X-Git-Url: http://git.annexia.org/?a=blobdiff_plain;f=src%2Fguestfs.c;h=5750a4f433936ee4238b55fdc2369c804ddc039c;hb=4e0cf4dbf8a8a96288f70114fdc3939da0aa7ad1;hp=e18021f7f26d8c29bbbbbf20c2e3bb6d36099767;hpb=b6233d1fff5d9a6bbc61e7123a57bdd7d8cbc792;p=libguestfs.git diff --git a/src/guestfs.c b/src/guestfs.c index e18021f..776214e 100644 --- a/src/guestfs.c +++ b/src/guestfs.c @@ -1,5 +1,5 @@ /* libguestfs - * Copyright (C) 2009 Red Hat Inc. + * Copyright (C) 2009-2010 Red Hat Inc. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public @@ -23,10 +23,20 @@ #include #include #include +#include +#include +#include #include -#include #include #include +#include +#include +#include +#include +#include + +#include +#include #ifdef HAVE_ERRNO_H #include @@ -48,461 +58,867 @@ #include #endif -#include "guestfs.h" +#include +#include -static int error (guestfs_h *g, const char *fs, ...); -static int perrorf (guestfs_h *g, const char *fs, ...); -static void *safe_malloc (guestfs_h *g, int nbytes); -static void *safe_realloc (guestfs_h *g, void *ptr, int nbytes); -static char *safe_strdup (guestfs_h *g, const char *str); +#include "c-ctype.h" +#include "glthread/lock.h" +#include "hash.h" +#include "hash-pjw.h" -/* GuestFS handle and connection. */ -struct guestfs_h -{ - /* All these socks/pids are -1 if not connected. */ - int sock; /* Daemon communications socket. */ - int pid; /* Qemu PID. */ +#include "guestfs.h" +#include "guestfs-internal.h" +#include "guestfs-internal-actions.h" +#include "guestfs_protocol.h" - char *tmpdir; /* Temporary directory containing logfile - * and socket. Cleaned up unless there is - * an error. - */ +static void default_error_cb (guestfs_h *g, void *data, const char *msg); +static void close_handles (void); - char **cmdline; /* Qemu command line. */ - int cmdline_size; - - guestfs_abort_fn abort_fn; - int exit_on_error; - int verbose; -}; +gl_lock_define_initialized (static, handles_lock); +static guestfs_h *handles = NULL; +static int atexit_handler_set = 0; guestfs_h * guestfs_create (void) { guestfs_h *g; + const char *str; g = malloc (sizeof (*g)); if (!g) return NULL; + memset (g, 0, sizeof (*g)); + + g->state = CONFIG; + + g->fd[0] = -1; + g->fd[1] = -1; g->sock = -1; - g->pid = -1; - g->tmpdir = NULL; + g->abort_cb = abort; + g->error_cb = default_error_cb; + g->error_cb_data = NULL; + + g->recovery_proc = 1; + g->autosync = 1; - g->abort_fn = abort; /* Have to set these before safe_malloc. */ - g->exit_on_error = 0; - g->verbose = getenv ("LIBGUESTFS_VERBOSE") != NULL; + str = getenv ("LIBGUESTFS_DEBUG"); + g->verbose = str != NULL && STREQ (str, "1"); - g->cmdline = safe_malloc (g, sizeof (char *) * 1); - g->cmdline_size = 1; - g->cmdline[0] = NULL; /* This is chosen by guestfs_launch. */ + str = getenv ("LIBGUESTFS_TRACE"); + g->trace = str != NULL && STREQ (str, "1"); + + str = getenv ("LIBGUESTFS_PATH"); + g->path = str != NULL ? strdup (str) : strdup (GUESTFS_DEFAULT_PATH); + if (!g->path) goto error; + + str = getenv ("LIBGUESTFS_QEMU"); + g->qemu = str != NULL ? strdup (str) : strdup (QEMU); + if (!g->qemu) goto error; + + str = getenv ("LIBGUESTFS_APPEND"); + if (str) { + g->append = strdup (str); + if (!g->append) goto error; + } + + /* Choose a suitable memory size. Previously we tried to choose + * a minimal memory size, but this isn't really necessary since + * recent QEMU and KVM don't do anything nasty like locking + * memory into core any more. Thus we can safely choose a + * large, generous amount of memory, and it'll just get swapped + * on smaller systems. + */ + str = getenv ("LIBGUESTFS_MEMSIZE"); + if (str) { + if (sscanf (str, "%d", &g->memsize) != 1 || g->memsize <= 256) { + warning (g, "non-numeric or too small value for LIBGUESTFS_MEMSIZE"); + goto error; + } + } else + g->memsize = 500; + + /* Start with large serial numbers so they are easy to spot + * inside the protocol. + */ + g->msg_next_serial = 0x00123400; + + /* Link the handles onto a global list. */ + gl_lock_lock (handles_lock); + g->next = handles; + handles = g; + if (!atexit_handler_set) { + atexit (close_handles); + atexit_handler_set = 1; + } + gl_lock_unlock (handles_lock); + + debug (g, "new guestfs handle %p", g); return g; + + error: + free (g->path); + free (g->qemu); + free (g->append); + free (g); + return NULL; } void -guestfs_free (guestfs_h *g) +guestfs_close (guestfs_h *g) { int i; char filename[256]; + guestfs_h *gg; + + if (g->state == NO_HANDLE) { + /* Not safe to call ANY callbacks here, so ... */ + fprintf (stderr, _("guestfs_close: called twice on the same handle\n")); + return; + } + + debug (g, "closing guestfs handle %p (state %d)", g, g->state); - if (g->pid) guestfs_kill_subprocess (g); + /* Try to sync if autosync flag is set. */ + if (g->autosync && g->state == READY) + guestfs_internal_autosync (g); - /* The assumption is that programs calling this have successfully - * used qemu, so delete the logfile and socket directory. + /* Kill the qemu subprocess. */ + if (g->state != CONFIG) + guestfs_kill_subprocess (g); + + /* Run user close callbacks. */ + guestfs___call_callbacks_void (g, GUESTFS_EVENT_CLOSE); + + /* Remove all other registered callbacks. Since we've already + * called the close callbacks, we shouldn't call any others. */ + free (g->events); + g->nr_events = 0; + g->events = NULL; + + guestfs___free_inspect_info (g); + + /* Close sockets. */ + if (g->fd[0] >= 0) + close (g->fd[0]); + if (g->fd[1] >= 0) + close (g->fd[1]); + if (g->sock >= 0) + close (g->sock); + g->fd[0] = -1; + g->fd[1] = -1; + g->sock = -1; + + /* Wait for subprocess(es) to exit. */ + if (g->pid > 0) waitpid (g->pid, NULL, 0); + if (g->recoverypid > 0) waitpid (g->recoverypid, NULL, 0); + + /* Remove tmpfiles. */ if (g->tmpdir) { snprintf (filename, sizeof filename, "%s/sock", g->tmpdir); unlink (filename); - snprintf (filename, sizeof filename, "%s/qemu.log", g->tmpdir); - unlink (filename); - rmdir (g->tmpdir); free (g->tmpdir); } - for (i = 0; i < g->cmdline_size; ++i) - free (g->cmdline[i]); - free (g->cmdline); + if (g->cmdline) { + for (i = 0; i < g->cmdline_size; ++i) + free (g->cmdline[i]); + free (g->cmdline); + } + + /* Mark the handle as dead before freeing it. */ + g->state = NO_HANDLE; + gl_lock_lock (handles_lock); + if (handles == g) + handles = g->next; + else { + for (gg = handles; gg->next != g; gg = gg->next) + ; + gg->next = g->next; + } + gl_lock_unlock (handles_lock); + + if (g->pda) + hash_free (g->pda); + free (g->last_error); + free (g->path); + free (g->qemu); + free (g->append); + free (g->qemu_help); + free (g->qemu_version); free (g); } -/* Cleanup fds and sockets, assuming the subprocess is dead already. */ +/* Close all open handles (called from atexit(3)). */ static void -cleanup_fds (guestfs_h *g) +close_handles (void) { - if (g->sock >= 0) close (g->sock); - g->sock = -1; + while (handles) guestfs_close (handles); +} + +const char * +guestfs_last_error (guestfs_h *g) +{ + return g->last_error; +} + +int +guestfs_last_errno (guestfs_h *g) +{ + return g->last_errnum; } -/* Wait for subprocess to exit. */ static void -wait_subprocess (guestfs_h *g) +set_last_error (guestfs_h *g, int errnum, const char *msg) { - if (g->pid >= 0) waitpid (g->pid, NULL, 0); - g->pid = -1; + free (g->last_error); + g->last_error = strdup (msg); + g->last_errnum = errnum; } -static int -error (guestfs_h *g, const char *fs, ...) +/* Warning are printed unconditionally. We try to make these rare. + * Generally speaking, a warning should either be an error, or if it's + * not important for end users then it should be a debug message. + */ +void +guestfs___warning (guestfs_h *g, const char *fs, ...) { va_list args; + char *msg, *msg2; + int len; - fprintf (stderr, "libguestfs: "); va_start (args, fs); - vfprintf (stderr, fs, args); + len = vasprintf (&msg, fs, args); va_end (args); - fputc ('\n', stderr); - if (g->exit_on_error) exit (1); - return -1; + if (len < 0) return; + + len = asprintf (&msg2, _("warning: %s"), msg); + free (msg); + + if (len < 0) return; + + guestfs___call_callbacks_message (g, GUESTFS_EVENT_LIBRARY, msg2, len); + + free (msg2); } -static int -perrorf (guestfs_h *g, const char *fs, ...) +/* Debug messages. */ +void +guestfs___debug (guestfs_h *g, const char *fs, ...) { va_list args; - char buf[256]; - int err = errno; + char *msg; + int len; + + /* The cpp macro "debug" has already checked that g->verbose is true + * before calling this function, but we check it again just in case + * anyone calls this function directly. + */ + if (!g->verbose) + return; + + va_start (args, fs); + len = vasprintf (&msg, fs, args); + va_end (args); + + if (len < 0) return; + + guestfs___call_callbacks_message (g, GUESTFS_EVENT_LIBRARY, msg, len); +} + +/* Call trace messages. These are enabled by setting g->trace, and + * calls to this function should only happen from the generated code + * in src/actions.c + */ +void +guestfs___trace (guestfs_h *g, const char *fs, ...) +{ + va_list args; + char *msg; + int len; - fprintf (stderr, "libguestfs: "); va_start (args, fs); - vfprintf (stderr, fs, args); + len = vasprintf (&msg, fs, args); va_end (args); - strerror_r (err, buf, sizeof buf); - fprintf (stderr, ": %s\n", buf); - if (g->exit_on_error) exit (1); - return -1; + if (len < 0) return; + + guestfs___call_callbacks_message (g, GUESTFS_EVENT_TRACE, msg, len); + + free (msg); +} + +static void +default_error_cb (guestfs_h *g, void *data, const char *msg) +{ + fprintf (stderr, _("libguestfs: error: %s\n"), msg); +} + +void +guestfs_error_errno (guestfs_h *g, int errnum, const char *fs, ...) +{ + va_list args; + char *msg; + + va_start (args, fs); + int err = vasprintf (&msg, fs, args); + va_end (args); + + if (err < 0) return; + + /* set_last_error first so that the callback can access the error + * message and errno through the handle if it wishes. + */ + set_last_error (g, errnum, msg); + if (g->error_cb) g->error_cb (g, g->error_cb_data, msg); + + free (msg); +} + +void +guestfs_perrorf (guestfs_h *g, const char *fs, ...) +{ + va_list args; + char *msg; + int errnum = errno; + + va_start (args, fs); + int err = vasprintf (&msg, fs, args); + va_end (args); + + if (err < 0) return; + +#if !defined(_GNU_SOURCE) || defined(__APPLE__) + char buf[256]; + strerror_r (errnum, buf, sizeof buf); +#else + char _buf[256]; + char *buf; + buf = strerror_r (errnum, _buf, sizeof _buf); +#endif + + msg = safe_realloc (g, msg, strlen (msg) + 2 + strlen (buf) + 1); + strcat (msg, ": "); + strcat (msg, buf); + + /* set_last_error first so that the callback can access the error + * message and errno through the handle if it wishes. + */ + set_last_error (g, errnum, msg); + if (g->error_cb) g->error_cb (g, g->error_cb_data, msg); + + free (msg); } -static void * -safe_malloc (guestfs_h *g, int nbytes) +void * +guestfs_safe_malloc (guestfs_h *g, size_t nbytes) { void *ptr = malloc (nbytes); - if (!ptr) g->abort_fn (); + if (nbytes > 0 && !ptr) g->abort_cb (); return ptr; } -static void * -safe_realloc (guestfs_h *g, void *ptr, int nbytes) +/* Return 1 if an array of N objects, each of size S, cannot exist due + to size arithmetic overflow. S must be positive and N must be + nonnegative. This is a macro, not an inline function, so that it + works correctly even when SIZE_MAX < N. + + By gnulib convention, SIZE_MAX represents overflow in size + calculations, so the conservative dividend to use here is + SIZE_MAX - 1, since SIZE_MAX might represent an overflowed value. + However, malloc (SIZE_MAX) fails on all known hosts where + sizeof (ptrdiff_t) <= sizeof (size_t), so do not bother to test for + exactly-SIZE_MAX allocations on such hosts; this avoids a test and + branch when S is known to be 1. */ +# define xalloc_oversized(n, s) \ + ((size_t) (sizeof (ptrdiff_t) <= sizeof (size_t) ? -1 : -2) / (s) < (n)) + +/* Technically we should add an autoconf test for this, testing for the desired + functionality, like what's done in gnulib, but for now, this is fine. */ +#if defined(__GLIBC__) +#define HAVE_GNU_CALLOC (__GLIBC__ >= 2) +#else +#define HAVE_GNU_CALLOC 0 +#endif + +/* Allocate zeroed memory for N elements of S bytes, with error + checking. S must be nonzero. */ +void * +guestfs_safe_calloc (guestfs_h *g, size_t n, size_t s) +{ + /* From gnulib's calloc function in xmalloc.c. */ + void *p; + /* Test for overflow, since some calloc implementations don't have + proper overflow checks. But omit overflow and size-zero tests if + HAVE_GNU_CALLOC, since GNU calloc catches overflow and never + returns NULL if successful. */ + if ((! HAVE_GNU_CALLOC && xalloc_oversized (n, s)) + || (! (p = calloc (n, s)) && (HAVE_GNU_CALLOC || n != 0))) + g->abort_cb (); + return p; +} + +void * +guestfs_safe_realloc (guestfs_h *g, void *ptr, int nbytes) { void *p = realloc (ptr, nbytes); - if (!p) g->abort_fn (); + if (nbytes > 0 && !p) g->abort_cb (); return p; } -static char * -safe_strdup (guestfs_h *g, const char *str) +char * +guestfs_safe_strdup (guestfs_h *g, const char *str) { char *s = strdup (str); - if (!s) g->abort_fn (); + if (!s) g->abort_cb (); return s; } +char * +guestfs_safe_strndup (guestfs_h *g, const char *str, size_t n) +{ + char *s = strndup (str, n); + if (!s) g->abort_cb (); + return s; +} + +void * +guestfs_safe_memdup (guestfs_h *g, void *ptr, size_t size) +{ + void *p = malloc (size); + if (!p) g->abort_cb (); + memcpy (p, ptr, size); + return p; +} + +char * +guestfs_safe_asprintf (guestfs_h *g, const char *fs, ...) +{ + va_list args; + char *msg; + + va_start (args, fs); + int err = vasprintf (&msg, fs, args); + va_end (args); + + if (err == -1) + g->abort_cb (); + + return msg; +} + void -guestfs_set_out_of_memory_handler (guestfs_h *g, guestfs_abort_fn a) +guestfs_set_out_of_memory_handler (guestfs_h *g, guestfs_abort_cb cb) { - g->abort_fn = a; + g->abort_cb = cb; } -guestfs_abort_fn +guestfs_abort_cb guestfs_get_out_of_memory_handler (guestfs_h *g) { - return g->abort_fn; + return g->abort_cb; } void -guestfs_set_exit_on_error (guestfs_h *g, int e) +guestfs_set_error_handler (guestfs_h *g, guestfs_error_handler_cb cb, void *data) { - g->exit_on_error = e; + g->error_cb = cb; + g->error_cb_data = data; } -int -guestfs_get_exit_on_error (guestfs_h *g) +guestfs_error_handler_cb +guestfs_get_error_handler (guestfs_h *g, void **data_rtn) { - return g->exit_on_error; + if (data_rtn) *data_rtn = g->error_cb_data; + return g->error_cb; } -void -guestfs_set_verbose (guestfs_h *g, int v) +int +guestfs__set_verbose (guestfs_h *g, int v) { - g->verbose = v; + g->verbose = !!v; + return 0; } int -guestfs_get_verbose (guestfs_h *g) +guestfs__get_verbose (guestfs_h *g) { return g->verbose; } -/* Add an escaped string to the current command line. */ -static int -add_cmdline (guestfs_h *g, const char *str) +int +guestfs__set_autosync (guestfs_h *g, int a) { - if (g->pid >= 0) - return error (g, "command line cannot be altered after qemu subprocess launched"); - - g->cmdline_size++; - g->cmdline = safe_realloc (g, g->cmdline, sizeof (char *) * g->cmdline_size); - g->cmdline[g->cmdline_size-1] = safe_strdup (g, str); - + g->autosync = !!a; return 0; } int -guestfs_config (guestfs_h *g, - const char *qemu_param, const char *qemu_value) +guestfs__get_autosync (guestfs_h *g) { - if (qemu_param[0] != '-') - return error (g, "guestfs_config: parameter must begin with '-' character"); + return g->autosync; +} - /* A bit fascist, but the user will probably break the extra - * parameters that we add if they try to set any of these. - */ - if (strcmp (qemu_param, "-kernel") == 0 || - strcmp (qemu_param, "-initrd") == 0 || - strcmp (qemu_param, "-nographic") == 0 || - strcmp (qemu_param, "-serial") == 0 || - strcmp (qemu_param, "-vnc") == 0 || - strcmp (qemu_param, "-full-screen") == 0 || - strcmp (qemu_param, "-std-vga") == 0 || - strcmp (qemu_param, "-vnc") == 0) - return error (g, "guestfs_config: parameter '%s' isn't allowed"); - - if (add_cmdline (g, qemu_param) != 0) return -1; - - if (qemu_value != NULL) { - if (add_cmdline (g, qemu_value) != 0) return -1; - } +int +guestfs__set_path (guestfs_h *g, const char *path) +{ + free (g->path); + g->path = NULL; + g->path = + path == NULL ? + safe_strdup (g, GUESTFS_DEFAULT_PATH) : safe_strdup (g, path); return 0; } +const char * +guestfs__get_path (guestfs_h *g) +{ + return g->path; +} + int -guestfs_add_drive (guestfs_h *g, const char *filename) +guestfs__set_qemu (guestfs_h *g, const char *qemu) { - int len = strlen (filename) + 64; - char buf[len]; + free (g->qemu); + g->qemu = NULL; - if (strchr (filename, ',') != NULL) - return error (g, "filename cannot contain ',' (comma) character"); + g->qemu = qemu == NULL ? safe_strdup (g, QEMU) : safe_strdup (g, qemu); + return 0; +} - snprintf (buf, len, "file=%s,media=disk", filename); +const char * +guestfs__get_qemu (guestfs_h *g) +{ + return g->qemu; +} + +int +guestfs__set_append (guestfs_h *g, const char *append) +{ + free (g->append); + g->append = NULL; - return guestfs_config (g, "-drive", buf); + g->append = append ? safe_strdup (g, append) : NULL; + return 0; +} + +const char * +guestfs__get_append (guestfs_h *g) +{ + return g->append; } int -guestfs_add_cdrom (guestfs_h *g, const char *filename) +guestfs__set_memsize (guestfs_h *g, int memsize) { - int len = strlen (filename) + 64; - char buf[len]; + g->memsize = memsize; + return 0; +} - if (strchr (filename, ',') != NULL) - return error (g, "filename cannot contain ',' (comma) character"); +int +guestfs__get_memsize (guestfs_h *g) +{ + return g->memsize; +} - snprintf (buf, len, "file=%s,if=ide,index=1,media=cdrom", filename); +int +guestfs__set_selinux (guestfs_h *g, int selinux) +{ + g->selinux = selinux; + return 0; +} - return guestfs_config (g, "-drive", buf); +int +guestfs__get_selinux (guestfs_h *g) +{ + return g->selinux; } int -guestfs_launch (guestfs_h *g) -{ - static const char *dir_template = "/tmp/libguestfsXXXXXX"; - int r, i; - const char *qemu = QEMU; /* XXX */ - const char *kernel = "/boot/vmlinuz-2.6.27.15-170.2.24.fc10.x86_64"; - const char *initrd = "/boot/initrd-2.6.27.15-170.2.24.fc10.x86_64.img"; - char unixsock[256]; - char vmchannel[256]; - char tmpfile[256]; - - /* XXX Choose which qemu to run. */ - /* XXX Choose initrd, etc. */ - - /* Make the temporary directory containing the logfile and socket. */ - if (!g->tmpdir) { - g->tmpdir = safe_strdup (g, dir_template); - if (mkdtemp (g->tmpdir) == NULL) - return perrorf (g, "%s: cannot create temporary directory", dir_template); - - snprintf (unixsock, sizeof unixsock, "%s/sock", g->tmpdir); +guestfs__get_pid (guestfs_h *g) +{ + if (g->pid > 0) + return g->pid; + else { + error (g, "get_pid: no qemu subprocess"); + return -1; } +} - r = fork (); - if (r == -1) - return perrorf (g, "fork"); - - if (r > 0) { /* Parent (library). */ - g->pid = r; - - /* If qemu is going to die during startup, give it a tiny amount of - * time to print the error message. - */ - usleep (10000); - } else { /* Child (qemu). */ - /* Set up the full command line. Do this in the subprocess so we - * don't need to worry about cleaning up. - */ - g->cmdline[0] = (char *) qemu; - - g->cmdline = realloc (g->cmdline, sizeof (char *) * (g->cmdline_size + 14)); - if (g->cmdline == NULL) { - perror ("realloc"); - _exit (1); - } +struct guestfs_version * +guestfs__version (guestfs_h *g) +{ + struct guestfs_version *r; + + r = safe_malloc (g, sizeof *r); + r->major = PACKAGE_VERSION_MAJOR; + r->minor = PACKAGE_VERSION_MINOR; + r->release = PACKAGE_VERSION_RELEASE; + r->extra = safe_strdup (g, PACKAGE_VERSION_EXTRA); + return r; +} - snprintf (vmchannel, sizeof vmchannel, - "channel,%d:unix:%s,server,nowait", 666, unixsock); - - g->cmdline[g->cmdline_size ] = "-kernel"; - g->cmdline[g->cmdline_size+ 1] = (char *) kernel; - g->cmdline[g->cmdline_size+ 2] = "-initrd"; - g->cmdline[g->cmdline_size+ 3] = (char *) initrd; - g->cmdline[g->cmdline_size+ 4] = "-append"; - g->cmdline[g->cmdline_size+ 5] = "console=ttyS0"; - g->cmdline[g->cmdline_size+ 6] = "-nographic"; - g->cmdline[g->cmdline_size+ 7] = "-serial"; - g->cmdline[g->cmdline_size+ 8] = "stdio"; - g->cmdline[g->cmdline_size+ 9] = "-net"; - g->cmdline[g->cmdline_size+10] = vmchannel; - g->cmdline[g->cmdline_size+11] = "-net"; - g->cmdline[g->cmdline_size+12] = "user,vlan0"; - g->cmdline[g->cmdline_size+13] = NULL; - - if (g->verbose) { - fprintf (stderr, "Running %s", qemu); - for (i = 0; g->cmdline[i]; ++i) - fprintf (stderr, " %s", g->cmdline[i]); - fprintf (stderr, "\n"); - } +int +guestfs__set_trace (guestfs_h *g, int t) +{ + g->trace = !!t; + return 0; +} - /* Set up stdin, stdout. Messages should go to the logfile. */ - close (0); - close (1); - open ("/dev/null", O_RDONLY); - snprintf (tmpfile, sizeof tmpfile, "%s/qemu.log", g->tmpdir); - open (tmpfile, O_WRONLY|O_CREAT|O_APPEND, 0644); - /*dup2 (1, 2);*/ - - execv (qemu, g->cmdline); /* Run qemu. */ - perror (qemu); - _exit (1); - } +int +guestfs__get_trace (guestfs_h *g) +{ + return g->trace; +} +int +guestfs__set_direct (guestfs_h *g, int d) +{ + g->direct = !!d; return 0; } -#define UNIX_PATH_MAX 108 +int +guestfs__get_direct (guestfs_h *g) +{ + return g->direct; +} int -guestfs_wait_ready (guestfs_h *g) +guestfs__set_recovery_proc (guestfs_h *g, int f) { - int r, i, lsock; - struct sockaddr_un addr; + g->recovery_proc = !!f; + return 0; +} - if (guestfs_ready (g)) return 0; +int +guestfs__get_recovery_proc (guestfs_h *g) +{ + return g->recovery_proc; +} - /* Launch the subprocess, if there isn't one already. */ - if (g->pid == -1) { - if (guestfs_launch (g) != 0) - return -1; - } +int +guestfs__set_network (guestfs_h *g, int v) +{ + g->enable_network = !!v; + return 0; +} - if (g->sock >= 0) { - close (g->sock); - g->sock = -1; +int +guestfs__get_network (guestfs_h *g) +{ + return g->enable_network; +} + +int +guestfs__set_attach_method (guestfs_h *g, const char *method) +{ + if (STREQ (method, "appliance")) { + g->attach_method = ATTACH_METHOD_APPLIANCE; + free (g->attach_method_arg); + g->attach_method_arg = NULL; + } + else if (STRPREFIX (method, "unix:") && strlen (method) > 5) { + g->attach_method = ATTACH_METHOD_UNIX; + free (g->attach_method_arg); + g->attach_method_arg = safe_strdup (g, method + 5); + /* Note that we don't check the path exists until launch is called. */ + } + else { + error (g, "invalid attach method: %s", method); + return -1; } - lsock = socket (AF_UNIX, SOCK_STREAM, 0); - if (lsock == -1) - return perrorf (g, "socket"); + return 0; +} - addr.sun_family = AF_UNIX; - snprintf (addr.sun_path, UNIX_PATH_MAX, "%s/sock", g->tmpdir); +char * +guestfs__get_attach_method (guestfs_h *g) +{ + char *ret; - if (bind (lsock, (struct sockaddr *) &addr, sizeof addr) == -1) { - perrorf (g, "bind"); - close (lsock); - return -1; + switch (g->attach_method) { + case ATTACH_METHOD_APPLIANCE: + ret = safe_strdup (g, "appliance"); + break; + + case ATTACH_METHOD_UNIX: + ret = safe_malloc (g, strlen (g->attach_method_arg) + 5 + 1); + strcpy (ret, "unix:"); + strcat (ret, g->attach_method_arg); + break; + + default: /* keep GCC happy - this is not reached */ + abort (); } - if (listen (lsock, 1) == -1) { - perrorf (g, "listen"); - close (lsock); - return -1; + return ret; +} + +/* Note the private data area is allocated lazily, since the vast + * majority of callers will never use it. This means g->pda is + * likely to be NULL. + */ +struct pda_entry { + char *key; /* key */ + void *data; /* opaque user data pointer */ +}; + +static size_t +hasher (void const *x, size_t table_size) +{ + struct pda_entry const *p = x; + return hash_pjw (p->key, table_size); +} + +static bool +comparator (void const *x, void const *y) +{ + struct pda_entry const *a = x; + struct pda_entry const *b = y; + return STREQ (a->key, b->key); +} + +static void +freer (void *x) +{ + if (x) { + struct pda_entry *p = x; + free (p->key); + free (p); } +} - if (fcntl (lsock, F_SETFL, O_NONBLOCK) == -1) { - perrorf (g, "set socket non-blocking"); - close (lsock); - return -1; +void +guestfs_set_private (guestfs_h *g, const char *key, void *data) +{ + if (g->pda == NULL) { + g->pda = hash_initialize (16, NULL, hasher, comparator, freer); + if (g->pda == NULL) + g->abort_cb (); } - /* Wait until the daemon running inside the guest connects to the - * Unix socket, which indicates it's alive. Qemu might exit in the - * meantime if there is a problem. More problematically qemu might - * hang, which we can only detect by timeout. - */ - for (i = 0; i < 30; ++i) { - r = waitpid (g->pid, NULL, WNOHANG); - - if (r > 0 || (r == -1 && errno == ECHILD)) { - error (g, "qemu subprocess exited unexpectedly during initialization"); - g->pid = -1; - cleanup_fds (g); - close (lsock); - return -1; - } + struct pda_entry *new_entry = safe_malloc (g, sizeof *new_entry); + new_entry->key = safe_strdup (g, key); + new_entry->data = data; - r = accept (lsock, NULL, 0); - if (r >= 0) { - g->sock = r; - fcntl (g->sock, F_SETFL, O_NONBLOCK); - close (lsock); - return 0; - } - if (errno == EAGAIN) { - sleep (1); - continue; - } - perrorf (g, "accept"); - close (lsock); - guestfs_kill_subprocess (g); - return -1; - } + struct pda_entry *old_entry = hash_delete (g->pda, new_entry); + freer (old_entry); - close (lsock); - return error (g, "timeout waiting for guest to become ready"); + struct pda_entry *entry = hash_insert (g->pda, new_entry); + if (entry == NULL) + g->abort_cb (); + assert (entry == new_entry); } -int -guestfs_ready (guestfs_h *g) +static inline char * +bad_cast (char const *s) { - return - g->pid >= 0 && - kill (g->pid, 0) == 0 && - g->sock >= 0 /* && - guestfs_ping_daemon (g) >= 0 */; + return (char *) s; } -int -guestfs_kill_subprocess (guestfs_h *g) +void * +guestfs_get_private (guestfs_h *g, const char *key) +{ + if (g->pda == NULL) + return NULL; /* no keys have been set */ + + const struct pda_entry k = { .key = bad_cast (key) }; + struct pda_entry *entry = hash_lookup (g->pda, &k); + if (entry) + return entry->data; + else + return NULL; +} + +/* Iterator. */ +void * +guestfs_first_private (guestfs_h *g, const char **key_rtn) +{ + if (g->pda == NULL) + return NULL; + + g->pda_next = hash_get_first (g->pda); + + /* Ignore any keys with NULL data pointers. */ + while (g->pda_next && g->pda_next->data == NULL) + g->pda_next = hash_get_next (g->pda, g->pda_next); + + if (g->pda_next == NULL) + return NULL; + + *key_rtn = g->pda_next->key; + return g->pda_next->data; +} + +void * +guestfs_next_private (guestfs_h *g, const char **key_rtn) +{ + if (g->pda == NULL) + return NULL; + + if (g->pda_next == NULL) + return NULL; + + /* Walk to the next key with a non-NULL data pointer. */ + do { + g->pda_next = hash_get_next (g->pda, g->pda_next); + } while (g->pda_next && g->pda_next->data == NULL); + + if (g->pda_next == NULL) + return NULL; + + *key_rtn = g->pda_next->key; + return g->pda_next->data; +} + +/* When tracing, be careful how we print BufferIn parameters which + * usually contain large amounts of binary data (RHBZ#646822). + */ +void +guestfs___print_BufferIn (FILE *out, const char *buf, size_t buf_size) { - if (g->pid >= 0) { - if (g->verbose) - fprintf (stderr, "sending SIGINT to pid %d\n", g->pid); + size_t i; + size_t orig_size = buf_size; + + if (buf_size > 256) + buf_size = 256; - kill (g->pid, SIGINT); - wait_subprocess (g); + fputc ('"', out); + + for (i = 0; i < buf_size; ++i) { + if (c_isprint (buf[i])) + fputc (buf[i], out); + else + fprintf (out, "\\x%02x", (unsigned char) buf[i]); } - cleanup_fds (g); + fputc ('"', out); - return 0; + if (orig_size > buf_size) + fprintf (out, + _(""), orig_size); +} + +void +guestfs___print_BufferOut (FILE *out, const char *buf, size_t buf_size) +{ + guestfs___print_BufferIn (out, buf, buf_size); +} + +void +guestfs___free_string_list (char **argv) +{ + size_t i; + for (i = 0; argv[i] != NULL; ++i) + free (argv[i]); + free (argv); }