2008-10-24 11:20:08 +00:00
|
|
|
|
2007-07-19 16:22:40 +00:00
|
|
|
/*
|
|
|
|
* utils.h: common, generic utility functions
|
|
|
|
*
|
2010-03-02 16:35:01 +00:00
|
|
|
* Copyright (C) 2010 Red Hat, Inc.
|
2007-07-19 16:22:40 +00:00
|
|
|
* Copyright (C) 2006, 2007 Binary Karma
|
|
|
|
* Copyright (C) 2006 Shuveb Hussain
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*
|
|
|
|
* File created Jul 18, 2007 - Shuveb Hussain <shuveb@binarykarma.com>
|
|
|
|
*/
|
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
#ifndef __VIR_UTIL_H__
|
2010-03-09 18:22:22 +00:00
|
|
|
# define __VIR_UTIL_H__
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# include "verify.h"
|
|
|
|
# include "internal.h"
|
|
|
|
# include <unistd.h>
|
|
|
|
# include <sys/select.h>
|
|
|
|
# include <sys/types.h>
|
2010-11-22 23:39:47 +00:00
|
|
|
# include <stdarg.h>
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-04-14 15:40:14 +00:00
|
|
|
# ifndef MIN
|
|
|
|
# define MIN(a, b) ((a) < (b) ? (a) : (b))
|
|
|
|
# endif
|
|
|
|
|
2010-11-22 23:50:00 +00:00
|
|
|
ssize_t saferead(int fd, void *buf, size_t count) ATTRIBUTE_RETURN_CHECK;
|
2010-03-02 16:35:01 +00:00
|
|
|
ssize_t safewrite(int fd, const void *buf, size_t count)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
|
|
|
int safezero(int fd, int flags, off_t offset, off_t len)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
2008-11-17 11:03:25 +00:00
|
|
|
|
2008-08-20 09:24:14 +00:00
|
|
|
enum {
|
|
|
|
VIR_EXEC_NONE = 0,
|
|
|
|
VIR_EXEC_NONBLOCK = (1 << 0),
|
|
|
|
VIR_EXEC_DAEMON = (1 << 1),
|
2009-06-29 17:00:52 +00:00
|
|
|
VIR_EXEC_CLEAR_CAPS = (1 << 2),
|
2008-08-20 09:24:14 +00:00
|
|
|
};
|
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virSetNonBlock(int fd) ATTRIBUTE_RETURN_CHECK;
|
|
|
|
int virSetCloseExec(int fd) ATTRIBUTE_RETURN_CHECK;
|
2009-01-20 16:36:34 +00:00
|
|
|
|
2009-02-26 16:27:51 +00:00
|
|
|
/* This will execute in the context of the first child
|
|
|
|
* after fork() but before execve() */
|
|
|
|
typedef int (*virExecHook)(void *data);
|
|
|
|
|
2010-02-04 22:41:52 +00:00
|
|
|
int virExecDaemonize(const char *const*argv,
|
2009-05-11 13:34:37 +00:00
|
|
|
const char *const*envp,
|
|
|
|
const fd_set *keepfd,
|
|
|
|
pid_t *retpid,
|
|
|
|
int infd, int *outfd, int *errfd,
|
|
|
|
int flags,
|
|
|
|
virExecHook hook,
|
2009-05-11 13:50:38 +00:00
|
|
|
void *data,
|
2009-10-16 10:09:13 +00:00
|
|
|
char *pidfile) ATTRIBUTE_RETURN_CHECK;
|
2010-02-04 22:41:52 +00:00
|
|
|
int virExecWithHook(const char *const*argv,
|
2009-02-26 16:27:51 +00:00
|
|
|
const char *const*envp,
|
|
|
|
const fd_set *keepfd,
|
|
|
|
int *retpid,
|
|
|
|
int infd,
|
|
|
|
int *outfd,
|
|
|
|
int *errfd,
|
|
|
|
int flags,
|
|
|
|
virExecHook hook,
|
2009-05-11 13:50:38 +00:00
|
|
|
void *data,
|
2009-10-16 10:09:13 +00:00
|
|
|
char *pidfile) ATTRIBUTE_RETURN_CHECK;
|
2010-02-04 22:41:52 +00:00
|
|
|
int virExec(const char *const*argv,
|
2008-08-20 09:24:14 +00:00
|
|
|
const char *const*envp,
|
2008-08-27 11:42:52 +00:00
|
|
|
const fd_set *keepfd,
|
2008-12-18 11:58:28 +00:00
|
|
|
pid_t *retpid,
|
2008-08-20 09:24:14 +00:00
|
|
|
int infd,
|
|
|
|
int *outfd,
|
|
|
|
int *errfd,
|
2009-10-16 10:09:13 +00:00
|
|
|
int flags) ATTRIBUTE_RETURN_CHECK;
|
2010-02-04 22:41:52 +00:00
|
|
|
int virRun(const char *const*argv, int *status) ATTRIBUTE_RETURN_CHECK;
|
|
|
|
int virRunWithHook(const char *const*argv,
|
2010-01-20 23:30:36 +00:00
|
|
|
virExecHook hook, void *data,
|
|
|
|
int *status) ATTRIBUTE_RETURN_CHECK;
|
2010-03-26 10:50:10 +00:00
|
|
|
int virPipeReadUntilEOF(int outfd, int errfd,
|
|
|
|
char **outbuf, char **errbuf);
|
Add virFork() function to utils
virFork() contains bookkeeping that must be done any time a process
forks. Currently this includes:
1) Call virLogLock() prior to fork() and virLogUnlock() just after,
to avoid a deadlock if some other thread happens to hold that lock
during the fork.
2) Reset the logging hooks and send all child process log messages to
stderr.
3) Block all signals prior to fork(), then either a) reset the signal
mask for the parent process, or b) clear the signal mask for the
child process.
Note that the signal mask handling in __virExec erroneously fails to
restore the signal mask when fork() fails. virFork() fixes this
problem.
Other than this, it attempts to behave as closely to fork() as
possible (including preserving errno for the caller), with a couple
exceptions:
1) The return value is 0 (success) or -1 (failure), while the pid is
returned via the pid_t* argument. Like fork(), if pid < 0 there is
no child process, otherwise both the child and the parent will
return to the caller, and both should look at the return value,
which will indicate if some of the extra processing outlined above
encountered an error.
2) If virFork() returns with pid < 0 or with a return value < 0
indicating an error condition, the error has already been
reported. You can log an additional message if you like, but it
isn't necessary, and may be awkwardly extraneous.
Note that virFork()'s child process will *never* call _exit() - if a
child process is created, it will return to the caller.
* util.c util.h: add virFork() function, based on what is currently
done in __virExec().
2010-02-18 21:13:48 +00:00
|
|
|
int virFork(pid_t *pid);
|
2007-07-19 16:22:40 +00:00
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileReadLimFD(int fd, int maxlen, char **buf) ATTRIBUTE_RETURN_CHECK;
|
2008-09-02 10:29:51 +00:00
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileReadAll(const char *path, int maxlen, char **buf) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-12-03 09:47:08 +00:00
|
|
|
int virFileWriteStr(const char *path, const char *str, mode_t mode)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_RETURN_CHECK;
|
2009-02-13 19:13:06 +00:00
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
int virFileMatchesNameSuffix(const char *file,
|
|
|
|
const char *name,
|
|
|
|
const char *suffix);
|
|
|
|
|
|
|
|
int virFileHasSuffix(const char *str,
|
|
|
|
const char *suffix);
|
|
|
|
|
2008-08-20 19:42:36 +00:00
|
|
|
int virFileStripSuffix(char *str,
|
2009-10-16 10:09:13 +00:00
|
|
|
const char *suffix) ATTRIBUTE_RETURN_CHECK;
|
2008-08-20 19:42:36 +00:00
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
int virFileLinkPointsTo(const char *checkLink,
|
|
|
|
const char *checkDest);
|
2008-02-26 07:05:18 +00:00
|
|
|
|
2009-04-01 10:26:22 +00:00
|
|
|
int virFileResolveLink(const char *linkpath,
|
2009-10-16 10:09:13 +00:00
|
|
|
char **resultpath) ATTRIBUTE_RETURN_CHECK;
|
2009-04-01 10:26:22 +00:00
|
|
|
|
2009-06-11 13:18:56 +00:00
|
|
|
char *virFindFileInPath(const char *file);
|
|
|
|
|
2008-02-26 07:05:18 +00:00
|
|
|
int virFileExists(const char *path);
|
|
|
|
|
2010-05-20 15:41:31 +00:00
|
|
|
char *virFileSanitizePath(const char *path);
|
|
|
|
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
enum {
|
Rename virFileCreate to virFileOperation, add hook function
It turns out it is also useful to be able to perform other operations
on a file created while running as a different uid (eg, write things
to that file), and possibly to do this to a file that already
exists. This patch adds an optional hook function to the renamed (for
more accuracy of purpose) virFileOperation; the hook will be called
after the file has been opened (possibly created) and gid/mode
checked/set, before closing it.
As with the other operations on the file, if the VIR_FILE_OP_AS_UID
flag is set, this hook function will be called in the context of a
child process forked from the process that called virFileOperation.
The implication here is that, while all data in memory is available to
this hook function, any modification to that data will not be seen by
the caller - the only indication in memory of what happened in the
hook will be the return value (which the hook should set to 0 on
success, or one of the standard errno values on failure).
Another piece of making the function more flexible was to add an
"openflags" argument. This arg should contain exactly the flags to be
passed to open(2), eg O_RDWR | O_EXCL, etc.
In the process of adding the hook to virFileOperation, I also realized
that the bits to fix up file owner/group/mode settings after creation
were being done in the parent process, which could fail, so I moved
them to the child process where they should be.
* src/util/util.[ch]: rename and rework virFileCreate-->virFileOperation,
and redo flags in virDirCreate
* storage/storage_backend.c, storage/storage_backend_fs.c: update the
calls to virFileOperation/virDirCreate to reflect changes in the API,
but don't yet take advantage of the hook.
2010-02-19 16:43:22 +00:00
|
|
|
VIR_FILE_OP_NONE = 0,
|
|
|
|
VIR_FILE_OP_AS_UID = (1 << 0),
|
|
|
|
VIR_FILE_OP_FORCE_PERMS = (1 << 1),
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
};
|
Rename virFileCreate to virFileOperation, add hook function
It turns out it is also useful to be able to perform other operations
on a file created while running as a different uid (eg, write things
to that file), and possibly to do this to a file that already
exists. This patch adds an optional hook function to the renamed (for
more accuracy of purpose) virFileOperation; the hook will be called
after the file has been opened (possibly created) and gid/mode
checked/set, before closing it.
As with the other operations on the file, if the VIR_FILE_OP_AS_UID
flag is set, this hook function will be called in the context of a
child process forked from the process that called virFileOperation.
The implication here is that, while all data in memory is available to
this hook function, any modification to that data will not be seen by
the caller - the only indication in memory of what happened in the
hook will be the return value (which the hook should set to 0 on
success, or one of the standard errno values on failure).
Another piece of making the function more flexible was to add an
"openflags" argument. This arg should contain exactly the flags to be
passed to open(2), eg O_RDWR | O_EXCL, etc.
In the process of adding the hook to virFileOperation, I also realized
that the bits to fix up file owner/group/mode settings after creation
were being done in the parent process, which could fail, so I moved
them to the child process where they should be.
* src/util/util.[ch]: rename and rework virFileCreate-->virFileOperation,
and redo flags in virDirCreate
* storage/storage_backend.c, storage/storage_backend_fs.c: update the
calls to virFileOperation/virDirCreate to reflect changes in the API,
but don't yet take advantage of the hook.
2010-02-19 16:43:22 +00:00
|
|
|
typedef int (*virFileOperationHook)(int fd, void *data);
|
|
|
|
int virFileOperation(const char *path, int openflags, mode_t mode,
|
|
|
|
uid_t uid, gid_t gid,
|
|
|
|
virFileOperationHook hook, void *hookdata,
|
|
|
|
unsigned int flags) ATTRIBUTE_RETURN_CHECK;
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
|
Rename virFileCreate to virFileOperation, add hook function
It turns out it is also useful to be able to perform other operations
on a file created while running as a different uid (eg, write things
to that file), and possibly to do this to a file that already
exists. This patch adds an optional hook function to the renamed (for
more accuracy of purpose) virFileOperation; the hook will be called
after the file has been opened (possibly created) and gid/mode
checked/set, before closing it.
As with the other operations on the file, if the VIR_FILE_OP_AS_UID
flag is set, this hook function will be called in the context of a
child process forked from the process that called virFileOperation.
The implication here is that, while all data in memory is available to
this hook function, any modification to that data will not be seen by
the caller - the only indication in memory of what happened in the
hook will be the return value (which the hook should set to 0 on
success, or one of the standard errno values on failure).
Another piece of making the function more flexible was to add an
"openflags" argument. This arg should contain exactly the flags to be
passed to open(2), eg O_RDWR | O_EXCL, etc.
In the process of adding the hook to virFileOperation, I also realized
that the bits to fix up file owner/group/mode settings after creation
were being done in the parent process, which could fail, so I moved
them to the child process where they should be.
* src/util/util.[ch]: rename and rework virFileCreate-->virFileOperation,
and redo flags in virDirCreate
* storage/storage_backend.c, storage/storage_backend_fs.c: update the
calls to virFileOperation/virDirCreate to reflect changes in the API,
but don't yet take advantage of the hook.
2010-02-19 16:43:22 +00:00
|
|
|
enum {
|
|
|
|
VIR_DIR_CREATE_NONE = 0,
|
|
|
|
VIR_DIR_CREATE_AS_UID = (1 << 0),
|
|
|
|
VIR_DIR_CREATE_FORCE_PERMS = (1 << 1),
|
|
|
|
VIR_DIR_CREATE_ALLOW_EXIST = (1 << 2),
|
|
|
|
};
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
int virDirCreate(const char *path, mode_t mode, uid_t uid, gid_t gid,
|
|
|
|
unsigned int flags) ATTRIBUTE_RETURN_CHECK;
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileMakePath(const char *path) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
|
|
|
int virFileBuildPath(const char *dir,
|
|
|
|
const char *name,
|
|
|
|
const char *ext,
|
|
|
|
char *buf,
|
2009-10-16 10:09:13 +00:00
|
|
|
unsigned int buflen) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2009-10-08 14:55:58 +00:00
|
|
|
int virFileAbsPath(const char *path,
|
2009-10-16 10:09:13 +00:00
|
|
|
char **abspath) ATTRIBUTE_RETURN_CHECK;
|
2009-10-08 14:55:58 +00:00
|
|
|
|
2008-08-13 10:52:15 +00:00
|
|
|
int virFileOpenTty(int *ttymaster,
|
|
|
|
char **ttyName,
|
|
|
|
int rawmode);
|
2009-04-22 14:26:50 +00:00
|
|
|
int virFileOpenTtyAt(const char *ptmx,
|
|
|
|
int *ttymaster,
|
|
|
|
char **ttyName,
|
|
|
|
int rawmode);
|
2008-08-13 10:52:15 +00:00
|
|
|
|
2008-12-18 15:22:49 +00:00
|
|
|
char* virFilePid(const char *dir,
|
|
|
|
const char *name);
|
2010-11-01 04:17:14 +00:00
|
|
|
|
2009-05-11 13:50:38 +00:00
|
|
|
int virFileWritePidPath(const char *path,
|
2009-10-16 10:09:13 +00:00
|
|
|
pid_t pid) ATTRIBUTE_RETURN_CHECK;
|
2008-08-13 10:52:15 +00:00
|
|
|
int virFileWritePid(const char *dir,
|
|
|
|
const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
pid_t pid) ATTRIBUTE_RETURN_CHECK;
|
2008-08-13 10:52:15 +00:00
|
|
|
int virFileReadPid(const char *dir,
|
|
|
|
const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
pid_t *pid) ATTRIBUTE_RETURN_CHECK;
|
2008-08-13 10:52:15 +00:00
|
|
|
int virFileDeletePid(const char *dir,
|
|
|
|
const char *name);
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2008-11-05 18:22:10 +00:00
|
|
|
char *virArgvToString(const char *const *argv);
|
|
|
|
|
2008-11-17 11:03:25 +00:00
|
|
|
int virStrToLong_i(char const *s,
|
2008-02-08 09:15:16 +00:00
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
int *result);
|
|
|
|
|
|
|
|
int virStrToLong_ui(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
unsigned int *result);
|
|
|
|
int virStrToLong_ll(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
long long *result);
|
2008-11-17 11:03:25 +00:00
|
|
|
int virStrToLong_ull(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
unsigned long long *result);
|
2009-07-09 13:11:21 +00:00
|
|
|
int virStrToDouble(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
double *result);
|
2008-11-17 11:03:25 +00:00
|
|
|
|
2010-08-27 21:13:45 +00:00
|
|
|
int virHexToBin(unsigned char c);
|
|
|
|
|
2008-11-17 11:03:25 +00:00
|
|
|
int virMacAddrCompare (const char *mac1, const char *mac2);
|
2008-02-27 16:14:44 +00:00
|
|
|
|
2008-02-27 04:35:08 +00:00
|
|
|
void virSkipSpaces(const char **str);
|
|
|
|
int virParseNumber(const char **str);
|
2010-03-30 14:15:13 +00:00
|
|
|
int virParseVersionString(const char *str, unsigned long *version);
|
2010-11-22 23:39:47 +00:00
|
|
|
int virAsprintf(char **strp, const char *fmt, ...)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_FMT_PRINTF(2, 3);
|
|
|
|
int virVasprintf(char **strp, const char *fmt, va_list list)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_FMT_PRINTF(2, 0);
|
2009-08-03 12:37:44 +00:00
|
|
|
char *virStrncpy(char *dest, const char *src, size_t n, size_t destbytes)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
|
|
|
char *virStrcpy(char *dest, const char *src, size_t destbytes)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
2010-03-09 18:22:22 +00:00
|
|
|
# define virStrcpyStatic(dest, src) virStrcpy((dest), (src), sizeof(dest))
|
2008-02-27 04:35:08 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define VIR_MAC_BUFLEN 6
|
|
|
|
# define VIR_MAC_PREFIX_BUFLEN 3
|
|
|
|
# define VIR_MAC_STRING_BUFLEN VIR_MAC_BUFLEN * 3
|
2008-10-24 11:20:08 +00:00
|
|
|
|
|
|
|
int virParseMacAddr(const char* str,
|
2009-10-16 10:09:13 +00:00
|
|
|
unsigned char *addr) ATTRIBUTE_RETURN_CHECK;
|
2008-10-24 11:20:08 +00:00
|
|
|
void virFormatMacAddr(const unsigned char *addr,
|
|
|
|
char *str);
|
|
|
|
void virGenerateMacAddr(const unsigned char *prefix,
|
|
|
|
unsigned char *addr);
|
2008-03-20 11:24:30 +00:00
|
|
|
|
2008-05-09 16:41:19 +00:00
|
|
|
int virDiskNameToIndex(const char* str);
|
2009-12-03 16:17:40 +00:00
|
|
|
char *virIndexToDiskName(int idx, const char *prefix);
|
2008-06-24 15:00:15 +00:00
|
|
|
|
|
|
|
int virEnumFromString(const char *const*types,
|
|
|
|
unsigned int ntypes,
|
|
|
|
const char *type);
|
|
|
|
|
|
|
|
const char *virEnumToString(const char *const*types,
|
|
|
|
unsigned int ntypes,
|
|
|
|
int type);
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define VIR_ENUM_IMPL(name, lastVal, ...) \
|
2009-02-03 13:08:59 +00:00
|
|
|
static const char *const name ## TypeList[] = { __VA_ARGS__ }; \
|
2008-07-11 16:23:36 +00:00
|
|
|
extern int (* name ## Verify (void)) [verify_true (ARRAY_CARDINALITY(name ## TypeList) == lastVal)]; \
|
2008-06-24 15:00:15 +00:00
|
|
|
const char *name ## TypeToString(int type) { \
|
|
|
|
return virEnumToString(name ## TypeList, \
|
|
|
|
ARRAY_CARDINALITY(name ## TypeList), \
|
|
|
|
type); \
|
|
|
|
} \
|
|
|
|
int name ## TypeFromString(const char *type) { \
|
|
|
|
return virEnumFromString(name ## TypeList, \
|
|
|
|
ARRAY_CARDINALITY(name ## TypeList), \
|
|
|
|
type); \
|
|
|
|
}
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define VIR_ENUM_DECL(name) \
|
2008-06-24 15:00:15 +00:00
|
|
|
const char *name ## TypeToString(int type); \
|
|
|
|
int name ## TypeFromString(const char*type);
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# ifndef HAVE_GETUID
|
2008-09-05 12:03:45 +00:00
|
|
|
static inline int getuid (void) { return 0; }
|
2010-03-09 18:22:22 +00:00
|
|
|
# endif
|
2008-09-05 12:03:45 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# ifndef HAVE_GETGID
|
2008-09-05 12:03:45 +00:00
|
|
|
static inline int getgid (void) { return 0; }
|
2010-03-09 18:22:22 +00:00
|
|
|
# endif
|
2008-09-05 12:03:45 +00:00
|
|
|
|
2009-10-23 17:01:22 +00:00
|
|
|
char *virGetHostname(virConnectPtr conn);
|
2009-01-07 10:43:16 +00:00
|
|
|
|
2009-01-06 17:46:46 +00:00
|
|
|
int virKillProcess(pid_t pid, int sig);
|
|
|
|
|
2010-02-04 22:41:52 +00:00
|
|
|
char *virGetUserDirectory(uid_t uid);
|
|
|
|
char *virGetUserName(uid_t uid);
|
|
|
|
int virGetUserID(const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
uid_t *uid) ATTRIBUTE_RETURN_CHECK;
|
2010-02-04 22:41:52 +00:00
|
|
|
int virGetGroupID(const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
gid_t *gid) ATTRIBUTE_RETURN_CHECK;
|
2009-01-22 19:41:48 +00:00
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virRandomInitialize(unsigned int seed) ATTRIBUTE_RETURN_CHECK;
|
2009-01-22 20:27:01 +00:00
|
|
|
int virRandom(int max);
|
|
|
|
|
Support configuration of huge pages in guests
Add option to domain XML for
<memoryBacking>
<hugepages/>
</memoryBacking>
* configure.in: Add check for mntent.h
* qemud/libvirtd_qemu.aug, qemud/test_libvirtd_qemu.aug, src/qemu.conf
Add 'hugetlbfs_mount' config parameter
* src/qemu_conf.c, src/qemu_conf.h: Check for -mem-path flag in QEMU,
and pass it when hugepages are requested.
Load hugetlbfs_mount config parameter, search for mount if not given.
* src/qemu_driver.c: Free hugetlbfs_mount/path parameter in driver shutdown.
Create directory for QEMU hugepage usage, chowning if required.
* docs/formatdomain.html.in: Document memoryBacking/hugepages elements
* docs/schemas/domain.rng: Add memoryBacking/hugepages elements to schema
* src/util.c, src/util.h, src/libvirt_private.syms: Add virFileFindMountPoint
helper API
* tests/qemuhelptest.c: Add -mem-path constants
* tests/qemuxml2argvtest.c, tests/qemuxml2xmltest.c: Add tests for hugepage
handling
* tests/qemuxml2argvdata/qemuxml2argv-hugepages.xml,
tests/qemuxml2argvdata/qemuxml2argv-hugepages.args: Data files for
hugepage tests
2009-08-25 14:05:18 +00:00
|
|
|
char *virFileFindMountPoint(const char *type);
|
|
|
|
|
2010-02-04 22:41:52 +00:00
|
|
|
void virFileWaitForDevices(void);
|
2009-09-10 13:21:10 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define virBuildPath(path, ...) virBuildPathInternal(path, __VA_ARGS__, NULL)
|
2009-11-12 21:48:24 +00:00
|
|
|
int virBuildPathInternal(char **path, ...) ATTRIBUTE_SENTINEL;
|
|
|
|
|
2010-11-01 04:17:14 +00:00
|
|
|
char *virTimestamp(void);
|
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
#endif /* __VIR_UTIL_H__ */
|