2007-07-19 16:22:40 +00:00
|
|
|
/*
|
|
|
|
* utils.h: common, generic utility functions
|
|
|
|
*
|
2012-01-02 22:03:19 +00:00
|
|
|
* Copyright (C) 2010-2012 Red Hat, Inc.
|
2007-07-19 16:22:40 +00:00
|
|
|
* Copyright (C) 2006, 2007 Binary Karma
|
|
|
|
* Copyright (C) 2006 Shuveb Hussain
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2012-07-21 10:06:23 +00:00
|
|
|
* License along with this library; If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
2007-07-19 16:22:40 +00:00
|
|
|
*
|
|
|
|
* File created Jul 18, 2007 - Shuveb Hussain <shuveb@binarykarma.com>
|
|
|
|
*/
|
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
#ifndef __VIR_UTIL_H__
|
2010-03-09 18:22:22 +00:00
|
|
|
# define __VIR_UTIL_H__
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# include "verify.h"
|
|
|
|
# include "internal.h"
|
|
|
|
# include <unistd.h>
|
|
|
|
# include <sys/select.h>
|
|
|
|
# include <sys/types.h>
|
2010-11-22 23:39:47 +00:00
|
|
|
# include <stdarg.h>
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-04-14 15:40:14 +00:00
|
|
|
# ifndef MIN
|
|
|
|
# define MIN(a, b) ((a) < (b) ? (a) : (b))
|
|
|
|
# endif
|
2011-07-20 02:08:15 +00:00
|
|
|
# ifndef MAX
|
|
|
|
# define MAX(a, b) ((a) > (b) ? (a) : (b))
|
|
|
|
# endif
|
2010-04-14 15:40:14 +00:00
|
|
|
|
2010-11-22 23:50:00 +00:00
|
|
|
ssize_t saferead(int fd, void *buf, size_t count) ATTRIBUTE_RETURN_CHECK;
|
2010-03-02 16:35:01 +00:00
|
|
|
ssize_t safewrite(int fd, const void *buf, size_t count)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
2011-07-06 22:32:10 +00:00
|
|
|
int safezero(int fd, off_t offset, off_t len)
|
2010-03-02 16:35:01 +00:00
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
2008-11-17 11:03:25 +00:00
|
|
|
|
2011-03-08 18:04:06 +00:00
|
|
|
int virSetBlocking(int fd, bool blocking) ATTRIBUTE_RETURN_CHECK;
|
2009-10-16 10:09:13 +00:00
|
|
|
int virSetNonBlock(int fd) ATTRIBUTE_RETURN_CHECK;
|
2011-03-26 11:19:28 +00:00
|
|
|
int virSetInherit(int fd, bool inherit) ATTRIBUTE_RETURN_CHECK;
|
2009-10-16 10:09:13 +00:00
|
|
|
int virSetCloseExec(int fd) ATTRIBUTE_RETURN_CHECK;
|
2009-01-20 16:36:34 +00:00
|
|
|
|
2010-03-26 10:50:10 +00:00
|
|
|
int virPipeReadUntilEOF(int outfd, int errfd,
|
|
|
|
char **outbuf, char **errbuf);
|
2007-07-19 16:22:40 +00:00
|
|
|
|
2010-12-23 06:44:02 +00:00
|
|
|
int virSetUIDGID(uid_t uid, gid_t gid);
|
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileReadLimFD(int fd, int maxlen, char **buf) ATTRIBUTE_RETURN_CHECK;
|
2008-09-02 10:29:51 +00:00
|
|
|
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileReadAll(const char *path, int maxlen, char **buf) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2010-12-03 09:47:08 +00:00
|
|
|
int virFileWriteStr(const char *path, const char *str, mode_t mode)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_RETURN_CHECK;
|
2009-02-13 19:13:06 +00:00
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
int virFileMatchesNameSuffix(const char *file,
|
|
|
|
const char *name,
|
|
|
|
const char *suffix);
|
|
|
|
|
|
|
|
int virFileHasSuffix(const char *str,
|
|
|
|
const char *suffix);
|
|
|
|
|
2008-08-20 19:42:36 +00:00
|
|
|
int virFileStripSuffix(char *str,
|
2009-10-16 10:09:13 +00:00
|
|
|
const char *suffix) ATTRIBUTE_RETURN_CHECK;
|
2008-08-20 19:42:36 +00:00
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
int virFileLinkPointsTo(const char *checkLink,
|
|
|
|
const char *checkDest);
|
2008-02-26 07:05:18 +00:00
|
|
|
|
2009-04-01 10:26:22 +00:00
|
|
|
int virFileResolveLink(const char *linkpath,
|
2009-10-16 10:09:13 +00:00
|
|
|
char **resultpath) ATTRIBUTE_RETURN_CHECK;
|
2012-01-17 21:33:02 +00:00
|
|
|
int virFileResolveAllLinks(const char *linkpath,
|
|
|
|
char **resultpath) ATTRIBUTE_RETURN_CHECK;
|
2009-04-01 10:26:22 +00:00
|
|
|
|
2011-08-16 19:36:22 +00:00
|
|
|
int virFileIsLink(const char *linkpath)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_RETURN_CHECK;
|
|
|
|
|
2009-06-11 13:18:56 +00:00
|
|
|
char *virFindFileInPath(const char *file);
|
|
|
|
|
2012-05-03 16:36:27 +00:00
|
|
|
bool virFileIsDir (const char *file) ATTRIBUTE_NONNULL(1);
|
2011-01-12 16:12:24 +00:00
|
|
|
bool virFileExists(const char *file) ATTRIBUTE_NONNULL(1);
|
|
|
|
bool virFileIsExecutable(const char *file) ATTRIBUTE_NONNULL(1);
|
2008-02-26 07:05:18 +00:00
|
|
|
|
2010-05-20 15:41:31 +00:00
|
|
|
char *virFileSanitizePath(const char *path);
|
|
|
|
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
enum {
|
2011-03-22 19:15:44 +00:00
|
|
|
VIR_FILE_OPEN_NONE = 0,
|
util: refactor virFileOpenAs
virFileOpenAs previously would only try opening a file as the current
user, or as a different user, but wouldn't try both methods in a
single call. This made it cumbersome to use as a replacement for
open(2). Additionally, it had a lot of historical baggage that led to
it being difficult to understand.
This patch refactors virFileOpenAs in the following ways:
* reorganize the code so that everything dealing with both the parent
and child sides of the "fork+setuid+setgid+open" method are in a
separate function. This makes the public function easier to understand.
* Allow a single call to virFileOpenAs() to first attempt the open as
the current user, and if that fails to automatically re-try after
doing fork+setuid (if deemed appropriate, i.e. errno indicates it
would now be successful, and the file is on a networkFS). This makes
it possible (in many, but possibly not all, cases) to drop-in
virFileOpenAs() as a replacement for open(2).
(NB: currently qemuOpenFile() calls virFileOpenAs() twice, once
without forking, then again with forking. That unfortunately can't
be changed without at least some discussion of the ramifications,
because the requested file permissions are different in each case,
which is something that a single call to virFileOpenAs() can't deal
with.)
* Add a flag so that any fchown() of the file to a different uid:gid
is explicitly requested when the function is called, rather than it
being implied by the presence of the O_CREAT flag. This just makes
for less subtle surprises to consumers. (Commit
b1643dc15c5de886fefe56ad18608d65f1325a2c added the check for O_CREAT
before forcing ownership. This patch just makes that restriction
more explicit.)
* If either the uid or gid is specified as "-1", virFileOpenAs will
interpret this to mean "the current [gu]id".
All current consumers of virFileOpenAs should retain their present
behavior (after a few minor changes to their setup code and
arguments).
2012-01-13 20:26:45 +00:00
|
|
|
VIR_FILE_OPEN_NOFORK = (1 << 0),
|
|
|
|
VIR_FILE_OPEN_FORK = (1 << 1),
|
|
|
|
VIR_FILE_OPEN_FORCE_MODE = (1 << 2),
|
|
|
|
VIR_FILE_OPEN_FORCE_OWNER = (1 << 3),
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
};
|
2011-10-17 16:00:28 +00:00
|
|
|
int virFileAccessibleAs(const char *path, int mode,
|
|
|
|
uid_t uid, gid_t gid)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_RETURN_CHECK;
|
2011-03-22 19:15:44 +00:00
|
|
|
int virFileOpenAs(const char *path, int openflags, mode_t mode,
|
|
|
|
uid_t uid, gid_t gid,
|
|
|
|
unsigned int flags)
|
2011-03-03 15:50:19 +00:00
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_RETURN_CHECK;
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
|
Rename virFileCreate to virFileOperation, add hook function
It turns out it is also useful to be able to perform other operations
on a file created while running as a different uid (eg, write things
to that file), and possibly to do this to a file that already
exists. This patch adds an optional hook function to the renamed (for
more accuracy of purpose) virFileOperation; the hook will be called
after the file has been opened (possibly created) and gid/mode
checked/set, before closing it.
As with the other operations on the file, if the VIR_FILE_OP_AS_UID
flag is set, this hook function will be called in the context of a
child process forked from the process that called virFileOperation.
The implication here is that, while all data in memory is available to
this hook function, any modification to that data will not be seen by
the caller - the only indication in memory of what happened in the
hook will be the return value (which the hook should set to 0 on
success, or one of the standard errno values on failure).
Another piece of making the function more flexible was to add an
"openflags" argument. This arg should contain exactly the flags to be
passed to open(2), eg O_RDWR | O_EXCL, etc.
In the process of adding the hook to virFileOperation, I also realized
that the bits to fix up file owner/group/mode settings after creation
were being done in the parent process, which could fail, so I moved
them to the child process where they should be.
* src/util/util.[ch]: rename and rework virFileCreate-->virFileOperation,
and redo flags in virDirCreate
* storage/storage_backend.c, storage/storage_backend_fs.c: update the
calls to virFileOperation/virDirCreate to reflect changes in the API,
but don't yet take advantage of the hook.
2010-02-19 16:43:22 +00:00
|
|
|
enum {
|
|
|
|
VIR_DIR_CREATE_NONE = 0,
|
|
|
|
VIR_DIR_CREATE_AS_UID = (1 << 0),
|
|
|
|
VIR_DIR_CREATE_FORCE_PERMS = (1 << 1),
|
|
|
|
VIR_DIR_CREATE_ALLOW_EXIST = (1 << 2),
|
|
|
|
};
|
New utility functions virFileCreate and virDirCreate
These functions create a new file or directory with the given
uid/gid. If the flag VIR_FILE_CREATE_AS_UID is given, they do this by
forking a new process, calling setuid/setgid in the new process, and
then creating the file. This is better than simply calling open then
fchown, because in the latter case, a root-squashing nfs server would
create the new file as user nobody, then refuse to allow fchown.
If VIR_FILE_CREATE_AS_UID is not specified, the simpler tactic of
creating the file/dir, then chowning is is used. This gives better
results in cases where the parent directory isn't on a root-squashing
NFS server, but doesn't give permission for the specified uid/gid to
create files. (Note that if the fork/setuid method fails to create the
file due to access privileges, the parent process will make a second
attempt using this simpler method.)
If the bit VIR_FILE_CREATE_ALLOW_EXIST is set in the flags, an
existing file/directory will not cause an error; in this case, the
function will simply set the permissions of the file/directory to
those requested. If VIR_FILE_CREATE_ALLOW_EXIST is not specified, an
existing file/directory is considered (and reported as) an error.
Return from both of these functions is 0 on success, or the value of
errno if there was a failure.
* src/util/util.[ch]: add the 2 new util functions
2010-01-20 23:33:43 +00:00
|
|
|
int virDirCreate(const char *path, mode_t mode, uid_t uid, gid_t gid,
|
|
|
|
unsigned int flags) ATTRIBUTE_RETURN_CHECK;
|
2009-10-16 10:09:13 +00:00
|
|
|
int virFileMakePath(const char *path) ATTRIBUTE_RETURN_CHECK;
|
2012-07-10 11:24:04 +00:00
|
|
|
int virFileMakePathWithMode(const char *path,
|
|
|
|
mode_t mode) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2011-04-03 09:21:14 +00:00
|
|
|
char *virFileBuildPath(const char *dir,
|
|
|
|
const char *name,
|
|
|
|
const char *ext) ATTRIBUTE_RETURN_CHECK;
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2012-05-24 13:37:54 +00:00
|
|
|
|
|
|
|
# ifdef WIN32
|
|
|
|
/* On Win32, the canonical directory separator is the backslash, and
|
|
|
|
* the search path separator is the semicolon. Note that also the
|
|
|
|
* (forward) slash works as directory separator.
|
|
|
|
*/
|
|
|
|
# define VIR_FILE_DIR_SEPARATOR '\\'
|
|
|
|
# define VIR_FILE_DIR_SEPARATOR_S "\\"
|
|
|
|
# define VIR_FILE_IS_DIR_SEPARATOR(c) ((c) == VIR_FILE_DIR_SEPARATOR || (c) == '/')
|
|
|
|
# define VIR_FILE_PATH_SEPARATOR ';'
|
|
|
|
# define VIR_FILE_PATH_SEPARATOR_S ";"
|
|
|
|
|
|
|
|
# else /* !WIN32 */
|
|
|
|
|
|
|
|
# define VIR_FILE_DIR_SEPARATOR '/'
|
|
|
|
# define VIR_FILE_DIR_SEPARATOR_S "/"
|
|
|
|
# define VIR_FILE_IS_DIR_SEPARATOR(c) ((c) == VIR_FILE_DIR_SEPARATOR)
|
|
|
|
# define VIR_FILE_PATH_SEPARATOR ':'
|
|
|
|
# define VIR_FILE_PATH_SEPARATOR_S ":"
|
|
|
|
|
|
|
|
# endif /* !WIN32 */
|
|
|
|
|
|
|
|
bool virFileIsAbsPath(const char *path);
|
2009-10-08 14:55:58 +00:00
|
|
|
int virFileAbsPath(const char *path,
|
2009-10-16 10:09:13 +00:00
|
|
|
char **abspath) ATTRIBUTE_RETURN_CHECK;
|
2012-05-24 13:37:54 +00:00
|
|
|
const char *virFileSkipRoot(const char *path);
|
2009-10-08 14:55:58 +00:00
|
|
|
|
2008-08-13 10:52:15 +00:00
|
|
|
int virFileOpenTty(int *ttymaster,
|
|
|
|
char **ttyName,
|
|
|
|
int rawmode);
|
2007-12-03 14:30:46 +00:00
|
|
|
|
2008-11-05 18:22:10 +00:00
|
|
|
char *virArgvToString(const char *const *argv);
|
|
|
|
|
2008-11-17 11:03:25 +00:00
|
|
|
int virStrToLong_i(char const *s,
|
2008-02-08 09:15:16 +00:00
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
int *result);
|
|
|
|
|
|
|
|
int virStrToLong_ui(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
unsigned int *result);
|
2011-01-13 22:09:18 +00:00
|
|
|
int virStrToLong_l(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
long *result);
|
|
|
|
int virStrToLong_ul(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
unsigned long *result);
|
2008-02-08 09:15:16 +00:00
|
|
|
int virStrToLong_ll(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
long long *result);
|
2008-11-17 11:03:25 +00:00
|
|
|
int virStrToLong_ull(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
int base,
|
|
|
|
unsigned long long *result);
|
2009-07-09 13:11:21 +00:00
|
|
|
int virStrToDouble(char const *s,
|
|
|
|
char **end_ptr,
|
|
|
|
double *result);
|
2008-11-17 11:03:25 +00:00
|
|
|
|
2012-03-05 16:28:59 +00:00
|
|
|
int virScaleInteger(unsigned long long *value, const char *suffix,
|
|
|
|
unsigned long long scale, unsigned long long limit)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_RETURN_CHECK;
|
|
|
|
|
2010-08-27 21:13:45 +00:00
|
|
|
int virHexToBin(unsigned char c);
|
|
|
|
|
2011-06-29 17:47:08 +00:00
|
|
|
void virSkipSpaces(const char **str) ATTRIBUTE_NONNULL(1);
|
|
|
|
void virSkipSpacesAndBackslash(const char **str) ATTRIBUTE_NONNULL(1);
|
|
|
|
void virTrimSpaces(char *str, char **endp) ATTRIBUTE_NONNULL(1);
|
|
|
|
void virSkipSpacesBackwards(const char *str, char **endp)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2);
|
|
|
|
|
2008-02-27 04:35:08 +00:00
|
|
|
int virParseNumber(const char **str);
|
2011-07-01 13:23:02 +00:00
|
|
|
int virParseVersionString(const char *str, unsigned long *version,
|
|
|
|
bool allowMissing);
|
2010-11-22 23:39:47 +00:00
|
|
|
int virAsprintf(char **strp, const char *fmt, ...)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_FMT_PRINTF(2, 3);
|
|
|
|
int virVasprintf(char **strp, const char *fmt, va_list list)
|
|
|
|
ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_FMT_PRINTF(2, 0);
|
2009-08-03 12:37:44 +00:00
|
|
|
char *virStrncpy(char *dest, const char *src, size_t n, size_t destbytes)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
|
|
|
char *virStrcpy(char *dest, const char *src, size_t destbytes)
|
|
|
|
ATTRIBUTE_RETURN_CHECK;
|
2010-03-09 18:22:22 +00:00
|
|
|
# define virStrcpyStatic(dest, src) virStrcpy((dest), (src), sizeof(dest))
|
2008-02-27 04:35:08 +00:00
|
|
|
|
2008-05-09 16:41:19 +00:00
|
|
|
int virDiskNameToIndex(const char* str);
|
2009-12-03 16:17:40 +00:00
|
|
|
char *virIndexToDiskName(int idx, const char *prefix);
|
2008-06-24 15:00:15 +00:00
|
|
|
|
|
|
|
int virEnumFromString(const char *const*types,
|
|
|
|
unsigned int ntypes,
|
|
|
|
const char *type);
|
|
|
|
|
|
|
|
const char *virEnumToString(const char *const*types,
|
|
|
|
unsigned int ntypes,
|
|
|
|
int type);
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define VIR_ENUM_IMPL(name, lastVal, ...) \
|
2009-02-03 13:08:59 +00:00
|
|
|
static const char *const name ## TypeList[] = { __VA_ARGS__ }; \
|
2011-08-26 16:17:48 +00:00
|
|
|
verify(ARRAY_CARDINALITY(name ## TypeList) == lastVal); \
|
2008-06-24 15:00:15 +00:00
|
|
|
const char *name ## TypeToString(int type) { \
|
|
|
|
return virEnumToString(name ## TypeList, \
|
|
|
|
ARRAY_CARDINALITY(name ## TypeList), \
|
|
|
|
type); \
|
|
|
|
} \
|
|
|
|
int name ## TypeFromString(const char *type) { \
|
|
|
|
return virEnumFromString(name ## TypeList, \
|
|
|
|
ARRAY_CARDINALITY(name ## TypeList), \
|
|
|
|
type); \
|
|
|
|
}
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define VIR_ENUM_DECL(name) \
|
2008-06-24 15:00:15 +00:00
|
|
|
const char *name ## TypeToString(int type); \
|
|
|
|
int name ## TypeFromString(const char*type);
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# ifndef HAVE_GETUID
|
2008-09-05 12:03:45 +00:00
|
|
|
static inline int getuid (void) { return 0; }
|
2010-03-09 18:22:22 +00:00
|
|
|
# endif
|
2008-09-05 12:03:45 +00:00
|
|
|
|
2011-03-11 15:49:39 +00:00
|
|
|
# ifndef HAVE_GETEUID
|
|
|
|
static inline int geteuid (void) { return 0; }
|
|
|
|
# endif
|
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# ifndef HAVE_GETGID
|
2008-09-05 12:03:45 +00:00
|
|
|
static inline int getgid (void) { return 0; }
|
2010-03-09 18:22:22 +00:00
|
|
|
# endif
|
2008-09-05 12:03:45 +00:00
|
|
|
|
2009-10-23 17:01:22 +00:00
|
|
|
char *virGetHostname(virConnectPtr conn);
|
2009-01-07 10:43:16 +00:00
|
|
|
|
2009-01-06 17:46:46 +00:00
|
|
|
int virKillProcess(pid_t pid, int sig);
|
|
|
|
|
2012-05-24 12:29:42 +00:00
|
|
|
char *virGetUserDirectory(void);
|
|
|
|
char *virGetUserConfigDirectory(void);
|
|
|
|
char *virGetUserCacheDirectory(void);
|
|
|
|
char *virGetUserRuntimeDirectory(void);
|
2010-02-04 22:41:52 +00:00
|
|
|
char *virGetUserName(uid_t uid);
|
2011-12-16 00:55:19 +00:00
|
|
|
char *virGetGroupName(gid_t gid);
|
2010-02-04 22:41:52 +00:00
|
|
|
int virGetUserID(const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
uid_t *uid) ATTRIBUTE_RETURN_CHECK;
|
2010-02-04 22:41:52 +00:00
|
|
|
int virGetGroupID(const char *name,
|
2009-10-16 10:09:13 +00:00
|
|
|
gid_t *gid) ATTRIBUTE_RETURN_CHECK;
|
2009-01-22 19:41:48 +00:00
|
|
|
|
Support configuration of huge pages in guests
Add option to domain XML for
<memoryBacking>
<hugepages/>
</memoryBacking>
* configure.in: Add check for mntent.h
* qemud/libvirtd_qemu.aug, qemud/test_libvirtd_qemu.aug, src/qemu.conf
Add 'hugetlbfs_mount' config parameter
* src/qemu_conf.c, src/qemu_conf.h: Check for -mem-path flag in QEMU,
and pass it when hugepages are requested.
Load hugetlbfs_mount config parameter, search for mount if not given.
* src/qemu_driver.c: Free hugetlbfs_mount/path parameter in driver shutdown.
Create directory for QEMU hugepage usage, chowning if required.
* docs/formatdomain.html.in: Document memoryBacking/hugepages elements
* docs/schemas/domain.rng: Add memoryBacking/hugepages elements to schema
* src/util.c, src/util.h, src/libvirt_private.syms: Add virFileFindMountPoint
helper API
* tests/qemuhelptest.c: Add -mem-path constants
* tests/qemuxml2argvtest.c, tests/qemuxml2xmltest.c: Add tests for hugepage
handling
* tests/qemuxml2argvdata/qemuxml2argv-hugepages.xml,
tests/qemuxml2argvdata/qemuxml2argv-hugepages.args: Data files for
hugepage tests
2009-08-25 14:05:18 +00:00
|
|
|
char *virFileFindMountPoint(const char *type);
|
|
|
|
|
2010-02-04 22:41:52 +00:00
|
|
|
void virFileWaitForDevices(void);
|
2009-09-10 13:21:10 +00:00
|
|
|
|
2010-03-09 18:22:22 +00:00
|
|
|
# define virBuildPath(path, ...) virBuildPathInternal(path, __VA_ARGS__, NULL)
|
2009-11-12 21:48:24 +00:00
|
|
|
int virBuildPathInternal(char **path, ...) ATTRIBUTE_SENTINEL;
|
|
|
|
|
2011-09-16 12:05:58 +00:00
|
|
|
bool virIsDevMapperDevice(const char *dev_name) ATTRIBUTE_NONNULL(1);
|
2011-04-29 09:28:28 +00:00
|
|
|
|
2007-12-03 14:30:46 +00:00
|
|
|
#endif /* __VIR_UTIL_H__ */
|