guestfs_add_drive (guestfs_h *g, const char *filename)
797 size_t len = strlen (filename) + 64;
800 if (strchr (filename, ',') != NULL) {
801 error (g, _("filename cannot contain ',' (comma) character"));
805 /* cache=off improves reliability in the event of a host crash.
807 * However this option causes qemu to try to open the file with
808 * O_DIRECT. This fails on some filesystem types (notably tmpfs).
809 * So we check if we can open the file with or without O_DIRECT,
810 * and use cache=off (or not) accordingly.
812 * This test also checks for the presence of the file, which
813 * is a documented semantic of this interface.
815 int fd = open (filename, O_RDONLY|O_DIRECT);
818 snprintf (buf, len, "file=%s,cache=off,if=" DRIVE_IF, filename);
820 fd = open (filename, O_RDONLY);
823 snprintf (buf, len, "file=%s,if=" DRIVE_IF, filename);
825 perrorf (g, "%s", filename);
830 return guestfs_config (g, "-drive", buf);
834 guestfs_add_drive_ro (guestfs_h *g, const char *filename)
836 size_t len = strlen (filename) + 64;
839 if (strchr (filename, ',') != NULL) {
840 error (g, _("filename cannot contain ',' (comma) character"));
844 if (access (filename, F_OK) == -1) {
845 perrorf (g, "%s", filename);
849 snprintf (buf, len, "file=%s,snapshot=on,if=%s", filename, DRIVE_IF);
851 return guestfs_config (g, "-drive", buf);
855 guestfs_add_cdrom (guestfs_h *g, const char *filename)
857 if (strchr (filename, ',') != NULL) {
858 error (g, _("filename cannot contain ',' (comma) character"));
862 if (access (filename, F_OK) == -1) {
863 perrorf (g, "%s", filename);
867 return guestfs_config (g, "-cdrom", filename);
870 /* Returns true iff file is contained in dir. */
872 dir_contains_file (const char *dir, const char *file)
874 int dirlen = strlen (dir);
875 int filelen = strlen (file);
876 int len = dirlen+filelen+2;
879 snprintf (path, len, "%s/%s", dir, file);
880 return access (path, F_OK) == 0;
883 /* Returns true iff every listed file is contained in 'dir'. */
885 dir_contains_files (const char *dir, ...)
890 va_start (args, dir);
891 while ((file = va_arg (args, const char *)) != NULL) {
892 if (!dir_contains_file (dir, file)) {
901 static int build_supermin_appliance (guestfs_h *g, const char *path, char **kernel, char **initrd);
902 static int test_qemu (guestfs_h *g);
903 static int qemu_supports (guestfs_h *g, const char *option);
904 static void print_cmdline (guestfs_h *g);
906 static const char *kernel_name = "vmlinuz." REPO "." host_cpu;
907 static const char *initrd_name = "initramfs." REPO "." host_cpu ".img";
908 static const char *supermin_name =
909 "initramfs." REPO "." host_cpu ".supermin.img";
910 static const char *supermin_hostfiles_name =
911 "initramfs." REPO "." host_cpu ".supermin.hostfiles";
914 guestfs_launch (guestfs_h *g)
917 char dir_template[PATH_MAX];
922 char *path, *pelem, *pend;
923 char *kernel = NULL, *initrd = NULL;
925 struct sockaddr_un addr;
933 tmpdir = getenv ("TMPDIR") ? : tmpdir;
934 snprintf (dir_template, sizeof dir_template, "%s/libguestfsXXXXXX", tmpdir);
938 error (g, _("you must call guestfs_add_drive before guestfs_launch"));
942 if (g->state != CONFIG) {
943 error (g, _("qemu has already been launched"));
947 /* Make the temporary directory. */
949 g->tmpdir = safe_strdup (g, dir_template);
950 if (mkdtemp (g->tmpdir) == NULL) {
951 perrorf (g, _("%s: cannot create temporary directory"), dir_template);
956 /* First search g->path for the supermin appliance, and try to
957 * synthesize a kernel and initrd from that. If it fails, we
958 * try the path search again looking for a backup ordinary
961 pelem = path = safe_strdup (g, g->path);
963 pend = strchrnul (pelem, ':');
964 pmore = *pend == ':';
968 /* Empty element of "." means cwd. */
969 if (len == 0 || (len == 1 && *pelem == '.')) {
972 "looking for supermin appliance in current directory\n");
973 if (dir_contains_files (".",
974 supermin_name, supermin_hostfiles_name,
975 "kmod.whitelist", NULL)) {
976 if (build_supermin_appliance (g, ".", &kernel, &initrd) == -1)
981 /* Look at <path>/supermin* etc. */
984 fprintf (stderr, "looking for supermin appliance in %s\n", pelem);
986 if (dir_contains_files (pelem,
987 supermin_name, supermin_hostfiles_name,
988 "kmod.whitelist", NULL)) {
989 if (build_supermin_appliance (g, pelem, &kernel, &initrd) == -1)
1000 if (kernel == NULL || initrd == NULL) {
1001 /* Search g->path for the kernel and initrd. */
1002 pelem = path = safe_strdup (g, g->path);
1004 pend = strchrnul (pelem, ':');
1005 pmore = *pend == ':';
1009 /* Empty element or "." means cwd. */
1010 if (len == 0 || (len == 1 && *pelem == '.')) {
1013 "looking for appliance in current directory\n");
1014 if (dir_contains_files (".", kernel_name, initrd_name, NULL)) {
1015 kernel = safe_strdup (g, kernel_name);
1016 initrd = safe_strdup (g, initrd_name);
1020 /* Look at <path>/kernel etc. */
1023 fprintf (stderr, "looking for appliance in %s\n", pelem);
1025 if (dir_contains_files (pelem, kernel_name, initrd_name, NULL)) {
1026 kernel = safe_malloc (g, len + strlen (kernel_name) + 2);
1027 initrd = safe_malloc (g, len + strlen (initrd_name) + 2);
1028 sprintf (kernel, "%s/%s", pelem, kernel_name);
1029 sprintf (initrd, "%s/%s", pelem, initrd_name);
1040 if (kernel == NULL || initrd == NULL) {
1041 error (g, _("cannot find %s or %s on LIBGUESTFS_PATH (current path = %s)"),
1042 kernel_name, initrd_name, g->path);
1046 /* Get qemu help text and version. */
1047 if (test_qemu (g) == -1)
1050 /* Make the vmchannel socket. */
1051 snprintf (unixsock, sizeof unixsock, "%s/sock", g->tmpdir);
1054 if (pipe (wfd) == -1 || pipe (rfd) == -1) {
1055 perrorf (g, "pipe");
1061 perrorf (g, "fork");
1069 if (r == 0) { /* Child (qemu). */
1070 char vmchannel[256];
1072 char memsize_str[256];
1074 /* Set up the full command line. Do this in the subprocess so we
1075 * don't need to worry about cleaning up.
1077 g->cmdline[0] = g->qemu;
1079 #define LINUX_CMDLINE \
1080 "panic=1 " /* force kernel to panic if daemon exits */ \
1081 "console=ttyS0 " /* serial console */ \
1082 "udevtimeout=300 " /* good for very slow systems (RHBZ#480319) */ \
1083 "noapic " /* workaround for RHBZ#502058 - ok if not SMP */ \
1084 "acpi=off " /* we don't need ACPI, turn it off */ \
1085 "cgroup_disable=memory " /* saves us about 5 MB of RAM */
1087 /* Linux kernel command line. */
1088 snprintf (append, sizeof append,
1091 "%s" /* (selinux) */
1092 "%s" /* (verbose) */
1093 "%s", /* (append) */
1094 VMCHANNEL_ADDR, VMCHANNEL_PORT,
1095 g->selinux ? "selinux=1 enforcing=0 " : "selinux=0 ",
1096 g->verbose ? "guestfs_verbose=1 " : " ",
1097 g->append ? g->append : "");
1099 snprintf (memsize_str, sizeof memsize_str, "%d", g->memsize);
1101 add_cmdline (g, "-m");
1102 add_cmdline (g, memsize_str);
1103 add_cmdline (g, "-no-reboot"); /* Force exit instead of reboot on panic */
1104 add_cmdline (g, "-kernel");
1105 add_cmdline (g, (char *) kernel);
1106 add_cmdline (g, "-initrd");
1107 add_cmdline (g, (char *) initrd);
1108 add_cmdline (g, "-append");
1109 add_cmdline (g, append);
1110 add_cmdline (g, "-nographic");
1111 add_cmdline (g, "-serial");
1112 add_cmdline (g, "stdio");
1115 /* Doesn't work. See:
1116 * http://lists.gnu.org/archive/html/qemu-devel/2009-07/threads.html
1117 * Subject "guestfwd option doesn't allow supplementary ,server,nowait"
1119 if (qemu_supports (g, "guestfwd")) {
1120 /* New-style -net user,guestfwd=... syntax for vmchannel. See:
1121 * http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=c92ef6a22d3c71538fcc48fb61ad353f7ba03b62
1123 snprintf (vmchannel, sizeof vmchannel,
1124 "user,vlan=0,net=10.0.2.0/8,guestfwd=tcp:%s:%d-unix:%s,server,nowait",
1125 VMCHANNEL_ADDR, VMCHANNEL_PORT, unixsock);
1127 add_cmdline (g, "-net");
1128 add_cmdline (g, vmchannel);
1131 /* Not guestfwd. HOPEFULLY this qemu uses the older -net channel
1132 * syntax, or if not then we'll get a quick failure.
1134 snprintf (vmchannel, sizeof vmchannel,
1135 "channel,%d:unix:%s,server,nowait",
1136 VMCHANNEL_PORT, unixsock);
1138 add_cmdline (g, "-net");
1139 add_cmdline (g, vmchannel);
1140 add_cmdline (g, "-net");
1141 add_cmdline (g, "user,vlan=0,net=10.0.2.0/8");
1145 add_cmdline (g, "-net");
1146 add_cmdline (g, "nic,model=" NET_IF ",vlan=0");
1148 /* These options recommended by KVM developers to improve reliability. */
1149 if (qemu_supports (g, "-no-hpet"))
1150 add_cmdline (g, "-no-hpet");
1152 if (qemu_supports (g, "-rtc-td-hack"))
1153 add_cmdline (g, "-rtc-td-hack");
1155 /* Finish off the command line. */
1156 incr_cmdline_size (g);
1157 g->cmdline[g->cmdline_size-1] = NULL;
1162 /* Set up stdin, stdout. */
1168 if (dup (wfd[0]) == -1) {
1170 perror ("dup failed");
1173 if (dup (rfd[1]) == -1)
1180 /* Set up a new process group, so we can signal this process
1181 * and all subprocesses (eg. if qemu is really a shell script).
1186 execv (g->qemu, g->cmdline); /* Run qemu. */
1191 /* Parent (library). */
1199 /* Fork the recovery process off which will kill qemu if the parent
1200 * process fails to do so (eg. if the parent segfaults).
1204 pid_t qemu_pid = g->pid;
1205 pid_t parent_pid = getppid ();
1207 /* Writing to argv is hideously complicated and error prone. See:
1208 * http://anoncvs.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/misc/ps_status.c?rev=1.33.2.1;content-type=text%2Fplain
1211 /* Loop around waiting for one or both of the other processes to
1212 * disappear. It's fair to say this is very hairy. The PIDs that
1213 * we are looking at might be reused by another process. We are
1214 * effectively polling. Is the cure worse than the disease?
1217 if (kill (qemu_pid, 0) == -1) /* qemu's gone away, we aren't needed */
1219 if (kill (parent_pid, 0) == -1) {
1220 /* Parent's gone away, qemu still around, so kill qemu. */
1228 /* Don't worry, if the fork failed, this will be -1. The recovery
1229 * process isn't essential.
1233 /* Start the clock ... */
1236 /* Close the other ends of the pipe. */
1240 if (fcntl (wfd[1], F_SETFL, O_NONBLOCK) == -1 ||
1241 fcntl (rfd[0], F_SETFL, O_NONBLOCK) == -1) {
1242 perrorf (g, "fcntl");
1246 g->fd[0] = wfd[1]; /* stdin of child */
1247 g->fd[1] = rfd[0]; /* stdout of child */
1249 /* Open the Unix socket. The vmchannel implementation that got
1250 * merged with qemu sucks in a number of ways. Both ends do
1251 * connect(2), which means that no one knows what, if anything, is
1252 * connected to the other end, or if it becomes disconnected. Even
1253 * worse, we have to wait some indeterminate time for qemu to create
1254 * the socket and connect to it (which happens very early in qemu's
1255 * start-up), so any code that uses vmchannel is inherently racy.
1256 * Hence this silly loop.
1258 g->sock = socket (AF_UNIX, SOCK_STREAM, 0);
1259 if (g->sock == -1) {
1260 perrorf (g, "socket");
1264 if (fcntl (g->sock, F_SETFL, O_NONBLOCK) == -1) {
1265 perrorf (g, "fcntl");
1269 addr.sun_family = AF_UNIX;
1270 strncpy (addr.sun_path, unixsock, UNIX_PATH_MAX);
1271 addr.sun_path[UNIX_PATH_MAX-1] = '\0';
1274 /* Always sleep at least once to give qemu a small chance to start up. */
1277 r = connect (g->sock, (struct sockaddr *) &addr, sizeof addr);
1278 if ((r == -1 && errno == EINPROGRESS) || r == 0)
1281 if (errno != ENOENT)
1282 perrorf (g, "connect");
1287 error (g, _("failed to connect to vmchannel socket"));
1291 /* Watch the file descriptors. */
1294 g->msg_in_size = g->msg_in_allocated = 0;
1298 g->msg_out_size = 0;
1302 g->main_loop->add_handle (g->main_loop, g, g->fd[1],
1303 GUESTFS_HANDLE_READABLE,
1304 stdout_event, NULL);
1305 if (g->stdout_watch == -1) {
1306 error (g, _("could not watch qemu stdout"));
1310 if (guestfs__switch_to_receiving (g) == -1)
1313 g->state = LAUNCHING;
1317 if (g->stdout_watch >= 0)
1318 g->main_loop->remove_handle (g->main_loop, g, g->stdout_watch);
1319 if (g->sock_watch >= 0)
1320 g->main_loop->remove_handle (g->main_loop, g, g->sock_watch);
1329 if (g->recoverypid > 0) kill (g->recoverypid, 9);
1330 waitpid (g->pid, NULL, 0);
1331 if (g->recoverypid > 0) waitpid (g->recoverypid, NULL, 0);
1338 g->stdout_watch = -1;
1347 /* This function is used to print the qemu command line before it gets
1348 * executed, when in verbose mode.
1351 print_cmdline (guestfs_h *g)
1356 while (g->cmdline[i]) {
1357 if (g->cmdline[i][0] == '-') /* -option starts a new line */
1358 fprintf (stderr, " \\\n ");
1360 if (i > 0) fputc (' ', stderr);
1362 /* Does it need shell quoting? This only deals with simple cases. */
1363 needs_quote = strcspn (g->cmdline[i], " ") != strlen (g->cmdline[i]);
1365 if (needs_quote) fputc ('\'', stderr);
1366 fprintf (stderr, "%s", g->cmdline[i]);
1367 if (needs_quote) fputc ('\'', stderr);
1371 fputc ('\n', stderr);
1374 /* This function does the hard work of building the supermin appliance
1375 * on the fly. 'path' is the directory containing the control files.
1376 * 'kernel' and 'initrd' are where we will return the names of the
1377 * kernel and initrd (only initrd is built). The work is done by
1378 * an external script. We just tell it where to put the result.
1381 build_supermin_appliance (guestfs_h *g, const char *path,
1382 char **kernel, char **initrd)
1387 len = strlen (g->tmpdir);
1388 *kernel = safe_malloc (g, len + 8);
1389 snprintf (*kernel, len+8, "%s/kernel", g->tmpdir);
1390 *initrd = safe_malloc (g, len + 8);
1391 snprintf (*initrd, len+8, "%s/initrd", g->tmpdir);
1393 snprintf (cmd, sizeof cmd,
1395 "libguestfs-supermin-helper '%s' %s %s",
1397 path, *kernel, *initrd);
1400 if (r == -1 || WEXITSTATUS(r) != 0) {
1401 error (g, _("external command failed: %s"), cmd);
1404 *kernel = *initrd = NULL;
1411 static int read_all (guestfs_h *g, FILE *fp, char **ret);
1413 /* Test qemu binary (or wrapper) runs, and do 'qemu -help' and
1414 * 'qemu -version' so we know what options this qemu supports and
1418 test_qemu (guestfs_h *g)
1423 free (g->qemu_help);
1424 free (g->qemu_version);
1425 g->qemu_help = NULL;
1426 g->qemu_version = NULL;
1428 snprintf (cmd, sizeof cmd, "'%s' -help", g->qemu);
1430 fp = popen (cmd, "r");
1431 /* qemu -help should always work (qemu -version OTOH wasn't
1432 * supported by qemu 0.9). If this command doesn't work then it
1433 * probably indicates that the qemu binary is missing.
1436 /* XXX This error is never printed, even if the qemu binary
1437 * doesn't exist. Why?
1440 perrorf (g, _("%s: command failed: If qemu is located on a non-standard path, try setting the LIBGUESTFS_QEMU environment variable."), cmd);
1444 if (read_all (g, fp, &g->qemu_help) == -1)
1447 if (pclose (fp) == -1)
1450 snprintf (cmd, sizeof cmd, "'%s' -version 2>/dev/null", g->qemu);
1452 fp = popen (cmd, "r");
1454 /* Intentionally ignore errors. */
1455 read_all (g, fp, &g->qemu_version);
1463 read_all (guestfs_h *g, FILE *fp, char **ret)
1470 *ret = safe_realloc (g, *ret, n + 1);
1475 *ret = safe_realloc (g, *ret, n + BUFSIZ);
1477 r = fread (p, 1, BUFSIZ, fp);
1479 perrorf (g, "read");
1486 /* Test if option is supported by qemu command line (just by grepping
1490 qemu_supports (guestfs_h *g, const char *option)
1492 return g->qemu_help && strstr (g->qemu_help, option) != NULL;
1496 finish_wait_ready (guestfs_h *g, void *vp)
1499 fprintf (stderr, "finish_wait_ready called, %p, vp = %p\n", g, vp);
1502 g->main_loop->main_loop_quit (g->main_loop, g);
1506 guestfs_wait_ready (guestfs_h *g)
1508 int finished = 0, r;
1510 if (g->state == READY) return 0;
1512 if (g->state == BUSY) {
1513 error (g, _("qemu has finished launching already"));
1517 if (g->state != LAUNCHING) {
1518 error (g, _("qemu has not been launched yet"));
1522 g->launch_done_cb = finish_wait_ready;
1523 g->launch_done_cb_data = &finished;
1524 r = g->main_loop->main_loop_run (g->main_loop, g);
1525 g->launch_done_cb = NULL;
1526 g->launch_done_cb_data = NULL;
1528 if (r == -1) return -1;
1530 if (finished != 1) {
1531 error (g, _("guestfs_wait_ready failed, see earlier error messages"));
1535 /* This is possible in some really strange situations, such as
1536 * guestfsd starts up OK but then qemu immediately exits. Check for
1537 * it because the caller is probably expecting to be able to send
1538 * commands after this function returns.
1540 if (g->state != READY) {
1541 error (g, _("qemu launched and contacted daemon, but state != READY"));
1549 guestfs_kill_subprocess (guestfs_h *g)
1551 if (g->state == CONFIG) {
1552 error (g, _("no subprocess to kill"));
1557 fprintf (stderr, "sending SIGTERM to process %d\n", g->pid);
1559 kill (g->pid, SIGTERM);
1560 if (g->recoverypid > 0) kill (g->recoverypid, 9);
1565 /* Access current state. */
1567 guestfs_is_config (guestfs_h *g)
1569 return g->state == CONFIG;
1573 guestfs_is_launching (guestfs_h *g)
1575 return g->state == LAUNCHING;
1579 guestfs_is_ready (guestfs_h *g)
1581 return g->state == READY;
1585 guestfs_is_busy (guestfs_h *g)
1587 return g->state == BUSY;
1591 guestfs_get_state (guestfs_h *g)
1597 guestfs_set_ready (guestfs_h *g)
1599 if (g->state != BUSY) {
1600 error (g, _("guestfs_set_ready: called when in state %d != BUSY"),
1609 guestfs_set_busy (guestfs_h *g)
1611 if (g->state != READY) {
1612 error (g, _("guestfs_set_busy: called when in state %d != READY"),
1621 guestfs_end_busy (guestfs_h *g)
1635 error (g, _("guestfs_end_busy: called when in state %d"), g->state);
1641 /* We don't know if stdout_event or sock_read_event will be the
1642 * first to receive EOF if the qemu process dies. This function
1643 * has the common cleanup code for both.
1646 child_cleanup (guestfs_h *g)
1649 fprintf (stderr, "stdout_event: %p: child process died\n", g);
1650 /*kill (g->pid, SIGTERM);*/
1651 if (g->recoverypid > 0) kill (g->recoverypid, 9);
1652 waitpid (g->pid, NULL, 0);
1653 if (g->recoverypid > 0) waitpid (g->recoverypid, NULL, 0);
1654 if (g->stdout_watch >= 0)
1655 g->main_loop->remove_handle (g->main_loop, g, g->stdout_watch);
1656 if (g->sock_watch >= 0)
1657 g->main_loop->remove_handle (g->main_loop, g, g->sock_watch);
1667 g->stdout_watch = -1;
1670 if (g->subprocess_quit_cb)
1671 g->subprocess_quit_cb (g, g->subprocess_quit_cb_data);
1674 /* This function is called whenever qemu prints something on stdout.
1675 * Qemu's stdout is also connected to the guest's serial console, so
1676 * we see kernel messages here too.
1679 stdout_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1680 int watch, int fd, int events)
1688 "stdout_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1689 g, g->state, fd, events);
1692 if (g->fd[1] != fd) {
1693 error (g, _("stdout_event: internal error: %d != %d"), g->fd[1], fd);
1697 n = read (fd, buf, sizeof buf);
1699 /* Hopefully this indicates the qemu child process has died. */
1705 if (errno != EINTR && errno != EAGAIN)
1706 perrorf (g, "read");
1710 /* In verbose mode, copy all log messages to stderr. */
1712 ignore_value (write (STDERR_FILENO, buf, n));
1714 /* It's an actual log message, send it upwards if anyone is listening. */
1715 if (g->log_message_cb)
1716 g->log_message_cb (g, g->log_message_cb_data, buf, n);
1719 /* The function is called whenever we can read something on the
1720 * guestfsd (daemon inside the guest) communication socket.
1723 sock_read_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1724 int watch, int fd, int events)
1732 "sock_read_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1733 g, g->state, fd, events);
1735 if (g->sock != fd) {
1736 error (g, _("sock_read_event: internal error: %d != %d"), g->sock, fd);
1740 if (g->msg_in_size <= g->msg_in_allocated) {
1741 g->msg_in_allocated += 4096;
1742 g->msg_in = safe_realloc (g, g->msg_in, g->msg_in_allocated);
1744 n = read (g->sock, g->msg_in + g->msg_in_size,
1745 g->msg_in_allocated - g->msg_in_size);
1753 if (errno != EINTR && errno != EAGAIN)
1754 perrorf (g, "read");
1758 g->msg_in_size += n;
1760 /* Have we got enough of a message to be able to process it yet? */
1762 if (g->msg_in_size < 4) return;
1764 xdrmem_create (&xdr, g->msg_in, g->msg_in_size, XDR_DECODE);
1765 if (!xdr_uint32_t (&xdr, &len)) {
1766 error (g, _("can't decode length word"));
1770 /* Length is normally the length of the message, but when guestfsd
1771 * starts up it sends a "magic" value (longer than any possible
1772 * message). Check for this.
1774 if (len == GUESTFS_LAUNCH_FLAG) {
1775 if (g->state != LAUNCHING)
1776 error (g, _("received magic signature from guestfsd, but in state %d"),
1778 else if (g->msg_in_size != 4)
1779 error (g, _("received magic signature from guestfsd, but msg size is %d"),
1783 if (g->launch_done_cb)
1784 g->launch_done_cb (g, g->launch_done_cb_data);
1790 /* This can happen if a cancellation happens right at the end
1791 * of us sending a FileIn parameter to the daemon. Discard. The
1792 * daemon should send us an error message next.
1794 if (len == GUESTFS_CANCEL_FLAG) {
1795 g->msg_in_size -= 4;
1796 memmove (g->msg_in, g->msg_in+4, g->msg_in_size);
1800 /* If this happens, it's pretty bad and we've probably lost
1803 if (len > GUESTFS_MESSAGE_MAX) {
1804 error (g, _("message length (%u) > maximum possible size (%d)"),
1805 len, GUESTFS_MESSAGE_MAX);
1809 if (g->msg_in_size-4 < len) return; /* Need more of this message. */
1811 /* Got the full message, begin processing it. */
1816 for (i = 0; i < g->msg_in_size; i += 16) {
1817 printf ("%04x: ", i);
1818 for (j = i; j < MIN (i+16, g->msg_in_size); ++j)
1819 printf ("%02x ", (unsigned char) g->msg_in[j]);
1820 for (; j < i+16; ++j)
1823 for (j = i; j < MIN (i+16, g->msg_in_size); ++j)
1824 if (isprint (g->msg_in[j]))
1825 printf ("%c", g->msg_in[j]);
1828 for (; j < i+16; ++j)
1835 /* Not in the expected state. */
1836 if (g->state != BUSY)
1837 error (g, _("state %d != BUSY"), g->state);
1839 /* Push the message up to the higher layer. */
1841 g->reply_cb (g, g->reply_cb_data, &xdr);
1843 /* This message (probably) should never be printed. */
1844 fprintf (stderr, "libguesfs: sock_read_event: !!! dropped message !!!\n");
1846 g->msg_in_size -= len + 4;
1847 memmove (g->msg_in, g->msg_in+len+4, g->msg_in_size);
1848 if (g->msg_in_size > 0) goto again;
1851 /* Free the message buffer if it's grown excessively large. */
1852 if (g->msg_in_allocated > 65536) {
1855 g->msg_in_size = g->msg_in_allocated = 0;
1862 /* The function is called whenever we can write something on the
1863 * guestfsd (daemon inside the guest) communication socket.
1866 sock_write_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1867 int watch, int fd, int events)
1873 "sock_write_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1874 g, g->state, fd, events);
1876 if (g->sock != fd) {
1877 error (g, _("sock_write_event: internal error: %d != %d"), g->sock, fd);
1881 if (g->state != BUSY) {
1882 error (g, _("sock_write_event: state %d != BUSY"), g->state);
1887 fprintf (stderr, "sock_write_event: writing %d bytes ...\n",
1888 g->msg_out_size - g->msg_out_pos);
1890 n = write (g->sock, g->msg_out + g->msg_out_pos,
1891 g->msg_out_size - g->msg_out_pos);
1895 perrorf (g, "write");
1896 if (err == EPIPE) /* Disconnected from guest (RHBZ#508713). */
1902 fprintf (stderr, "sock_write_event: wrote %d bytes\n", n);
1904 g->msg_out_pos += n;
1906 /* More to write? */
1907 if (g->msg_out_pos < g->msg_out_size)
1911 fprintf (stderr, "sock_write_event: done writing, calling send_cb\n");
1915 g->msg_out_pos = g->msg_out_size = 0;
1917 /* Done writing, call the higher layer. */
1919 g->send_cb (g, g->send_cb_data);
1923 guestfs_set_send_callback (guestfs_h *g,
1924 guestfs_send_cb cb, void *opaque)
1927 g->send_cb_data = opaque;
1931 guestfs_set_reply_callback (guestfs_h *g,
1932 guestfs_reply_cb cb, void *opaque)
1935 g->reply_cb_data = opaque;
1939 guestfs_set_log_message_callback (guestfs_h *g,
1940 guestfs_log_message_cb cb, void *opaque)
1942 g->log_message_cb = cb;
1943 g->log_message_cb_data = opaque;
1947 guestfs_set_subprocess_quit_callback (guestfs_h *g,
1948 guestfs_subprocess_quit_cb cb, void *opaque)
1950 g->subprocess_quit_cb = cb;
1951 g->subprocess_quit_cb_data = opaque;
1955 guestfs_set_launch_done_callback (guestfs_h *g,
1956 guestfs_launch_done_cb cb, void *opaque)
1958 g->launch_done_cb = cb;
1959 g->launch_done_cb_data = opaque;
1962 /* Access to the handle's main loop and the default main loop. */
1964 guestfs_set_main_loop (guestfs_h *g, guestfs_main_loop *main_loop)
1966 g->main_loop = main_loop;
1970 guestfs_get_main_loop (guestfs_h *g)
1972 return g->main_loop;
1976 guestfs_get_default_main_loop (void)
1978 return (guestfs_main_loop *) &default_main_loop;
1981 /* Change the daemon socket handler so that we are now writing.
1982 * This sets the handle to sock_write_event.
1985 guestfs__switch_to_sending (guestfs_h *g)
1987 if (g->sock_watch >= 0) {
1988 if (g->main_loop->remove_handle (g->main_loop, g, g->sock_watch) == -1) {
1989 error (g, _("remove_handle failed"));
1996 g->main_loop->add_handle (g->main_loop, g, g->sock,
1997 GUESTFS_HANDLE_WRITABLE,
1998 sock_write_event, NULL);
1999 if (g->sock_watch == -1) {
2000 error (g, _("add_handle failed"));
2008 guestfs__switch_to_receiving (guestfs_h *g)
2010 if (g->sock_watch >= 0) {
2011 if (g->main_loop->remove_handle (g->main_loop, g, g->sock_watch) == -1) {
2012 error (g, _("remove_handle failed"));
2019 g->main_loop->add_handle (g->main_loop, g, g->sock,
2020 GUESTFS_HANDLE_READABLE,
2021 sock_read_event, NULL);
2022 if (g->sock_watch == -1) {
2023 error (g, _("add_handle failed"));
2030 /* Dispatch a call (len + header + args) to the remote daemon,
2031 * synchronously (ie. using the guest's main loop to wait until
2032 * it has been sent). Returns -1 for error, or the serial
2033 * number of the message.
2036 send_cb (guestfs_h *g, void *data)
2038 guestfs_main_loop *ml = guestfs_get_main_loop (g);
2041 ml->main_loop_quit (ml, g);
2045 guestfs__send_sync (guestfs_h *g, int proc_nr,
2046 xdrproc_t xdrp, char *args)
2048 struct guestfs_message_header hdr;
2051 int serial = g->msg_next_serial++;
2053 guestfs_main_loop *ml = guestfs_get_main_loop (g);
2055 if (g->state != BUSY) {
2056 error (g, _("guestfs__send_sync: state %d != BUSY"), g->state);
2060 /* This is probably an internal error. Or perhaps we should just
2061 * free the buffer anyway?
2063 if (g->msg_out != NULL) {
2064 error (g, _("guestfs__send_sync: msg_out should be NULL"));
2068 /* We have to allocate this message buffer on the heap because
2069 * it is quite large (although will be mostly unused). We
2070 * can't allocate it on the stack because in some environments
2071 * we have quite limited stack space available, notably when
2072 * running in the JVM.
2074 g->msg_out = safe_malloc (g, GUESTFS_MESSAGE_MAX + 4);
2075 xdrmem_create (&xdr, g->msg_out + 4, GUESTFS_MESSAGE_MAX, XDR_ENCODE);
2077 /* Serialize the header. */
2078 hdr.prog = GUESTFS_PROGRAM;
2079 hdr.vers = GUESTFS_PROTOCOL_VERSION;
2081 hdr.direction = GUESTFS_DIRECTION_CALL;
2082 hdr.serial = serial;
2083 hdr.status = GUESTFS_STATUS_OK;
2085 if (!xdr_guestfs_message_header (&xdr, &hdr)) {
2086 error (g, _("xdr_guestfs_message_header failed"));
2090 /* Serialize the args. If any, because some message types
2091 * have no parameters.
2094 if (!(*xdrp) (&xdr, args)) {
2095 error (g, _("dispatch failed to marshal args"));
2100 /* Get the actual length of the message, resize the buffer to match
2101 * the actual length, and write the length word at the beginning.
2103 len = xdr_getpos (&xdr);
2106 g->msg_out = safe_realloc (g, g->msg_out, len + 4);
2107 g->msg_out_size = len + 4;
2110 xdrmem_create (&xdr, g->msg_out, 4, XDR_ENCODE);
2111 xdr_uint32_t (&xdr, &len);
2113 if (guestfs__switch_to_sending (g) == -1)
2117 guestfs_set_send_callback (g, send_cb, &sent);
2118 if (ml->main_loop_run (ml, g) == -1)
2121 error (g, _("send failed, see earlier error messages"));
2130 g->msg_out_size = 0;
2134 static int cancel = 0; /* XXX Implement file cancellation. */
2135 static int send_file_chunk_sync (guestfs_h *g, int cancel, const char *buf, size_t len);
2136 static int send_file_data_sync (guestfs_h *g, const char *buf, size_t len);
2137 static int send_file_cancellation_sync (guestfs_h *g);
2138 static int send_file_complete_sync (guestfs_h *g);
2140 /* Synchronously send a file.
2144 * -2 daemon cancelled (we must read the error message)
2147 guestfs__send_file_sync (guestfs_h *g, const char *filename)
2149 char buf[GUESTFS_MAX_CHUNK_SIZE];
2152 fd = open (filename, O_RDONLY);
2154 perrorf (g, "open: %s", filename);
2155 send_file_cancellation_sync (g);
2156 /* Daemon sees cancellation and won't reply, so caller can
2162 /* Send file in chunked encoding. */
2164 r = read (fd, buf, sizeof buf);
2165 if (r == -1 && (errno == EINTR || errno == EAGAIN))
2168 err = send_file_data_sync (g, buf, r);
2170 if (err == -2) /* daemon sent cancellation */
2171 send_file_cancellation_sync (g);
2176 if (cancel) { /* cancel from either end */
2177 send_file_cancellation_sync (g);
2182 perrorf (g, "read: %s", filename);
2183 send_file_cancellation_sync (g);
2187 /* End of file, but before we send that, we need to close
2188 * the file and check for errors.
2190 if (close (fd) == -1) {
2191 perrorf (g, "close: %s", filename);
2192 send_file_cancellation_sync (g);
2196 return send_file_complete_sync (g);
2199 /* Send a chunk of file data. */
2201 send_file_data_sync (guestfs_h *g, const char *buf, size_t len)
2203 return send_file_chunk_sync (g, 0, buf, len);
2206 /* Send a cancellation message. */
2208 send_file_cancellation_sync (guestfs_h *g)
2210 return send_file_chunk_sync (g, 1, NULL, 0);
2213 /* Send a file complete chunk. */
2215 send_file_complete_sync (guestfs_h *g)
2218 return send_file_chunk_sync (g, 0, buf, 0);
2221 /* Send a chunk, cancellation or end of file, synchronously (ie. wait
2224 static int check_for_daemon_cancellation (guestfs_h *g);
2227 send_file_chunk_sync (guestfs_h *g, int cancel, const char *buf, size_t buflen)
2231 guestfs_chunk chunk;
2233 guestfs_main_loop *ml = guestfs_get_main_loop (g);
2235 if (g->state != BUSY) {
2236 error (g, _("send_file_chunk_sync: state %d != READY"), g->state);
2240 /* This is probably an internal error. Or perhaps we should just
2241 * free the buffer anyway?
2243 if (g->msg_out != NULL) {
2244 error (g, _("guestfs__send_sync: msg_out should be NULL"));
2248 /* Did the daemon send a cancellation message? */
2249 if (check_for_daemon_cancellation (g)) {
2251 fprintf (stderr, "got daemon cancellation\n");
2255 /* Allocate the chunk buffer. Don't use the stack to avoid
2256 * excessive stack usage and unnecessary copies.
2258 g->msg_out = safe_malloc (g, GUESTFS_MAX_CHUNK_SIZE + 4 + 48);
2259 xdrmem_create (&xdr, g->msg_out + 4, GUESTFS_MAX_CHUNK_SIZE + 48, XDR_ENCODE);
2261 /* Serialize the chunk. */
2262 chunk.cancel = cancel;
2263 chunk.data.data_len = buflen;
2264 chunk.data.data_val = (char *) buf;
2266 if (!xdr_guestfs_chunk (&xdr, &chunk)) {
2267 error (g, _("xdr_guestfs_chunk failed (buf = %p, buflen = %zu)"),
2273 len = xdr_getpos (&xdr);
2276 /* Reduce the size of the outgoing message buffer to the real length. */
2277 g->msg_out = safe_realloc (g, g->msg_out, len + 4);
2278 g->msg_out_size = len + 4;
2281 xdrmem_create (&xdr, g->msg_out, 4, XDR_ENCODE);
2282 xdr_uint32_t (&xdr, &len);
2284 if (guestfs__switch_to_sending (g) == -1)
2288 guestfs_set_send_callback (g, send_cb, &sent);
2289 if (ml->main_loop_run (ml, g) == -1)
2292 error (g, _("send file chunk failed, see earlier error messages"));
2301 g->msg_out_size = 0;
2305 /* At this point we are sending FileIn file(s) to the guest, and not
2306 * expecting to read anything, so if we do read anything, it must be
2307 * a cancellation message. This checks for this case without blocking.
2310 check_for_daemon_cancellation (guestfs_h *g)
2320 FD_SET (g->sock, &rset);
2323 r = select (g->sock+1, &rset, NULL, NULL, &tv);
2325 perrorf (g, "select");
2331 /* Read the message from the daemon. */
2332 r = xread (g->sock, buf, sizeof buf);
2334 perrorf (g, "read");
2338 xdrmem_create (&xdr, buf, sizeof buf, XDR_DECODE);
2339 xdr_uint32_t (&xdr, &flag);
2342 if (flag != GUESTFS_CANCEL_FLAG) {
2343 error (g, _("check_for_daemon_cancellation: read 0x%x from daemon, expected 0x%x\n"),
2344 flag, GUESTFS_CANCEL_FLAG);
2351 /* Synchronously receive a file. */
2353 /* Returns -1 = error, 0 = EOF, 1 = more data */
2354 static int receive_file_data_sync (guestfs_h *g, void **buf, size_t *len);
2357 guestfs__receive_file_sync (guestfs_h *g, const char *filename)
2363 fd = open (filename, O_WRONLY|O_CREAT|O_TRUNC|O_NOCTTY, 0666);
2365 perrorf (g, "open: %s", filename);
2369 /* Receive the file in chunked encoding. */
2370 while ((r = receive_file_data_sync (g, &buf, &len)) >= 0) {
2371 if (xwrite (fd, buf, len) == -1) {
2372 perrorf (g, "%s: write", filename);
2377 if (r == 0) break; /* End of file. */
2381 error (g, _("%s: error in chunked encoding"), filename);
2385 if (close (fd) == -1) {
2386 perrorf (g, "close: %s", filename);
2393 /* Send cancellation message to daemon, then wait until it
2394 * cancels (just throwing away data).
2398 uint32_t flag = GUESTFS_CANCEL_FLAG;
2401 fprintf (stderr, "%s: waiting for daemon to acknowledge cancellation\n",
2404 xdrmem_create (&xdr, fbuf, sizeof fbuf, XDR_ENCODE);
2405 xdr_uint32_t (&xdr, &flag);
2408 if (xwrite (g->sock, fbuf, sizeof fbuf) == -1) {
2409 perrorf (g, _("write to daemon socket"));
2413 while ((r = receive_file_data_sync (g, NULL, NULL)) > 0)
2414 ; /* just discard it */
2419 /* Note that the reply callback can be called multiple times before
2420 * the main loop quits and we get back to the synchronous code. So
2421 * we have to be prepared to save multiple chunks on a list here.
2423 struct receive_file_ctx {
2424 int count; /* 0 if receive_file_cb not called, or
2425 * else count number of chunks.
2427 guestfs_chunk *chunks; /* Array of chunks. */
2431 free_chunks (struct receive_file_ctx *ctx)
2435 for (i = 0; i < ctx->count; ++i)
2436 free (ctx->chunks[i].data.data_val);
2442 receive_file_cb (guestfs_h *g, void *data, XDR *xdr)
2444 guestfs_main_loop *ml = guestfs_get_main_loop (g);
2445 struct receive_file_ctx *ctx = (struct receive_file_ctx *) data;
2446 guestfs_chunk chunk;
2448 if (ctx->count == -1) /* Parse error occurred previously. */
2451 ml->main_loop_quit (ml, g);
2453 memset (&chunk, 0, sizeof chunk);
2455 if (!xdr_guestfs_chunk (xdr, &chunk)) {
2456 error (g, _("failed to parse file chunk"));
2463 /* Copy the chunk to the list. */
2464 ctx->chunks = safe_realloc (g, ctx->chunks,
2465 sizeof (guestfs_chunk) * (ctx->count+1));
2466 ctx->chunks[ctx->count] = chunk;
2470 /* Receive a chunk of file data. */
2471 /* Returns -1 = error, 0 = EOF, 1 = more data */
2473 receive_file_data_sync (guestfs_h *g, void **buf, size_t *len_r)
2475 struct receive_file_ctx ctx;
2476 guestfs_main_loop *ml = guestfs_get_main_loop (g);
2483 guestfs_set_reply_callback (g, receive_file_cb, &ctx);
2484 (void) ml->main_loop_run (ml, g);
2485 guestfs_set_reply_callback (g, NULL, NULL);
2487 if (ctx.count == 0) {
2488 error (g, _("receive_file_data_sync: reply callback not called\n"));
2492 if (ctx.count == -1) {
2493 error (g, _("receive_file_data_sync: parse error in reply callback\n"));
2494 /* callback already freed the chunks */
2499 fprintf (stderr, "receive_file_data_sync: got %d chunks\n", ctx.count);
2501 /* Process each chunk in the list. */
2502 if (buf) *buf = NULL; /* Accumulate data in this buffer. */
2505 for (i = 0; i < ctx.count; ++i) {
2506 if (ctx.chunks[i].cancel) {
2507 error (g, _("file receive cancelled by daemon"));
2509 if (buf) free (*buf);
2510 if (len_r) *len_r = 0;
2514 if (ctx.chunks[i].data.data_len == 0) { /* end of transfer */
2516 if (len_r) *len_r = len;
2521 *buf = safe_realloc (g, *buf, len + ctx.chunks[i].data.data_len);
2522 memcpy (((char *)*buf)+len, ctx.chunks[i].data.data_val,
2523 ctx.chunks[i].data.data_len);
2525 len += ctx.chunks[i].data.data_len;
2528 if (len_r) *len_r = len;
2533 /* This is the default main loop implementation, using select(2). */
2536 select_add_handle (guestfs_main_loop *mlv, guestfs_h *g, int fd, int events,
2537 guestfs_handle_event_cb cb, void *data)
2539 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2541 if (fd < 0 || fd >= FD_SETSIZE) {
2542 error (g, _("fd %d is out of range"), fd);
2546 if ((events & ~(GUESTFS_HANDLE_READABLE |
2547 GUESTFS_HANDLE_WRITABLE |
2548 GUESTFS_HANDLE_HANGUP |
2549 GUESTFS_HANDLE_ERROR)) != 0) {
2550 error (g, _("set of events (0x%x) contains unknown events"), events);
2555 error (g, _("set of events is empty"));
2559 if (FD_ISSET (fd, &ml->rset) ||
2560 FD_ISSET (fd, &ml->wset) ||
2561 FD_ISSET (fd, &ml->xset)) {
2562 error (g, _("fd %d is already registered"), fd);
2567 error (g, _("callback is NULL"));
2571 if ((events & GUESTFS_HANDLE_READABLE))
2572 FD_SET (fd, &ml->rset);
2573 if ((events & GUESTFS_HANDLE_WRITABLE))
2574 FD_SET (fd, &ml->wset);
2575 if ((events & GUESTFS_HANDLE_HANGUP) || (events & GUESTFS_HANDLE_ERROR))
2576 FD_SET (fd, &ml->xset);
2578 if (fd > ml->max_fd) {
2580 ml->handle_cb_data =
2581 safe_realloc (g, ml->handle_cb_data,
2582 sizeof (struct select_handle_cb_data) * (ml->max_fd+1));
2584 ml->handle_cb_data[fd].cb = cb;
2585 ml->handle_cb_data[fd].g = g;
2586 ml->handle_cb_data[fd].data = data;
2590 /* Any integer >= 0 can be the handle, and this is as good as any ... */
2595 select_remove_handle (guestfs_main_loop *mlv, guestfs_h *g, int fd)
2597 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2599 if (fd < 0 || fd >= FD_SETSIZE) {
2600 error (g, _("fd %d is out of range"), fd);
2604 if (!FD_ISSET (fd, &ml->rset) &&
2605 !FD_ISSET (fd, &ml->wset) &&
2606 !FD_ISSET (fd, &ml->xset)) {
2607 error (g, _("fd %d was not registered"), fd);
2611 FD_CLR (fd, &ml->rset);
2612 FD_CLR (fd, &ml->wset);
2613 FD_CLR (fd, &ml->xset);
2615 if (fd == ml->max_fd) {
2617 ml->handle_cb_data =
2618 safe_realloc (g, ml->handle_cb_data,
2619 sizeof (struct select_handle_cb_data) * (ml->max_fd+1));
2628 __attribute__((noreturn))
2629 select_add_timeout (guestfs_main_loop *mlv, guestfs_h *g, int interval,
2630 guestfs_handle_timeout_cb cb, void *data)
2632 //struct select_main_loop *ml = (struct select_main_loop *) mlv;
2634 abort (); /* XXX not implemented yet */
2638 __attribute__((noreturn))
2639 select_remove_timeout (guestfs_main_loop *mlv, guestfs_h *g, int timer)
2641 //struct select_main_loop *ml = (struct select_main_loop *) mlv;
2643 abort (); /* XXX not implemented yet */
2646 /* The 'g' parameter is just used for error reporting. Events
2647 * for multiple handles can be dispatched by running the main
2651 select_main_loop_run (guestfs_main_loop *mlv, guestfs_h *g)
2653 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2655 fd_set rset2, wset2, xset2;
2657 if (ml->is_running) {
2658 error (g, _("select_main_loop_run: this cannot be called recursively"));
2664 while (ml->is_running) {
2665 if (ml->nr_fds == 0)
2671 r = select (ml->max_fd+1, &rset2, &wset2, &xset2, NULL);
2673 if (errno == EINTR || errno == EAGAIN)
2675 perrorf (g, "select");
2680 for (fd = 0; r > 0 && fd <= ml->max_fd; ++fd) {
2682 if (FD_ISSET (fd, &rset2))
2683 events |= GUESTFS_HANDLE_READABLE;
2684 if (FD_ISSET (fd, &wset2))
2685 events |= GUESTFS_HANDLE_WRITABLE;
2686 if (FD_ISSET (fd, &xset2))
2687 events |= GUESTFS_HANDLE_ERROR | GUESTFS_HANDLE_HANGUP;
2690 ml->handle_cb_data[fd].cb ((guestfs_main_loop *) ml,
2691 ml->handle_cb_data[fd].g,
2692 ml->handle_cb_data[fd].data,
2703 select_main_loop_quit (guestfs_main_loop *mlv, guestfs_h *g)
2705 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2707 /* Note that legitimately ml->is_running can be zero when
2708 * this function is called.