2 * Copyright (C) 2009 Red Hat Inc.
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
21 #define _BSD_SOURCE /* for mkdtemp, usleep */
22 #define _GNU_SOURCE /* for vasprintf, GNU strerror_r, strchrnul */
33 #include <sys/select.h>
35 #include <rpc/types.h>
42 #ifdef HAVE_SYS_TYPES_H
43 #include <sys/types.h>
46 #ifdef HAVE_SYS_WAIT_H
50 #ifdef HAVE_SYS_SOCKET_H
51 #include <sys/socket.h>
59 #include "guestfs_protocol.h"
61 #define error guestfs_error
62 #define perrorf guestfs_perrorf
63 #define safe_malloc guestfs_safe_malloc
64 #define safe_realloc guestfs_safe_realloc
65 #define safe_strdup guestfs_safe_strdup
66 #define safe_memdup guestfs_safe_memdup
68 static void default_error_cb (guestfs_h *g, void *data, const char *msg);
69 static void stdout_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
70 static void sock_read_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
71 static void sock_write_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data, int watch, int fd, int events);
73 static void close_handles (void);
75 static int select_add_handle (guestfs_main_loop *ml, guestfs_h *g, int fd, int events, guestfs_handle_event_cb cb, void *data);
76 static int select_remove_handle (guestfs_main_loop *ml, guestfs_h *g, int watch);
77 static int select_add_timeout (guestfs_main_loop *ml, guestfs_h *g, int interval, guestfs_handle_timeout_cb cb, void *data);
78 static int select_remove_timeout (guestfs_main_loop *ml, guestfs_h *g, int timer);
79 static int select_main_loop_run (guestfs_main_loop *ml, guestfs_h *g);
80 static int select_main_loop_quit (guestfs_main_loop *ml, guestfs_h *g);
82 /* Default select-based main loop. */
83 struct select_handle_cb_data {
84 guestfs_handle_event_cb cb;
89 struct select_main_loop {
90 /* NB. These fields must be the same as in struct guestfs_main_loop: */
91 guestfs_add_handle_cb add_handle;
92 guestfs_remove_handle_cb remove_handle;
93 guestfs_add_timeout_cb add_timeout;
94 guestfs_remove_timeout_cb remove_timeout;
95 guestfs_main_loop_run_cb main_loop_run;
96 guestfs_main_loop_quit_cb main_loop_quit;
98 /* Additional private data: */
107 struct select_handle_cb_data *handle_cb_data;
110 /* Default main loop. */
111 static struct select_main_loop default_main_loop = {
112 .add_handle = select_add_handle,
113 .remove_handle = select_remove_handle,
114 .add_timeout = select_add_timeout,
115 .remove_timeout = select_remove_timeout,
116 .main_loop_run = select_main_loop_run,
117 .main_loop_quit = select_main_loop_quit,
119 /* XXX hopefully .rset, .wset, .xset are initialized to the empty
120 * set by the normal action of everything being initialized to zero.
125 .handle_cb_data = NULL,
128 #define UNIX_PATH_MAX 108
130 /* Also in guestfsd.c */
131 #define VMCHANNEL_PORT 6666
132 #define VMCHANNEL_ADDR "10.0.2.4"
134 /* GuestFS handle and connection. */
135 enum state { CONFIG, LAUNCHING, READY, BUSY, NO_HANDLE };
139 struct guestfs_h *next; /* Linked list of open handles. */
141 /* State: see the state machine diagram in the man page guestfs(3). */
144 int fd[2]; /* Stdin/stdout of qemu. */
145 int sock; /* Daemon communications socket. */
146 pid_t pid; /* Qemu PID. */
147 pid_t recoverypid; /* Recovery process PID. */
148 time_t start_t; /* The time when we started qemu. */
150 int stdout_watch; /* Watches qemu stdout for log messages. */
151 int sock_watch; /* Watches daemon comm socket. */
153 char *tmpdir; /* Temporary directory containing socket. */
155 char **cmdline; /* Qemu command line. */
167 guestfs_abort_cb abort_cb;
168 guestfs_error_handler_cb error_cb;
169 void * error_cb_data;
170 guestfs_send_cb send_cb;
172 guestfs_reply_cb reply_cb;
173 void * reply_cb_data;
174 guestfs_log_message_cb log_message_cb;
175 void * log_message_cb_data;
176 guestfs_subprocess_quit_cb subprocess_quit_cb;
177 void * subprocess_quit_cb_data;
178 guestfs_launch_done_cb launch_done_cb;
179 void * launch_done_cb_data;
181 /* Main loop used by this handle. */
182 guestfs_main_loop *main_loop;
184 /* Messages sent and received from the daemon. */
186 int msg_in_size, msg_in_allocated;
188 int msg_out_size, msg_out_pos;
193 static guestfs_h *handles = NULL;
194 static int atexit_handler_set = 0;
197 guestfs_create (void)
202 g = malloc (sizeof (*g));
205 memset (g, 0, sizeof (*g));
212 g->stdout_watch = -1;
216 g->error_cb = default_error_cb;
217 g->error_cb_data = NULL;
219 str = getenv ("LIBGUESTFS_DEBUG");
220 g->verbose = str != NULL && strcmp (str, "1") == 0;
222 str = getenv ("LIBGUESTFS_PATH");
223 g->path = str != NULL ? str : GUESTFS_DEFAULT_PATH;
225 str = getenv ("LIBGUESTFS_QEMU");
226 g->qemu = str != NULL ? str : QEMU;
228 g->main_loop = guestfs_get_default_main_loop ();
230 /* Start with large serial numbers so they are easy to spot
231 * inside the protocol.
233 g->msg_next_serial = 0x00123400;
235 /* Link the handles onto a global list. This is the one area
236 * where the library needs to be made thread-safe. (XXX)
238 /* acquire mutex (XXX) */
241 if (!atexit_handler_set) {
242 atexit (close_handles);
243 atexit_handler_set = 1;
245 /* release mutex (XXX) */
248 fprintf (stderr, "new guestfs handle %p\n", g);
254 guestfs_close (guestfs_h *g)
260 if (g->state == NO_HANDLE) {
261 /* Not safe to call 'error' here, so ... */
262 fprintf (stderr, "guestfs_close: called twice on the same handle\n");
267 fprintf (stderr, "closing guestfs handle %p (state %d)\n", g, g->state);
269 /* Try to sync if autosync flag is set. */
270 if (g->autosync && g->state == READY) {
271 guestfs_umount_all (g);
275 /* Remove any handlers that might be called back before we kill the
278 g->log_message_cb = NULL;
280 if (g->state != CONFIG)
281 guestfs_kill_subprocess (g);
284 snprintf (filename, sizeof filename, "%s/sock", g->tmpdir);
293 for (i = 0; i < g->cmdline_size; ++i)
294 free (g->cmdline[i]);
298 /* Mark the handle as dead before freeing it. */
299 g->state = NO_HANDLE;
301 /* acquire mutex (XXX) */
305 for (gg = handles; gg->next != g; gg = gg->next)
309 /* release mutex (XXX) */
311 free (g->last_error);
315 /* Close all open handles (called from atexit(3)). */
319 while (handles) guestfs_close (handles);
323 guestfs_last_error (guestfs_h *g)
325 return g->last_error;
329 set_last_error (guestfs_h *g, const char *msg)
331 free (g->last_error);
332 g->last_error = strdup (msg);
336 default_error_cb (guestfs_h *g, void *data, const char *msg)
338 fprintf (stderr, "libguestfs: error: %s\n", msg);
342 guestfs_error (guestfs_h *g, const char *fs, ...)
348 vasprintf (&msg, fs, args);
351 if (g->error_cb) g->error_cb (g, g->error_cb_data, msg);
352 set_last_error (g, msg);
358 guestfs_perrorf (guestfs_h *g, const char *fs, ...)
365 vasprintf (&msg, fs, args);
370 strerror_r (err, buf, sizeof buf);
374 buf = strerror_r (err, _buf, sizeof _buf);
377 msg = safe_realloc (g, msg, strlen (msg) + 2 + strlen (buf) + 1);
381 if (g->error_cb) g->error_cb (g, g->error_cb_data, msg);
382 set_last_error (g, msg);
388 guestfs_safe_malloc (guestfs_h *g, size_t nbytes)
390 void *ptr = malloc (nbytes);
391 if (!ptr) g->abort_cb ();
396 guestfs_safe_realloc (guestfs_h *g, void *ptr, int nbytes)
398 void *p = realloc (ptr, nbytes);
399 if (!p) g->abort_cb ();
404 guestfs_safe_strdup (guestfs_h *g, const char *str)
406 char *s = strdup (str);
407 if (!s) g->abort_cb ();
412 guestfs_safe_memdup (guestfs_h *g, void *ptr, size_t size)
414 void *p = malloc (size);
415 if (!p) g->abort_cb ();
416 memcpy (p, ptr, size);
421 xwrite (int fd, const void *buf, size_t len)
426 r = write (fd, buf, len);
438 xread (int fd, void *buf, size_t len)
443 r = read (fd, buf, len);
455 guestfs_set_out_of_memory_handler (guestfs_h *g, guestfs_abort_cb cb)
461 guestfs_get_out_of_memory_handler (guestfs_h *g)
467 guestfs_set_error_handler (guestfs_h *g, guestfs_error_handler_cb cb, void *data)
470 g->error_cb_data = data;
473 guestfs_error_handler_cb
474 guestfs_get_error_handler (guestfs_h *g, void **data_rtn)
476 if (data_rtn) *data_rtn = g->error_cb_data;
481 guestfs_set_verbose (guestfs_h *g, int v)
488 guestfs_get_verbose (guestfs_h *g)
494 guestfs_set_autosync (guestfs_h *g, int a)
501 guestfs_get_autosync (guestfs_h *g)
507 guestfs_set_path (guestfs_h *g, const char *path)
510 g->path = GUESTFS_DEFAULT_PATH;
517 guestfs_get_path (guestfs_h *g)
523 guestfs_set_qemu (guestfs_h *g, const char *qemu)
533 guestfs_get_qemu (guestfs_h *g)
538 /* Add a string to the current command line. */
540 incr_cmdline_size (guestfs_h *g)
542 if (g->cmdline == NULL) {
543 /* g->cmdline[0] is reserved for argv[0], set in guestfs_launch. */
545 g->cmdline = safe_malloc (g, sizeof (char *));
546 g->cmdline[0] = NULL;
550 g->cmdline = safe_realloc (g, g->cmdline, sizeof (char *) * g->cmdline_size);
554 add_cmdline (guestfs_h *g, const char *str)
556 if (g->state != CONFIG) {
557 error (g, "command line cannot be altered after qemu subprocess launched");
561 incr_cmdline_size (g);
562 g->cmdline[g->cmdline_size-1] = safe_strdup (g, str);
567 guestfs_config (guestfs_h *g,
568 const char *qemu_param, const char *qemu_value)
570 if (qemu_param[0] != '-') {
571 error (g, "guestfs_config: parameter must begin with '-' character");
575 /* A bit fascist, but the user will probably break the extra
576 * parameters that we add if they try to set any of these.
578 if (strcmp (qemu_param, "-kernel") == 0 ||
579 strcmp (qemu_param, "-initrd") == 0 ||
580 strcmp (qemu_param, "-nographic") == 0 ||
581 strcmp (qemu_param, "-serial") == 0 ||
582 strcmp (qemu_param, "-vnc") == 0 ||
583 strcmp (qemu_param, "-full-screen") == 0 ||
584 strcmp (qemu_param, "-std-vga") == 0 ||
585 strcmp (qemu_param, "-vnc") == 0) {
586 error (g, "guestfs_config: parameter '%s' isn't allowed", qemu_param);
590 if (add_cmdline (g, qemu_param) != 0) return -1;
592 if (qemu_value != NULL) {
593 if (add_cmdline (g, qemu_value) != 0) return -1;
600 guestfs_add_drive (guestfs_h *g, const char *filename)
602 int len = strlen (filename) + 64;
605 if (strchr (filename, ',') != NULL) {
606 error (g, "filename cannot contain ',' (comma) character");
610 if (access (filename, F_OK) == -1) {
611 perrorf (g, "%s", filename);
615 snprintf (buf, len, "file=%s", filename);
617 return guestfs_config (g, "-drive", buf);
621 guestfs_add_cdrom (guestfs_h *g, const char *filename)
623 if (strchr (filename, ',') != NULL) {
624 error (g, "filename cannot contain ',' (comma) character");
628 if (access (filename, F_OK) == -1) {
629 perrorf (g, "%s", filename);
633 return guestfs_config (g, "-cdrom", filename);
637 guestfs_launch (guestfs_h *g)
639 static const char *dir_template = "/tmp/libguestfsXXXXXX";
640 int r, i, len, pmore, memsize;
643 const char *kernel_name = "vmlinuz." REPO "." host_cpu;
644 const char *initrd_name = "initramfs." REPO "." host_cpu ".img";
645 char *path, *pelem, *pend;
646 char *kernel = NULL, *initrd = NULL;
648 struct sockaddr_un addr;
653 error (g, "you must call guestfs_add_drive before guestfs_launch");
657 if (g->state != CONFIG) {
658 error (g, "qemu has already been launched");
662 /* Search g->path for the kernel and initrd. */
663 pelem = path = safe_strdup (g, g->path);
665 pend = strchrnul (pelem, ':');
666 pmore = *pend == ':';
670 /* Empty element or "." means cwd. */
671 if (len == 0 || (len == 1 && *pelem == '.')) {
674 "looking for kernel and initrd in current directory\n");
675 if (access (kernel_name, F_OK) == 0 && access (initrd_name, F_OK) == 0) {
676 kernel = safe_strdup (g, kernel_name);
677 initrd = safe_strdup (g, initrd_name);
681 /* Look at <path>/kernel etc. */
683 kernel = safe_malloc (g, len + strlen (kernel_name) + 2);
684 initrd = safe_malloc (g, len + strlen (initrd_name) + 2);
685 sprintf (kernel, "%s/%s", pelem, kernel_name);
686 sprintf (initrd, "%s/%s", pelem, initrd_name);
689 fprintf (stderr, "looking for %s and %s\n", kernel, initrd);
691 if (access (kernel, F_OK) == 0 && access (initrd, F_OK) == 0)
695 kernel = initrd = NULL;
703 if (kernel == NULL || initrd == NULL) {
704 error (g, "cannot find %s or %s on LIBGUESTFS_PATH (current path = %s)",
705 kernel_name, initrd_name, g->path);
709 /* Choose a suitable memory size (in MB). This is more art
710 * than science, but you can help by doing
711 * ./configure --enable-debug-command
715 * and seeing how much free memory is left for particular
718 * It's also helpful to report both the compressed and uncompressed
719 * size of the initramfs (ls -lh initramfs*.img; du -sh initramfs).
721 * XXX KVM virtio balloon driver?
723 if (stat (initrd, &statbuf) != -1) {
724 /* Approximate size of the initramfs after it is decompressed
725 * in kernel memory. The compression factor is ~2.5-3.
727 memsize = 3 * statbuf.st_size / 1024 / 1024;
729 /* Approximate size used by the kernel. */
732 /* Want to give userspace some room, so: */
736 /* On 64 bit, assume some overhead. */
743 /* Make the temporary directory containing the socket. */
745 g->tmpdir = safe_strdup (g, dir_template);
746 if (mkdtemp (g->tmpdir) == NULL) {
747 perrorf (g, "%s: cannot create temporary directory", dir_template);
752 snprintf (unixsock, sizeof unixsock, "%s/sock", g->tmpdir);
755 if (pipe (wfd) == -1 || pipe (rfd) == -1) {
770 if (r == 0) { /* Child (qemu). */
773 char memsize_str[256];
775 /* Set up the full command line. Do this in the subprocess so we
776 * don't need to worry about cleaning up.
778 g->cmdline[0] = (char *) g->qemu;
780 /* Construct the -net channel parameter for qemu. */
781 snprintf (vmchannel, sizeof vmchannel,
782 "channel,%d:unix:%s,server,nowait",
783 VMCHANNEL_PORT, unixsock);
785 /* Linux kernel command line. */
786 snprintf (append, sizeof append,
787 "console=ttyS0 guestfs=%s:%d%s",
788 VMCHANNEL_ADDR, VMCHANNEL_PORT,
789 g->verbose ? " guestfs_verbose=1" : "");
791 snprintf (memsize_str, sizeof memsize_str, "%d", memsize);
793 add_cmdline (g, "-m");
794 add_cmdline (g, memsize_str);
796 add_cmdline (g, "-no-kqemu"); /* Avoids a warning. */
798 add_cmdline (g, "-kernel");
799 add_cmdline (g, (char *) kernel);
800 add_cmdline (g, "-initrd");
801 add_cmdline (g, (char *) initrd);
802 add_cmdline (g, "-append");
803 add_cmdline (g, append);
804 add_cmdline (g, "-nographic");
805 add_cmdline (g, "-serial");
806 add_cmdline (g, "stdio");
807 add_cmdline (g, "-net");
808 add_cmdline (g, vmchannel);
809 add_cmdline (g, "-net");
810 add_cmdline (g, "user,vlan=0");
811 add_cmdline (g, "-net");
812 add_cmdline (g, "nic,model=virtio,vlan=0");
813 incr_cmdline_size (g);
814 g->cmdline[g->cmdline_size-1] = NULL;
817 fprintf (stderr, "%s", g->qemu);
818 for (i = 0; g->cmdline[i]; ++i)
819 fprintf (stderr, " %s", g->cmdline[i]);
820 fprintf (stderr, "\n");
823 /* Set up stdin, stdout. */
834 /* Set up a new process group, so we can signal this process
835 * and all subprocesses (eg. if qemu is really a shell script).
840 execv (g->qemu, g->cmdline); /* Run qemu. */
845 /* Parent (library). */
848 /* Fork the recovery process off which will kill qemu if the parent
849 * process fails to do so (eg. if the parent segfaults).
853 pid_t qemu_pid = g->pid;
854 pid_t parent_pid = getppid ();
856 /* Writing to argv is hideously complicated and error prone. See:
857 * http://anoncvs.postgresql.org/cvsweb.cgi/pgsql/src/backend/utils/misc/ps_status.c?rev=1.33.2.1;content-type=text%2Fplain
860 /* Loop around waiting for one or both of the other processes to
861 * disappear. It's fair to say this is very hairy. The PIDs that
862 * we are looking at might be reused by another process. We are
863 * effectively polling. Is the cure worse than the disease?
866 if (kill (qemu_pid, 0) == -1) /* qemu's gone away, we aren't needed */
868 if (kill (parent_pid, 0) == -1) {
869 /* Parent's gone away, qemu still around, so kill qemu. */
877 /* Don't worry, if the fork failed, this will be -1. The recovery
878 * process isn't essential.
882 /* Start the clock ... */
885 /* Close the other ends of the pipe. */
889 if (fcntl (wfd[1], F_SETFL, O_NONBLOCK) == -1 ||
890 fcntl (rfd[0], F_SETFL, O_NONBLOCK) == -1) {
891 perrorf (g, "fcntl");
895 g->fd[0] = wfd[1]; /* stdin of child */
896 g->fd[1] = rfd[0]; /* stdout of child */
898 /* Open the Unix socket. The vmchannel implementation that got
899 * merged with qemu sucks in a number of ways. Both ends do
900 * connect(2), which means that no one knows what, if anything, is
901 * connected to the other end, or if it becomes disconnected. Even
902 * worse, we have to wait some indeterminate time for qemu to create
903 * the socket and connect to it (which happens very early in qemu's
904 * start-up), so any code that uses vmchannel is inherently racy.
905 * Hence this silly loop.
907 g->sock = socket (AF_UNIX, SOCK_STREAM, 0);
909 perrorf (g, "socket");
913 if (fcntl (g->sock, F_SETFL, O_NONBLOCK) == -1) {
914 perrorf (g, "fcntl");
918 addr.sun_family = AF_UNIX;
919 strncpy (addr.sun_path, unixsock, UNIX_PATH_MAX);
920 addr.sun_path[UNIX_PATH_MAX-1] = '\0';
924 /* Always sleep at least once to give qemu a small chance to start up. */
927 r = connect (g->sock, (struct sockaddr *) &addr, sizeof addr);
928 if ((r == -1 && errno == EINPROGRESS) || r == 0)
932 perrorf (g, "connect");
936 error (g, "failed to connect to vmchannel socket");
940 /* Watch the file descriptors. */
943 g->msg_in_size = g->msg_in_allocated = 0;
951 g->main_loop->add_handle (g->main_loop, g, g->fd[1],
952 GUESTFS_HANDLE_READABLE,
954 if (g->stdout_watch == -1) {
955 error (g, "could not watch qemu stdout");
959 if (guestfs__switch_to_receiving (g) == -1)
962 g->state = LAUNCHING;
966 if (g->stdout_watch >= 0)
967 g->main_loop->remove_handle (g->main_loop, g, g->stdout_watch);
968 if (g->sock_watch >= 0)
969 g->main_loop->remove_handle (g->main_loop, g, g->sock_watch);
978 if (g->recoverypid > 0) kill (g->recoverypid, 9);
979 waitpid (g->pid, NULL, 0);
980 if (g->recoverypid > 0) waitpid (g->recoverypid, NULL, 0);
987 g->stdout_watch = -1;
997 finish_wait_ready (guestfs_h *g, void *vp)
1000 fprintf (stderr, "finish_wait_ready called, %p, vp = %p\n", g, vp);
1003 g->main_loop->main_loop_quit (g->main_loop, g);
1007 guestfs_wait_ready (guestfs_h *g)
1009 int finished = 0, r;
1011 if (g->state == READY) return 0;
1013 if (g->state == BUSY) {
1014 error (g, "qemu has finished launching already");
1018 if (g->state != LAUNCHING) {
1019 error (g, "qemu has not been launched yet");
1023 g->launch_done_cb = finish_wait_ready;
1024 g->launch_done_cb_data = &finished;
1025 r = g->main_loop->main_loop_run (g->main_loop, g);
1026 g->launch_done_cb = NULL;
1027 g->launch_done_cb_data = NULL;
1029 if (r == -1) return -1;
1031 if (finished != 1) {
1032 error (g, "guestfs_wait_ready failed, see earlier error messages");
1036 /* This is possible in some really strange situations, such as
1037 * guestfsd starts up OK but then qemu immediately exits. Check for
1038 * it because the caller is probably expecting to be able to send
1039 * commands after this function returns.
1041 if (g->state != READY) {
1042 error (g, "qemu launched and contacted daemon, but state != READY");
1050 guestfs_kill_subprocess (guestfs_h *g)
1052 if (g->state == CONFIG) {
1053 error (g, "no subprocess to kill");
1058 fprintf (stderr, "sending SIGTERM to process %d\n", g->pid);
1060 kill (g->pid, SIGTERM);
1061 if (g->recoverypid > 0) kill (g->recoverypid, 9);
1066 /* Access current state. */
1068 guestfs_is_config (guestfs_h *g)
1070 return g->state == CONFIG;
1074 guestfs_is_launching (guestfs_h *g)
1076 return g->state == LAUNCHING;
1080 guestfs_is_ready (guestfs_h *g)
1082 return g->state == READY;
1086 guestfs_is_busy (guestfs_h *g)
1088 return g->state == BUSY;
1092 guestfs_get_state (guestfs_h *g)
1098 guestfs_set_ready (guestfs_h *g)
1100 if (g->state != BUSY) {
1101 error (g, "guestfs_set_ready: called when in state %d != BUSY", g->state);
1109 guestfs_set_busy (guestfs_h *g)
1111 if (g->state != READY) {
1112 error (g, "guestfs_set_busy: called when in state %d != READY", g->state);
1119 /* Structure-freeing functions. These rely on the fact that the
1120 * structure format is identical to the XDR format. See note in
1124 guestfs_free_int_bool (struct guestfs_int_bool *x)
1130 guestfs_free_lvm_pv_list (struct guestfs_lvm_pv_list *x)
1132 xdr_free ((xdrproc_t) xdr_guestfs_lvm_int_pv_list, (char *) x);
1137 guestfs_free_lvm_vg_list (struct guestfs_lvm_vg_list *x)
1139 xdr_free ((xdrproc_t) xdr_guestfs_lvm_int_vg_list, (char *) x);
1144 guestfs_free_lvm_lv_list (struct guestfs_lvm_lv_list *x)
1146 xdr_free ((xdrproc_t) xdr_guestfs_lvm_int_lv_list, (char *) x);
1150 /* This function is called whenever qemu prints something on stdout.
1151 * Qemu's stdout is also connected to the guest's serial console, so
1152 * we see kernel messages here too.
1155 stdout_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1156 int watch, int fd, int events)
1164 "stdout_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1165 g, g->state, fd, events);
1168 if (g->fd[1] != fd) {
1169 error (g, "stdout_event: internal error: %d != %d", g->fd[1], fd);
1173 n = read (fd, buf, sizeof buf);
1175 /* Hopefully this indicates the qemu child process has died. */
1177 fprintf (stderr, "stdout_event: %p: child process died\n", g);
1178 /*kill (g->pid, SIGTERM);*/
1179 if (g->recoverypid > 0) kill (g->recoverypid, 9);
1180 waitpid (g->pid, NULL, 0);
1181 if (g->recoverypid > 0) waitpid (g->recoverypid, NULL, 0);
1182 if (g->stdout_watch >= 0)
1183 g->main_loop->remove_handle (g->main_loop, g, g->stdout_watch);
1184 if (g->sock_watch >= 0)
1185 g->main_loop->remove_handle (g->main_loop, g, g->sock_watch);
1195 g->stdout_watch = -1;
1198 if (g->subprocess_quit_cb)
1199 g->subprocess_quit_cb (g, g->subprocess_quit_cb_data);
1204 if (errno != EAGAIN)
1205 perrorf (g, "read");
1209 /* In verbose mode, copy all log messages to stderr. */
1213 /* It's an actual log message, send it upwards if anyone is listening. */
1214 if (g->log_message_cb)
1215 g->log_message_cb (g, g->log_message_cb_data, buf, n);
1218 /* The function is called whenever we can read something on the
1219 * guestfsd (daemon inside the guest) communication socket.
1222 sock_read_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1223 int watch, int fd, int events)
1231 "sock_read_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1232 g, g->state, fd, events);
1234 if (g->sock != fd) {
1235 error (g, "sock_read_event: internal error: %d != %d", g->sock, fd);
1239 if (g->msg_in_size <= g->msg_in_allocated) {
1240 g->msg_in_allocated += 4096;
1241 g->msg_in = safe_realloc (g, g->msg_in, g->msg_in_allocated);
1243 n = read (g->sock, g->msg_in + g->msg_in_size,
1244 g->msg_in_allocated - g->msg_in_size);
1246 /* Disconnected? Ignore it because stdout_watch will get called
1247 * and will do the cleanup.
1252 if (errno != EAGAIN)
1253 perrorf (g, "read");
1257 g->msg_in_size += n;
1259 /* Have we got enough of a message to be able to process it yet? */
1261 if (g->msg_in_size < 4) return;
1263 xdrmem_create (&xdr, g->msg_in, g->msg_in_size, XDR_DECODE);
1264 if (!xdr_uint32_t (&xdr, &len)) {
1265 error (g, "can't decode length word");
1269 /* Length is normally the length of the message, but when guestfsd
1270 * starts up it sends a "magic" value (longer than any possible
1271 * message). Check for this.
1273 if (len == GUESTFS_LAUNCH_FLAG) {
1274 if (g->state != LAUNCHING)
1275 error (g, "received magic signature from guestfsd, but in state %d",
1277 else if (g->msg_in_size != 4)
1278 error (g, "received magic signature from guestfsd, but msg size is %d",
1282 if (g->launch_done_cb)
1283 g->launch_done_cb (g, g->launch_done_cb_data);
1289 /* This can happen if a cancellation happens right at the end
1290 * of us sending a FileIn parameter to the daemon. Discard. The
1291 * daemon should send us an error message next.
1293 if (len == GUESTFS_CANCEL_FLAG) {
1294 g->msg_in_size -= 4;
1295 memmove (g->msg_in, g->msg_in+4, g->msg_in_size);
1299 /* If this happens, it's pretty bad and we've probably lost
1302 if (len > GUESTFS_MESSAGE_MAX) {
1303 error (g, "message length (%u) > maximum possible size (%d)",
1304 len, GUESTFS_MESSAGE_MAX);
1308 if (g->msg_in_size-4 < len) return; /* Need more of this message. */
1310 /* Got the full message, begin processing it. */
1315 for (i = 0; i < g->msg_in_size; i += 16) {
1316 printf ("%04x: ", i);
1317 for (j = i; j < MIN (i+16, g->msg_in_size); ++j)
1318 printf ("%02x ", (unsigned char) g->msg_in[j]);
1319 for (; j < i+16; ++j)
1322 for (j = i; j < MIN (i+16, g->msg_in_size); ++j)
1323 if (isprint (g->msg_in[j]))
1324 printf ("%c", g->msg_in[j]);
1327 for (; j < i+16; ++j)
1334 /* Not in the expected state. */
1335 if (g->state != BUSY)
1336 error (g, "state %d != BUSY", g->state);
1338 /* Push the message up to the higher layer. */
1340 g->reply_cb (g, g->reply_cb_data, &xdr);
1342 /* This message (probably) should never be printed. */
1343 fprintf (stderr, "libguesfs: sock_read_event: !!! dropped message !!!\n");
1345 g->msg_in_size -= len + 4;
1346 memmove (g->msg_in, g->msg_in+len+4, g->msg_in_size);
1347 if (g->msg_in_size > 0) goto again;
1350 /* Free the message buffer if it's grown excessively large. */
1351 if (g->msg_in_allocated > 65536) {
1354 g->msg_in_size = g->msg_in_allocated = 0;
1361 /* The function is called whenever we can write something on the
1362 * guestfsd (daemon inside the guest) communication socket.
1365 sock_write_event (struct guestfs_main_loop *ml, guestfs_h *g, void *data,
1366 int watch, int fd, int events)
1372 "sock_write_event: %p g->state = %d, fd = %d, events = 0x%x\n",
1373 g, g->state, fd, events);
1375 if (g->sock != fd) {
1376 error (g, "sock_write_event: internal error: %d != %d", g->sock, fd);
1380 if (g->state != BUSY) {
1381 error (g, "sock_write_event: state %d != BUSY", g->state);
1386 fprintf (stderr, "sock_write_event: writing %d bytes ...\n",
1387 g->msg_out_size - g->msg_out_pos);
1389 n = write (g->sock, g->msg_out + g->msg_out_pos,
1390 g->msg_out_size - g->msg_out_pos);
1392 if (errno != EAGAIN)
1393 perrorf (g, "write");
1398 fprintf (stderr, "sock_write_event: wrote %d bytes\n", n);
1400 g->msg_out_pos += n;
1402 /* More to write? */
1403 if (g->msg_out_pos < g->msg_out_size)
1407 fprintf (stderr, "sock_write_event: done writing, calling send_cb\n");
1411 g->msg_out_pos = g->msg_out_size = 0;
1413 /* Done writing, call the higher layer. */
1415 g->send_cb (g, g->send_cb_data);
1419 guestfs_set_send_callback (guestfs_h *g,
1420 guestfs_send_cb cb, void *opaque)
1423 g->send_cb_data = opaque;
1427 guestfs_set_reply_callback (guestfs_h *g,
1428 guestfs_reply_cb cb, void *opaque)
1431 g->reply_cb_data = opaque;
1435 guestfs_set_log_message_callback (guestfs_h *g,
1436 guestfs_log_message_cb cb, void *opaque)
1438 g->log_message_cb = cb;
1439 g->log_message_cb_data = opaque;
1443 guestfs_set_subprocess_quit_callback (guestfs_h *g,
1444 guestfs_subprocess_quit_cb cb, void *opaque)
1446 g->subprocess_quit_cb = cb;
1447 g->subprocess_quit_cb_data = opaque;
1451 guestfs_set_launch_done_callback (guestfs_h *g,
1452 guestfs_launch_done_cb cb, void *opaque)
1454 g->launch_done_cb = cb;
1455 g->launch_done_cb_data = opaque;
1458 /* Access to the handle's main loop and the default main loop. */
1460 guestfs_set_main_loop (guestfs_h *g, guestfs_main_loop *main_loop)
1462 g->main_loop = main_loop;
1466 guestfs_get_main_loop (guestfs_h *g)
1468 return g->main_loop;
1472 guestfs_get_default_main_loop (void)
1474 return (guestfs_main_loop *) &default_main_loop;
1477 /* Change the daemon socket handler so that we are now writing.
1478 * This sets the handle to sock_write_event.
1481 guestfs__switch_to_sending (guestfs_h *g)
1483 if (g->sock_watch >= 0) {
1484 if (g->main_loop->remove_handle (g->main_loop, g, g->sock_watch) == -1) {
1485 error (g, "remove_handle failed");
1492 g->main_loop->add_handle (g->main_loop, g, g->sock,
1493 GUESTFS_HANDLE_WRITABLE,
1494 sock_write_event, NULL);
1495 if (g->sock_watch == -1) {
1496 error (g, "add_handle failed");
1504 guestfs__switch_to_receiving (guestfs_h *g)
1506 if (g->sock_watch >= 0) {
1507 if (g->main_loop->remove_handle (g->main_loop, g, g->sock_watch) == -1) {
1508 error (g, "remove_handle failed");
1515 g->main_loop->add_handle (g->main_loop, g, g->sock,
1516 GUESTFS_HANDLE_READABLE,
1517 sock_read_event, NULL);
1518 if (g->sock_watch == -1) {
1519 error (g, "add_handle failed");
1526 /* Dispatch a call (len + header + args) to the remote daemon,
1527 * synchronously (ie. using the guest's main loop to wait until
1528 * it has been sent). Returns -1 for error, or the serial
1529 * number of the message.
1532 send_cb (guestfs_h *g, void *data)
1534 guestfs_main_loop *ml = guestfs_get_main_loop (g);
1537 ml->main_loop_quit (ml, g);
1541 guestfs__send_sync (guestfs_h *g, int proc_nr,
1542 xdrproc_t xdrp, char *args)
1544 struct guestfs_message_header hdr;
1547 int serial = g->msg_next_serial++;
1549 guestfs_main_loop *ml = guestfs_get_main_loop (g);
1551 if (g->state != BUSY) {
1552 error (g, "guestfs__send_sync: state %d != BUSY", g->state);
1556 /* This is probably an internal error. Or perhaps we should just
1557 * free the buffer anyway?
1559 if (g->msg_out != NULL) {
1560 error (g, "guestfs__send_sync: msg_out should be NULL");
1564 /* We have to allocate this message buffer on the heap because
1565 * it is quite large (although will be mostly unused). We
1566 * can't allocate it on the stack because in some environments
1567 * we have quite limited stack space available, notably when
1568 * running in the JVM.
1570 g->msg_out = safe_malloc (g, GUESTFS_MESSAGE_MAX + 4);
1571 xdrmem_create (&xdr, g->msg_out + 4, GUESTFS_MESSAGE_MAX, XDR_ENCODE);
1573 /* Serialize the header. */
1574 hdr.prog = GUESTFS_PROGRAM;
1575 hdr.vers = GUESTFS_PROTOCOL_VERSION;
1577 hdr.direction = GUESTFS_DIRECTION_CALL;
1578 hdr.serial = serial;
1579 hdr.status = GUESTFS_STATUS_OK;
1581 if (!xdr_guestfs_message_header (&xdr, &hdr)) {
1582 error (g, "xdr_guestfs_message_header failed");
1586 /* Serialize the args. If any, because some message types
1587 * have no parameters.
1590 if (!(*xdrp) (&xdr, args)) {
1591 error (g, "dispatch failed to marshal args");
1596 /* Get the actual length of the message, resize the buffer to match
1597 * the actual length, and write the length word at the beginning.
1599 len = xdr_getpos (&xdr);
1602 g->msg_out = safe_realloc (g, g->msg_out, len + 4);
1603 g->msg_out_size = len + 4;
1606 xdrmem_create (&xdr, g->msg_out, 4, XDR_ENCODE);
1607 xdr_uint32_t (&xdr, &len);
1609 if (guestfs__switch_to_sending (g) == -1)
1613 guestfs_set_send_callback (g, send_cb, &sent);
1614 if (ml->main_loop_run (ml, g) == -1)
1617 error (g, "send failed, see earlier error messages");
1626 g->msg_out_size = 0;
1630 static int cancel = 0; /* XXX Implement file cancellation. */
1631 static int send_file_chunk_sync (guestfs_h *g, int cancel, const char *buf, size_t len);
1632 static int send_file_data_sync (guestfs_h *g, const char *buf, size_t len);
1633 static int send_file_cancellation_sync (guestfs_h *g);
1634 static int send_file_complete_sync (guestfs_h *g);
1636 /* Synchronously send a file.
1640 * -2 daemon cancelled (we must read the error message)
1643 guestfs__send_file_sync (guestfs_h *g, const char *filename)
1645 char buf[GUESTFS_MAX_CHUNK_SIZE];
1648 fd = open (filename, O_RDONLY);
1650 perrorf (g, "open: %s", filename);
1651 send_file_cancellation_sync (g);
1652 /* Daemon sees cancellation and won't reply, so caller can
1658 /* Send file in chunked encoding. */
1659 while (!cancel && (r = read (fd, buf, sizeof buf)) > 0) {
1660 err = send_file_data_sync (g, buf, r);
1662 if (err == -2) /* daemon sent cancellation */
1663 send_file_cancellation_sync (g);
1668 if (cancel) { /* cancel from either end */
1669 send_file_cancellation_sync (g);
1674 perrorf (g, "read: %s", filename);
1675 send_file_cancellation_sync (g);
1679 /* End of file, but before we send that, we need to close
1680 * the file and check for errors.
1682 if (close (fd) == -1) {
1683 perrorf (g, "close: %s", filename);
1684 send_file_cancellation_sync (g);
1688 return send_file_complete_sync (g);
1691 /* Send a chunk of file data. */
1693 send_file_data_sync (guestfs_h *g, const char *buf, size_t len)
1695 return send_file_chunk_sync (g, 0, buf, len);
1698 /* Send a cancellation message. */
1700 send_file_cancellation_sync (guestfs_h *g)
1702 return send_file_chunk_sync (g, 1, NULL, 0);
1705 /* Send a file complete chunk. */
1707 send_file_complete_sync (guestfs_h *g)
1710 return send_file_chunk_sync (g, 0, buf, 0);
1713 /* Send a chunk, cancellation or end of file, synchronously (ie. wait
1716 static int check_for_daemon_cancellation (guestfs_h *g);
1719 send_file_chunk_sync (guestfs_h *g, int cancel, const char *buf, size_t buflen)
1723 guestfs_chunk chunk;
1725 guestfs_main_loop *ml = guestfs_get_main_loop (g);
1727 if (g->state != BUSY) {
1728 error (g, "send_file_chunk_sync: state %d != READY", g->state);
1732 /* This is probably an internal error. Or perhaps we should just
1733 * free the buffer anyway?
1735 if (g->msg_out != NULL) {
1736 error (g, "guestfs__send_sync: msg_out should be NULL");
1740 /* Did the daemon send a cancellation message? */
1741 if (check_for_daemon_cancellation (g)) {
1743 fprintf (stderr, "got daemon cancellation\n");
1747 /* Allocate the chunk buffer. Don't use the stack to avoid
1748 * excessive stack usage and unnecessary copies.
1750 g->msg_out = safe_malloc (g, GUESTFS_MAX_CHUNK_SIZE + 4 + 48);
1751 xdrmem_create (&xdr, g->msg_out + 4, GUESTFS_MAX_CHUNK_SIZE + 48, XDR_ENCODE);
1753 /* Serialize the chunk. */
1754 chunk.cancel = cancel;
1755 chunk.data.data_len = buflen;
1756 chunk.data.data_val = (char *) buf;
1758 if (!xdr_guestfs_chunk (&xdr, &chunk)) {
1759 error (g, "xdr_guestfs_chunk failed (buf = %p, buflen = %zu)",
1765 len = xdr_getpos (&xdr);
1768 /* Reduce the size of the outgoing message buffer to the real length. */
1769 g->msg_out = safe_realloc (g, g->msg_out, len + 4);
1770 g->msg_out_size = len + 4;
1773 xdrmem_create (&xdr, g->msg_out, 4, XDR_ENCODE);
1774 xdr_uint32_t (&xdr, &len);
1776 if (guestfs__switch_to_sending (g) == -1)
1780 guestfs_set_send_callback (g, send_cb, &sent);
1781 if (ml->main_loop_run (ml, g) == -1)
1784 error (g, "send file chunk failed, see earlier error messages");
1793 g->msg_out_size = 0;
1797 /* At this point we are sending FileIn file(s) to the guest, and not
1798 * expecting to read anything, so if we do read anything, it must be
1799 * a cancellation message. This checks for this case without blocking.
1802 check_for_daemon_cancellation (guestfs_h *g)
1812 FD_SET (g->sock, &rset);
1815 r = select (g->sock+1, &rset, NULL, NULL, &tv);
1817 perrorf (g, "select");
1823 /* Read the message from the daemon. */
1824 r = xread (g->sock, buf, sizeof buf);
1826 perrorf (g, "read");
1830 xdrmem_create (&xdr, buf, sizeof buf, XDR_DECODE);
1831 xdr_uint32_t (&xdr, &flag);
1834 if (flag != GUESTFS_CANCEL_FLAG) {
1835 error (g, "check_for_daemon_cancellation: read 0x%x from daemon, expected 0x%x\n",
1836 flag, GUESTFS_CANCEL_FLAG);
1843 /* Synchronously receive a file. */
1845 /* Returns -1 = error, 0 = EOF, 1 = more data */
1846 static int receive_file_data_sync (guestfs_h *g, void **buf, int *len);
1849 guestfs__receive_file_sync (guestfs_h *g, const char *filename)
1854 fd = open (filename, O_WRONLY|O_CREAT|O_TRUNC|O_NOCTTY, 0666);
1856 perrorf (g, "open: %s", filename);
1860 /* Receive the file in chunked encoding. */
1861 while ((r = receive_file_data_sync (g, &buf, &len)) >= 0) {
1862 if (xwrite (fd, buf, len) == -1) {
1863 perrorf (g, "%s: write", filename);
1868 if (r == 0) break; /* End of file. */
1872 error (g, "%s: error in chunked encoding", filename);
1876 if (close (fd) == -1) {
1877 perrorf (g, "close: %s", filename);
1884 /* Send cancellation message to daemon, then wait until it
1885 * cancels (just throwing away data).
1889 uint32_t flag = GUESTFS_CANCEL_FLAG;
1891 xdrmem_create (&xdr, fbuf, sizeof fbuf, XDR_ENCODE);
1892 xdr_uint32_t (&xdr, &flag);
1895 if (xwrite (g->sock, fbuf, sizeof fbuf) == -1) {
1896 perrorf (g, "write to daemon socket");
1900 while ((r = receive_file_data_sync (g, NULL, NULL)) > 0)
1901 ; /* just discard it */
1906 /* Note that the reply callback can be called multiple times before
1907 * the main loop quits and we get back to the synchronous code. So
1908 * we have to be prepared to save multiple chunks on a list here.
1910 struct receive_file_ctx {
1911 int count; /* 0 if receive_file_cb not called, or
1912 * else count number of chunks.
1914 guestfs_chunk *chunks; /* Array of chunks. */
1918 free_chunks (struct receive_file_ctx *ctx)
1922 for (i = 0; i < ctx->count; ++i)
1923 free (ctx->chunks[i].data.data_val);
1929 receive_file_cb (guestfs_h *g, void *data, XDR *xdr)
1931 guestfs_main_loop *ml = guestfs_get_main_loop (g);
1932 struct receive_file_ctx *ctx = (struct receive_file_ctx *) data;
1933 guestfs_chunk chunk;
1935 if (ctx->count == -1) /* Parse error occurred previously. */
1938 ml->main_loop_quit (ml, g);
1940 memset (&chunk, 0, sizeof chunk);
1942 if (!xdr_guestfs_chunk (xdr, &chunk)) {
1943 error (g, "failed to parse file chunk");
1950 /* Copy the chunk to the list. */
1951 ctx->chunks = safe_realloc (g, ctx->chunks,
1952 sizeof (guestfs_chunk) * (ctx->count+1));
1953 ctx->chunks[ctx->count] = chunk;
1957 /* Receive a chunk of file data. */
1958 /* Returns -1 = error, 0 = EOF, 1 = more data */
1960 receive_file_data_sync (guestfs_h *g, void **buf, int *len_r)
1962 struct receive_file_ctx ctx;
1963 guestfs_main_loop *ml = guestfs_get_main_loop (g);
1969 guestfs_set_reply_callback (g, receive_file_cb, &ctx);
1970 (void) ml->main_loop_run (ml, g);
1971 guestfs_set_reply_callback (g, NULL, NULL);
1973 if (ctx.count == 0) {
1974 error (g, "receive_file_data_sync: reply callback not called\n");
1978 if (ctx.count == -1) {
1979 error (g, "receive_file_data_sync: parse error in reply callback\n");
1980 /* callback already freed the chunks */
1985 fprintf (stderr, "receive_file_data_sync: got %d chunks\n", ctx.count);
1987 /* Process each chunk in the list. */
1988 if (buf) *buf = NULL; /* Accumulate data in this buffer. */
1991 for (i = 0; i < ctx.count; ++i) {
1992 if (ctx.chunks[i].cancel) {
1993 error (g, "file receive cancelled by daemon");
1995 if (buf) free (*buf);
1996 if (len_r) *len_r = 0;
2000 if (ctx.chunks[i].data.data_len == 0) { /* end of transfer */
2002 if (len_r) *len_r = len;
2007 *buf = safe_realloc (g, *buf, len + ctx.chunks[i].data.data_len);
2008 memcpy (*buf+len, ctx.chunks[i].data.data_val,
2009 ctx.chunks[i].data.data_len);
2011 len += ctx.chunks[i].data.data_len;
2014 if (len_r) *len_r = len;
2019 /* This is the default main loop implementation, using select(2). */
2022 select_add_handle (guestfs_main_loop *mlv, guestfs_h *g, int fd, int events,
2023 guestfs_handle_event_cb cb, void *data)
2025 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2027 if (fd < 0 || fd >= FD_SETSIZE) {
2028 error (g, "fd %d is out of range", fd);
2032 if ((events & ~(GUESTFS_HANDLE_READABLE |
2033 GUESTFS_HANDLE_WRITABLE |
2034 GUESTFS_HANDLE_HANGUP |
2035 GUESTFS_HANDLE_ERROR)) != 0) {
2036 error (g, "set of events (0x%x) contains unknown events", events);
2041 error (g, "set of events is empty");
2045 if (FD_ISSET (fd, &ml->rset) ||
2046 FD_ISSET (fd, &ml->wset) ||
2047 FD_ISSET (fd, &ml->xset)) {
2048 error (g, "fd %d is already registered", fd);
2053 error (g, "callback is NULL");
2057 if ((events & GUESTFS_HANDLE_READABLE))
2058 FD_SET (fd, &ml->rset);
2059 if ((events & GUESTFS_HANDLE_WRITABLE))
2060 FD_SET (fd, &ml->wset);
2061 if ((events & GUESTFS_HANDLE_HANGUP) || (events & GUESTFS_HANDLE_ERROR))
2062 FD_SET (fd, &ml->xset);
2064 if (fd > ml->max_fd) {
2066 ml->handle_cb_data =
2067 safe_realloc (g, ml->handle_cb_data,
2068 sizeof (struct select_handle_cb_data) * (ml->max_fd+1));
2070 ml->handle_cb_data[fd].cb = cb;
2071 ml->handle_cb_data[fd].g = g;
2072 ml->handle_cb_data[fd].data = data;
2076 /* Any integer >= 0 can be the handle, and this is as good as any ... */
2081 select_remove_handle (guestfs_main_loop *mlv, guestfs_h *g, int fd)
2083 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2085 if (fd < 0 || fd >= FD_SETSIZE) {
2086 error (g, "fd %d is out of range", fd);
2090 if (!FD_ISSET (fd, &ml->rset) &&
2091 !FD_ISSET (fd, &ml->wset) &&
2092 !FD_ISSET (fd, &ml->xset)) {
2093 error (g, "fd %d was not registered", fd);
2097 FD_CLR (fd, &ml->rset);
2098 FD_CLR (fd, &ml->wset);
2099 FD_CLR (fd, &ml->xset);
2101 if (fd == ml->max_fd) {
2103 ml->handle_cb_data =
2104 safe_realloc (g, ml->handle_cb_data,
2105 sizeof (struct select_handle_cb_data) * (ml->max_fd+1));
2114 select_add_timeout (guestfs_main_loop *mlv, guestfs_h *g, int interval,
2115 guestfs_handle_timeout_cb cb, void *data)
2117 //struct select_main_loop *ml = (struct select_main_loop *) mlv;
2119 abort (); /* XXX not implemented yet */
2123 select_remove_timeout (guestfs_main_loop *mlv, guestfs_h *g, int timer)
2125 //struct select_main_loop *ml = (struct select_main_loop *) mlv;
2127 abort (); /* XXX not implemented yet */
2130 /* The 'g' parameter is just used for error reporting. Events
2131 * for multiple handles can be dispatched by running the main
2135 select_main_loop_run (guestfs_main_loop *mlv, guestfs_h *g)
2137 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2139 fd_set rset2, wset2, xset2;
2141 if (ml->is_running) {
2142 error (g, "select_main_loop_run: this cannot be called recursively");
2148 while (ml->is_running) {
2149 if (ml->nr_fds == 0)
2155 r = select (ml->max_fd+1, &rset2, &wset2, &xset2, NULL);
2157 perrorf (g, "select");
2162 for (fd = 0; r > 0 && fd <= ml->max_fd; ++fd) {
2164 if (FD_ISSET (fd, &rset2))
2165 events |= GUESTFS_HANDLE_READABLE;
2166 if (FD_ISSET (fd, &wset2))
2167 events |= GUESTFS_HANDLE_WRITABLE;
2168 if (FD_ISSET (fd, &xset2))
2169 events |= GUESTFS_HANDLE_ERROR | GUESTFS_HANDLE_HANGUP;
2172 ml->handle_cb_data[fd].cb ((guestfs_main_loop *) ml,
2173 ml->handle_cb_data[fd].g,
2174 ml->handle_cb_data[fd].data,
2185 select_main_loop_quit (guestfs_main_loop *mlv, guestfs_h *g)
2187 struct select_main_loop *ml = (struct select_main_loop *) mlv;
2189 /* Note that legitimately ml->is_running can be zero when
2190 * this function is called.