remote_driver.c 272.4 KB
Newer Older
1 2 3 4
/*
 * remote_internal.c: driver to provide access to libvirtd running
 *   on a remote machine
 *
5
 * Copyright (C) 2007-2010 Red Hat, Inc.
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Richard Jones <rjones@redhat.com>
 */

24
#include <config.h>
25

26 27 28
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
29
#include <string.h>
30 31 32
#include <assert.h>
#include <signal.h>
#include <sys/types.h>
33 34
#include <sys/stat.h>
#include <fcntl.h>
35

36 37 38 39 40
/* Windows socket compatibility functions. */
#include <errno.h>
#include <sys/socket.h>

#ifndef HAVE_WINSOCK2_H /* Unix & Cygwin. */
41 42 43 44 45 46
# include <sys/un.h>
# include <net/if.h>
# include <netinet/in.h>
# include <netinet/tcp.h>
#endif

47
#ifdef HAVE_SYS_WAIT_H
48
# include <sys/wait.h>
49 50 51
#endif

#ifdef HAVE_PWD_H
52
# include <pwd.h>
53 54 55
#endif

#ifdef HAVE_PATHS_H
56
# include <paths.h>
57 58
#endif

59
#include <rpc/types.h>
60 61 62
#include <rpc/xdr.h>
#include <gnutls/gnutls.h>
#include <gnutls/x509.h>
63
#include "gnutls_1_0_compat.h"
64
#if HAVE_SASL
65
# include <sasl/sasl.h>
66
#endif
67 68
#include <libxml/uri.h>

J
Jim Meyering 已提交
69
#include <netdb.h>
70

71 72
#include <poll.h>

73 74 75 76 77
/* AI_ADDRCONFIG is missing on some systems. */
#ifndef AI_ADDRCONFIG
# define AI_ADDRCONFIG 0
#endif

78
#include "virterror_internal.h"
79
#include "logging.h"
80
#include "datatypes.h"
81
#include "domain_event.h"
82
#include "driver.h"
83 84
#include "buf.h"
#include "qparams.h"
85
#include "remote_driver.h"
86
#include "remote_protocol.h"
87
#include "memory.h"
88
#include "util.h"
89
#include "event.h"
90
#include "ignore-value.h"
91

92 93
#define VIR_FROM_THIS VIR_FROM_REMOTE

94
#ifdef WIN32
95
# define pipe(fds) _pipe(fds,4096, _O_BINARY)
96 97 98
#endif


99 100
static int inside_daemon = 0;

101 102 103 104 105 106 107 108 109 110 111 112 113
struct remote_thread_call;


enum {
    REMOTE_MODE_WAIT_TX,
    REMOTE_MODE_WAIT_RX,
    REMOTE_MODE_COMPLETE,
    REMOTE_MODE_ERROR,
};

struct remote_thread_call {
    int mode;

114 115
    /* Buffer for outgoing data packet
     * 4 byte length, followed by RPC message header+body */
116 117 118 119 120 121 122 123 124
    char buffer[4 + REMOTE_MESSAGE_MAX];
    unsigned int bufferLength;
    unsigned int bufferOffset;

    unsigned int serial;
    unsigned int proc_nr;

    virCond cond;

125
    int want_reply;
126 127 128 129 130 131 132 133
    xdrproc_t ret_filter;
    char *ret;

    remote_error err;

    struct remote_thread_call *next;
};

134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153
struct private_stream_data {
    unsigned int has_error : 1;
    remote_error err;

    unsigned int serial;
    unsigned int proc_nr;

    /* XXX this is potentially unbounded if the client
     * app has domain events registered, since packets
     * may be read off wire, while app isn't ready to
     * recv them. Figure out how to address this some
     * time....
     */
    char *incoming;
    unsigned int incomingOffset;
    unsigned int incomingLength;

    struct private_stream_data *next;
};

154
struct private_data {
155 156
    virMutex lock;

157
    int sock;                   /* Socket. */
158
    int errfd;                /* File handle connected to remote stderr */
159
    int watch;                  /* File handle watch */
160
    pid_t pid;                  /* PID of tunnel process */
161
    int uses_tls;               /* TLS enabled on socket? */
162
    int is_secure;              /* Secure if TLS or SASL or UNIX sockets */
163 164 165
    gnutls_session_t session;   /* GnuTLS session (if uses_tls != 0). */
    char *type;                 /* Cached return from remoteType. */
    int counter;                /* Generates serial numbers for RPC. */
166
    int localUses;              /* Ref count for private data */
167 168
    char *hostname;             /* Original hostname */
    FILE *debugLog;             /* Debug remote protocol */
169

170 171
#if HAVE_SASL
    sasl_conn_t *saslconn;      /* SASL context */
172

173 174 175
    const char *saslDecoded;
    unsigned int saslDecodedLength;
    unsigned int saslDecodedOffset;
176 177 178 179

    const char *saslEncoded;
    unsigned int saslEncodedLength;
    unsigned int saslEncodedOffset;
180
#endif
181

182 183
    /* Buffer for incoming data packets
     * 4 byte length, followed by RPC message header+body */
184 185 186 187
    char buffer[4 + REMOTE_MESSAGE_MAX];
    unsigned int bufferLength;
    unsigned int bufferOffset;

188 189 190 191 192 193 194
    /* The list of domain event callbacks */
    virDomainEventCallbackListPtr callbackList;
    /* The queue of domain events generated
       during a call / response rpc          */
    virDomainEventQueuePtr domainEvents;
    /* Timer for flushing domainEvents queue */
    int eventFlushTimer;
195 196
    /* Flag if we're in process of dispatching */
    int domainEventDispatching;
197 198 199 200 201 202 203

    /* Self-pipe to wakeup threads waiting in poll() */
    int wakeupSendFD;
    int wakeupReadFD;

    /* List of threads currently waiting for dispatch */
    struct remote_thread_call *waitDispatch;
204 205

    struct private_stream_data *streams;
206 207
};

208 209 210 211 212 213
enum {
    REMOTE_CALL_IN_OPEN = 1,
    REMOTE_CALL_QUIET_MISSING_RPC = 2,
};


214 215 216 217 218 219 220 221 222 223
static void remoteDriverLock(struct private_data *driver)
{
    virMutexLock(&driver->lock);
}

static void remoteDriverUnlock(struct private_data *driver)
{
    virMutexUnlock(&driver->lock);
}

224 225 226 227
static int remoteIO(virConnectPtr conn,
                    struct private_data *priv,
                    int flags,
                    struct remote_thread_call *thiscall);
228 229 230 231
static int call (virConnectPtr conn, struct private_data *priv,
                 int flags, int proc_nr,
                 xdrproc_t args_filter, char *args,
                 xdrproc_t ret_filter, char *ret);
232 233
static int remoteAuthenticate (virConnectPtr conn, struct private_data *priv, int in_open,
                               virConnectAuthPtr auth, const char *authtype);
234
#if HAVE_SASL
235 236
static int remoteAuthSASL (virConnectPtr conn, struct private_data *priv, int in_open,
                           virConnectAuthPtr auth, const char *mech);
237
#endif
238
#if HAVE_POLKIT
239 240
static int remoteAuthPolkit (virConnectPtr conn, struct private_data *priv, int in_open,
                             virConnectAuthPtr auth);
241
#endif /* HAVE_POLKIT */
242 243 244
#define error(conn, code, info)                                 \
    virReportErrorHelper(conn, VIR_FROM_QEMU, code, __FILE__,   \
                         __FUNCTION__, __LINE__, "%s", info)
245
#define errorf(conn, code, ...)                                 \
246
    virReportErrorHelper(conn, VIR_FROM_QEMU, code, __FILE__,   \
247
                         __FUNCTION__, __LINE__, __VA_ARGS__)
248

249 250
static virDomainPtr get_nonnull_domain (virConnectPtr conn, remote_nonnull_domain domain);
static virNetworkPtr get_nonnull_network (virConnectPtr conn, remote_nonnull_network network);
251
static virInterfacePtr get_nonnull_interface (virConnectPtr conn, remote_nonnull_interface iface);
252 253
static virStoragePoolPtr get_nonnull_storage_pool (virConnectPtr conn, remote_nonnull_storage_pool pool);
static virStorageVolPtr get_nonnull_storage_vol (virConnectPtr conn, remote_nonnull_storage_vol vol);
254
static virNodeDevicePtr get_nonnull_node_device (virConnectPtr conn, remote_nonnull_node_device dev);
255
static virSecretPtr get_nonnull_secret (virConnectPtr conn, remote_nonnull_secret secret);
256 257
static void make_nonnull_domain (remote_nonnull_domain *dom_dst, virDomainPtr dom_src);
static void make_nonnull_network (remote_nonnull_network *net_dst, virNetworkPtr net_src);
D
Daniel Veillard 已提交
258
static void make_nonnull_interface (remote_nonnull_interface *interface_dst, virInterfacePtr interface_src);
259 260
static void make_nonnull_storage_pool (remote_nonnull_storage_pool *pool_dst, virStoragePoolPtr vol_src);
static void make_nonnull_storage_vol (remote_nonnull_storage_vol *vol_dst, virStorageVolPtr vol_src);
261
static void make_nonnull_secret (remote_nonnull_secret *secret_dst, virSecretPtr secret_src);
262
void remoteDomainEventFired(int watch, int fd, int event, void *data);
263 264
static void remoteDomainQueueEvent(virConnectPtr conn, XDR *xdr);
void remoteDomainEventQueueFlush(int timer, void *opaque);
265 266 267 268 269 270 271
/*----------------------------------------------------------------------*/

/* Helper functions for remoteOpen. */
static char *get_transport_from_scheme (char *scheme);

/* GnuTLS functions used by remoteOpen. */
static int initialise_gnutls (virConnectPtr conn);
272
static gnutls_session_t negotiate_gnutls_on_connection (virConnectPtr conn, struct private_data *priv, int no_verify);
273

A
Atsushi SAKAI 已提交
274
#ifdef WITH_LIBVIRTD
275
static int
276
remoteStartup(int privileged ATTRIBUTE_UNUSED)
277 278 279 280 281 282 283
{
    /* Mark that we're inside the daemon so we can avoid
     * re-entering ourselves
     */
    inside_daemon = 1;
    return 0;
}
A
Atsushi SAKAI 已提交
284
#endif
285

286
#ifndef WIN32
287 288 289 290
/**
 * remoteFindServerPath:
 *
 * Tries to find the path to the libvirtd binary.
291
 *
292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322
 * Returns path on success or NULL in case of error.
 */
static const char *
remoteFindDaemonPath(void)
{
    static const char *serverPaths[] = {
        SBINDIR "/libvirtd",
        SBINDIR "/libvirtd_dbg",
        NULL
    };
    int i;
    const char *customDaemon = getenv("LIBVIRTD_PATH");

    if (customDaemon)
        return(customDaemon);

    for (i = 0; serverPaths[i]; i++) {
        if (access(serverPaths[i], X_OK | R_OK) == 0) {
            return serverPaths[i];
        }
    }
    return NULL;
}

/**
 * qemuForkDaemon:
 *
 * Forks and try to launch the libvirtd daemon
 *
 * Returns 0 in case of success or -1 in case of detected error.
 */
323
static int
324 325 326
remoteForkDaemon(virConnectPtr conn)
{
    const char *daemonPath = remoteFindDaemonPath();
327
    const char *const daemonargs[] = { daemonPath, "--timeout=30", NULL };
328
    pid_t pid;
329 330

    if (!daemonPath) {
331
        error(conn, VIR_ERR_INTERNAL_ERROR, _("failed to find libvirtd binary"));
332
        return -1;
333 334
    }

335
    if (virExecDaemonize(daemonargs, NULL, NULL,
336 337
                         &pid, -1, NULL, NULL,
                         VIR_EXEC_CLEAR_CAPS,
338
                         NULL, NULL, NULL) < 0)
339
        return -1;
340

341
    return 0;
342
}
343
#endif
344

345
enum virDrvOpenRemoteFlags {
346
    VIR_DRV_OPEN_REMOTE_RO = (1 << 0),
347 348
    VIR_DRV_OPEN_REMOTE_USER      = (1 << 1), /* Use the per-user socket path */
    VIR_DRV_OPEN_REMOTE_AUTOSTART = (1 << 2), /* Autostart a per-user daemon */
349
};
350

351

352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368
/*
 * URIs that this driver needs to handle:
 *
 * The easy answer:
 *   - Everything that no one else has yet claimed, but nothing if
 *     we're inside the libvirtd daemon
 *
 * The hard answer:
 *   - Plain paths (///var/lib/xen/xend-socket)  -> UNIX domain socket
 *   - xxx://servername/      -> TLS connection
 *   - xxx+tls://servername/  -> TLS connection
 *   - xxx+tls:///            -> TLS connection to localhost
 *   - xxx+tcp://servername/  -> TCP connection
 *   - xxx+tcp:///            -> TCP connection to localhost
 *   - xxx+unix:///           -> UNIX domain socket
 *   - xxx:///                -> UNIX domain socket
 */
369
static int
370 371 372 373
doRemoteOpen (virConnectPtr conn,
              struct private_data *priv,
              virConnectAuthPtr auth ATTRIBUTE_UNUSED,
              int flags)
374
{
375
    struct qparam_set *vars = NULL;
376
    int wakeupFD[2] = { -1, -1 };
377
    char *transport_str = NULL;
378 379 380 381 382 383 384
    enum {
        trans_tls,
        trans_unix,
        trans_ssh,
        trans_ext,
        trans_tcp,
    } transport;
385

386 387
    /* We handle *ALL*  URIs here. The caller has rejected any
     * URIs we don't care about */
388

389 390 391
    if (conn->uri) {
        if (!conn->uri->scheme) {
            /* This is the ///var/lib/xen/xend-socket local path style */
392
            transport = trans_unix;
393 394
        } else {
            transport_str = get_transport_from_scheme (conn->uri->scheme);
395

396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422
            if (!transport_str) {
                if (conn->uri->server)
                    transport = trans_tls;
                else
                    transport = trans_unix;
            } else {
                if (STRCASEEQ (transport_str, "tls"))
                    transport = trans_tls;
                else if (STRCASEEQ (transport_str, "unix"))
                    transport = trans_unix;
                else if (STRCASEEQ (transport_str, "ssh"))
                    transport = trans_ssh;
                else if (STRCASEEQ (transport_str, "ext"))
                    transport = trans_ext;
                else if (STRCASEEQ (transport_str, "tcp"))
                    transport = trans_tcp;
                else {
                    error (conn, VIR_ERR_INVALID_ARG,
                           _("remote_open: transport in URL not recognised "
                             "(should be tls|unix|ssh|ext|tcp)"));
                    return VIR_DRV_OPEN_ERROR;
                }
            }
        }
    } else {
        /* No URI, then must be probing so use UNIX socket */
        transport = trans_unix;
423
    }
424

425 426 427
    /* Local variables which we will initialise. These can
     * get freed in the failed: path.
     */
428 429
    char *name = NULL, *command = NULL, *sockname = NULL, *netcat = NULL;
    char *port = NULL, *authtype = NULL, *username = NULL;
430
    int no_verify = 0, no_tty = 0;
431
    char **cmd_argv = NULL;
432

433 434 435
    /* Return code from this function, and the private data. */
    int retcode = VIR_DRV_OPEN_ERROR;

436
    /* Remote server defaults to "localhost" if not specified. */
437
    if (conn->uri && conn->uri->port != 0) {
438
        if (virAsprintf(&port, "%d", conn->uri->port) == -1) goto out_of_memory;
439 440 441 442 443 444 445
    } else if (transport == trans_tls) {
        port = strdup (LIBVIRTD_TLS_PORT);
        if (!port) goto out_of_memory;
    } else if (transport == trans_tcp) {
        port = strdup (LIBVIRTD_TCP_PORT);
        if (!port) goto out_of_memory;
    } else
446
        port = NULL; /* Port not used for unix, ext., default for ssh */
447

448

449 450
    priv->hostname = strdup (conn->uri && conn->uri->server ?
                             conn->uri->server : "localhost");
451 452
    if (!priv->hostname)
        goto out_of_memory;
453 454
    if (conn->uri && conn->uri->user) {
        username = strdup (conn->uri->user);
455 456
        if (!username)
            goto out_of_memory;
457 458
    }

459 460 461 462 463
    /* Get the variables from the query string.
     * Then we need to reconstruct the query string (because
     * feasibly it might contain variables needed by the real driver,
     * although that won't be the case for now).
     */
464 465
    struct qparam *var;
    int i;
466 467
    char *query;

468
    if (conn->uri) {
469
#ifdef HAVE_XMLURI_QUERY_RAW
470
        query = conn->uri->query_raw;
471
#else
472
        query = conn->uri->query;
473
#endif
474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514
        vars = qparam_query_parse (query);
        if (vars == NULL) goto failed;

        for (i = 0; i < vars->n; i++) {
            var = &vars->p[i];
            if (STRCASEEQ (var->name, "name")) {
                name = strdup (var->value);
                if (!name) goto out_of_memory;
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "command")) {
                command = strdup (var->value);
                if (!command) goto out_of_memory;
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "socket")) {
                sockname = strdup (var->value);
                if (!sockname) goto out_of_memory;
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "auth")) {
                authtype = strdup (var->value);
                if (!authtype) goto out_of_memory;
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "netcat")) {
                netcat = strdup (var->value);
                if (!netcat) goto out_of_memory;
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "no_verify")) {
                no_verify = atoi (var->value);
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "no_tty")) {
                no_tty = atoi (var->value);
                var->ignore = 1;
            } else if (STRCASEEQ (var->name, "debug")) {
                if (var->value &&
                    STRCASEEQ (var->value, "stdout"))
                    priv->debugLog = stdout;
                else
                    priv->debugLog = stderr;
            } else
                DEBUG("passing through variable '%s' ('%s') to remote end",
                      var->name, var->value);
        }
515

516 517
        /* Construct the original name. */
        if (!name) {
518 519 520
            if (conn->uri->scheme &&
                (STREQ(conn->uri->scheme, "remote") ||
                 STRPREFIX(conn->uri->scheme, "remote+"))) {
521 522 523 524 525
                /* Allow remote serve to probe */
                name = strdup("");
            } else {
                xmlURI tmpuri = {
                    .scheme = conn->uri->scheme,
526
#ifdef HAVE_XMLURI_QUERY_RAW
527
                    .query_raw = qparam_get_query (vars),
528
#else
529
                    .query = qparam_get_query (vars),
530
#endif
531 532 533 534 535 536 537 538 539
                    .path = conn->uri->path,
                    .fragment = conn->uri->fragment,
                };

                /* Evil, blank out transport scheme temporarily */
                if (transport_str) {
                    assert (transport_str[-1] == '+');
                    transport_str[-1] = '\0';
                }
540

541
                name = (char *) xmlSaveUri (&tmpuri);
542

543 544 545 546 547 548 549 550 551 552
#ifdef HAVE_XMLURI_QUERY_RAW
                VIR_FREE(tmpuri.query_raw);
#else
                VIR_FREE(tmpuri.query);
#endif

                /* Restore transport scheme */
                if (transport_str)
                    transport_str[-1] = '+';
            }
553 554
        }

555
        free_qparam_set (vars);
556
        vars = NULL;
557 558 559 560
    } else {
        /* Probe URI server side */
        name = strdup("");
    }
561

562
    if (!name) {
563
        virReportOOMError();
564
        goto failed;
565 566
    }

567
    DEBUG("proceeding with name = %s", name);
568

569 570 571 572 573 574 575
    /* For ext transport, command is required. */
    if (transport == trans_ext && !command) {
        error (conn, VIR_ERR_INVALID_ARG,
               _("remote_open: for 'ext' transport, command is required"));
        goto failed;
    }

576 577 578 579
    /* Connect to the remote service. */
    switch (transport) {
    case trans_tls:
        if (initialise_gnutls (conn) == -1) goto failed;
580
        priv->uses_tls = 1;
581
        priv->is_secure = 1;
582 583 584 585 586 587

        /*FALLTHROUGH*/
    case trans_tcp: {
        // http://people.redhat.com/drepper/userapi-ipv6.html
        struct addrinfo *res, *r;
        struct addrinfo hints;
588
        int saved_errno = EINVAL;
589 590 591
        memset (&hints, 0, sizeof hints);
        hints.ai_socktype = SOCK_STREAM;
        hints.ai_flags = AI_ADDRCONFIG;
592
        int e = getaddrinfo (priv->hostname, port, &hints, &res);
593
        if (e != 0) {
594 595 596
            errorf (conn, VIR_ERR_SYSTEM_ERROR,
                    _("unable to resolve hostname '%s': %s"),
                    priv->hostname, gai_strerror (e));
597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613
            goto failed;
        }

        /* Try to connect to each returned address in turn. */
        /* XXX This loop contains a subtle problem.  In the case
         * where a host is accessible over IPv4 and IPv6, it will
         * try the IPv4 and IPv6 addresses in turn.  However it
         * should be able to present different client certificates
         * (because the commonName field in a client cert contains
         * the client IP address, which is different for IPv4 and
         * IPv6).  At the moment we only have a single client
         * certificate, and no way to specify what address family
         * that certificate belongs to.
         */
        for (r = res; r; r = r->ai_next) {
            int no_slow_start = 1;

614 615
            priv->sock = socket (r->ai_family, SOCK_STREAM, 0);
            if (priv->sock == -1) {
J
Jim Meyering 已提交
616
                saved_errno = errno;
617 618 619 620
                continue;
            }

            /* Disable Nagle - Dan Berrange. */
621
            setsockopt (priv->sock,
622 623 624
                        IPPROTO_TCP, TCP_NODELAY, (void *)&no_slow_start,
                        sizeof no_slow_start);

625
            if (connect (priv->sock, r->ai_addr, r->ai_addrlen) == -1) {
J
Jim Meyering 已提交
626
                saved_errno = errno;
627
                close (priv->sock);
628 629 630
                continue;
            }

631 632
            if (priv->uses_tls) {
                priv->session =
633
                    negotiate_gnutls_on_connection
634
                      (conn, priv, no_verify);
635 636 637
                if (!priv->session) {
                    close (priv->sock);
                    priv->sock = -1;
638
                    goto failed;
639 640 641 642 643 644
                }
            }
            goto tcp_connected;
        }

        freeaddrinfo (res);
645
        virReportSystemError(saved_errno,
646
                             _("unable to connect to libvirtd at '%s'"),
647
                             priv->hostname);
648 649 650 651 652 653 654 655 656 657
        goto failed;

       tcp_connected:
        freeaddrinfo (res);

        // NB. All versioning is done by the RPC headers, so we don't
        // need to worry (at this point anyway) about versioning.
        break;
    }

658
#ifndef WIN32
659 660
    case trans_unix: {
        if (!sockname) {
661
            if (flags & VIR_DRV_OPEN_REMOTE_USER) {
662
                char *userdir = virGetUserDirectory(getuid());
663

664
                if (!userdir)
665
                    goto failed;
666

667 668
                if (virAsprintf(&sockname, "@%s" LIBVIRTD_USER_UNIX_SOCKET, userdir) < 0) {
                    VIR_FREE(userdir);
669
                    goto out_of_memory;
670 671
                }
                VIR_FREE(userdir);
672
            } else {
673
                if (flags & VIR_DRV_OPEN_REMOTE_RO)
674 675 676
                    sockname = strdup (LIBVIRTD_PRIV_UNIX_SOCKET_RO);
                else
                    sockname = strdup (LIBVIRTD_PRIV_UNIX_SOCKET);
677 678
                if (sockname == NULL)
                    goto out_of_memory;
679
            }
680 681
        }

682 683 684
# ifndef UNIX_PATH_MAX
#  define UNIX_PATH_MAX(addr) (sizeof (addr).sun_path)
# endif
685
        struct sockaddr_un addr;
686 687
        int trials = 0;

688 689
        memset (&addr, 0, sizeof addr);
        addr.sun_family = AF_UNIX;
C
Chris Lalancette 已提交
690 691 692 693 694
        if (virStrcpyStatic(addr.sun_path, sockname) == NULL) {
            errorf(conn, VIR_ERR_INTERNAL_ERROR,
                   _("Socket %s too big for destination"), sockname);
            goto failed;
        }
695 696
        if (addr.sun_path[0] == '@')
            addr.sun_path[0] = '\0';
697

698
      autostart_retry:
699
        priv->is_secure = 1;
700 701
        priv->sock = socket (AF_UNIX, SOCK_STREAM, 0);
        if (priv->sock == -1) {
702
            virReportSystemError(errno, "%s",
703
                                 _("unable to create socket"));
704 705
            goto failed;
        }
706 707 708 709 710 711 712 713 714 715
        if (connect (priv->sock, (struct sockaddr *) &addr, sizeof addr) == -1) {
            /* We might have to autostart the daemon in some cases....
             * It takes a short while for the daemon to startup, hence we
             * have a number of retries, with a small sleep. This will
             * sometimes cause multiple daemons to be started - this is
             * ok because the duplicates will fail to bind to the socket
             * and immediately exit, leaving just one daemon.
             */
            if (errno == ECONNREFUSED &&
                flags & VIR_DRV_OPEN_REMOTE_AUTOSTART &&
716
                trials < 20) {
717 718
                close(priv->sock);
                priv->sock = -1;
719 720
                if (trials > 0 ||
                    remoteForkDaemon(conn) == 0) {
721
                    trials++;
722
                    usleep(1000 * 100 * trials);
723 724 725
                    goto autostart_retry;
                }
            }
726
            virReportSystemError(errno,
727 728
              _("unable to connect to '%s', libvirtd may need to be started"),
              sockname);
729 730 731 732 733 734 735
            goto failed;
        }

        break;
    }

    case trans_ssh: {
736
        int j, nr_args = 6;
737 738 739

        if (username) nr_args += 2; /* For -l username */
        if (no_tty) nr_args += 5;   /* For -T -o BatchMode=yes -e none */
740
        if (port) nr_args += 2;     /* For -p port */
741

742
        command = command ? command : strdup ("ssh");
743 744
        if (command == NULL)
            goto out_of_memory;
745 746

        // Generate the final command argv[] array.
747
        //   ssh [-p $port] [-l $username] $hostname $netcat -U $sockname [NULL]
748 749
        if (VIR_ALLOC_N(cmd_argv, nr_args) < 0)
            goto out_of_memory;
J
Jim Meyering 已提交
750

751 752
        j = 0;
        cmd_argv[j++] = strdup (command);
753 754 755 756
        if (port) {
            cmd_argv[j++] = strdup ("-p");
            cmd_argv[j++] = strdup (port);
        }
757 758 759 760
        if (username) {
            cmd_argv[j++] = strdup ("-l");
            cmd_argv[j++] = strdup (username);
        }
761 762 763 764 765 766 767
        if (no_tty) {
            cmd_argv[j++] = strdup ("-T");
            cmd_argv[j++] = strdup ("-o");
            cmd_argv[j++] = strdup ("BatchMode=yes");
            cmd_argv[j++] = strdup ("-e");
            cmd_argv[j++] = strdup ("none");
        }
768
        cmd_argv[j++] = strdup (priv->hostname);
769 770
        cmd_argv[j++] = strdup (netcat ? netcat : "nc");
        cmd_argv[j++] = strdup ("-U");
771 772 773 774
        cmd_argv[j++] = strdup (sockname ? sockname :
                                (flags & VIR_CONNECT_RO
                                 ? LIBVIRTD_PRIV_UNIX_SOCKET_RO
                                 : LIBVIRTD_PRIV_UNIX_SOCKET));
775 776
        cmd_argv[j++] = 0;
        assert (j == nr_args);
777 778 779
        for (j = 0; j < (nr_args-1); j++)
            if (cmd_argv[j] == NULL)
                goto out_of_memory;
780 781

        priv->is_secure = 1;
782 783 784 785
    }

        /*FALLTHROUGH*/
    case trans_ext: {
786
        pid_t pid;
787
        int sv[2];
788
        int errfd[2];
789 790 791 792 793 794

        /* Fork off the external process.  Use socketpair to create a private
         * (unnamed) Unix domain socket to the child process so we don't have
         * to faff around with two file descriptors (a la 'pipe(2)').
         */
        if (socketpair (PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
795
            virReportSystemError(errno, "%s",
796
                                 _("unable to create socket pair"));
797 798 799
            goto failed;
        }

800 801 802 803 804 805
        if (pipe(errfd) == -1) {
            virReportSystemError(errno, "%s",
                                 _("unable to create socket pair"));
            goto failed;
        }

806
        if (virExec((const char**)cmd_argv, NULL, NULL,
807
                    &pid, sv[1], &(sv[1]), &(errfd[1]),
808
                    VIR_EXEC_CLEAR_CAPS) < 0)
809 810 811 812
            goto failed;

        /* Parent continues here. */
        close (sv[1]);
813
        close (errfd[1]);
814
        priv->sock = sv[0];
815
        priv->errfd = errfd[0];
816
        priv->pid = pid;
817 818 819 820

        /* Do not set 'is_secure' flag since we can't guarentee
         * an external program is secure, and this flag must be
         * pessimistic */
821
    }
822 823 824 825 826 827 828
#else /* WIN32 */

    case trans_unix:
    case trans_ssh:
    case trans_ext:
        error (conn, VIR_ERR_INVALID_ARG,
               _("transport methods unix, ssh and ext are not supported under Windows"));
829
        goto failed;
830 831 832

#endif /* WIN32 */

833 834
    } /* switch (transport) */

835
    if (virSetNonBlock(priv->sock) < 0) {
836
        virReportSystemError(errno, "%s",
837
                             _("unable to make socket non-blocking"));
838 839 840
        goto failed;
    }

841 842 843 844 845 846
    if ((priv->errfd != -1) && virSetNonBlock(priv->errfd) < 0) {
        virReportSystemError(errno, "%s",
                             _("unable to make socket non-blocking"));
        goto failed;
    }

847
    if (pipe(wakeupFD) < 0) {
848
        virReportSystemError(errno, "%s",
849
                             _("unable to make pipe"));
850 851 852 853
        goto failed;
    }
    priv->wakeupReadFD = wakeupFD[0];
    priv->wakeupSendFD = wakeupFD[1];
854 855

    /* Try and authenticate with server */
856
    if (remoteAuthenticate(conn, priv, 1, auth, authtype) == -1)
857 858
        goto failed;

859 860 861
    /* Finally we can call the remote side's open function. */
    remote_open_args args = { &name, flags };

862
    if (call (conn, priv, REMOTE_CALL_IN_OPEN, REMOTE_PROC_OPEN,
863 864 865 866
              (xdrproc_t) xdr_remote_open_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto failed;

867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893
    /* Now try and find out what URI the daemon used */
    if (conn->uri == NULL) {
        remote_get_uri_ret uriret;
        int urierr;

        memset (&uriret, 0, sizeof uriret);
        urierr = call (conn, priv,
                       REMOTE_CALL_IN_OPEN | REMOTE_CALL_QUIET_MISSING_RPC,
                       REMOTE_PROC_GET_URI,
                       (xdrproc_t) xdr_void, (char *) NULL,
                       (xdrproc_t) xdr_remote_get_uri_ret, (char *) &uriret);
        if (urierr == -2) {
            /* Should not really happen, since we only probe local libvirtd's,
               & the library should always match the daemon. Only case is post
               RPM upgrade where an old daemon instance is still running with
               new client. Too bad. It is not worth the hassle to fix this */
            error (conn, VIR_ERR_INTERNAL_ERROR, _("unable to auto-detect URI"));
            goto failed;
        }
        if (urierr == -1) {
            goto failed;
        }

        DEBUG("Auto-probed URI is %s", uriret.uri);
        conn->uri = xmlParseURI(uriret.uri);
        VIR_FREE(uriret.uri);
        if (!conn->uri) {
894
            virReportOOMError();
895 896 897 898
            goto failed;
        }
    }

899
    if(VIR_ALLOC(priv->callbackList)<0) {
900
        virReportOOMError();
901 902 903 904
        goto failed;
    }

    if(VIR_ALLOC(priv->domainEvents)<0) {
905
        virReportOOMError();
906 907 908 909 910
        goto failed;
    }

    DEBUG0("Adding Handler for remote events");
    /* Set up a callback to listen on the socket data */
911
    if ((priv->watch = virEventAddHandle(priv->sock,
912
                                         VIR_EVENT_HANDLE_READABLE,
913
                                         remoteDomainEventFired,
914
                                         conn, NULL)) < 0) {
915 916 917 918 919 920
        DEBUG0("virEventAddHandle failed: No addHandleImpl defined."
               " continuing without events.");
    } else {

        DEBUG0("Adding Timeout for remote event queue flushing");
        if ( (priv->eventFlushTimer = virEventAddTimeout(-1,
921 922
                                                         remoteDomainEventQueueFlush,
                                                         conn, NULL)) < 0) {
923 924
            DEBUG0("virEventAddTimeout failed: No addTimeoutImpl defined. "
                    "continuing without events.");
925
            virEventRemoveHandle(priv->watch);
926
            priv->watch = -1;
927 928
        }
    }
929 930 931
    /* Successful. */
    retcode = VIR_DRV_OPEN_SUCCESS;

932
 cleanup:
933
    /* Free up the URL and strings. */
934 935 936 937 938 939 940
    VIR_FREE(name);
    VIR_FREE(command);
    VIR_FREE(sockname);
    VIR_FREE(authtype);
    VIR_FREE(netcat);
    VIR_FREE(username);
    VIR_FREE(port);
941 942 943
    if (cmd_argv) {
        char **cmd_argv_ptr = cmd_argv;
        while (*cmd_argv_ptr) {
944
            VIR_FREE(*cmd_argv_ptr);
945 946
            cmd_argv_ptr++;
        }
947
        VIR_FREE(cmd_argv);
948 949 950
    }

    return retcode;
951 952

 out_of_memory:
953
    virReportOOMError();
954 955
    if (vars)
        free_qparam_set (vars);
956 957 958

 failed:
    /* Close the socket if we failed. */
959 960 961
    if (priv->errfd >= 0)
        close(priv->errfd);

962 963 964 965 966 967
    if (priv->sock >= 0) {
        if (priv->uses_tls && priv->session) {
            gnutls_bye (priv->session, GNUTLS_SHUT_RDWR);
            gnutls_deinit (priv->session);
        }
        close (priv->sock);
968
#ifndef WIN32
969 970 971
        if (priv->pid > 0) {
            pid_t reap;
            do {
972
retry:
973 974
                reap = waitpid(priv->pid, NULL, 0);
                if (reap == -1 && errno == EINTR)
975
                    goto retry;
976 977
            } while (reap != -1 && reap != priv->pid);
        }
978
#endif
979 980
    }

981 982 983 984 985
    if (wakeupFD[0] >= 0) {
        close(wakeupFD[0]);
        close(wakeupFD[1]);
    }

986
    VIR_FREE(priv->hostname);
987
    goto cleanup;
988 989
}

990 991
static struct private_data *
remoteAllocPrivateData(virConnectPtr conn)
992
{
993
    struct private_data *priv;
994
    if (VIR_ALLOC(priv) < 0) {
995
        virReportOOMError();
996
        return NULL;
997 998
    }

999 1000 1001 1002
    if (virMutexInit(&priv->lock) < 0) {
        error(conn, VIR_ERR_INTERNAL_ERROR,
              _("cannot initialize mutex"));
        VIR_FREE(priv);
1003
        return NULL;
1004 1005 1006
    }
    remoteDriverLock(priv);
    priv->localUses = 1;
1007
    priv->watch = -1;
1008
    priv->sock = -1;
1009
    priv->errfd = -1;
1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047

    return priv;
}

static int
remoteOpenSecondaryDriver(virConnectPtr conn,
                          virConnectAuthPtr auth,
                          int flags,
                          struct private_data **priv)
{
    int ret;
    int rflags = 0;

    if (!((*priv) = remoteAllocPrivateData(conn)))
        return VIR_DRV_OPEN_ERROR;

    if (flags & VIR_CONNECT_RO)
        rflags |= VIR_DRV_OPEN_REMOTE_RO;

    ret = doRemoteOpen(conn, *priv, auth, rflags);
    if (ret != VIR_DRV_OPEN_SUCCESS) {
        remoteDriverUnlock(*priv);
        VIR_FREE(*priv);
    } else {
        (*priv)->localUses = 1;
        remoteDriverUnlock(*priv);
    }

    return ret;
}

static virDrvOpenStatus
remoteOpen (virConnectPtr conn,
            virConnectAuthPtr auth,
            int flags)
{
    struct private_data *priv;
    int ret, rflags = 0;
1048
    const char *autostart = getenv("LIBVIRT_AUTOSTART");
1049

1050
    if (inside_daemon && (!conn->uri || (conn->uri && !conn->uri->server)))
1051 1052 1053 1054
        return VIR_DRV_OPEN_DECLINED;

    if (!(priv = remoteAllocPrivateData(conn)))
        return VIR_DRV_OPEN_ERROR;
1055

1056
    if (flags & VIR_CONNECT_RO)
1057 1058
        rflags |= VIR_DRV_OPEN_REMOTE_RO;

1059 1060 1061 1062 1063 1064 1065 1066 1067
    /*
     * If no servername is given, and no +XXX
     * transport is listed, or transport is unix,
     * and path is /session, and uid is unprivileged
     * then auto-spawn a daemon.
     */
    if (conn->uri &&
        !conn->uri->server &&
        conn->uri->path &&
D
Daniel P. Berrange 已提交
1068
        conn->uri->scheme &&
1069 1070
        ((strchr(conn->uri->scheme, '+') == 0)||
         (strstr(conn->uri->scheme, "+unix") != NULL)) &&
1071 1072
        (STREQ(conn->uri->path, "/session") ||
         STRPREFIX(conn->uri->scheme, "test+")) &&
1073 1074 1075
        getuid() > 0) {
        DEBUG0("Auto-spawn user daemon instance");
        rflags |= VIR_DRV_OPEN_REMOTE_USER;
1076 1077 1078
        if (!autostart ||
            STRNEQ(autostart, "0"))
            rflags |= VIR_DRV_OPEN_REMOTE_AUTOSTART;
1079 1080 1081
    }

    /*
J
John Levon 已提交
1082 1083 1084 1085
     * If URI is NULL, then do a UNIX connection possibly auto-spawning
     * unprivileged server and probe remote server for URI. On Solaris,
     * this isn't supported, but we may be privileged enough to connect
     * to the UNIX socket anyway.
1086 1087 1088
     */
    if (!conn->uri) {
        DEBUG0("Auto-probe remote URI");
J
John Levon 已提交
1089
#ifndef __sun
1090 1091 1092
        if (getuid() > 0) {
            DEBUG0("Auto-spawn user daemon instance");
            rflags |= VIR_DRV_OPEN_REMOTE_USER;
1093 1094 1095
            if (!autostart ||
                STRNEQ(autostart, "0"))
                rflags |= VIR_DRV_OPEN_REMOTE_AUTOSTART;
1096
        }
J
John Levon 已提交
1097
#endif
1098
    }
1099

1100
    ret = doRemoteOpen(conn, priv, auth, rflags);
1101 1102
    if (ret != VIR_DRV_OPEN_SUCCESS) {
        conn->privateData = NULL;
1103
        remoteDriverUnlock(priv);
1104
        VIR_FREE(priv);
1105 1106
    } else {
        conn->privateData = priv;
1107
        remoteDriverUnlock(priv);
1108 1109 1110 1111 1112
    }
    return ret;
}


1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
/* In a string "driver+transport" return a pointer to "transport". */
static char *
get_transport_from_scheme (char *scheme)
{
    char *p = strchr (scheme, '+');
    return p ? p+1 : 0;
}

/* GnuTLS functions used by remoteOpen. */
static gnutls_certificate_credentials_t x509_cred;

1124 1125

static int
1126
check_cert_file(const char *type, const char *file)
1127 1128 1129
{
    struct stat sb;
    if (stat(file, &sb) < 0) {
1130
        virReportSystemError(errno,
1131 1132
                             _("Cannot access %s '%s'"),
                             type, file);
1133 1134 1135 1136 1137 1138
        return -1;
    }
    return 0;
}


1139
static int
1140
initialise_gnutls (virConnectPtr conn)
1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151
{
    static int initialised = 0;
    int err;

    if (initialised) return 0;

    gnutls_global_init ();

    /* X509 stuff */
    err = gnutls_certificate_allocate_credentials (&x509_cred);
    if (err) {
1152 1153 1154
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to allocate TLS credentials: %s"),
                gnutls_strerror (err));
1155 1156 1157
        return -1;
    }

1158

1159
    if (check_cert_file("CA certificate", LIBVIRT_CACERT) < 0)
1160
        return -1;
1161
    if (check_cert_file("client key", LIBVIRT_CLIENTKEY) < 0)
1162
        return -1;
1163
    if (check_cert_file("client certificate", LIBVIRT_CLIENTCERT) < 0)
1164 1165
        return -1;

1166
    /* Set the trusted CA cert. */
1167
    DEBUG("loading CA file %s", LIBVIRT_CACERT);
1168 1169 1170 1171
    err =
        gnutls_certificate_set_x509_trust_file (x509_cred, LIBVIRT_CACERT,
                                                GNUTLS_X509_FMT_PEM);
    if (err < 0) {
1172 1173 1174
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to load CA certificate: %s"),
                gnutls_strerror (err));
1175 1176 1177 1178
        return -1;
    }

    /* Set the client certificate and private key. */
1179 1180
    DEBUG("loading client cert and key from files %s and %s",
          LIBVIRT_CLIENTCERT, LIBVIRT_CLIENTKEY);
1181 1182 1183 1184 1185 1186
    err =
        gnutls_certificate_set_x509_key_file (x509_cred,
                                              LIBVIRT_CLIENTCERT,
                                              LIBVIRT_CLIENTKEY,
                                              GNUTLS_X509_FMT_PEM);
    if (err < 0) {
1187 1188 1189
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to load private key/certificate: %s"),
                gnutls_strerror (err));
1190 1191 1192 1193 1194 1195 1196
        return -1;
    }

    initialised = 1;
    return 0;
}

1197
static int verify_certificate (virConnectPtr conn, struct private_data *priv, gnutls_session_t session);
1198 1199 1200

static gnutls_session_t
negotiate_gnutls_on_connection (virConnectPtr conn,
1201 1202
                                struct private_data *priv,
                                int no_verify)
1203 1204 1205 1206 1207 1208 1209 1210 1211
{
    const int cert_type_priority[3] = {
        GNUTLS_CRT_X509,
        GNUTLS_CRT_OPENPGP,
        0
    };
    int err;
    gnutls_session_t session;

1212
    /* Initialize TLS session
1213 1214 1215
     */
    err = gnutls_init (&session, GNUTLS_CLIENT);
    if (err) {
1216 1217 1218
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to initialize TLS client: %s"),
                gnutls_strerror (err));
1219 1220 1221 1222 1223 1224
        return NULL;
    }

    /* Use default priorities */
    err = gnutls_set_default_priority (session);
    if (err) {
1225 1226 1227
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to set TLS algorithm priority: %s"),
                gnutls_strerror (err));
1228 1229 1230 1231 1232 1233
        return NULL;
    }
    err =
        gnutls_certificate_type_set_priority (session,
                                              cert_type_priority);
    if (err) {
1234 1235 1236
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to set certificate priority: %s"),
                gnutls_strerror (err));
1237 1238 1239 1240 1241 1242 1243
        return NULL;
    }

    /* put the x509 credentials to the current session
     */
    err = gnutls_credentials_set (session, GNUTLS_CRD_CERTIFICATE, x509_cred);
    if (err) {
1244 1245 1246
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to set session credentials: %s"),
                gnutls_strerror (err));
1247 1248 1249 1250
        return NULL;
    }

    gnutls_transport_set_ptr (session,
1251
                              (gnutls_transport_ptr_t) (long) priv->sock);
1252 1253 1254 1255 1256 1257 1258

    /* Perform the TLS handshake. */
 again:
    err = gnutls_handshake (session);
    if (err < 0) {
        if (err == GNUTLS_E_AGAIN || err == GNUTLS_E_INTERRUPTED)
            goto again;
1259 1260 1261
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to complete TLS handshake: %s"),
                gnutls_strerror (err));
1262 1263 1264 1265
        return NULL;
    }

    /* Verify certificate. */
1266
    if (verify_certificate (conn, priv, session) == -1) {
1267 1268 1269
        DEBUG0("failed to verify peer's certificate");
        if (!no_verify) return NULL;
    }
1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280

    /* At this point, the server is verifying _our_ certificate, IP address,
     * etc.  If we make the grade, it will send us a '\1' byte.
     */
    char buf[1];
    int len;
 again_2:
    len = gnutls_record_recv (session, buf, 1);
    if (len < 0 && len != GNUTLS_E_UNEXPECTED_PACKET_LENGTH) {
        if (len == GNUTLS_E_AGAIN || len == GNUTLS_E_INTERRUPTED)
            goto again_2;
1281 1282 1283
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to complete TLS initialization: %s"),
                gnutls_strerror (len));
1284 1285 1286
        return NULL;
    }
    if (len != 1 || buf[0] != '\1') {
1287
        error (conn, VIR_ERR_RPC,
1288
               _("server verification (of our certificate or IP address) failed\n"));
1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301
        return NULL;
    }

#if 0
    /* Print session info. */
    print_info (session);
#endif

    return session;
}

static int
verify_certificate (virConnectPtr conn ATTRIBUTE_UNUSED,
1302 1303
                    struct private_data *priv,
                    gnutls_session_t session)
1304 1305 1306 1307 1308 1309 1310 1311
{
    int ret;
    unsigned int status;
    const gnutls_datum_t *certs;
    unsigned int nCerts, i;
    time_t now;

    if ((ret = gnutls_certificate_verify_peers2 (session, &status)) < 0) {
1312 1313 1314
        errorf (conn, VIR_ERR_GNUTLS_ERROR,
                _("unable to verify server certificate: %s"),
                gnutls_strerror (ret));
1315 1316
        return -1;
    }
1317

1318
    if ((now = time(NULL)) == ((time_t)-1)) {
1319
        virReportSystemError(errno, "%s",
1320
                             _("cannot get current time"));
1321 1322 1323 1324
        return -1;
    }

    if (status != 0) {
1325
        const char *reason = _("Invalid certificate");
1326 1327

        if (status & GNUTLS_CERT_INVALID)
1328
            reason = _("The certificate is not trusted.");
1329

1330
        if (status & GNUTLS_CERT_SIGNER_NOT_FOUND)
1331
            reason = _("The certificate hasn't got a known issuer.");
1332

1333
        if (status & GNUTLS_CERT_REVOKED)
1334
            reason = _("The certificate has been revoked.");
1335 1336

#ifndef GNUTLS_1_0_COMPAT
1337
        if (status & GNUTLS_CERT_INSECURE_ALGORITHM)
1338
            reason = _("The certificate uses an insecure algorithm");
1339
#endif
1340

1341 1342 1343
        errorf (conn, VIR_ERR_RPC,
                _("server certificate failed validation: %s"),
                reason);
1344 1345 1346 1347
        return -1;
    }

    if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
1348
        error (conn, VIR_ERR_RPC, _("Certificate type is not X.509"));
1349 1350
        return -1;
    }
1351

1352
    if (!(certs = gnutls_certificate_get_peers(session, &nCerts))) {
1353
        error (conn, VIR_ERR_RPC, _("gnutls_certificate_get_peers failed"));
1354 1355
        return -1;
    }
1356

1357 1358 1359 1360 1361
    for (i = 0 ; i < nCerts ; i++) {
        gnutls_x509_crt_t cert;

        ret = gnutls_x509_crt_init (&cert);
        if (ret < 0) {
1362 1363 1364
            errorf (conn, VIR_ERR_GNUTLS_ERROR,
                    _("unable to initialize certificate: %s"),
                    gnutls_strerror (ret));
1365 1366
            return -1;
        }
1367

1368 1369
        ret = gnutls_x509_crt_import (cert, &certs[i], GNUTLS_X509_FMT_DER);
        if (ret < 0) {
1370 1371 1372
            errorf (conn, VIR_ERR_GNUTLS_ERROR,
                    _("unable to import certificate: %s"),
                    gnutls_strerror (ret));
1373 1374 1375
            gnutls_x509_crt_deinit (cert);
            return -1;
        }
1376

1377
        if (gnutls_x509_crt_get_expiration_time (cert) < now) {
1378
            error (conn, VIR_ERR_RPC, _("The certificate has expired"));
1379 1380 1381
            gnutls_x509_crt_deinit (cert);
            return -1;
        }
1382

1383
        if (gnutls_x509_crt_get_activation_time (cert) > now) {
1384
            error (conn, VIR_ERR_RPC, _("The certificate is not yet activated"));
1385 1386 1387
            gnutls_x509_crt_deinit (cert);
            return -1;
        }
1388

1389
        if (i == 0) {
1390
            if (!gnutls_x509_crt_check_hostname (cert, priv->hostname)) {
1391 1392 1393
                errorf(conn, VIR_ERR_RPC,
                       _("Certificate's owner does not match the hostname (%s)"),
                       priv->hostname);
1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404
                gnutls_x509_crt_deinit (cert);
                return -1;
            }
        }
    }

    return 0;
}

/*----------------------------------------------------------------------*/

1405

1406
static int
1407
doRemoteClose (virConnectPtr conn, struct private_data *priv)
1408 1409 1410 1411 1412 1413
{
    if (call (conn, priv, 0, REMOTE_PROC_CLOSE,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        return -1;

1414 1415 1416 1417 1418
    if (priv->eventFlushTimer >= 0) {
        /* Remove timeout */
        virEventRemoveTimeout(priv->eventFlushTimer);
        /* Remove handle for remote events */
        virEventRemoveHandle(priv->watch);
1419
        priv->watch = -1;
1420
    }
1421

1422
    /* Close socket. */
1423
    if (priv->uses_tls && priv->session) {
1424
        gnutls_bye (priv->session, GNUTLS_SHUT_RDWR);
1425 1426 1427 1428 1429 1430
        gnutls_deinit (priv->session);
    }
#if HAVE_SASL
    if (priv->saslconn)
        sasl_dispose (&priv->saslconn);
#endif
1431
    close (priv->sock);
1432
    close (priv->errfd);
1433

1434
#ifndef WIN32
1435 1436 1437
    if (priv->pid > 0) {
        pid_t reap;
        do {
1438
retry:
1439 1440
            reap = waitpid(priv->pid, NULL, 0);
            if (reap == -1 && errno == EINTR)
1441
                goto retry;
1442 1443
        } while (reap != -1 && reap != priv->pid);
    }
1444
#endif
1445 1446 1447 1448 1449
    if (priv->wakeupReadFD >= 0) {
        close(priv->wakeupReadFD);
        close(priv->wakeupSendFD);
    }

1450

1451
    /* Free hostname copy */
1452
    VIR_FREE(priv->hostname);
1453

1454
    /* See comment for remoteType. */
1455
    VIR_FREE(priv->type);
1456

1457 1458 1459 1460 1461 1462
    /* Free callback list */
    virDomainEventCallbackListFree(priv->callbackList);

    /* Free queued events */
    virDomainEventQueueFree(priv->domainEvents);

1463 1464 1465
    return 0;
}

1466 1467 1468
static int
remoteClose (virConnectPtr conn)
{
1469
    int ret = 0;
1470
    struct private_data *priv = conn->privateData;
1471

1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482
    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        ret = doRemoteClose(conn, priv);
        conn->privateData = NULL;
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE (priv);
    }
    if (priv)
        remoteDriverUnlock(priv);
1483 1484 1485 1486

    return ret;
}

1487 1488 1489
static int
remoteSupportsFeature (virConnectPtr conn, int feature)
{
1490
    int rv = -1;
1491 1492
    remote_supports_feature_args args;
    remote_supports_feature_ret ret;
1493
    struct private_data *priv = conn->privateData;
1494

1495 1496
    remoteDriverLock(priv);

1497
    /* VIR_DRV_FEATURE_REMOTE* features are handled directly. */
1498 1499 1500 1501
    if (feature == VIR_DRV_FEATURE_REMOTE) {
        rv = 1;
        goto done;
    }
1502 1503 1504 1505 1506 1507 1508

    args.feature = feature;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_SUPPORTS_FEATURE,
              (xdrproc_t) xdr_remote_supports_feature_args, (char *) &args,
              (xdrproc_t) xdr_remote_supports_feature_ret, (char *) &ret) == -1)
1509 1510 1511
        goto done;

    rv = ret.supported;
1512

1513
done:
1514
    remoteDriverUnlock(priv);
1515
    return rv;
1516 1517
}

1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528
/* Unfortunately this function is defined to return a static string.
 * Since the remote end always answers with the same type (for a
 * single connection anyway) we cache the type in the connection's
 * private data, and free it when we close the connection.
 *
 * See also:
 * http://www.redhat.com/archives/libvir-list/2007-February/msg00096.html
 */
static const char *
remoteType (virConnectPtr conn)
{
1529
    char *rv = NULL;
1530
    remote_get_type_ret ret;
1531
    struct private_data *priv = conn->privateData;
1532

1533 1534
    remoteDriverLock(priv);

1535
    /* Cached? */
1536 1537 1538 1539
    if (priv->type) {
        rv = priv->type;
        goto done;
    }
1540 1541 1542 1543 1544

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_GET_TYPE,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_get_type_ret, (char *) &ret) == -1)
1545
        goto done;
1546 1547

    /* Stash. */
1548 1549 1550
    rv = priv->type = ret.type;

done:
1551
    remoteDriverUnlock(priv);
1552
    return rv;
1553 1554 1555
}

static int
1556
remoteGetVersion (virConnectPtr conn, unsigned long *hvVer)
1557
{
1558
    int rv = -1;
1559
    remote_get_version_ret ret;
1560
    struct private_data *priv = conn->privateData;
1561

1562 1563
    remoteDriverLock(priv);

1564 1565 1566 1567
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_GET_VERSION,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_get_version_ret, (char *) &ret) == -1)
1568
        goto done;
1569 1570

    if (hvVer) *hvVer = ret.hv_ver;
1571 1572 1573
    rv = 0;

done:
1574
    remoteDriverUnlock(priv);
1575
    return rv;
1576 1577
}

1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601
static int
remoteGetLibVersion (virConnectPtr conn, unsigned long *libVer)
{
    int rv = -1;
    remote_get_lib_version_ret ret;
    struct private_data *priv = conn->privateData;

    remoteDriverLock(priv);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_GET_LIB_VERSION,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_get_lib_version_ret,
              (char *) &ret) == -1)
        goto done;

    if (libVer) *libVer = ret.lib_ver;
    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

1602 1603 1604
static char *
remoteGetHostname (virConnectPtr conn)
{
1605
    char *rv = NULL;
1606
    remote_get_hostname_ret ret;
1607
    struct private_data *priv = conn->privateData;
1608

1609 1610
    remoteDriverLock(priv);

1611 1612 1613 1614
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_GET_HOSTNAME,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_get_hostname_ret, (char *) &ret) == -1)
1615
        goto done;
1616 1617

    /* Caller frees this. */
1618 1619 1620
    rv = ret.hostname;

done:
1621
    remoteDriverUnlock(priv);
1622
    return rv;
1623 1624
}

1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690
static int remoteIsSecure(virConnectPtr conn)
{
    int rv = -1;
    struct private_data *priv = conn->privateData;
    remote_is_secure_ret ret;
    remoteDriverLock(priv);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_IS_SECURE,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_is_secure_ret, (char *) &ret) == -1)
        goto done;

    /* We claim to be secure, if the remote driver
     * transport itself is secure, and the remote
     * HV connection is secure
     *
     * ie, we don't want to claim to be secure if the
     * remote driver is used to connect to a XenD
     * driver using unencrypted HTTP:/// access
     */
    rv = priv->is_secure && ret.secure ? 1 : 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int remoteIsEncrypted(virConnectPtr conn)
{
    int rv = -1;
    int encrypted = 0;
    struct private_data *priv = conn->privateData;
    remote_is_secure_ret ret;
    remoteDriverLock(priv);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_IS_SECURE,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_is_secure_ret, (char *) &ret) == -1)
        goto done;

    if (priv->uses_tls)
        encrypted = 1;
#if HAVE_SASL
    else if (priv->saslconn)
        encrypted = 1;
#endif


    /* We claim to be encrypted, if the remote driver
     * transport itself is encrypted, and the remote
     * HV connection is secure.
     *
     * Yes, we really don't check the remote 'encrypted'
     * option, since it will almost always be false,
     * even if secure (eg UNIX sockets).
     */
    rv = encrypted && ret.secure ? 1 : 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}


1691 1692 1693
static int
remoteGetMaxVcpus (virConnectPtr conn, const char *type)
{
1694
    int rv = -1;
1695 1696
    remote_get_max_vcpus_args args;
    remote_get_max_vcpus_ret ret;
1697
    struct private_data *priv = conn->privateData;
1698

1699 1700
    remoteDriverLock(priv);

1701
    memset (&ret, 0, sizeof ret);
1702
    args.type = type == NULL ? NULL : (char **) &type;
1703 1704 1705
    if (call (conn, priv, 0, REMOTE_PROC_GET_MAX_VCPUS,
              (xdrproc_t) xdr_remote_get_max_vcpus_args, (char *) &args,
              (xdrproc_t) xdr_remote_get_max_vcpus_ret, (char *) &ret) == -1)
1706 1707 1708
        goto done;

    rv = ret.max_vcpus;
1709

1710
done:
1711
    remoteDriverUnlock(priv);
1712
    return rv;
1713 1714 1715 1716 1717
}

static int
remoteNodeGetInfo (virConnectPtr conn, virNodeInfoPtr info)
{
1718
    int rv = -1;
1719
    remote_node_get_info_ret ret;
1720
    struct private_data *priv = conn->privateData;
1721

1722 1723
    remoteDriverLock(priv);

1724 1725 1726 1727
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_GET_INFO,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_node_get_info_ret, (char *) &ret) == -1)
1728
        goto done;
1729

C
Chris Lalancette 已提交
1730 1731
    if (virStrcpyStatic(info->model, ret.model) == NULL)
        goto done;
1732 1733 1734 1735 1736 1737 1738
    info->memory = ret.memory;
    info->cpus = ret.cpus;
    info->mhz = ret.mhz;
    info->nodes = ret.nodes;
    info->sockets = ret.sockets;
    info->cores = ret.cores;
    info->threads = ret.threads;
1739 1740 1741
    rv = 0;

done:
1742
    remoteDriverUnlock(priv);
1743
    return rv;
1744 1745 1746 1747 1748
}

static char *
remoteGetCapabilities (virConnectPtr conn)
{
1749
    char *rv = NULL;
1750
    remote_get_capabilities_ret ret;
1751
    struct private_data *priv = conn->privateData;
1752

1753 1754
    remoteDriverLock(priv);

1755 1756 1757 1758
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_GET_CAPABILITIES,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_get_capabilities_ret, (char *)&ret) == -1)
1759
        goto done;
1760 1761

    /* Caller frees this. */
1762 1763 1764
    rv = ret.capabilities;

done:
1765
    remoteDriverUnlock(priv);
1766
    return rv;
1767 1768
}

1769 1770 1771 1772 1773 1774
static int
remoteNodeGetCellsFreeMemory(virConnectPtr conn,
                            unsigned long long *freeMems,
                            int startCell,
                            int maxCells)
{
1775
    int rv = -1;
1776 1777 1778
    remote_node_get_cells_free_memory_args args;
    remote_node_get_cells_free_memory_ret ret;
    int i;
1779
    struct private_data *priv = conn->privateData;
1780

1781 1782
    remoteDriverLock(priv);

1783 1784 1785 1786 1787
    if (maxCells > REMOTE_NODE_MAX_CELLS) {
        errorf (conn, VIR_ERR_RPC,
                _("too many NUMA cells: %d > %d"),
                maxCells,
                REMOTE_NODE_MAX_CELLS);
1788
        goto done;
1789 1790 1791 1792 1793 1794 1795 1796 1797
    }

    args.startCell = startCell;
    args.maxCells = maxCells;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_GET_CELLS_FREE_MEMORY,
              (xdrproc_t) xdr_remote_node_get_cells_free_memory_args, (char *)&args,
              (xdrproc_t) xdr_remote_node_get_cells_free_memory_ret, (char *)&ret) == -1)
1798
        goto done;
1799 1800 1801 1802 1803 1804

    for (i = 0 ; i < ret.freeMems.freeMems_len ; i++)
        freeMems[i] = ret.freeMems.freeMems_val[i];

    xdr_free((xdrproc_t) xdr_remote_node_get_cells_free_memory_ret, (char *) &ret);

1805 1806 1807
    rv = ret.freeMems.freeMems_len;

done:
1808
    remoteDriverUnlock(priv);
1809
    return rv;
1810 1811 1812 1813 1814
}

static unsigned long long
remoteNodeGetFreeMemory (virConnectPtr conn)
{
1815
    unsigned long long rv = 0; /* 0 is error value this special function*/
1816
    remote_node_get_free_memory_ret ret;
1817
    struct private_data *priv = conn->privateData;
1818

1819 1820
    remoteDriverLock(priv);

1821 1822 1823 1824
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_GET_FREE_MEMORY,
              (xdrproc_t) xdr_void, NULL,
              (xdrproc_t) xdr_remote_node_get_free_memory_ret, (char *)&ret) == -1)
1825 1826 1827
        goto done;

    rv = ret.freeMem;
1828

1829
done:
1830
    remoteDriverUnlock(priv);
1831
    return rv;
1832 1833 1834
}


1835 1836 1837
static int
remoteListDomains (virConnectPtr conn, int *ids, int maxids)
{
1838
    int rv = -1;
1839 1840 1841
    int i;
    remote_list_domains_args args;
    remote_list_domains_ret ret;
1842
    struct private_data *priv = conn->privateData;
1843

1844 1845
    remoteDriverLock(priv);

1846
    if (maxids > REMOTE_DOMAIN_ID_LIST_MAX) {
1847 1848 1849
        errorf (conn, VIR_ERR_RPC,
                _("too many remote domain IDs: %d > %d"),
                maxids, REMOTE_DOMAIN_ID_LIST_MAX);
1850
        goto done;
1851 1852 1853 1854 1855 1856 1857
    }
    args.maxids = maxids;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_DOMAINS,
              (xdrproc_t) xdr_remote_list_domains_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_domains_ret, (char *) &ret) == -1)
1858
        goto done;
1859 1860

    if (ret.ids.ids_len > maxids) {
1861 1862 1863
        errorf (conn, VIR_ERR_RPC,
                _("too many remote domain IDs: %d > %d"),
                ret.ids.ids_len, maxids);
1864
        goto cleanup;
1865 1866 1867 1868 1869
    }

    for (i = 0; i < ret.ids.ids_len; ++i)
        ids[i] = ret.ids.ids_val[i];

1870 1871 1872
    rv = ret.ids.ids_len;

cleanup:
1873 1874
    xdr_free ((xdrproc_t) xdr_remote_list_domains_ret, (char *) &ret);

1875
done:
1876
    remoteDriverUnlock(priv);
1877
    return rv;
1878 1879 1880 1881 1882
}

static int
remoteNumOfDomains (virConnectPtr conn)
{
1883
    int rv = -1;
1884
    remote_num_of_domains_ret ret;
1885
    struct private_data *priv = conn->privateData;
1886

1887 1888
    remoteDriverLock(priv);

1889 1890 1891 1892
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_DOMAINS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_domains_ret, (char *) &ret) == -1)
1893 1894 1895
        goto done;

    rv = ret.num;
1896

1897
done:
1898
    remoteDriverUnlock(priv);
1899
    return rv;
1900 1901
}

1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949
static int
remoteDomainIsActive(virDomainPtr domain)
{
    int rv = -1;
    remote_domain_is_active_args args;
    remote_domain_is_active_ret ret;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_IS_ACTIVE,
              (xdrproc_t) xdr_remote_domain_is_active_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_is_active_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.active;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteDomainIsPersistent(virDomainPtr domain)
{
    int rv = -1;
    remote_domain_is_persistent_args args;
    remote_domain_is_persistent_ret ret;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_IS_PERSISTENT,
              (xdrproc_t) xdr_remote_domain_is_persistent_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_is_persistent_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.persistent;

done:
    remoteDriverUnlock(priv);
    return rv;
}

1950
static virDomainPtr
1951
remoteDomainCreateXML (virConnectPtr conn,
1952 1953 1954
                         const char *xmlDesc,
                         unsigned int flags)
{
1955
    virDomainPtr dom = NULL;
1956 1957
    remote_domain_create_xml_args args;
    remote_domain_create_xml_ret ret;
1958
    struct private_data *priv = conn->privateData;
1959

1960 1961
    remoteDriverLock(priv);

1962 1963 1964 1965
    args.xml_desc = (char *) xmlDesc;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
1966 1967 1968
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_CREATE_XML,
              (xdrproc_t) xdr_remote_domain_create_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_create_xml_ret, (char *) &ret) == -1)
1969
        goto done;
1970 1971

    dom = get_nonnull_domain (conn, ret.dom);
1972
    xdr_free ((xdrproc_t) &xdr_remote_domain_create_xml_ret, (char *) &ret);
1973

1974
done:
1975
    remoteDriverUnlock(priv);
1976 1977 1978 1979 1980 1981
    return dom;
}

static virDomainPtr
remoteDomainLookupByID (virConnectPtr conn, int id)
{
1982
    virDomainPtr dom = NULL;
1983 1984
    remote_domain_lookup_by_id_args args;
    remote_domain_lookup_by_id_ret ret;
1985
    struct private_data *priv = conn->privateData;
1986

1987 1988
    remoteDriverLock(priv);

1989 1990 1991 1992 1993 1994
    args.id = id;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_LOOKUP_BY_ID,
              (xdrproc_t) xdr_remote_domain_lookup_by_id_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_lookup_by_id_ret, (char *) &ret) == -1)
1995
        goto done;
1996 1997 1998 1999

    dom = get_nonnull_domain (conn, ret.dom);
    xdr_free ((xdrproc_t) &xdr_remote_domain_lookup_by_id_ret, (char *) &ret);

2000
done:
2001
    remoteDriverUnlock(priv);
2002 2003 2004 2005 2006 2007
    return dom;
}

static virDomainPtr
remoteDomainLookupByUUID (virConnectPtr conn, const unsigned char *uuid)
{
2008
    virDomainPtr dom = NULL;
2009 2010
    remote_domain_lookup_by_uuid_args args;
    remote_domain_lookup_by_uuid_ret ret;
2011
    struct private_data *priv = conn->privateData;
2012

2013 2014
    remoteDriverLock(priv);

2015 2016 2017 2018 2019 2020
    memcpy (args.uuid, uuid, VIR_UUID_BUFLEN);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_LOOKUP_BY_UUID,
              (xdrproc_t) xdr_remote_domain_lookup_by_uuid_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_lookup_by_uuid_ret, (char *) &ret) == -1)
2021
        goto done;
2022 2023 2024

    dom = get_nonnull_domain (conn, ret.dom);
    xdr_free ((xdrproc_t) &xdr_remote_domain_lookup_by_uuid_ret, (char *) &ret);
2025 2026

done:
2027
    remoteDriverUnlock(priv);
2028 2029 2030 2031 2032 2033
    return dom;
}

static virDomainPtr
remoteDomainLookupByName (virConnectPtr conn, const char *name)
{
2034
    virDomainPtr dom = NULL;
2035 2036
    remote_domain_lookup_by_name_args args;
    remote_domain_lookup_by_name_ret ret;
2037
    struct private_data *priv = conn->privateData;
2038

2039 2040
    remoteDriverLock(priv);

2041 2042 2043 2044 2045 2046
    args.name = (char *) name;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_domain_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_lookup_by_name_ret, (char *) &ret) == -1)
2047
        goto done;
2048 2049 2050 2051

    dom = get_nonnull_domain (conn, ret.dom);
    xdr_free ((xdrproc_t) &xdr_remote_domain_lookup_by_name_ret, (char *) &ret);

2052
done:
2053
    remoteDriverUnlock(priv);
2054 2055 2056 2057 2058 2059
    return dom;
}

static int
remoteDomainSuspend (virDomainPtr domain)
{
2060
    int rv = -1;
2061
    remote_domain_suspend_args args;
2062
    struct private_data *priv = domain->conn->privateData;
2063

2064 2065
    remoteDriverLock(priv);

2066 2067 2068 2069 2070
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SUSPEND,
              (xdrproc_t) xdr_remote_domain_suspend_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2071
        goto done;
2072

2073 2074 2075
    rv = 0;

done:
2076
    remoteDriverUnlock(priv);
2077
    return rv;
2078 2079 2080 2081 2082
}

static int
remoteDomainResume (virDomainPtr domain)
{
2083
    int rv = -1;
2084
    remote_domain_resume_args args;
2085
    struct private_data *priv = domain->conn->privateData;
2086

2087 2088
    remoteDriverLock(priv);

2089 2090 2091 2092 2093
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_RESUME,
              (xdrproc_t) xdr_remote_domain_resume_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2094
        goto done;
2095

2096 2097 2098
    rv = 0;

done:
2099
    remoteDriverUnlock(priv);
2100
    return rv;
2101 2102 2103 2104 2105
}

static int
remoteDomainShutdown (virDomainPtr domain)
{
2106
    int rv = -1;
2107
    remote_domain_shutdown_args args;
2108
    struct private_data *priv = domain->conn->privateData;
2109

2110 2111
    remoteDriverLock(priv);

2112 2113 2114 2115 2116
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SHUTDOWN,
              (xdrproc_t) xdr_remote_domain_shutdown_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2117
        goto done;
2118

2119 2120 2121
    rv = 0;

done:
2122
    remoteDriverUnlock(priv);
2123
    return rv;
2124 2125 2126 2127 2128
}

static int
remoteDomainReboot (virDomainPtr domain, unsigned int flags)
{
2129
    int rv = -1;
2130
    remote_domain_reboot_args args;
2131
    struct private_data *priv = domain->conn->privateData;
2132

2133 2134
    remoteDriverLock(priv);

2135 2136 2137 2138 2139 2140
    make_nonnull_domain (&args.dom, domain);
    args.flags = flags;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_REBOOT,
              (xdrproc_t) xdr_remote_domain_reboot_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2141
        goto done;
2142

2143 2144 2145
    rv = 0;

done:
2146
    remoteDriverUnlock(priv);
2147
    return rv;
2148 2149 2150 2151 2152
}

static int
remoteDomainDestroy (virDomainPtr domain)
{
2153
    int rv = -1;
2154
    remote_domain_destroy_args args;
2155
    struct private_data *priv = domain->conn->privateData;
2156

2157 2158
    remoteDriverLock(priv);

2159 2160 2161 2162 2163
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_DESTROY,
              (xdrproc_t) xdr_remote_domain_destroy_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2164
        goto done;
2165

2166
    rv = 0;
2167
    domain->id = -1;
2168 2169

done:
2170
    remoteDriverUnlock(priv);
2171
    return rv;
2172 2173 2174 2175 2176
}

static char *
remoteDomainGetOSType (virDomainPtr domain)
{
2177
    char *rv = NULL;
2178 2179
    remote_domain_get_os_type_args args;
    remote_domain_get_os_type_ret ret;
2180
    struct private_data *priv = domain->conn->privateData;
2181

2182 2183
    remoteDriverLock(priv);

2184 2185 2186 2187 2188 2189
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_OS_TYPE,
              (xdrproc_t) xdr_remote_domain_get_os_type_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_os_type_ret, (char *) &ret) == -1)
2190
        goto done;
2191 2192

    /* Caller frees. */
2193 2194 2195
    rv = ret.type;

done:
2196
    remoteDriverUnlock(priv);
2197
    return rv;
2198 2199 2200 2201 2202
}

static unsigned long
remoteDomainGetMaxMemory (virDomainPtr domain)
{
2203
    unsigned long rv = 0;
2204 2205
    remote_domain_get_max_memory_args args;
    remote_domain_get_max_memory_ret ret;
2206
    struct private_data *priv = domain->conn->privateData;
2207

2208 2209
    remoteDriverLock(priv);

2210 2211 2212 2213 2214 2215
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_MAX_MEMORY,
              (xdrproc_t) xdr_remote_domain_get_max_memory_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_max_memory_ret, (char *) &ret) == -1)
2216 2217 2218
        goto done;

    rv = ret.memory;
2219

2220
done:
2221
    remoteDriverUnlock(priv);
2222
    return rv;
2223 2224 2225 2226 2227
}

static int
remoteDomainSetMaxMemory (virDomainPtr domain, unsigned long memory)
{
2228
    int rv = -1;
2229
    remote_domain_set_max_memory_args args;
2230
    struct private_data *priv = domain->conn->privateData;
2231

2232 2233
    remoteDriverLock(priv);

2234 2235 2236 2237 2238 2239
    make_nonnull_domain (&args.dom, domain);
    args.memory = memory;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SET_MAX_MEMORY,
              (xdrproc_t) xdr_remote_domain_set_max_memory_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2240
        goto done;
2241

2242 2243 2244
    rv = 0;

done:
2245
    remoteDriverUnlock(priv);
2246
    return rv;
2247 2248 2249 2250 2251
}

static int
remoteDomainSetMemory (virDomainPtr domain, unsigned long memory)
{
2252
    int rv = -1;
2253
    remote_domain_set_memory_args args;
2254
    struct private_data *priv = domain->conn->privateData;
2255

2256 2257
    remoteDriverLock(priv);

2258 2259 2260 2261 2262 2263
    make_nonnull_domain (&args.dom, domain);
    args.memory = memory;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SET_MEMORY,
              (xdrproc_t) xdr_remote_domain_set_memory_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2264
        goto done;
2265

2266 2267 2268
    rv = 0;

done:
2269
    remoteDriverUnlock(priv);
2270
    return rv;
2271 2272 2273 2274 2275
}

static int
remoteDomainGetInfo (virDomainPtr domain, virDomainInfoPtr info)
{
2276
    int rv = -1;
2277 2278
    remote_domain_get_info_args args;
    remote_domain_get_info_ret ret;
2279
    struct private_data *priv = domain->conn->privateData;
2280

2281 2282
    remoteDriverLock(priv);

2283 2284 2285 2286 2287 2288
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_INFO,
              (xdrproc_t) xdr_remote_domain_get_info_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_info_ret, (char *) &ret) == -1)
2289
        goto done;
2290 2291 2292 2293 2294 2295

    info->state = ret.state;
    info->maxMem = ret.max_mem;
    info->memory = ret.memory;
    info->nrVirtCpu = ret.nr_virt_cpu;
    info->cpuTime = ret.cpu_time;
2296

2297 2298 2299
    rv = 0;

done:
2300
    remoteDriverUnlock(priv);
2301
    return rv;
2302 2303 2304 2305 2306
}

static int
remoteDomainSave (virDomainPtr domain, const char *to)
{
2307
    int rv = -1;
2308
    remote_domain_save_args args;
2309
    struct private_data *priv = domain->conn->privateData;
2310

2311 2312
    remoteDriverLock(priv);

2313 2314 2315 2316 2317 2318
    make_nonnull_domain (&args.dom, domain);
    args.to = (char *) to;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SAVE,
              (xdrproc_t) xdr_remote_domain_save_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2319
        goto done;
2320

2321 2322 2323
    rv = 0;

done:
2324
    remoteDriverUnlock(priv);
2325
    return rv;
2326 2327 2328 2329 2330
}

static int
remoteDomainRestore (virConnectPtr conn, const char *from)
{
2331
    int rv = -1;
2332
    remote_domain_restore_args args;
2333
    struct private_data *priv = conn->privateData;
2334

2335 2336
    remoteDriverLock(priv);

2337 2338 2339 2340 2341
    args.from = (char *) from;

    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_RESTORE,
              (xdrproc_t) xdr_remote_domain_restore_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2342
        goto done;
2343

2344 2345 2346
    rv = 0;

done:
2347
    remoteDriverUnlock(priv);
2348
    return rv;
2349 2350 2351 2352 2353
}

static int
remoteDomainCoreDump (virDomainPtr domain, const char *to, int flags)
{
2354
    int rv = -1;
2355
    remote_domain_core_dump_args args;
2356
    struct private_data *priv = domain->conn->privateData;
2357

2358 2359
    remoteDriverLock(priv);

2360 2361 2362 2363 2364 2365 2366
    make_nonnull_domain (&args.dom, domain);
    args.to = (char *) to;
    args.flags = flags;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_CORE_DUMP,
              (xdrproc_t) xdr_remote_domain_core_dump_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2367
        goto done;
2368

2369 2370 2371
    rv = 0;

done:
2372
    remoteDriverUnlock(priv);
2373
    return rv;
2374 2375 2376 2377 2378
}

static int
remoteDomainSetVcpus (virDomainPtr domain, unsigned int nvcpus)
{
2379
    int rv = -1;
2380
    remote_domain_set_vcpus_args args;
2381
    struct private_data *priv = domain->conn->privateData;
2382

2383 2384
    remoteDriverLock(priv);

2385 2386 2387 2388 2389 2390
    make_nonnull_domain (&args.dom, domain);
    args.nvcpus = nvcpus;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SET_VCPUS,
              (xdrproc_t) xdr_remote_domain_set_vcpus_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2391
        goto done;
2392

2393 2394 2395
    rv = 0;

done:
2396
    remoteDriverUnlock(priv);
2397
    return rv;
2398 2399 2400 2401 2402 2403 2404 2405
}

static int
remoteDomainPinVcpu (virDomainPtr domain,
                     unsigned int vcpu,
                     unsigned char *cpumap,
                     int maplen)
{
2406
    int rv = -1;
2407
    remote_domain_pin_vcpu_args args;
2408
    struct private_data *priv = domain->conn->privateData;
2409

2410 2411
    remoteDriverLock(priv);

2412
    if (maplen > REMOTE_CPUMAP_MAX) {
2413 2414 2415
        errorf (domain->conn, VIR_ERR_RPC,
                _("map length greater than maximum: %d > %d"),
                maplen, REMOTE_CPUMAP_MAX);
2416
        goto done;
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426
    }

    make_nonnull_domain (&args.dom, domain);
    args.vcpu = vcpu;
    args.cpumap.cpumap_len = maplen;
    args.cpumap.cpumap_val = (char *) cpumap;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_PIN_VCPU,
              (xdrproc_t) xdr_remote_domain_pin_vcpu_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2427
        goto done;
2428

2429 2430 2431
    rv = 0;

done:
2432
    remoteDriverUnlock(priv);
2433
    return rv;
2434 2435 2436 2437 2438 2439 2440 2441 2442
}

static int
remoteDomainGetVcpus (virDomainPtr domain,
                      virVcpuInfoPtr info,
                      int maxinfo,
                      unsigned char *cpumaps,
                      int maplen)
{
2443
    int rv = -1;
2444 2445 2446
    int i;
    remote_domain_get_vcpus_args args;
    remote_domain_get_vcpus_ret ret;
2447
    struct private_data *priv = domain->conn->privateData;
2448

2449 2450
    remoteDriverLock(priv);

2451
    if (maxinfo > REMOTE_VCPUINFO_MAX) {
2452 2453 2454
        errorf (domain->conn, VIR_ERR_RPC,
                _("vCPU count exceeds maximum: %d > %d"),
                maxinfo, REMOTE_VCPUINFO_MAX);
2455
        goto done;
2456
    }
2457
    if (maxinfo * maplen > REMOTE_CPUMAPS_MAX) {
2458 2459 2460
        errorf (domain->conn, VIR_ERR_RPC,
                _("vCPU map buffer length exceeds maximum: %d > %d"),
                maxinfo * maplen, REMOTE_CPUMAPS_MAX);
2461
        goto done;
2462 2463 2464 2465 2466 2467 2468 2469 2470 2471
    }

    make_nonnull_domain (&args.dom, domain);
    args.maxinfo = maxinfo;
    args.maplen = maplen;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_VCPUS,
              (xdrproc_t) xdr_remote_domain_get_vcpus_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_vcpus_ret, (char *) &ret) == -1)
2472
        goto done;
2473 2474

    if (ret.info.info_len > maxinfo) {
2475 2476 2477
        errorf (domain->conn, VIR_ERR_RPC,
                _("host reports too many vCPUs: %d > %d"),
                ret.info.info_len, maxinfo);
2478
        goto cleanup;
2479
    }
2480
    if (ret.cpumaps.cpumaps_len > maxinfo * maplen) {
2481 2482 2483
        errorf (domain->conn, VIR_ERR_RPC,
                _("host reports map buffer length exceeds maximum: %d > %d"),
                ret.cpumaps.cpumaps_len, maxinfo * maplen);
2484
        goto cleanup;
2485 2486
    }

2487 2488 2489
    memset (info, 0, sizeof (virVcpuInfo) * maxinfo);
    memset (cpumaps, 0, maxinfo * maplen);

2490 2491 2492 2493 2494 2495 2496 2497 2498 2499
    for (i = 0; i < ret.info.info_len; ++i) {
        info[i].number = ret.info.info_val[i].number;
        info[i].state = ret.info.info_val[i].state;
        info[i].cpuTime = ret.info.info_val[i].cpu_time;
        info[i].cpu = ret.info.info_val[i].cpu;
    }

    for (i = 0; i < ret.cpumaps.cpumaps_len; ++i)
        cpumaps[i] = ret.cpumaps.cpumaps_val[i];

2500 2501 2502
    rv = ret.info.info_len;

cleanup:
2503
    xdr_free ((xdrproc_t) xdr_remote_domain_get_vcpus_ret, (char *) &ret);
2504 2505

done:
2506
    remoteDriverUnlock(priv);
2507
    return rv;
2508 2509 2510 2511 2512
}

static int
remoteDomainGetMaxVcpus (virDomainPtr domain)
{
2513
    int rv = -1;
2514 2515
    remote_domain_get_max_vcpus_args args;
    remote_domain_get_max_vcpus_ret ret;
2516
    struct private_data *priv = domain->conn->privateData;
2517

2518 2519
    remoteDriverLock(priv);

2520 2521 2522
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
2523
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_MAX_VCPUS,
2524 2525
              (xdrproc_t) xdr_remote_domain_get_max_vcpus_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_max_vcpus_ret, (char *) &ret) == -1)
2526
        goto done;
2527

2528 2529 2530
    rv = ret.num;

done:
2531
    remoteDriverUnlock(priv);
2532
    return rv;
2533 2534
}

2535 2536 2537 2538 2539 2540
static int
remoteDomainGetSecurityLabel (virDomainPtr domain, virSecurityLabelPtr seclabel)
{
    remote_domain_get_security_label_args args;
    remote_domain_get_security_label_ret ret;
    struct private_data *priv = domain->conn->privateData;
2541 2542 2543
    int rv = -1;

    remoteDriverLock(priv);
2544 2545 2546

    make_nonnull_domain (&args.dom, domain);
    memset (&ret, 0, sizeof ret);
2547 2548
    memset (seclabel, 0, sizeof (*seclabel));

2549 2550 2551
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_SECURITY_LABEL,
              (xdrproc_t) xdr_remote_domain_get_security_label_args, (char *)&args,
              (xdrproc_t) xdr_remote_domain_get_security_label_ret, (char *)&ret) == -1) {
2552
        goto done;
2553 2554 2555 2556 2557 2558
    }

    if (ret.label.label_val != NULL) {
        if (strlen (ret.label.label_val) >= sizeof seclabel->label) {
            errorf (domain->conn, VIR_ERR_RPC, _("security label exceeds maximum: %zd"),
                    sizeof seclabel->label - 1);
2559
            goto done;
2560 2561 2562 2563 2564
        }
        strcpy (seclabel->label, ret.label.label_val);
        seclabel->enforcing = ret.enforcing;
    }

2565 2566 2567 2568 2569
    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
2570 2571 2572 2573 2574 2575 2576
}

static int
remoteNodeGetSecurityModel (virConnectPtr conn, virSecurityModelPtr secmodel)
{
    remote_node_get_security_model_ret ret;
    struct private_data *priv = conn->privateData;
2577 2578 2579
    int rv = -1;

    remoteDriverLock(priv);
2580 2581

    memset (&ret, 0, sizeof ret);
2582 2583
    memset (secmodel, 0, sizeof (*secmodel));

2584 2585 2586
    if (call (conn, priv, 0, REMOTE_PROC_NODE_GET_SECURITY_MODEL,
              (xdrproc_t) xdr_void, NULL,
              (xdrproc_t) xdr_remote_node_get_security_model_ret, (char *)&ret) == -1) {
2587
        goto done;
2588 2589 2590 2591 2592 2593
    }

    if (ret.model.model_val != NULL) {
        if (strlen (ret.model.model_val) >= sizeof secmodel->model) {
            errorf (conn, VIR_ERR_RPC, _("security model exceeds maximum: %zd"),
                    sizeof secmodel->model - 1);
2594
            goto done;
2595 2596 2597 2598 2599 2600 2601 2602
        }
        strcpy (secmodel->model, ret.model.model_val);
    }

    if (ret.doi.doi_val != NULL) {
        if (strlen (ret.doi.doi_val) >= sizeof secmodel->doi) {
            errorf (conn, VIR_ERR_RPC, _("security doi exceeds maximum: %zd"),
                    sizeof secmodel->doi - 1);
2603
            goto done;
2604 2605 2606
        }
        strcpy (secmodel->doi, ret.doi.doi_val);
    }
2607 2608 2609 2610 2611 2612

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
2613 2614
}

2615 2616 2617
static char *
remoteDomainDumpXML (virDomainPtr domain, int flags)
{
2618
    char *rv = NULL;
2619 2620
    remote_domain_dump_xml_args args;
    remote_domain_dump_xml_ret ret;
2621
    struct private_data *priv = domain->conn->privateData;
2622

2623 2624
    remoteDriverLock(priv);

2625 2626 2627 2628 2629 2630 2631
    make_nonnull_domain (&args.dom, domain);
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_DUMP_XML,
              (xdrproc_t) xdr_remote_domain_dump_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_dump_xml_ret, (char *) &ret) == -1)
2632
        goto done;
2633 2634

    /* Caller frees. */
2635 2636 2637
    rv = ret.xml;

done:
2638
    remoteDriverUnlock(priv);
2639
    return rv;
2640 2641
}

2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703
static char *
remoteDomainXMLFromNative (virConnectPtr conn,
                           const char *format,
                           const char *config,
                           unsigned int flags)
{
    char *rv = NULL;
    remote_domain_xml_from_native_args args;
    remote_domain_xml_from_native_ret ret;
    struct private_data *priv = conn->privateData;

    remoteDriverLock(priv);

    args.nativeFormat = (char *)format;
    args.nativeConfig = (char *)config;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_XML_FROM_NATIVE,
              (xdrproc_t) xdr_remote_domain_xml_from_native_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_xml_from_native_ret, (char *) &ret) == -1)
        goto done;

    /* Caller frees. */
    rv = ret.domainXml;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static char *
remoteDomainXMLToNative (virConnectPtr conn,
                         const char *format,
                         const char *xml,
                         unsigned int flags)
{
    char *rv = NULL;
    remote_domain_xml_to_native_args args;
    remote_domain_xml_to_native_ret ret;
    struct private_data *priv = conn->privateData;

    remoteDriverLock(priv);

    args.nativeFormat = (char *)format;
    args.domainXml = (char *)xml;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_XML_TO_NATIVE,
              (xdrproc_t) xdr_remote_domain_xml_to_native_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_xml_to_native_ret, (char *) &ret) == -1)
        goto done;

    /* Caller frees. */
    rv = ret.nativeConfig;

done:
    remoteDriverUnlock(priv);
    return rv;
}

2704 2705 2706 2707 2708 2709 2710
static int
remoteDomainMigratePrepare (virConnectPtr dconn,
                            char **cookie, int *cookielen,
                            const char *uri_in, char **uri_out,
                            unsigned long flags, const char *dname,
                            unsigned long resource)
{
2711
    int rv = -1;
2712 2713
    remote_domain_migrate_prepare_args args;
    remote_domain_migrate_prepare_ret ret;
2714
    struct private_data *priv = dconn->privateData;
2715

2716 2717
    remoteDriverLock(priv);

2718 2719 2720 2721 2722 2723 2724 2725 2726
    args.uri_in = uri_in == NULL ? NULL : (char **) &uri_in;
    args.flags = flags;
    args.dname = dname == NULL ? NULL : (char **) &dname;
    args.resource = resource;

    memset (&ret, 0, sizeof ret);
    if (call (dconn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_PREPARE,
              (xdrproc_t) xdr_remote_domain_migrate_prepare_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_migrate_prepare_ret, (char *) &ret) == -1)
2727
        goto done;
2728 2729 2730 2731 2732 2733 2734 2735

    if (ret.cookie.cookie_len > 0) {
        *cookie = ret.cookie.cookie_val; /* Caller frees. */
        *cookielen = ret.cookie.cookie_len;
    }
    if (ret.uri_out)
        *uri_out = *ret.uri_out; /* Caller frees. */

2736 2737 2738
    rv = 0;

done:
2739
    remoteDriverUnlock(priv);
2740
    return rv;
2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751
}

static int
remoteDomainMigratePerform (virDomainPtr domain,
                            const char *cookie,
                            int cookielen,
                            const char *uri,
                            unsigned long flags,
                            const char *dname,
                            unsigned long resource)
{
2752
    int rv = -1;
2753
    remote_domain_migrate_perform_args args;
2754
    struct private_data *priv = domain->conn->privateData;
2755

2756 2757
    remoteDriverLock(priv);

2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768
    make_nonnull_domain (&args.dom, domain);
    args.cookie.cookie_len = cookielen;
    args.cookie.cookie_val = (char *) cookie;
    args.uri = (char *) uri;
    args.flags = flags;
    args.dname = dname == NULL ? NULL : (char **) &dname;
    args.resource = resource;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_PERFORM,
              (xdrproc_t) xdr_remote_domain_migrate_perform_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2769
        goto done;
2770

2771 2772 2773
    rv = 0;

done:
2774
    remoteDriverUnlock(priv);
2775
    return rv;
2776 2777 2778 2779 2780 2781 2782 2783 2784 2785
}

static virDomainPtr
remoteDomainMigrateFinish (virConnectPtr dconn,
                           const char *dname,
                           const char *cookie,
                           int cookielen,
                           const char *uri,
                           unsigned long flags)
{
2786
    virDomainPtr ddom = NULL;
2787 2788
    remote_domain_migrate_finish_args args;
    remote_domain_migrate_finish_ret ret;
2789
    struct private_data *priv = dconn->privateData;
2790

2791 2792
    remoteDriverLock(priv);

2793 2794 2795 2796 2797 2798 2799 2800 2801 2802
    args.dname = (char *) dname;
    args.cookie.cookie_len = cookielen;
    args.cookie.cookie_val = (char *) cookie;
    args.uri = (char *) uri;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (dconn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_FINISH,
              (xdrproc_t) xdr_remote_domain_migrate_finish_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_migrate_finish_ret, (char *) &ret) == -1)
2803
        goto done;
2804 2805 2806 2807

    ddom = get_nonnull_domain (dconn, ret.ddom);
    xdr_free ((xdrproc_t) &xdr_remote_domain_migrate_finish_ret, (char *) &ret);

2808
done:
2809
    remoteDriverUnlock(priv);
2810 2811 2812
    return ddom;
}

D
Daniel Veillard 已提交
2813 2814 2815 2816 2817 2818 2819 2820
static int
remoteDomainMigratePrepare2 (virConnectPtr dconn,
                             char **cookie, int *cookielen,
                             const char *uri_in, char **uri_out,
                             unsigned long flags, const char *dname,
                             unsigned long resource,
                             const char *dom_xml)
{
2821
    int rv = -1;
D
Daniel Veillard 已提交
2822 2823
    remote_domain_migrate_prepare2_args args;
    remote_domain_migrate_prepare2_ret ret;
2824
    struct private_data *priv = dconn->privateData;
D
Daniel Veillard 已提交
2825

2826 2827
    remoteDriverLock(priv);

D
Daniel Veillard 已提交
2828 2829 2830 2831 2832 2833 2834 2835 2836 2837
    args.uri_in = uri_in == NULL ? NULL : (char **) &uri_in;
    args.flags = flags;
    args.dname = dname == NULL ? NULL : (char **) &dname;
    args.resource = resource;
    args.dom_xml = (char *) dom_xml;

    memset (&ret, 0, sizeof ret);
    if (call (dconn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_PREPARE2,
              (xdrproc_t) xdr_remote_domain_migrate_prepare2_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_migrate_prepare2_ret, (char *) &ret) == -1)
2838
        goto done;
D
Daniel Veillard 已提交
2839 2840 2841 2842 2843 2844 2845 2846

    if (ret.cookie.cookie_len > 0) {
        *cookie = ret.cookie.cookie_val; /* Caller frees. */
        *cookielen = ret.cookie.cookie_len;
    }
    if (ret.uri_out)
        *uri_out = *ret.uri_out; /* Caller frees. */

2847 2848 2849
    rv = 0;

done:
2850
    remoteDriverUnlock(priv);
2851
    return rv;
D
Daniel Veillard 已提交
2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862
}

static virDomainPtr
remoteDomainMigrateFinish2 (virConnectPtr dconn,
                            const char *dname,
                            const char *cookie,
                            int cookielen,
                            const char *uri,
                            unsigned long flags,
                            int retcode)
{
2863
    virDomainPtr ddom = NULL;
D
Daniel Veillard 已提交
2864 2865
    remote_domain_migrate_finish2_args args;
    remote_domain_migrate_finish2_ret ret;
2866
    struct private_data *priv = dconn->privateData;
D
Daniel Veillard 已提交
2867

2868 2869
    remoteDriverLock(priv);

D
Daniel Veillard 已提交
2870 2871 2872 2873 2874 2875 2876 2877 2878 2879 2880
    args.dname = (char *) dname;
    args.cookie.cookie_len = cookielen;
    args.cookie.cookie_val = (char *) cookie;
    args.uri = (char *) uri;
    args.flags = flags;
    args.retcode = retcode;

    memset (&ret, 0, sizeof ret);
    if (call (dconn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_FINISH2,
              (xdrproc_t) xdr_remote_domain_migrate_finish2_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_migrate_finish2_ret, (char *) &ret) == -1)
2881
        goto done;
D
Daniel Veillard 已提交
2882 2883 2884 2885

    ddom = get_nonnull_domain (dconn, ret.ddom);
    xdr_free ((xdrproc_t) &xdr_remote_domain_migrate_finish2_ret, (char *) &ret);

2886
done:
2887
    remoteDriverUnlock(priv);
D
Daniel Veillard 已提交
2888 2889 2890
    return ddom;
}

2891 2892 2893
static int
remoteListDefinedDomains (virConnectPtr conn, char **const names, int maxnames)
{
2894
    int rv = -1;
2895 2896 2897
    int i;
    remote_list_defined_domains_args args;
    remote_list_defined_domains_ret ret;
2898
    struct private_data *priv = conn->privateData;
2899

2900 2901
    remoteDriverLock(priv);

2902
    if (maxnames > REMOTE_DOMAIN_NAME_LIST_MAX) {
2903 2904 2905
        errorf (conn, VIR_ERR_RPC,
                _("too many remote domain names: %d > %d"),
                maxnames, REMOTE_DOMAIN_NAME_LIST_MAX);
2906
        goto done;
2907 2908 2909 2910 2911 2912 2913
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_DEFINED_DOMAINS,
              (xdrproc_t) xdr_remote_list_defined_domains_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_defined_domains_ret, (char *) &ret) == -1)
2914
        goto done;
2915 2916

    if (ret.names.names_len > maxnames) {
2917 2918 2919
        errorf (conn, VIR_ERR_RPC,
                _("too many remote domain names: %d > %d"),
                ret.names.names_len, maxnames);
2920
        goto cleanup;
2921 2922 2923 2924 2925 2926 2927
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
2928
    for (i = 0; i < ret.names.names_len; ++i) {
2929 2930
        names[i] = strdup (ret.names.names_val[i]);

2931 2932 2933 2934
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

2935
            virReportOOMError();
2936 2937 2938 2939
            goto cleanup;
        }
    }

2940 2941 2942
    rv = ret.names.names_len;

cleanup:
2943 2944
    xdr_free ((xdrproc_t) xdr_remote_list_defined_domains_ret, (char *) &ret);

2945
done:
2946
    remoteDriverUnlock(priv);
2947
    return rv;
2948 2949 2950 2951 2952
}

static int
remoteNumOfDefinedDomains (virConnectPtr conn)
{
2953
    int rv = -1;
2954
    remote_num_of_defined_domains_ret ret;
2955
    struct private_data *priv = conn->privateData;
2956

2957 2958
    remoteDriverLock(priv);

2959 2960 2961 2962
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_DEFINED_DOMAINS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_defined_domains_ret, (char *) &ret) == -1)
2963
        goto done;
2964

2965 2966 2967
    rv = ret.num;

done:
2968
    remoteDriverUnlock(priv);
2969
    return rv;
2970 2971 2972 2973 2974
}

static int
remoteDomainCreate (virDomainPtr domain)
{
2975
    int rv = -1;
2976
    remote_domain_create_args args;
2977 2978
    remote_domain_lookup_by_uuid_args args2;
    remote_domain_lookup_by_uuid_ret ret2;
2979
    struct private_data *priv = domain->conn->privateData;
2980

2981 2982
    remoteDriverLock(priv);

2983 2984 2985 2986 2987
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_CREATE,
              (xdrproc_t) xdr_remote_domain_create_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
2988
        goto done;
2989

2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003
    /* Need to do a lookup figure out ID of newly started guest, because
     * bug in design of REMOTE_PROC_DOMAIN_CREATE means we aren't getting
     * it returned.
     */
    memcpy (args2.uuid, domain->uuid, VIR_UUID_BUFLEN);
    memset (&ret2, 0, sizeof ret2);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_LOOKUP_BY_UUID,
              (xdrproc_t) xdr_remote_domain_lookup_by_uuid_args, (char *) &args2,
              (xdrproc_t) xdr_remote_domain_lookup_by_uuid_ret, (char *) &ret2) == -1)
        goto done;

    domain->id = ret2.dom.id;
    xdr_free ((xdrproc_t) &xdr_remote_domain_lookup_by_uuid_ret, (char *) &ret2);

3004 3005 3006
    rv = 0;

done:
3007
    remoteDriverUnlock(priv);
3008
    return rv;
3009 3010 3011 3012 3013
}

static virDomainPtr
remoteDomainDefineXML (virConnectPtr conn, const char *xml)
{
3014
    virDomainPtr dom = NULL;
3015 3016
    remote_domain_define_xml_args args;
    remote_domain_define_xml_ret ret;
3017
    struct private_data *priv = conn->privateData;
3018

3019 3020
    remoteDriverLock(priv);

3021 3022 3023 3024 3025 3026
    args.xml = (char *) xml;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_DEFINE_XML,
              (xdrproc_t) xdr_remote_domain_define_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_define_xml_ret, (char *) &ret) == -1)
3027
        goto done;
3028 3029 3030 3031

    dom = get_nonnull_domain (conn, ret.dom);
    xdr_free ((xdrproc_t) xdr_remote_domain_define_xml_ret, (char *) &ret);

3032
done:
3033
    remoteDriverUnlock(priv);
3034 3035 3036 3037 3038 3039
    return dom;
}

static int
remoteDomainUndefine (virDomainPtr domain)
{
3040
    int rv = -1;
3041
    remote_domain_undefine_args args;
3042
    struct private_data *priv = domain->conn->privateData;
3043

3044 3045
    remoteDriverLock(priv);

3046 3047 3048 3049 3050
    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_UNDEFINE,
              (xdrproc_t) xdr_remote_domain_undefine_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3051
        goto done;
3052

3053 3054 3055
    rv = 0;

done:
3056
    remoteDriverUnlock(priv);
3057
    return rv;
3058 3059 3060
}

static int
3061
remoteDomainAttachDevice (virDomainPtr domain, const char *xml)
3062
{
3063
    int rv = -1;
3064
    remote_domain_attach_device_args args;
3065
    struct private_data *priv = domain->conn->privateData;
3066

3067 3068
    remoteDriverLock(priv);

3069
    make_nonnull_domain (&args.dom, domain);
3070
    args.xml = (char *) xml;
3071 3072 3073 3074

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_ATTACH_DEVICE,
              (xdrproc_t) xdr_remote_domain_attach_device_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3075
        goto done;
3076

3077 3078 3079
    rv = 0;

done:
3080
    remoteDriverUnlock(priv);
3081
    return rv;
3082 3083
}

J
Jim Fehlig 已提交
3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109
static int
remoteDomainAttachDeviceFlags (virDomainPtr domain, const char *xml,
                               unsigned int flags)
{
    int rv = -1;
    remote_domain_attach_device_flags_args args;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);
    args.xml = (char *) xml;
    args.flags = flags;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_ATTACH_DEVICE_FLAGS,
              (xdrproc_t) xdr_remote_domain_attach_device_flags_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

3110
static int
3111
remoteDomainDetachDevice (virDomainPtr domain, const char *xml)
3112
{
3113
    int rv = -1;
3114
    remote_domain_detach_device_args args;
3115
    struct private_data *priv = domain->conn->privateData;
3116

3117 3118
    remoteDriverLock(priv);

3119
    make_nonnull_domain (&args.dom, domain);
3120
    args.xml = (char *) xml;
3121 3122 3123 3124

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_DETACH_DEVICE,
              (xdrproc_t) xdr_remote_domain_detach_device_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3125
        goto done;
3126

3127 3128 3129
    rv = 0;

done:
3130
    remoteDriverUnlock(priv);
3131
    return rv;
3132 3133
}

J
Jim Fehlig 已提交
3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159
static int
remoteDomainDetachDeviceFlags (virDomainPtr domain, const char *xml,
                               unsigned int flags)
{
    int rv = -1;
    remote_domain_detach_device_flags_args args;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);
    args.xml = (char *) xml;
    args.flags = flags;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_DETACH_DEVICE_FLAGS,
              (xdrproc_t) xdr_remote_domain_detach_device_flags_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

3160 3161 3162
static int
remoteDomainGetAutostart (virDomainPtr domain, int *autostart)
{
3163
    int rv = -1;
3164 3165
    remote_domain_get_autostart_args args;
    remote_domain_get_autostart_ret ret;
3166
    struct private_data *priv = domain->conn->privateData;
3167

3168 3169
    remoteDriverLock(priv);

3170 3171 3172 3173 3174 3175
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_AUTOSTART,
              (xdrproc_t) xdr_remote_domain_get_autostart_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_autostart_ret, (char *) &ret) == -1)
3176
        goto done;
3177 3178

    if (autostart) *autostart = ret.autostart;
3179 3180 3181
    rv = 0;

done:
3182
    remoteDriverUnlock(priv);
3183
    return rv;
3184 3185 3186 3187 3188
}

static int
remoteDomainSetAutostart (virDomainPtr domain, int autostart)
{
3189
    int rv = -1;
3190
    remote_domain_set_autostart_args args;
3191
    struct private_data *priv = domain->conn->privateData;
3192

3193 3194
    remoteDriverLock(priv);

3195 3196 3197 3198 3199 3200
    make_nonnull_domain (&args.dom, domain);
    args.autostart = autostart;

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SET_AUTOSTART,
              (xdrproc_t) xdr_remote_domain_set_autostart_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3201
        goto done;
3202

3203 3204 3205
    rv = 0;

done:
3206
    remoteDriverUnlock(priv);
3207
    return rv;
3208 3209
}

3210 3211 3212
static char *
remoteDomainGetSchedulerType (virDomainPtr domain, int *nparams)
{
3213
    char *rv = NULL;
3214 3215
    remote_domain_get_scheduler_type_args args;
    remote_domain_get_scheduler_type_ret ret;
3216
    struct private_data *priv = domain->conn->privateData;
3217

3218 3219
    remoteDriverLock(priv);

3220 3221 3222 3223 3224 3225
    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_SCHEDULER_TYPE,
              (xdrproc_t) xdr_remote_domain_get_scheduler_type_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_scheduler_type_ret, (char *) &ret) == -1)
3226
        goto done;
3227 3228 3229 3230

    if (nparams) *nparams = ret.nparams;

    /* Caller frees this. */
3231 3232 3233
    rv = ret.type;

done:
3234
    remoteDriverUnlock(priv);
3235
    return rv;
3236 3237 3238 3239 3240 3241
}

static int
remoteDomainGetSchedulerParameters (virDomainPtr domain,
                                    virSchedParameterPtr params, int *nparams)
{
3242
    int rv = -1;
3243 3244
    remote_domain_get_scheduler_parameters_args args;
    remote_domain_get_scheduler_parameters_ret ret;
3245
    int i = -1;
3246
    struct private_data *priv = domain->conn->privateData;
3247

3248 3249
    remoteDriverLock(priv);

3250 3251 3252 3253 3254 3255 3256
    make_nonnull_domain (&args.dom, domain);
    args.nparams = *nparams;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_SCHEDULER_PARAMETERS,
              (xdrproc_t) xdr_remote_domain_get_scheduler_parameters_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_scheduler_parameters_ret, (char *) &ret) == -1)
3257
        goto done;
3258 3259 3260 3261

    /* Check the length of the returned list carefully. */
    if (ret.params.params_len > REMOTE_DOMAIN_SCHEDULER_PARAMETERS_MAX ||
        ret.params.params_len > *nparams) {
3262 3263 3264
        error (domain->conn, VIR_ERR_RPC,
               _("remoteDomainGetSchedulerParameters: "
                 "returned number of parameters exceeds limit"));
3265
        goto cleanup;
3266 3267 3268 3269 3270
    }
    *nparams = ret.params.params_len;

    /* Deserialise the result. */
    for (i = 0; i < *nparams; ++i) {
C
Chris Lalancette 已提交
3271 3272 3273 3274 3275 3276
        if (virStrcpyStatic(params[i].field, ret.params.params_val[i].field) == NULL) {
            errorf(domain->conn, VIR_ERR_INTERNAL_ERROR,
                   _("Parameter %s too big for destination"),
                   ret.params.params_val[i].field);
            goto cleanup;
        }
3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291
        params[i].type = ret.params.params_val[i].value.type;
        switch (params[i].type) {
        case VIR_DOMAIN_SCHED_FIELD_INT:
            params[i].value.i = ret.params.params_val[i].value.remote_sched_param_value_u.i; break;
        case VIR_DOMAIN_SCHED_FIELD_UINT:
            params[i].value.ui = ret.params.params_val[i].value.remote_sched_param_value_u.ui; break;
        case VIR_DOMAIN_SCHED_FIELD_LLONG:
            params[i].value.l = ret.params.params_val[i].value.remote_sched_param_value_u.l; break;
        case VIR_DOMAIN_SCHED_FIELD_ULLONG:
            params[i].value.ul = ret.params.params_val[i].value.remote_sched_param_value_u.ul; break;
        case VIR_DOMAIN_SCHED_FIELD_DOUBLE:
            params[i].value.d = ret.params.params_val[i].value.remote_sched_param_value_u.d; break;
        case VIR_DOMAIN_SCHED_FIELD_BOOLEAN:
            params[i].value.b = ret.params.params_val[i].value.remote_sched_param_value_u.b; break;
        default:
3292 3293 3294
            error (domain->conn, VIR_ERR_RPC,
                   _("remoteDomainGetSchedulerParameters: "
                     "unknown parameter type"));
3295
            goto cleanup;
3296 3297 3298
        }
    }

3299 3300 3301
    rv = 0;

cleanup:
3302
    xdr_free ((xdrproc_t) xdr_remote_domain_get_scheduler_parameters_ret, (char *) &ret);
3303
done:
3304
    remoteDriverUnlock(priv);
3305
    return rv;
3306 3307 3308 3309 3310 3311
}

static int
remoteDomainSetSchedulerParameters (virDomainPtr domain,
                                    virSchedParameterPtr params, int nparams)
{
3312
    int rv = -1;
3313 3314
    remote_domain_set_scheduler_parameters_args args;
    int i, do_error;
3315
    struct private_data *priv = domain->conn->privateData;
3316

3317 3318
    remoteDriverLock(priv);

3319 3320 3321 3322
    make_nonnull_domain (&args.dom, domain);

    /* Serialise the scheduler parameters. */
    args.params.params_len = nparams;
3323
    if (VIR_ALLOC_N(args.params.params_val, nparams) < 0) {
3324
        virReportOOMError();
3325
        goto done;
3326 3327 3328 3329 3330 3331 3332
    }

    do_error = 0;
    for (i = 0; i < nparams; ++i) {
        // call() will free this:
        args.params.params_val[i].field = strdup (params[i].field);
        if (args.params.params_val[i].field == NULL) {
3333
            virReportOOMError();
3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350
            do_error = 1;
        }
        args.params.params_val[i].value.type = params[i].type;
        switch (params[i].type) {
        case VIR_DOMAIN_SCHED_FIELD_INT:
            args.params.params_val[i].value.remote_sched_param_value_u.i = params[i].value.i; break;
        case VIR_DOMAIN_SCHED_FIELD_UINT:
            args.params.params_val[i].value.remote_sched_param_value_u.ui = params[i].value.ui; break;
        case VIR_DOMAIN_SCHED_FIELD_LLONG:
            args.params.params_val[i].value.remote_sched_param_value_u.l = params[i].value.l; break;
        case VIR_DOMAIN_SCHED_FIELD_ULLONG:
            args.params.params_val[i].value.remote_sched_param_value_u.ul = params[i].value.ul; break;
        case VIR_DOMAIN_SCHED_FIELD_DOUBLE:
            args.params.params_val[i].value.remote_sched_param_value_u.d = params[i].value.d; break;
        case VIR_DOMAIN_SCHED_FIELD_BOOLEAN:
            args.params.params_val[i].value.remote_sched_param_value_u.b = params[i].value.b; break;
        default:
3351
            error (domain->conn, VIR_ERR_RPC, _("unknown parameter type"));
3352 3353 3354 3355 3356 3357
            do_error = 1;
        }
    }

    if (do_error) {
        xdr_free ((xdrproc_t) xdr_remote_domain_set_scheduler_parameters_args, (char *) &args);
3358
        goto done;
3359 3360 3361 3362 3363
    }

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_SET_SCHEDULER_PARAMETERS,
              (xdrproc_t) xdr_remote_domain_set_scheduler_parameters_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3364
        goto done;
3365

3366 3367 3368
    rv = 0;

done:
3369
    remoteDriverUnlock(priv);
3370
    return rv;
3371 3372
}

3373 3374 3375 3376
static int
remoteDomainBlockStats (virDomainPtr domain, const char *path,
                        struct _virDomainBlockStats *stats)
{
3377
    int rv = -1;
3378 3379
    remote_domain_block_stats_args args;
    remote_domain_block_stats_ret ret;
3380
    struct private_data *priv = domain->conn->privateData;
3381

3382 3383
    remoteDriverLock(priv);

3384 3385 3386 3387 3388 3389 3390 3391
    make_nonnull_domain (&args.dom, domain);
    args.path = (char *) path;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_BLOCK_STATS,
              (xdrproc_t) xdr_remote_domain_block_stats_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_block_stats_ret, (char *) &ret)
        == -1)
3392
        goto done;
3393 3394 3395 3396 3397 3398 3399

    stats->rd_req = ret.rd_req;
    stats->rd_bytes = ret.rd_bytes;
    stats->wr_req = ret.wr_req;
    stats->wr_bytes = ret.wr_bytes;
    stats->errs = ret.errs;

3400 3401 3402
    rv = 0;

done:
3403
    remoteDriverUnlock(priv);
3404
    return rv;
3405 3406 3407 3408 3409 3410
}

static int
remoteDomainInterfaceStats (virDomainPtr domain, const char *path,
                            struct _virDomainInterfaceStats *stats)
{
3411
    int rv = -1;
3412 3413
    remote_domain_interface_stats_args args;
    remote_domain_interface_stats_ret ret;
3414
    struct private_data *priv = domain->conn->privateData;
3415

3416 3417
    remoteDriverLock(priv);

3418 3419 3420 3421 3422 3423 3424 3425 3426
    make_nonnull_domain (&args.dom, domain);
    args.path = (char *) path;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_INTERFACE_STATS,
              (xdrproc_t) xdr_remote_domain_interface_stats_args,
                (char *) &args,
              (xdrproc_t) xdr_remote_domain_interface_stats_ret,
                (char *) &ret) == -1)
3427
        goto done;
3428 3429 3430 3431 3432 3433 3434 3435 3436 3437

    stats->rx_bytes = ret.rx_bytes;
    stats->rx_packets = ret.rx_packets;
    stats->rx_errs = ret.rx_errs;
    stats->rx_drop = ret.rx_drop;
    stats->tx_bytes = ret.tx_bytes;
    stats->tx_packets = ret.tx_packets;
    stats->tx_errs = ret.tx_errs;
    stats->tx_drop = ret.tx_drop;

3438 3439 3440
    rv = 0;

done:
3441
    remoteDriverUnlock(priv);
3442
    return rv;
3443 3444
}

3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487
static int
remoteDomainMemoryStats (virDomainPtr domain,
                         struct _virDomainMemoryStat *stats,
                         unsigned int nr_stats)
{
    int rv = -1;
    remote_domain_memory_stats_args args;
    remote_domain_memory_stats_ret ret;
    struct private_data *priv = domain->conn->privateData;
    unsigned int i;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);
    if (nr_stats > REMOTE_DOMAIN_MEMORY_STATS_MAX) {
        errorf (domain->conn, VIR_ERR_RPC,
                _("too many memory stats requested: %d > %d"), nr_stats,
                REMOTE_DOMAIN_MEMORY_STATS_MAX);
        goto done;
    }
    args.maxStats = nr_stats;
    args.flags = 0;
    memset (&ret, 0, sizeof ret);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_MEMORY_STATS,
              (xdrproc_t) xdr_remote_domain_memory_stats_args,
                (char *) &args,
              (xdrproc_t) xdr_remote_domain_memory_stats_ret,
                (char *) &ret) == -1)
        goto done;

    for (i = 0; i < ret.stats.stats_len; i++) {
        stats[i].tag = ret.stats.stats_val[i].tag;
        stats[i].val = ret.stats.stats_val[i].val;
    }
    rv = ret.stats.stats_len;
    xdr_free((xdrproc_t) xdr_remote_domain_memory_stats_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return rv;
}

3488 3489 3490 3491 3492 3493 3494 3495
static int
remoteDomainBlockPeek (virDomainPtr domain,
                       const char *path,
                       unsigned long long offset,
                       size_t size,
                       void *buffer,
                       unsigned int flags)
{
3496
    int rv = -1;
3497 3498
    remote_domain_block_peek_args args;
    remote_domain_block_peek_ret ret;
3499
    struct private_data *priv = domain->conn->privateData;
3500

3501 3502
    remoteDriverLock(priv);

3503 3504 3505 3506
    if (size > REMOTE_DOMAIN_BLOCK_PEEK_BUFFER_MAX) {
        errorf (domain->conn, VIR_ERR_RPC,
                _("block peek request too large for remote protocol, %zi > %d"),
                size, REMOTE_DOMAIN_BLOCK_PEEK_BUFFER_MAX);
3507
        goto done;
3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521
    }

    make_nonnull_domain (&args.dom, domain);
    args.path = (char *) path;
    args.offset = offset;
    args.size = size;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_BLOCK_PEEK,
              (xdrproc_t) xdr_remote_domain_block_peek_args,
                (char *) &args,
              (xdrproc_t) xdr_remote_domain_block_peek_ret,
                (char *) &ret) == -1)
3522
        goto done;
3523 3524

    if (ret.buffer.buffer_len != size) {
3525 3526 3527
        errorf (domain->conn, VIR_ERR_RPC,
                "%s", _("returned buffer is not same size as requested"));
        goto cleanup;
3528 3529 3530
    }

    memcpy (buffer, ret.buffer.buffer_val, size);
3531 3532 3533
    rv = 0;

cleanup:
3534
    VIR_FREE(ret.buffer.buffer_val);
3535

3536
done:
3537
    remoteDriverUnlock(priv);
3538
    return rv;
3539 3540
}

R
Richard W.M. Jones 已提交
3541 3542 3543 3544 3545 3546 3547
static int
remoteDomainMemoryPeek (virDomainPtr domain,
                        unsigned long long offset,
                        size_t size,
                        void *buffer,
                        unsigned int flags)
{
3548
    int rv = -1;
R
Richard W.M. Jones 已提交
3549 3550
    remote_domain_memory_peek_args args;
    remote_domain_memory_peek_ret ret;
3551
    struct private_data *priv = domain->conn->privateData;
R
Richard W.M. Jones 已提交
3552

3553 3554
    remoteDriverLock(priv);

R
Richard W.M. Jones 已提交
3555 3556 3557 3558
    if (size > REMOTE_DOMAIN_MEMORY_PEEK_BUFFER_MAX) {
        errorf (domain->conn, VIR_ERR_RPC,
                _("memory peek request too large for remote protocol, %zi > %d"),
                size, REMOTE_DOMAIN_MEMORY_PEEK_BUFFER_MAX);
3559
        goto done;
R
Richard W.M. Jones 已提交
3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572
    }

    make_nonnull_domain (&args.dom, domain);
    args.offset = offset;
    args.size = size;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_MEMORY_PEEK,
              (xdrproc_t) xdr_remote_domain_memory_peek_args,
                (char *) &args,
              (xdrproc_t) xdr_remote_domain_memory_peek_ret,
                (char *) &ret) == -1)
3573
        goto done;
R
Richard W.M. Jones 已提交
3574 3575

    if (ret.buffer.buffer_len != size) {
3576 3577 3578
        errorf (domain->conn, VIR_ERR_RPC,
                "%s", _("returned buffer is not same size as requested"));
        goto cleanup;
R
Richard W.M. Jones 已提交
3579 3580 3581
    }

    memcpy (buffer, ret.buffer.buffer_val, size);
3582 3583 3584
    rv = 0;

cleanup:
3585
    VIR_FREE(ret.buffer.buffer_val);
R
Richard W.M. Jones 已提交
3586

3587
done:
3588
    remoteDriverUnlock(priv);
3589
    return rv;
R
Richard W.M. Jones 已提交
3590 3591
}

3592 3593
/*----------------------------------------------------------------------*/

J
Jim Meyering 已提交
3594
static virDrvOpenStatus ATTRIBUTE_NONNULL (1)
3595
remoteNetworkOpen (virConnectPtr conn,
3596
                   virConnectAuthPtr auth,
3597
                   int flags)
3598
{
3599 3600 3601
    if (inside_daemon)
        return VIR_DRV_OPEN_DECLINED;

J
Jim Meyering 已提交
3602
    if (conn->driver &&
3603
        STREQ (conn->driver->name, "remote")) {
3604 3605 3606
        struct private_data *priv;

       /* If we're here, the remote driver is already
3607 3608 3609
         * in use due to a) a QEMU uri, or b) a remote
         * URI. So we can re-use existing connection
         */
3610 3611 3612 3613 3614
        priv = conn->privateData;
        remoteDriverLock(priv);
        priv->localUses++;
        conn->networkPrivateData = priv;
        remoteDriverUnlock(priv);
3615
        return VIR_DRV_OPEN_SUCCESS;
3616 3617 3618
    } else {
        /* Using a non-remote driver, so we need to open a
         * new connection for network APIs, forcing it to
3619 3620
         * use the UNIX transport. This handles Xen driver
         * which doesn't have its own impl of the network APIs.
3621
         */
3622
        struct private_data *priv;
3623 3624 3625 3626 3627 3628
        int ret;
        ret = remoteOpenSecondaryDriver(conn,
                                        auth,
                                        flags,
                                        &priv);
        if (ret == VIR_DRV_OPEN_SUCCESS)
3629 3630 3631
            conn->networkPrivateData = priv;
        return ret;
    }
3632 3633 3634
}

static int
3635 3636
remoteNetworkClose (virConnectPtr conn)
{
3637
    int rv = 0;
3638 3639
    struct private_data *priv = conn->networkPrivateData;

3640 3641 3642 3643 3644 3645 3646 3647
    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        rv = doRemoteClose(conn, priv);
        conn->networkPrivateData = NULL;
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE(priv);
3648
    }
3649 3650
    if (priv)
        remoteDriverUnlock(priv);
3651
    return rv;
3652 3653 3654 3655 3656
}

static int
remoteNumOfNetworks (virConnectPtr conn)
{
3657
    int rv = -1;
3658
    remote_num_of_networks_ret ret;
3659
    struct private_data *priv = conn->networkPrivateData;
3660

3661 3662
    remoteDriverLock(priv);

3663 3664 3665 3666
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_NETWORKS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_networks_ret, (char *) &ret) == -1)
3667 3668 3669
        goto done;

    rv = ret.num;
3670

3671
done:
3672
    remoteDriverUnlock(priv);
3673
    return rv;
3674 3675 3676 3677 3678
}

static int
remoteListNetworks (virConnectPtr conn, char **const names, int maxnames)
{
3679
    int rv = -1;
3680 3681 3682
    int i;
    remote_list_networks_args args;
    remote_list_networks_ret ret;
3683
    struct private_data *priv = conn->networkPrivateData;
3684

3685 3686
    remoteDriverLock(priv);

3687
    if (maxnames > REMOTE_NETWORK_NAME_LIST_MAX) {
3688 3689 3690
        errorf (conn, VIR_ERR_RPC,
                _("too many remote networks: %d > %d"),
                maxnames, REMOTE_NETWORK_NAME_LIST_MAX);
3691
        goto done;
3692 3693 3694 3695 3696 3697 3698
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_NETWORKS,
              (xdrproc_t) xdr_remote_list_networks_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_networks_ret, (char *) &ret) == -1)
3699
        goto done;
3700 3701

    if (ret.names.names_len > maxnames) {
3702 3703 3704
        errorf (conn, VIR_ERR_RPC,
                _("too many remote networks: %d > %d"),
                ret.names.names_len, maxnames);
3705
        goto cleanup;
3706 3707 3708 3709 3710 3711 3712
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
3713
    for (i = 0; i < ret.names.names_len; ++i) {
3714 3715
        names[i] = strdup (ret.names.names_val[i]);

3716 3717 3718 3719
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

3720
            virReportOOMError();
3721 3722 3723 3724
            goto cleanup;
        }
    }

3725 3726 3727
    rv = ret.names.names_len;

cleanup:
3728 3729
    xdr_free ((xdrproc_t) xdr_remote_list_networks_ret, (char *) &ret);

3730
done:
3731
    remoteDriverUnlock(priv);
3732
    return rv;
3733 3734 3735 3736 3737
}

static int
remoteNumOfDefinedNetworks (virConnectPtr conn)
{
3738
    int rv = -1;
3739
    remote_num_of_defined_networks_ret ret;
3740
    struct private_data *priv = conn->networkPrivateData;
3741

3742 3743
    remoteDriverLock(priv);

3744 3745 3746 3747
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_DEFINED_NETWORKS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_defined_networks_ret, (char *) &ret) == -1)
3748 3749 3750
        goto done;

    rv = ret.num;
3751

3752
done:
3753
    remoteDriverUnlock(priv);
3754
    return rv;
3755 3756 3757 3758 3759 3760
}

static int
remoteListDefinedNetworks (virConnectPtr conn,
                           char **const names, int maxnames)
{
3761
    int rv = -1;
3762 3763 3764
    int i;
    remote_list_defined_networks_args args;
    remote_list_defined_networks_ret ret;
3765
    struct private_data *priv = conn->networkPrivateData;
3766

3767 3768
    remoteDriverLock(priv);

3769
    if (maxnames > REMOTE_NETWORK_NAME_LIST_MAX) {
3770 3771 3772
        errorf (conn, VIR_ERR_RPC,
                _("too many remote networks: %d > %d"),
                maxnames, REMOTE_NETWORK_NAME_LIST_MAX);
3773
        goto done;
3774 3775 3776 3777 3778 3779 3780
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_DEFINED_NETWORKS,
              (xdrproc_t) xdr_remote_list_defined_networks_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_defined_networks_ret, (char *) &ret) == -1)
3781
        goto done;
3782 3783

    if (ret.names.names_len > maxnames) {
3784 3785 3786
        errorf (conn, VIR_ERR_RPC,
                _("too many remote networks: %d > %d"),
                ret.names.names_len, maxnames);
3787
        goto cleanup;
3788 3789 3790 3791 3792 3793 3794
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
3795
    for (i = 0; i < ret.names.names_len; ++i) {
3796 3797
        names[i] = strdup (ret.names.names_val[i]);

3798 3799 3800 3801
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

3802
            virReportOOMError();
3803 3804 3805 3806
            goto cleanup;
        }
    }

3807 3808 3809
    rv = ret.names.names_len;

cleanup:
3810 3811
    xdr_free ((xdrproc_t) xdr_remote_list_defined_networks_ret, (char *) &ret);

3812
done:
3813
    remoteDriverUnlock(priv);
3814
    return rv;
3815 3816 3817 3818 3819 3820
}

static virNetworkPtr
remoteNetworkLookupByUUID (virConnectPtr conn,
                           const unsigned char *uuid)
{
3821
    virNetworkPtr net = NULL;
3822 3823
    remote_network_lookup_by_uuid_args args;
    remote_network_lookup_by_uuid_ret ret;
3824
    struct private_data *priv = conn->networkPrivateData;
3825

3826 3827
    remoteDriverLock(priv);

3828 3829 3830 3831 3832 3833
    memcpy (args.uuid, uuid, VIR_UUID_BUFLEN);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NETWORK_LOOKUP_BY_UUID,
              (xdrproc_t) xdr_remote_network_lookup_by_uuid_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_lookup_by_uuid_ret, (char *) &ret) == -1)
3834
        goto done;
3835 3836 3837 3838

    net = get_nonnull_network (conn, ret.net);
    xdr_free ((xdrproc_t) &xdr_remote_network_lookup_by_uuid_ret, (char *) &ret);

3839
done:
3840
    remoteDriverUnlock(priv);
3841 3842 3843 3844 3845 3846 3847
    return net;
}

static virNetworkPtr
remoteNetworkLookupByName (virConnectPtr conn,
                           const char *name)
{
3848
    virNetworkPtr net = NULL;
3849 3850
    remote_network_lookup_by_name_args args;
    remote_network_lookup_by_name_ret ret;
3851
    struct private_data *priv = conn->networkPrivateData;
3852

3853 3854
    remoteDriverLock(priv);

3855 3856 3857 3858 3859 3860
    args.name = (char *) name;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NETWORK_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_network_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_lookup_by_name_ret, (char *) &ret) == -1)
3861
        goto done;
3862 3863 3864 3865

    net = get_nonnull_network (conn, ret.net);
    xdr_free ((xdrproc_t) &xdr_remote_network_lookup_by_name_ret, (char *) &ret);

3866
done:
3867
    remoteDriverUnlock(priv);
3868 3869 3870
    return net;
}

3871 3872 3873 3874 3875 3876 3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889 3890 3891 3892 3893 3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918
static int
remoteNetworkIsActive(virNetworkPtr network)
{
    int rv = -1;
    remote_network_is_active_args args;
    remote_network_is_active_ret ret;
    struct private_data *priv = network->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_network (&args.net, network);

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_IS_ACTIVE,
              (xdrproc_t) xdr_remote_network_is_active_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_is_active_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.active;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteNetworkIsPersistent(virNetworkPtr network)
{
    int rv = -1;
    remote_network_is_persistent_args args;
    remote_network_is_persistent_ret ret;
    struct private_data *priv = network->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_network (&args.net, network);

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_IS_PERSISTENT,
              (xdrproc_t) xdr_remote_network_is_persistent_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_is_persistent_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.persistent;

done:
    remoteDriverUnlock(priv);
    return rv;
}

3919 3920 3921
static virNetworkPtr
remoteNetworkCreateXML (virConnectPtr conn, const char *xmlDesc)
{
3922
    virNetworkPtr net = NULL;
3923 3924
    remote_network_create_xml_args args;
    remote_network_create_xml_ret ret;
3925
    struct private_data *priv = conn->networkPrivateData;
3926

3927 3928
    remoteDriverLock(priv);

3929 3930 3931 3932 3933 3934
    args.xml = (char *) xmlDesc;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NETWORK_CREATE_XML,
              (xdrproc_t) xdr_remote_network_create_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_create_xml_ret, (char *) &ret) == -1)
3935
        goto done;
3936 3937 3938 3939

    net = get_nonnull_network (conn, ret.net);
    xdr_free ((xdrproc_t) &xdr_remote_network_create_xml_ret, (char *) &ret);

3940
done:
3941
    remoteDriverUnlock(priv);
3942 3943 3944 3945 3946 3947
    return net;
}

static virNetworkPtr
remoteNetworkDefineXML (virConnectPtr conn, const char *xml)
{
3948
    virNetworkPtr net = NULL;
3949 3950
    remote_network_define_xml_args args;
    remote_network_define_xml_ret ret;
3951
    struct private_data *priv = conn->networkPrivateData;
3952

3953 3954
    remoteDriverLock(priv);

3955 3956 3957 3958 3959 3960
    args.xml = (char *) xml;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NETWORK_DEFINE_XML,
              (xdrproc_t) xdr_remote_network_define_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_define_xml_ret, (char *) &ret) == -1)
3961
        goto done;
3962 3963 3964 3965

    net = get_nonnull_network (conn, ret.net);
    xdr_free ((xdrproc_t) &xdr_remote_network_define_xml_ret, (char *) &ret);

3966
done:
3967
    remoteDriverUnlock(priv);
3968 3969 3970 3971 3972 3973
    return net;
}

static int
remoteNetworkUndefine (virNetworkPtr network)
{
3974
    int rv = -1;
3975
    remote_network_undefine_args args;
3976
    struct private_data *priv = network->conn->networkPrivateData;
3977

3978 3979
    remoteDriverLock(priv);

3980 3981 3982 3983 3984
    make_nonnull_network (&args.net, network);

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_UNDEFINE,
              (xdrproc_t) xdr_remote_network_undefine_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
3985
        goto done;
3986

3987 3988 3989
    rv = 0;

done:
3990
    remoteDriverUnlock(priv);
3991
    return rv;
3992 3993 3994 3995 3996
}

static int
remoteNetworkCreate (virNetworkPtr network)
{
3997
    int rv = -1;
3998
    remote_network_create_args args;
3999
    struct private_data *priv = network->conn->networkPrivateData;
4000

4001 4002
    remoteDriverLock(priv);

4003 4004 4005 4006 4007
    make_nonnull_network (&args.net, network);

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_CREATE,
              (xdrproc_t) xdr_remote_network_create_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
4008
        goto done;
4009

4010 4011 4012
    rv = 0;

done:
4013
    remoteDriverUnlock(priv);
4014
    return rv;
4015 4016 4017 4018 4019
}

static int
remoteNetworkDestroy (virNetworkPtr network)
{
4020
    int rv = -1;
4021
    remote_network_destroy_args args;
4022
    struct private_data *priv = network->conn->networkPrivateData;
4023

4024 4025
    remoteDriverLock(priv);

4026 4027 4028 4029 4030
    make_nonnull_network (&args.net, network);

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_DESTROY,
              (xdrproc_t) xdr_remote_network_destroy_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
4031
        goto done;
4032

4033 4034 4035
    rv = 0;

done:
4036
    remoteDriverUnlock(priv);
4037
    return rv;
4038 4039 4040 4041 4042
}

static char *
remoteNetworkDumpXML (virNetworkPtr network, int flags)
{
4043
    char *rv = NULL;
4044 4045
    remote_network_dump_xml_args args;
    remote_network_dump_xml_ret ret;
4046
    struct private_data *priv = network->conn->networkPrivateData;
4047

4048 4049
    remoteDriverLock(priv);

4050 4051 4052 4053 4054 4055 4056
    make_nonnull_network (&args.net, network);
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_DUMP_XML,
              (xdrproc_t) xdr_remote_network_dump_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_dump_xml_ret, (char *) &ret) == -1)
4057
        goto done;
4058 4059

    /* Caller frees. */
4060 4061 4062
    rv = ret.xml;

done:
4063
    remoteDriverUnlock(priv);
4064
    return rv;
4065 4066 4067 4068 4069
}

static char *
remoteNetworkGetBridgeName (virNetworkPtr network)
{
4070
    char *rv = NULL;
4071 4072
    remote_network_get_bridge_name_args args;
    remote_network_get_bridge_name_ret ret;
4073
    struct private_data *priv = network->conn->networkPrivateData;
4074

4075 4076
    remoteDriverLock(priv);

4077 4078 4079 4080 4081 4082
    make_nonnull_network (&args.net, network);

    memset (&ret, 0, sizeof ret);
    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_GET_BRIDGE_NAME,
              (xdrproc_t) xdr_remote_network_get_bridge_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_get_bridge_name_ret, (char *) &ret) == -1)
4083
        goto done;
4084 4085

    /* Caller frees. */
4086 4087 4088
    rv = ret.name;

done:
4089
    remoteDriverUnlock(priv);
4090
    return rv;
4091 4092 4093 4094 4095
}

static int
remoteNetworkGetAutostart (virNetworkPtr network, int *autostart)
{
4096
    int rv = -1;
4097 4098
    remote_network_get_autostart_args args;
    remote_network_get_autostart_ret ret;
4099
    struct private_data *priv = network->conn->networkPrivateData;
4100

4101 4102
    remoteDriverLock(priv);

4103 4104 4105 4106 4107 4108
    make_nonnull_network (&args.net, network);

    memset (&ret, 0, sizeof ret);
    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_GET_AUTOSTART,
              (xdrproc_t) xdr_remote_network_get_autostart_args, (char *) &args,
              (xdrproc_t) xdr_remote_network_get_autostart_ret, (char *) &ret) == -1)
4109
        goto done;
4110 4111 4112

    if (autostart) *autostart = ret.autostart;

4113 4114 4115
    rv = 0;

done:
4116
    remoteDriverUnlock(priv);
4117
    return rv;
4118 4119 4120 4121 4122
}

static int
remoteNetworkSetAutostart (virNetworkPtr network, int autostart)
{
4123
    int rv = -1;
4124
    remote_network_set_autostart_args args;
4125
    struct private_data *priv = network->conn->networkPrivateData;
4126

4127 4128
    remoteDriverLock(priv);

4129 4130 4131 4132 4133 4134
    make_nonnull_network (&args.net, network);
    args.autostart = autostart;

    if (call (network->conn, priv, 0, REMOTE_PROC_NETWORK_SET_AUTOSTART,
              (xdrproc_t) xdr_remote_network_set_autostart_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
4135
        goto done;
4136

4137 4138 4139
    rv = 0;

done:
4140
    remoteDriverUnlock(priv);
4141
    return rv;
4142 4143
}

4144 4145 4146



D
Daniel Veillard 已提交
4147 4148
/*----------------------------------------------------------------------*/

J
Jim Meyering 已提交
4149
static virDrvOpenStatus ATTRIBUTE_NONNULL (1)
D
Daniel Veillard 已提交
4150
remoteInterfaceOpen (virConnectPtr conn,
J
Jim Meyering 已提交
4151 4152
                     virConnectAuthPtr auth,
                     int flags)
D
Daniel Veillard 已提交
4153 4154 4155 4156
{
    if (inside_daemon)
        return VIR_DRV_OPEN_DECLINED;

J
Jim Meyering 已提交
4157
    if (conn->driver &&
D
Daniel Veillard 已提交
4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203 4204 4205 4206 4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217 4218 4219 4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262 4263 4264 4265 4266 4267
        STREQ (conn->driver->name, "remote")) {
        struct private_data *priv;

       /* If we're here, the remote driver is already
         * in use due to a) a QEMU uri, or b) a remote
         * URI. So we can re-use existing connection
         */
        priv = conn->privateData;
        remoteDriverLock(priv);
        priv->localUses++;
        conn->interfacePrivateData = priv;
        remoteDriverUnlock(priv);
        return VIR_DRV_OPEN_SUCCESS;
    } else {
        /* Using a non-remote driver, so we need to open a
         * new connection for interface APIs, forcing it to
         * use the UNIX transport. This handles Xen driver
         * which doesn't have its own impl of the interface APIs.
         */
        struct private_data *priv;
        int ret;
        ret = remoteOpenSecondaryDriver(conn,
                                        auth,
                                        flags,
                                        &priv);
        if (ret == VIR_DRV_OPEN_SUCCESS)
            conn->interfacePrivateData = priv;
        return ret;
    }
}

static int
remoteInterfaceClose (virConnectPtr conn)
{
    int rv = 0;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        rv = doRemoteClose(conn, priv);
        conn->interfacePrivateData = NULL;
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE(priv);
    }
    if (priv)
        remoteDriverUnlock(priv);
    return rv;
}

static int
remoteNumOfInterfaces (virConnectPtr conn)
{
    int rv = -1;
    remote_num_of_interfaces_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_INTERFACES,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_interfaces_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.num;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteListInterfaces (virConnectPtr conn, char **const names, int maxnames)
{
    int rv = -1;
    int i;
    remote_list_interfaces_args args;
    remote_list_interfaces_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    if (maxnames > REMOTE_INTERFACE_NAME_LIST_MAX) {
        errorf (conn, VIR_ERR_RPC,
                _("too many remote interfaces: %d > %d"),
                maxnames, REMOTE_INTERFACE_NAME_LIST_MAX);
        goto done;
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_INTERFACES,
              (xdrproc_t) xdr_remote_list_interfaces_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_interfaces_ret, (char *) &ret) == -1)
        goto done;

    if (ret.names.names_len > maxnames) {
        errorf (conn, VIR_ERR_RPC,
                _("too many remote interfaces: %d > %d"),
                ret.names.names_len, maxnames);
        goto cleanup;
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
4268
    for (i = 0; i < ret.names.names_len; ++i) {
D
Daniel Veillard 已提交
4269 4270
        names[i] = strdup (ret.names.names_val[i]);

4271 4272 4273 4274
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

4275
            virReportOOMError();
4276 4277 4278 4279
            goto cleanup;
        }
    }

D
Daniel Veillard 已提交
4280 4281 4282 4283 4284 4285 4286 4287 4288 4289
    rv = ret.names.names_len;

cleanup:
    xdr_free ((xdrproc_t) xdr_remote_list_interfaces_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return rv;
}

4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309 4310 4311 4312 4313 4314 4315 4316 4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340 4341 4342 4343 4344 4345 4346 4347 4348
static int
remoteNumOfDefinedInterfaces (virConnectPtr conn)
{
    int rv = -1;
    remote_num_of_defined_interfaces_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_DEFINED_INTERFACES,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_defined_interfaces_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.num;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteListDefinedInterfaces (virConnectPtr conn, char **const names, int maxnames)
{
    int rv = -1;
    int i;
    remote_list_defined_interfaces_args args;
    remote_list_defined_interfaces_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    if (maxnames > REMOTE_DEFINED_INTERFACE_NAME_LIST_MAX) {
        errorf (conn, VIR_ERR_RPC,
                _("too many remote interfaces: %d > %d"),
                maxnames, REMOTE_DEFINED_INTERFACE_NAME_LIST_MAX);
        goto done;
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_DEFINED_INTERFACES,
              (xdrproc_t) xdr_remote_list_defined_interfaces_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_defined_interfaces_ret, (char *) &ret) == -1)
        goto done;

    if (ret.names.names_len > maxnames) {
        errorf (conn, VIR_ERR_RPC,
                _("too many remote interfaces: %d > %d"),
                ret.names.names_len, maxnames);
        goto cleanup;
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
4349
    for (i = 0; i < ret.names.names_len; ++i) {
4350 4351
        names[i] = strdup (ret.names.names_val[i]);

4352 4353 4354 4355
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

4356
            virReportOOMError();
4357 4358 4359 4360
            goto cleanup;
        }
    }

4361 4362 4363 4364 4365 4366 4367 4368 4369 4370
    rv = ret.names.names_len;

cleanup:
    xdr_free ((xdrproc_t) xdr_remote_list_defined_interfaces_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return rv;
}

D
Daniel Veillard 已提交
4371 4372 4373 4374
static virInterfacePtr
remoteInterfaceLookupByName (virConnectPtr conn,
                             const char *name)
{
4375
    virInterfacePtr iface = NULL;
D
Daniel Veillard 已提交
4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389
    remote_interface_lookup_by_name_args args;
    remote_interface_lookup_by_name_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    args.name = (char *) name;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_INTERFACE_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_interface_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_interface_lookup_by_name_ret, (char *) &ret) == -1)
        goto done;

4390
    iface = get_nonnull_interface (conn, ret.iface);
D
Daniel Veillard 已提交
4391 4392 4393 4394
    xdr_free ((xdrproc_t) &xdr_remote_interface_lookup_by_name_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
4395
    return iface;
D
Daniel Veillard 已提交
4396 4397 4398 4399 4400 4401
}

static virInterfacePtr
remoteInterfaceLookupByMACString (virConnectPtr conn,
                                  const char *mac)
{
4402
    virInterfacePtr iface = NULL;
D
Daniel Veillard 已提交
4403 4404 4405 4406 4407 4408 4409 4410 4411 4412 4413 4414 4415 4416
    remote_interface_lookup_by_mac_string_args args;
    remote_interface_lookup_by_mac_string_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    args.mac = (char *) mac;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_INTERFACE_LOOKUP_BY_MAC_STRING,
              (xdrproc_t) xdr_remote_interface_lookup_by_mac_string_args, (char *) &args,
              (xdrproc_t) xdr_remote_interface_lookup_by_mac_string_ret, (char *) &ret) == -1)
        goto done;

4417
    iface = get_nonnull_interface (conn, ret.iface);
D
Daniel Veillard 已提交
4418 4419 4420 4421
    xdr_free ((xdrproc_t) &xdr_remote_interface_lookup_by_mac_string_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
4422
    return iface;
D
Daniel Veillard 已提交
4423 4424
}

4425 4426 4427 4428 4429 4430 4431 4432 4433 4434 4435 4436 4437 4438 4439 4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450

static int
remoteInterfaceIsActive(virInterfacePtr iface)
{
    int rv = -1;
    remote_interface_is_active_args args;
    remote_interface_is_active_ret ret;
    struct private_data *priv = iface->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_interface (&args.iface, iface);

    if (call (iface->conn, priv, 0, REMOTE_PROC_INTERFACE_IS_ACTIVE,
              (xdrproc_t) xdr_remote_interface_is_active_args, (char *) &args,
              (xdrproc_t) xdr_remote_interface_is_active_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.active;

done:
    remoteDriverUnlock(priv);
    return rv;
}


D
Daniel Veillard 已提交
4451
static char *
4452
remoteInterfaceGetXMLDesc (virInterfacePtr iface,
D
Daniel Veillard 已提交
4453 4454 4455 4456 4457
                           unsigned int flags)
{
    char *rv = NULL;
    remote_interface_get_xml_desc_args args;
    remote_interface_get_xml_desc_ret ret;
4458
    struct private_data *priv = iface->conn->interfacePrivateData;
D
Daniel Veillard 已提交
4459 4460 4461

    remoteDriverLock(priv);

4462
    make_nonnull_interface (&args.iface, iface);
D
Daniel Veillard 已提交
4463 4464 4465
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
4466
    if (call (iface->conn, priv, 0, REMOTE_PROC_INTERFACE_GET_XML_DESC,
D
Daniel Veillard 已提交
4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483
              (xdrproc_t) xdr_remote_interface_get_xml_desc_args, (char *) &args,
              (xdrproc_t) xdr_remote_interface_get_xml_desc_ret, (char *) &ret) == -1)
        goto done;

    /* Caller frees. */
    rv = ret.xml;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static virInterfacePtr
remoteInterfaceDefineXML (virConnectPtr conn,
                          const char *xmlDesc,
                          unsigned int flags)
{
4484
    virInterfacePtr iface = NULL;
D
Daniel Veillard 已提交
4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499
    remote_interface_define_xml_args args;
    remote_interface_define_xml_ret ret;
    struct private_data *priv = conn->interfacePrivateData;

    remoteDriverLock(priv);

    args.xml = (char *) xmlDesc;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_INTERFACE_DEFINE_XML,
              (xdrproc_t) xdr_remote_interface_define_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_interface_define_xml_ret, (char *) &ret) == -1)
        goto done;

4500
    iface = get_nonnull_interface (conn, ret.iface);
D
Daniel Veillard 已提交
4501 4502 4503 4504
    xdr_free ((xdrproc_t) &xdr_remote_interface_define_xml_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
4505
    return iface;
D
Daniel Veillard 已提交
4506 4507 4508
}

static int
4509
remoteInterfaceUndefine (virInterfacePtr iface)
D
Daniel Veillard 已提交
4510 4511 4512
{
    int rv = -1;
    remote_interface_undefine_args args;
4513
    struct private_data *priv = iface->conn->interfacePrivateData;
D
Daniel Veillard 已提交
4514 4515 4516

    remoteDriverLock(priv);

4517
    make_nonnull_interface (&args.iface, iface);
D
Daniel Veillard 已提交
4518

4519
    if (call (iface->conn, priv, 0, REMOTE_PROC_INTERFACE_UNDEFINE,
D
Daniel Veillard 已提交
4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531
              (xdrproc_t) xdr_remote_interface_undefine_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
4532
remoteInterfaceCreate (virInterfacePtr iface,
D
Daniel Veillard 已提交
4533 4534 4535 4536
                       unsigned int flags)
{
    int rv = -1;
    remote_interface_create_args args;
4537
    struct private_data *priv = iface->conn->interfacePrivateData;
D
Daniel Veillard 已提交
4538 4539 4540

    remoteDriverLock(priv);

4541
    make_nonnull_interface (&args.iface, iface);
D
Daniel Veillard 已提交
4542 4543
    args.flags = flags;

4544
    if (call (iface->conn, priv, 0, REMOTE_PROC_INTERFACE_CREATE,
D
Daniel Veillard 已提交
4545 4546 4547 4548 4549 4550 4551 4552 4553 4554 4555 4556
              (xdrproc_t) xdr_remote_interface_create_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
4557
remoteInterfaceDestroy (virInterfacePtr iface,
D
Daniel Veillard 已提交
4558 4559 4560 4561
                        unsigned int flags)
{
    int rv = -1;
    remote_interface_destroy_args args;
4562
    struct private_data *priv = iface->conn->interfacePrivateData;
D
Daniel Veillard 已提交
4563 4564 4565

    remoteDriverLock(priv);

4566
    make_nonnull_interface (&args.iface, iface);
D
Daniel Veillard 已提交
4567 4568
    args.flags = flags;

4569
    if (call (iface->conn, priv, 0, REMOTE_PROC_INTERFACE_DESTROY,
D
Daniel Veillard 已提交
4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580
              (xdrproc_t) xdr_remote_interface_destroy_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

4581 4582
/*----------------------------------------------------------------------*/

J
Jim Meyering 已提交
4583
static virDrvOpenStatus ATTRIBUTE_NONNULL (1)
4584 4585 4586 4587 4588 4589 4590
remoteStorageOpen (virConnectPtr conn,
                   virConnectAuthPtr auth,
                   int flags)
{
    if (inside_daemon)
        return VIR_DRV_OPEN_DECLINED;

J
Jim Meyering 已提交
4591
    if (conn->driver &&
4592
        STREQ (conn->driver->name, "remote")) {
4593
        struct private_data *priv = conn->privateData;
4594 4595 4596 4597
        /* If we're here, the remote driver is already
         * in use due to a) a QEMU uri, or b) a remote
         * URI. So we can re-use existing connection
         */
4598 4599 4600 4601
        remoteDriverLock(priv);
        priv->localUses++;
        conn->storagePrivateData = priv;
        remoteDriverUnlock(priv);
4602 4603 4604
        return VIR_DRV_OPEN_SUCCESS;
    } else if (conn->networkDriver &&
               STREQ (conn->networkDriver->name, "remote")) {
4605 4606 4607 4608 4609
        struct private_data *priv = conn->networkPrivateData;
        remoteDriverLock(priv);
        conn->storagePrivateData = priv;
        priv->localUses++;
        remoteDriverUnlock(priv);
4610 4611 4612 4613 4614 4615 4616
        return VIR_DRV_OPEN_SUCCESS;
    } else {
        /* Using a non-remote driver, so we need to open a
         * new connection for network APIs, forcing it to
         * use the UNIX transport. This handles Xen driver
         * which doesn't have its own impl of the network APIs.
         */
4617
        struct private_data *priv;
4618 4619 4620 4621 4622 4623
        int ret;
        ret = remoteOpenSecondaryDriver(conn,
                                        auth,
                                        flags,
                                        &priv);
        if (ret == VIR_DRV_OPEN_SUCCESS)
4624 4625 4626 4627 4628 4629 4630 4631 4632
            conn->storagePrivateData = priv;
        return ret;
    }
}

static int
remoteStorageClose (virConnectPtr conn)
{
    int ret = 0;
4633 4634
    struct private_data *priv = conn->storagePrivateData;

4635 4636 4637 4638 4639 4640 4641 4642
    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        ret = doRemoteClose(conn, priv);
        conn->storagePrivateData = NULL;
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE(priv);
4643
    }
4644 4645
    if (priv)
        remoteDriverUnlock(priv);
4646

4647 4648 4649 4650 4651 4652
    return ret;
}

static int
remoteNumOfStoragePools (virConnectPtr conn)
{
4653
    int rv = -1;
4654
    remote_num_of_storage_pools_ret ret;
4655
    struct private_data *priv = conn->storagePrivateData;
4656

4657 4658
    remoteDriverLock(priv);

4659 4660 4661 4662
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_STORAGE_POOLS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_storage_pools_ret, (char *) &ret) == -1)
4663 4664 4665
        goto done;

    rv = ret.num;
4666

4667
done:
4668
    remoteDriverUnlock(priv);
4669
    return rv;
4670 4671 4672 4673 4674
}

static int
remoteListStoragePools (virConnectPtr conn, char **const names, int maxnames)
{
4675
    int rv = -1;
4676 4677 4678
    int i;
    remote_list_storage_pools_args args;
    remote_list_storage_pools_ret ret;
4679
    struct private_data *priv = conn->storagePrivateData;
4680

4681 4682
    remoteDriverLock(priv);

4683 4684
    if (maxnames > REMOTE_STORAGE_POOL_NAME_LIST_MAX) {
        error (conn, VIR_ERR_RPC, _("too many storage pools requested"));
4685
        goto done;
4686 4687 4688 4689 4690 4691 4692
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_STORAGE_POOLS,
              (xdrproc_t) xdr_remote_list_storage_pools_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_storage_pools_ret, (char *) &ret) == -1)
4693
        goto done;
4694 4695 4696

    if (ret.names.names_len > maxnames) {
        error (conn, VIR_ERR_RPC, _("too many storage pools received"));
4697
        goto cleanup;
4698 4699 4700 4701 4702 4703 4704
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
4705
    for (i = 0; i < ret.names.names_len; ++i) {
4706 4707
        names[i] = strdup (ret.names.names_val[i]);

4708 4709 4710 4711
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

4712
            virReportOOMError();
4713 4714 4715 4716
            goto cleanup;
        }
    }

4717 4718 4719
    rv = ret.names.names_len;

cleanup:
4720 4721
    xdr_free ((xdrproc_t) xdr_remote_list_storage_pools_ret, (char *) &ret);

4722
done:
4723
    remoteDriverUnlock(priv);
4724
    return rv;
4725 4726 4727 4728 4729
}

static int
remoteNumOfDefinedStoragePools (virConnectPtr conn)
{
4730
    int rv = -1;
4731
    remote_num_of_defined_storage_pools_ret ret;
4732
    struct private_data *priv = conn->storagePrivateData;
4733

4734 4735
    remoteDriverLock(priv);

4736 4737 4738 4739
    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_DEFINED_STORAGE_POOLS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_defined_storage_pools_ret, (char *) &ret) == -1)
4740
        goto done;
4741

4742 4743 4744
    rv = ret.num;

done:
4745
    remoteDriverUnlock(priv);
4746
    return rv;
4747 4748 4749 4750 4751 4752
}

static int
remoteListDefinedStoragePools (virConnectPtr conn,
                               char **const names, int maxnames)
{
4753
    int rv = -1;
4754 4755 4756
    int i;
    remote_list_defined_storage_pools_args args;
    remote_list_defined_storage_pools_ret ret;
4757
    struct private_data *priv = conn->storagePrivateData;
4758

4759 4760
    remoteDriverLock(priv);

4761 4762
    if (maxnames > REMOTE_STORAGE_POOL_NAME_LIST_MAX) {
        error (conn, VIR_ERR_RPC, _("too many storage pools requested"));
4763
        goto done;
4764 4765 4766 4767 4768 4769 4770
    }
    args.maxnames = maxnames;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_DEFINED_STORAGE_POOLS,
              (xdrproc_t) xdr_remote_list_defined_storage_pools_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_defined_storage_pools_ret, (char *) &ret) == -1)
4771
        goto done;
4772 4773 4774

    if (ret.names.names_len > maxnames) {
        error (conn, VIR_ERR_RPC, _("too many storage pools received"));
4775
        goto cleanup;
4776 4777 4778 4779 4780 4781 4782
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
4783
    for (i = 0; i < ret.names.names_len; ++i) {
4784 4785
        names[i] = strdup (ret.names.names_val[i]);

4786 4787 4788 4789
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

4790
            virReportOOMError();
4791 4792 4793 4794
            goto cleanup;
        }
    }

4795 4796 4797
    rv = ret.names.names_len;

cleanup:
4798 4799
    xdr_free ((xdrproc_t) xdr_remote_list_defined_storage_pools_ret, (char *) &ret);

4800
done:
4801
    remoteDriverUnlock(priv);
4802
    return rv;
4803 4804
}

4805 4806 4807 4808 4809 4810
static char *
remoteFindStoragePoolSources (virConnectPtr conn,
                              const char *type,
                              const char *srcSpec,
                              unsigned int flags)
{
4811
    char *rv = NULL;
4812 4813
    remote_find_storage_pool_sources_args args;
    remote_find_storage_pool_sources_ret ret;
4814
    struct private_data *priv = conn->storagePrivateData;
4815 4816
    const char *emptyString = "";

4817 4818
    remoteDriverLock(priv);

4819 4820 4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836 4837
    args.type = (char*)type;
    /*
     * I'd think the following would work here:
     *    args.srcSpec = (char**)&srcSpec;
     * since srcSpec is a remote_string (not a remote_nonnull_string).
     *
     * But when srcSpec is NULL, this yields:
     *    libvir: Remote error : marshalling args
     *
     * So for now I'm working around this by turning NULL srcSpecs
     * into empty strings.
     */
    args.srcSpec = srcSpec ? (char **)&srcSpec : (char **)&emptyString;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_FIND_STORAGE_POOL_SOURCES,
              (xdrproc_t) xdr_remote_find_storage_pool_sources_args, (char *) &args,
              (xdrproc_t) xdr_remote_find_storage_pool_sources_ret, (char *) &ret) == -1)
4838
        goto done;
4839

4840
    rv = ret.xml;
4841 4842 4843 4844
    ret.xml = NULL; /* To stop xdr_free free'ing it */

    xdr_free ((xdrproc_t) xdr_remote_find_storage_pool_sources_ret, (char *) &ret);

4845
done:
4846
    remoteDriverUnlock(priv);
4847
    return rv;
4848 4849
}

4850 4851 4852 4853
static virStoragePoolPtr
remoteStoragePoolLookupByUUID (virConnectPtr conn,
                               const unsigned char *uuid)
{
4854
    virStoragePoolPtr pool = NULL;
4855 4856
    remote_storage_pool_lookup_by_uuid_args args;
    remote_storage_pool_lookup_by_uuid_ret ret;
4857
    struct private_data *priv = conn->storagePrivateData;
4858

4859 4860
    remoteDriverLock(priv);

4861 4862 4863 4864 4865 4866
    memcpy (args.uuid, uuid, VIR_UUID_BUFLEN);

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_POOL_LOOKUP_BY_UUID,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_uuid_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_uuid_ret, (char *) &ret) == -1)
4867
        goto done;
4868 4869 4870 4871

    pool = get_nonnull_storage_pool (conn, ret.pool);
    xdr_free ((xdrproc_t) &xdr_remote_storage_pool_lookup_by_uuid_ret, (char *) &ret);

4872
done:
4873
    remoteDriverUnlock(priv);
4874 4875 4876 4877 4878 4879 4880
    return pool;
}

static virStoragePoolPtr
remoteStoragePoolLookupByName (virConnectPtr conn,
                               const char *name)
{
4881
    virStoragePoolPtr pool = NULL;
4882 4883
    remote_storage_pool_lookup_by_name_args args;
    remote_storage_pool_lookup_by_name_ret ret;
4884
    struct private_data *priv = conn->storagePrivateData;
4885

4886 4887
    remoteDriverLock(priv);

4888 4889 4890 4891 4892 4893
    args.name = (char *) name;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_POOL_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_name_ret, (char *) &ret) == -1)
4894
        goto done;
4895 4896 4897 4898

    pool = get_nonnull_storage_pool (conn, ret.pool);
    xdr_free ((xdrproc_t) &xdr_remote_storage_pool_lookup_by_name_ret, (char *) &ret);

4899
done:
4900
    remoteDriverUnlock(priv);
4901 4902 4903 4904 4905 4906
    return pool;
}

static virStoragePoolPtr
remoteStoragePoolLookupByVolume (virStorageVolPtr vol)
{
4907
    virStoragePoolPtr pool = NULL;
4908 4909
    remote_storage_pool_lookup_by_volume_args args;
    remote_storage_pool_lookup_by_volume_ret ret;
4910
    struct private_data *priv = vol->conn->storagePrivateData;
4911

4912 4913
    remoteDriverLock(priv);

4914 4915 4916 4917 4918 4919
    make_nonnull_storage_vol (&args.vol, vol);

    memset (&ret, 0, sizeof ret);
    if (call (vol->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_LOOKUP_BY_VOLUME,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_volume_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_lookup_by_volume_ret, (char *) &ret) == -1)
4920
        goto done;
4921 4922 4923 4924

    pool = get_nonnull_storage_pool (vol->conn, ret.pool);
    xdr_free ((xdrproc_t) &xdr_remote_storage_pool_lookup_by_volume_ret, (char *) &ret);

4925
done:
4926
    remoteDriverUnlock(priv);
4927 4928 4929 4930
    return pool;
}


4931 4932 4933 4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945 4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956 4957 4958 4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971 4972 4973 4974 4975 4976 4977 4978 4979
static int
remoteStoragePoolIsActive(virStoragePoolPtr pool)
{
    int rv = -1;
    remote_storage_pool_is_active_args args;
    remote_storage_pool_is_active_ret ret;
    struct private_data *priv = pool->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_storage_pool (&args.pool, pool);

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_IS_ACTIVE,
              (xdrproc_t) xdr_remote_storage_pool_is_active_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_is_active_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.active;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteStoragePoolIsPersistent(virStoragePoolPtr pool)
{
    int rv = -1;
    remote_storage_pool_is_persistent_args args;
    remote_storage_pool_is_persistent_ret ret;
    struct private_data *priv = pool->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_storage_pool (&args.pool, pool);

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_IS_PERSISTENT,
              (xdrproc_t) xdr_remote_storage_pool_is_persistent_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_is_persistent_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.persistent;

done:
    remoteDriverUnlock(priv);
    return rv;
}


4980 4981 4982
static virStoragePoolPtr
remoteStoragePoolCreateXML (virConnectPtr conn, const char *xmlDesc, unsigned int flags)
{
4983
    virStoragePoolPtr pool = NULL;
4984 4985
    remote_storage_pool_create_xml_args args;
    remote_storage_pool_create_xml_ret ret;
4986
    struct private_data *priv = conn->storagePrivateData;
4987

4988 4989
    remoteDriverLock(priv);

4990 4991 4992 4993 4994 4995 4996
    args.xml = (char *) xmlDesc;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_POOL_CREATE_XML,
              (xdrproc_t) xdr_remote_storage_pool_create_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_create_xml_ret, (char *) &ret) == -1)
4997
        goto done;
4998 4999 5000 5001

    pool = get_nonnull_storage_pool (conn, ret.pool);
    xdr_free ((xdrproc_t) &xdr_remote_storage_pool_create_xml_ret, (char *) &ret);

5002
done:
5003
    remoteDriverUnlock(priv);
5004 5005 5006 5007 5008 5009
    return pool;
}

static virStoragePoolPtr
remoteStoragePoolDefineXML (virConnectPtr conn, const char *xml, unsigned int flags)
{
5010
    virStoragePoolPtr pool = NULL;
5011 5012
    remote_storage_pool_define_xml_args args;
    remote_storage_pool_define_xml_ret ret;
5013
    struct private_data *priv = conn->storagePrivateData;
5014

5015 5016
    remoteDriverLock(priv);

5017 5018 5019 5020 5021 5022 5023
    args.xml = (char *) xml;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_POOL_DEFINE_XML,
              (xdrproc_t) xdr_remote_storage_pool_define_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_define_xml_ret, (char *) &ret) == -1)
5024
        goto done;
5025 5026 5027 5028

    pool = get_nonnull_storage_pool (conn, ret.pool);
    xdr_free ((xdrproc_t) &xdr_remote_storage_pool_define_xml_ret, (char *) &ret);

5029
done:
5030
    remoteDriverUnlock(priv);
5031 5032 5033 5034 5035 5036
    return pool;
}

static int
remoteStoragePoolUndefine (virStoragePoolPtr pool)
{
5037
    int rv = -1;
5038
    remote_storage_pool_undefine_args args;
5039
    struct private_data *priv = pool->conn->storagePrivateData;
5040

5041 5042
    remoteDriverLock(priv);

5043 5044 5045 5046 5047
    make_nonnull_storage_pool (&args.pool, pool);

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_UNDEFINE,
              (xdrproc_t) xdr_remote_storage_pool_undefine_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5048
        goto done;
5049

5050 5051 5052
    rv = 0;

done:
5053
    remoteDriverUnlock(priv);
5054
    return rv;
5055 5056 5057 5058 5059
}

static int
remoteStoragePoolCreate (virStoragePoolPtr pool, unsigned int flags)
{
5060
    int rv = -1;
5061
    remote_storage_pool_create_args args;
5062
    struct private_data *priv = pool->conn->storagePrivateData;
5063

5064 5065
    remoteDriverLock(priv);

5066 5067 5068 5069 5070 5071
    make_nonnull_storage_pool (&args.pool, pool);
    args.flags = flags;

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_CREATE,
              (xdrproc_t) xdr_remote_storage_pool_create_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5072
        goto done;
5073

5074 5075 5076
    rv = 0;

done:
5077
    remoteDriverUnlock(priv);
5078
    return rv;
5079 5080 5081 5082 5083 5084
}

static int
remoteStoragePoolBuild (virStoragePoolPtr pool,
                        unsigned int flags)
{
5085
    int rv = -1;
5086
    remote_storage_pool_build_args args;
5087
    struct private_data *priv = pool->conn->storagePrivateData;
5088

5089 5090
    remoteDriverLock(priv);

5091 5092 5093 5094 5095 5096
    make_nonnull_storage_pool (&args.pool, pool);
    args.flags = flags;

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_BUILD,
              (xdrproc_t) xdr_remote_storage_pool_build_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5097
        goto done;
5098

5099 5100 5101
    rv = 0;

done:
5102
    remoteDriverUnlock(priv);
5103
    return rv;
5104 5105 5106 5107 5108
}

static int
remoteStoragePoolDestroy (virStoragePoolPtr pool)
{
5109
    int rv = -1;
5110
    remote_storage_pool_destroy_args args;
5111
    struct private_data *priv = pool->conn->storagePrivateData;
5112

5113 5114
    remoteDriverLock(priv);

5115 5116 5117 5118 5119
    make_nonnull_storage_pool (&args.pool, pool);

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_DESTROY,
              (xdrproc_t) xdr_remote_storage_pool_destroy_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5120
        goto done;
5121

5122 5123 5124
    rv = 0;

done:
5125
    remoteDriverUnlock(priv);
5126
    return rv;
5127 5128 5129 5130 5131 5132
}

static int
remoteStoragePoolDelete (virStoragePoolPtr pool,
                         unsigned int flags)
{
5133
    int rv = -1;
5134
    remote_storage_pool_delete_args args;
5135
    struct private_data *priv = pool->conn->storagePrivateData;
5136

5137 5138
    remoteDriverLock(priv);

5139 5140 5141 5142 5143 5144
    make_nonnull_storage_pool (&args.pool, pool);
    args.flags = flags;

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_DELETE,
              (xdrproc_t) xdr_remote_storage_pool_delete_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5145
        goto done;
5146

5147 5148 5149
    rv = 0;

done:
5150
    remoteDriverUnlock(priv);
5151
    return rv;
5152 5153 5154 5155 5156 5157
}

static int
remoteStoragePoolRefresh (virStoragePoolPtr pool,
                          unsigned int flags)
{
5158
    int rv = -1;
5159
    remote_storage_pool_refresh_args args;
5160
    struct private_data *priv = pool->conn->storagePrivateData;
5161

5162 5163
    remoteDriverLock(priv);

5164 5165 5166 5167 5168 5169
    make_nonnull_storage_pool (&args.pool, pool);
    args.flags = flags;

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_REFRESH,
              (xdrproc_t) xdr_remote_storage_pool_refresh_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5170
        goto done;
5171

5172 5173 5174
    rv = 0;

done:
5175
    remoteDriverUnlock(priv);
5176
    return rv;
5177 5178 5179 5180 5181
}

static int
remoteStoragePoolGetInfo (virStoragePoolPtr pool, virStoragePoolInfoPtr info)
{
5182
    int rv = -1;
5183 5184
    remote_storage_pool_get_info_args args;
    remote_storage_pool_get_info_ret ret;
5185
    struct private_data *priv = pool->conn->storagePrivateData;
5186

5187 5188
    remoteDriverLock(priv);

5189 5190 5191 5192 5193 5194
    make_nonnull_storage_pool (&args.pool, pool);

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_GET_INFO,
              (xdrproc_t) xdr_remote_storage_pool_get_info_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_get_info_ret, (char *) &ret) == -1)
5195
        goto done;
5196 5197 5198 5199 5200 5201

    info->state = ret.state;
    info->capacity = ret.capacity;
    info->allocation = ret.allocation;
    info->available = ret.available;

5202 5203 5204
    rv = 0;

done:
5205
    remoteDriverUnlock(priv);
5206
    return rv;
5207 5208 5209 5210 5211 5212
}

static char *
remoteStoragePoolDumpXML (virStoragePoolPtr pool,
                          unsigned int flags)
{
5213
    char *rv = NULL;
5214 5215
    remote_storage_pool_dump_xml_args args;
    remote_storage_pool_dump_xml_ret ret;
5216
    struct private_data *priv = pool->conn->storagePrivateData;
5217

5218 5219
    remoteDriverLock(priv);

5220 5221 5222 5223 5224 5225 5226
    make_nonnull_storage_pool (&args.pool, pool);
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_DUMP_XML,
              (xdrproc_t) xdr_remote_storage_pool_dump_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_dump_xml_ret, (char *) &ret) == -1)
5227
        goto done;
5228 5229

    /* Caller frees. */
5230 5231 5232
    rv = ret.xml;

done:
5233
    remoteDriverUnlock(priv);
5234
    return rv;
5235 5236 5237 5238 5239
}

static int
remoteStoragePoolGetAutostart (virStoragePoolPtr pool, int *autostart)
{
5240
    int rv = -1;
5241 5242
    remote_storage_pool_get_autostart_args args;
    remote_storage_pool_get_autostart_ret ret;
5243
    struct private_data *priv = pool->conn->storagePrivateData;
5244

5245 5246
    remoteDriverLock(priv);

5247 5248 5249 5250 5251 5252
    make_nonnull_storage_pool (&args.pool, pool);

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_GET_AUTOSTART,
              (xdrproc_t) xdr_remote_storage_pool_get_autostart_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_get_autostart_ret, (char *) &ret) == -1)
5253
        goto done;
5254 5255 5256

    if (autostart) *autostart = ret.autostart;

5257 5258 5259
    rv = 0;

done:
5260
    remoteDriverUnlock(priv);
5261
    return rv;
5262 5263 5264 5265 5266
}

static int
remoteStoragePoolSetAutostart (virStoragePoolPtr pool, int autostart)
{
5267
    int rv = -1;
5268
    remote_storage_pool_set_autostart_args args;
5269
    struct private_data *priv = pool->conn->storagePrivateData;
5270

5271 5272
    remoteDriverLock(priv);

5273 5274 5275 5276 5277 5278
    make_nonnull_storage_pool (&args.pool, pool);
    args.autostart = autostart;

    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_SET_AUTOSTART,
              (xdrproc_t) xdr_remote_storage_pool_set_autostart_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5279
        goto done;
5280

5281 5282 5283
    rv = 0;

done:
5284
    remoteDriverUnlock(priv);
5285
    return rv;
5286 5287 5288 5289 5290 5291
}


static int
remoteStoragePoolNumOfVolumes (virStoragePoolPtr pool)
{
5292
    int rv = -1;
5293 5294
    remote_storage_pool_num_of_volumes_args args;
    remote_storage_pool_num_of_volumes_ret ret;
5295
    struct private_data *priv = pool->conn->storagePrivateData;
5296

5297 5298
    remoteDriverLock(priv);

5299 5300 5301 5302 5303 5304
    make_nonnull_storage_pool(&args.pool, pool);

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_NUM_OF_VOLUMES,
              (xdrproc_t) xdr_remote_storage_pool_num_of_volumes_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_num_of_volumes_ret, (char *) &ret) == -1)
5305 5306 5307
        goto done;

    rv = ret.num;
5308

5309
done:
5310
    remoteDriverUnlock(priv);
5311
    return rv;
5312 5313 5314 5315 5316
}

static int
remoteStoragePoolListVolumes (virStoragePoolPtr pool, char **const names, int maxnames)
{
5317
    int rv = -1;
5318 5319 5320
    int i;
    remote_storage_pool_list_volumes_args args;
    remote_storage_pool_list_volumes_ret ret;
5321
    struct private_data *priv = pool->conn->storagePrivateData;
5322

5323 5324
    remoteDriverLock(priv);

5325 5326
    if (maxnames > REMOTE_STORAGE_VOL_NAME_LIST_MAX) {
        error (pool->conn, VIR_ERR_RPC, _("too many storage volumes requested"));
5327
        goto done;
5328 5329 5330 5331 5332 5333 5334 5335
    }
    args.maxnames = maxnames;
    make_nonnull_storage_pool(&args.pool, pool);

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_POOL_LIST_VOLUMES,
              (xdrproc_t) xdr_remote_storage_pool_list_volumes_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_pool_list_volumes_ret, (char *) &ret) == -1)
5336
        goto done;
5337 5338 5339

    if (ret.names.names_len > maxnames) {
        error (pool->conn, VIR_ERR_RPC, _("too many storage volumes received"));
5340
        goto cleanup;
5341 5342 5343 5344 5345 5346 5347
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
5348
    for (i = 0; i < ret.names.names_len; ++i) {
5349 5350
        names[i] = strdup (ret.names.names_val[i]);

5351 5352 5353 5354
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

5355
            virReportOOMError();
5356 5357 5358 5359
            goto cleanup;
        }
    }

5360 5361 5362
    rv = ret.names.names_len;

cleanup:
5363 5364
    xdr_free ((xdrproc_t) xdr_remote_storage_pool_list_volumes_ret, (char *) &ret);

5365
done:
5366
    remoteDriverUnlock(priv);
5367
    return rv;
5368 5369 5370 5371 5372 5373 5374 5375
}



static virStorageVolPtr
remoteStorageVolLookupByName (virStoragePoolPtr pool,
                              const char *name)
{
5376
    virStorageVolPtr vol = NULL;
5377 5378
    remote_storage_vol_lookup_by_name_args args;
    remote_storage_vol_lookup_by_name_ret ret;
5379
    struct private_data *priv = pool->conn->storagePrivateData;
5380

5381 5382
    remoteDriverLock(priv);

5383 5384 5385 5386 5387 5388 5389
    make_nonnull_storage_pool(&args.pool, pool);
    args.name = (char *) name;

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_name_ret, (char *) &ret) == -1)
5390
        goto done;
5391 5392 5393 5394

    vol = get_nonnull_storage_vol (pool->conn, ret.vol);
    xdr_free ((xdrproc_t) &xdr_remote_storage_vol_lookup_by_name_ret, (char *) &ret);

5395
done:
5396
    remoteDriverUnlock(priv);
5397 5398 5399 5400 5401 5402 5403
    return vol;
}

static virStorageVolPtr
remoteStorageVolLookupByKey (virConnectPtr conn,
                             const char *key)
{
5404
    virStorageVolPtr  vol = NULL;
5405 5406
    remote_storage_vol_lookup_by_key_args args;
    remote_storage_vol_lookup_by_key_ret ret;
5407
    struct private_data *priv = conn->storagePrivateData;
5408

5409 5410
    remoteDriverLock(priv);

5411 5412 5413 5414 5415 5416
    args.key = (char *) key;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_VOL_LOOKUP_BY_KEY,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_key_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_key_ret, (char *) &ret) == -1)
5417
        goto done;
5418 5419 5420 5421

    vol = get_nonnull_storage_vol (conn, ret.vol);
    xdr_free ((xdrproc_t) &xdr_remote_storage_vol_lookup_by_key_ret, (char *) &ret);

5422
done:
5423
    remoteDriverUnlock(priv);
5424 5425 5426 5427 5428 5429 5430
    return vol;
}

static virStorageVolPtr
remoteStorageVolLookupByPath (virConnectPtr conn,
                              const char *path)
{
5431
    virStorageVolPtr vol = NULL;
5432 5433
    remote_storage_vol_lookup_by_path_args args;
    remote_storage_vol_lookup_by_path_ret ret;
5434
    struct private_data *priv = conn->storagePrivateData;
5435

5436 5437
    remoteDriverLock(priv);

5438 5439 5440 5441 5442 5443
    args.path = (char *) path;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_STORAGE_VOL_LOOKUP_BY_PATH,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_path_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_lookup_by_path_ret, (char *) &ret) == -1)
5444
        goto done;
5445 5446 5447 5448

    vol = get_nonnull_storage_vol (conn, ret.vol);
    xdr_free ((xdrproc_t) &xdr_remote_storage_vol_lookup_by_path_ret, (char *) &ret);

5449
done:
5450
    remoteDriverUnlock(priv);
5451 5452 5453 5454 5455 5456 5457
    return vol;
}

static virStorageVolPtr
remoteStorageVolCreateXML (virStoragePoolPtr pool, const char *xmlDesc,
                           unsigned int flags)
{
5458
    virStorageVolPtr vol = NULL;
5459 5460
    remote_storage_vol_create_xml_args args;
    remote_storage_vol_create_xml_ret ret;
5461
    struct private_data *priv = pool->conn->storagePrivateData;
5462

5463 5464
    remoteDriverLock(priv);

5465 5466 5467 5468 5469 5470 5471 5472
    make_nonnull_storage_pool (&args.pool, pool);
    args.xml = (char *) xmlDesc;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_CREATE_XML,
              (xdrproc_t) xdr_remote_storage_vol_create_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_create_xml_ret, (char *) &ret) == -1)
5473
        goto done;
5474 5475 5476 5477

    vol = get_nonnull_storage_vol (pool->conn, ret.vol);
    xdr_free ((xdrproc_t) &xdr_remote_storage_vol_create_xml_ret, (char *) &ret);

5478
done:
5479
    remoteDriverUnlock(priv);
5480 5481 5482
    return vol;
}

5483 5484 5485 5486 5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499 5500 5501 5502 5503 5504 5505 5506 5507 5508 5509 5510 5511 5512 5513 5514
static virStorageVolPtr
remoteStorageVolCreateXMLFrom (virStoragePoolPtr pool,
                               const char *xmlDesc,
                               virStorageVolPtr clonevol,
                               unsigned int flags)
{
    virStorageVolPtr newvol = NULL;
    remote_storage_vol_create_xml_from_args args;
    remote_storage_vol_create_xml_from_ret ret;
    struct private_data *priv = pool->conn->storagePrivateData;

    remoteDriverLock(priv);

    make_nonnull_storage_pool (&args.pool, pool);
    make_nonnull_storage_vol (&args.clonevol, clonevol);
    args.xml = (char *) xmlDesc;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (pool->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_CREATE_XML_FROM,
              (xdrproc_t) xdr_remote_storage_vol_create_xml_from_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_create_xml_from_ret, (char *) &ret) == -1)
        goto done;

    newvol = get_nonnull_storage_vol (pool->conn, ret.vol);
    xdr_free ((xdrproc_t) &xdr_remote_storage_vol_create_xml_from_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return newvol;
}

5515 5516 5517 5518
static int
remoteStorageVolDelete (virStorageVolPtr vol,
                        unsigned int flags)
{
5519
    int rv = -1;
5520
    remote_storage_vol_delete_args args;
5521
    struct private_data *priv = vol->conn->storagePrivateData;
5522

5523 5524
    remoteDriverLock(priv);

5525 5526 5527 5528 5529 5530
    make_nonnull_storage_vol (&args.vol, vol);
    args.flags = flags;

    if (call (vol->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_DELETE,
              (xdrproc_t) xdr_remote_storage_vol_delete_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
5531
        goto done;
5532

5533 5534 5535
    rv = 0;

done:
5536
    remoteDriverUnlock(priv);
5537
    return rv;
5538 5539 5540 5541 5542
}

static int
remoteStorageVolGetInfo (virStorageVolPtr vol, virStorageVolInfoPtr info)
{
5543
    int rv = -1;
5544 5545
    remote_storage_vol_get_info_args args;
    remote_storage_vol_get_info_ret ret;
5546
    struct private_data *priv = vol->conn->storagePrivateData;
5547

5548 5549
    remoteDriverLock(priv);

5550 5551 5552 5553 5554 5555
    make_nonnull_storage_vol (&args.vol, vol);

    memset (&ret, 0, sizeof ret);
    if (call (vol->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_GET_INFO,
              (xdrproc_t) xdr_remote_storage_vol_get_info_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_get_info_ret, (char *) &ret) == -1)
5556
        goto done;
5557 5558 5559 5560 5561

    info->type = ret.type;
    info->capacity = ret.capacity;
    info->allocation = ret.allocation;

5562 5563 5564
    rv = 0;

done:
5565
    remoteDriverUnlock(priv);
5566
    return rv;
5567 5568 5569 5570 5571 5572
}

static char *
remoteStorageVolDumpXML (virStorageVolPtr vol,
                         unsigned int flags)
{
5573
    char *rv = NULL;
5574 5575
    remote_storage_vol_dump_xml_args args;
    remote_storage_vol_dump_xml_ret ret;
5576
    struct private_data *priv = vol->conn->storagePrivateData;
5577

5578 5579
    remoteDriverLock(priv);

5580 5581 5582 5583 5584 5585 5586
    make_nonnull_storage_vol (&args.vol, vol);
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (vol->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_DUMP_XML,
              (xdrproc_t) xdr_remote_storage_vol_dump_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_dump_xml_ret, (char *) &ret) == -1)
5587
        goto done;
5588 5589

    /* Caller frees. */
5590 5591 5592
    rv = ret.xml;

done:
5593
    remoteDriverUnlock(priv);
5594
    return rv;
5595 5596 5597 5598 5599
}

static char *
remoteStorageVolGetPath (virStorageVolPtr vol)
{
5600
    char *rv = NULL;
5601 5602
    remote_storage_vol_get_path_args args;
    remote_storage_vol_get_path_ret ret;
5603
    struct private_data *priv = vol->conn->storagePrivateData;
5604

5605 5606
    remoteDriverLock(priv);

5607 5608 5609 5610 5611 5612
    make_nonnull_storage_vol (&args.vol, vol);

    memset (&ret, 0, sizeof ret);
    if (call (vol->conn, priv, 0, REMOTE_PROC_STORAGE_VOL_GET_PATH,
              (xdrproc_t) xdr_remote_storage_vol_get_path_args, (char *) &args,
              (xdrproc_t) xdr_remote_storage_vol_get_path_ret, (char *) &ret) == -1)
5613
        goto done;
5614 5615

    /* Caller frees. */
5616 5617 5618
    rv = ret.name;

done:
5619
    remoteDriverUnlock(priv);
5620
    return rv;
5621 5622 5623
}


5624 5625
/*----------------------------------------------------------------------*/

J
Jim Meyering 已提交
5626
static virDrvOpenStatus ATTRIBUTE_NONNULL (1)
5627 5628 5629 5630
remoteDevMonOpen(virConnectPtr conn,
                 virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                 int flags ATTRIBUTE_UNUSED)
{
5631 5632 5633
    if (inside_daemon)
        return VIR_DRV_OPEN_DECLINED;

J
Jim Meyering 已提交
5634
    if (conn->driver &&
5635
        STREQ (conn->driver->name, "remote")) {
5636
        struct private_data *priv = conn->privateData;
5637 5638 5639 5640
        /* If we're here, the remote driver is already
         * in use due to a) a QEMU uri, or b) a remote
         * URI. So we can re-use existing connection
         */
5641 5642 5643 5644
        remoteDriverLock(priv);
        priv->localUses++;
        conn->devMonPrivateData = priv;
        remoteDriverUnlock(priv);
5645
        return VIR_DRV_OPEN_SUCCESS;
5646 5647 5648 5649 5650 5651 5652 5653 5654 5655 5656 5657 5658 5659 5660
    } else if (conn->networkDriver &&
               STREQ (conn->networkDriver->name, "remote")) {
        struct private_data *priv = conn->networkPrivateData;
        remoteDriverLock(priv);
        conn->devMonPrivateData = priv;
        priv->localUses++;
        remoteDriverUnlock(priv);
        return VIR_DRV_OPEN_SUCCESS;
    } else {
        /* Using a non-remote driver, so we need to open a
         * new connection for network APIs, forcing it to
         * use the UNIX transport. This handles Xen driver
         * which doesn't have its own impl of the network APIs.
         */
        struct private_data *priv;
5661 5662 5663 5664 5665 5666
        int ret;
        ret = remoteOpenSecondaryDriver(conn,
                                        auth,
                                        flags,
                                        &priv);
        if (ret == VIR_DRV_OPEN_SUCCESS)
5667 5668 5669
            conn->devMonPrivateData = priv;
        return ret;
    }
5670 5671 5672 5673 5674
}

static int remoteDevMonClose(virConnectPtr conn)
{
    int ret = 0;
5675 5676
    struct private_data *priv = conn->devMonPrivateData;

5677 5678 5679 5680 5681 5682 5683 5684
    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        ret = doRemoteClose(conn, priv);
        conn->devMonPrivateData = NULL;
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE(priv);
5685
    }
5686 5687
    if (priv)
        remoteDriverUnlock(priv);
5688 5689 5690 5691 5692 5693 5694
    return ret;
}

static int remoteNodeNumOfDevices(virConnectPtr conn,
                                  const char *cap,
                                  unsigned int flags)
{
5695
    int rv = -1;
5696 5697
    remote_node_num_of_devices_args args;
    remote_node_num_of_devices_ret ret;
5698
    struct private_data *priv = conn->devMonPrivateData;
5699

5700 5701
    remoteDriverLock(priv);

5702 5703 5704 5705 5706 5707 5708
    args.cap = cap ? (char **)&cap : NULL;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_NUM_OF_DEVICES,
              (xdrproc_t) xdr_remote_node_num_of_devices_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_num_of_devices_ret, (char *) &ret) == -1)
5709 5710 5711
        goto done;

    rv = ret.num;
5712

5713
done:
5714
    remoteDriverUnlock(priv);
5715
    return rv;
5716 5717 5718 5719 5720 5721 5722 5723 5724
}


static int remoteNodeListDevices(virConnectPtr conn,
                                 const char *cap,
                                 char **const names,
                                 int maxnames,
                                 unsigned int flags)
{
5725
    int rv = -1;
5726 5727 5728
    int i;
    remote_node_list_devices_args args;
    remote_node_list_devices_ret ret;
5729
    struct private_data *priv = conn->devMonPrivateData;
5730

5731 5732
    remoteDriverLock(priv);

5733 5734
    if (maxnames > REMOTE_NODE_DEVICE_NAME_LIST_MAX) {
        error (conn, VIR_ERR_RPC, _("too many device names requested"));
5735
        goto done;
5736 5737 5738 5739 5740 5741 5742 5743 5744
    }
    args.cap = cap ? (char **)&cap : NULL;
    args.maxnames = maxnames;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_LIST_DEVICES,
              (xdrproc_t) xdr_remote_node_list_devices_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_list_devices_ret, (char *) &ret) == -1)
5745
        goto done;
5746 5747 5748

    if (ret.names.names_len > maxnames) {
        error (conn, VIR_ERR_RPC, _("too many device names received"));
5749
        goto cleanup;
5750 5751 5752 5753 5754 5755 5756
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
5757
    for (i = 0; i < ret.names.names_len; ++i) {
5758 5759
        names[i] = strdup (ret.names.names_val[i]);

5760 5761 5762 5763
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

5764
            virReportOOMError();
5765 5766 5767 5768
            goto cleanup;
        }
    }

5769 5770 5771
    rv = ret.names.names_len;

cleanup:
5772 5773
    xdr_free ((xdrproc_t) xdr_remote_node_list_devices_ret, (char *) &ret);

5774
done:
5775
    remoteDriverUnlock(priv);
5776
    return rv;
5777 5778 5779 5780 5781 5782 5783 5784
}


static virNodeDevicePtr remoteNodeDeviceLookupByName(virConnectPtr conn,
                                                     const char *name)
{
    remote_node_device_lookup_by_name_args args;
    remote_node_device_lookup_by_name_ret ret;
5785
    virNodeDevicePtr dev = NULL;
5786
    struct private_data *priv = conn->devMonPrivateData;
5787

5788 5789
    remoteDriverLock(priv);

5790 5791 5792 5793 5794 5795
    args.name = (char *)name;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_NODE_DEVICE_LOOKUP_BY_NAME,
              (xdrproc_t) xdr_remote_node_device_lookup_by_name_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_device_lookup_by_name_ret, (char *) &ret) == -1)
5796
        goto done;
5797 5798 5799 5800 5801

    dev = get_nonnull_node_device(conn, ret.dev);

    xdr_free ((xdrproc_t) xdr_remote_node_device_lookup_by_name_ret, (char *) &ret);

5802
done:
5803
    remoteDriverUnlock(priv);
5804 5805 5806 5807 5808 5809
    return dev;
}

static char *remoteNodeDeviceDumpXML(virNodeDevicePtr dev,
                                     unsigned int flags)
{
5810
    char *rv = NULL;
5811 5812
    remote_node_device_dump_xml_args args;
    remote_node_device_dump_xml_ret ret;
5813
    struct private_data *priv = dev->conn->devMonPrivateData;
5814

5815 5816
    remoteDriverLock(priv);

5817 5818 5819 5820 5821 5822 5823
    args.name = dev->name;
    args.flags = flags;

    memset (&ret, 0, sizeof ret);
    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_DUMP_XML,
              (xdrproc_t) xdr_remote_node_device_dump_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_device_dump_xml_ret, (char *) &ret) == -1)
5824
        goto done;
5825 5826

    /* Caller frees. */
5827 5828 5829
    rv = ret.xml;

done:
5830
    remoteDriverUnlock(priv);
5831
    return rv;
5832 5833 5834 5835
}

static char *remoteNodeDeviceGetParent(virNodeDevicePtr dev)
{
5836
    char *rv = NULL;
5837 5838
    remote_node_device_get_parent_args args;
    remote_node_device_get_parent_ret ret;
5839
    struct private_data *priv = dev->conn->devMonPrivateData;
5840

5841 5842
    remoteDriverLock(priv);

5843 5844 5845 5846 5847 5848
    args.name = dev->name;

    memset (&ret, 0, sizeof ret);
    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_GET_PARENT,
              (xdrproc_t) xdr_remote_node_device_get_parent_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_device_get_parent_ret, (char *) &ret) == -1)
5849
        goto done;
5850 5851

    /* Caller frees. */
5852
    rv = ret.parent ? *ret.parent : NULL;
5853
    VIR_FREE(ret.parent);
5854 5855

done:
5856
    remoteDriverUnlock(priv);
5857
    return rv;
5858 5859 5860 5861
}

static int remoteNodeDeviceNumOfCaps(virNodeDevicePtr dev)
{
5862
    int rv = -1;
5863 5864
    remote_node_device_num_of_caps_args args;
    remote_node_device_num_of_caps_ret ret;
5865
    struct private_data *priv = dev->conn->devMonPrivateData;
5866

5867 5868
    remoteDriverLock(priv);

5869 5870 5871 5872 5873 5874
    args.name = dev->name;

    memset (&ret, 0, sizeof ret);
    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_NUM_OF_CAPS,
              (xdrproc_t) xdr_remote_node_device_num_of_caps_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_device_num_of_caps_ret, (char *) &ret) == -1)
5875 5876 5877
        goto done;

    rv = ret.num;
5878

5879
done:
5880
    remoteDriverUnlock(priv);
5881
    return rv;
5882 5883 5884 5885 5886 5887
}

static int remoteNodeDeviceListCaps(virNodeDevicePtr dev,
                                    char **const names,
                                    int maxnames)
{
5888
    int rv = -1;
5889 5890 5891
    int i;
    remote_node_device_list_caps_args args;
    remote_node_device_list_caps_ret ret;
5892
    struct private_data *priv = dev->conn->devMonPrivateData;
5893

5894 5895
    remoteDriverLock(priv);

5896 5897
    if (maxnames > REMOTE_NODE_DEVICE_CAPS_LIST_MAX) {
        error (dev->conn, VIR_ERR_RPC, _("too many capability names requested"));
5898
        goto done;
5899 5900 5901 5902 5903 5904 5905 5906
    }
    args.maxnames = maxnames;
    args.name = dev->name;

    memset (&ret, 0, sizeof ret);
    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_LIST_CAPS,
              (xdrproc_t) xdr_remote_node_device_list_caps_args, (char *) &args,
              (xdrproc_t) xdr_remote_node_device_list_caps_ret, (char *) &ret) == -1)
5907
        goto done;
5908 5909 5910

    if (ret.names.names_len > maxnames) {
        error (dev->conn, VIR_ERR_RPC, _("too many capability names received"));
5911
        goto cleanup;
5912 5913 5914 5915 5916 5917 5918
    }

    /* This call is caller-frees (although that isn't clear from
     * the documentation).  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
5919
    for (i = 0; i < ret.names.names_len; ++i) {
5920 5921
        names[i] = strdup (ret.names.names_val[i]);

5922 5923 5924 5925
        if (names[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(names[i]);

5926
            virReportOOMError();
5927 5928 5929 5930
            goto cleanup;
        }
    }

5931 5932 5933
    rv = ret.names.names_len;

cleanup:
5934 5935
    xdr_free ((xdrproc_t) xdr_remote_node_device_list_caps_ret, (char *) &ret);

5936
done:
5937
    remoteDriverUnlock(priv);
5938
    return rv;
5939 5940
}

5941 5942 5943 5944 5945 5946 5947 5948 5949 5950 5951 5952 5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969 5970 5971 5972 5973 5974 5975 5976 5977 5978 5979 5980 5981 5982 5983 5984 5985 5986 5987 5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009
static int
remoteNodeDeviceDettach (virNodeDevicePtr dev)
{
    int rv = -1;
    remote_node_device_dettach_args args;
    struct private_data *priv = dev->conn->privateData;

    remoteDriverLock(priv);

    args.name = dev->name;

    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_DETTACH,
              (xdrproc_t) xdr_remote_node_device_dettach_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteNodeDeviceReAttach (virNodeDevicePtr dev)
{
    int rv = -1;
    remote_node_device_re_attach_args args;
    struct private_data *priv = dev->conn->privateData;

    remoteDriverLock(priv);

    args.name = dev->name;

    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_RE_ATTACH,
              (xdrproc_t) xdr_remote_node_device_re_attach_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

static int
remoteNodeDeviceReset (virNodeDevicePtr dev)
{
    int rv = -1;
    remote_node_device_reset_args args;
    struct private_data *priv = dev->conn->privateData;

    remoteDriverLock(priv);

    args.name = dev->name;

    if (call (dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_RESET,
              (xdrproc_t) xdr_remote_node_device_reset_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}

6010

6011 6012 6013 6014 6015 6016 6017 6018 6019 6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045 6046 6047 6048 6049 6050
static virNodeDevicePtr
remoteNodeDeviceCreateXML(virConnectPtr conn,
                          const char *xmlDesc,
                          unsigned int flags)
{
    remote_node_device_create_xml_args args;
    remote_node_device_create_xml_ret ret;
    virNodeDevicePtr dev = NULL;
    struct private_data *priv = conn->privateData;

    remoteDriverLock(priv);

    memset(&ret, 0, sizeof ret);
    args.xml_desc = (char *)xmlDesc;
    args.flags = flags;

    if (call(conn, priv, 0, REMOTE_PROC_NODE_DEVICE_CREATE_XML,
             (xdrproc_t) xdr_remote_node_device_create_xml_args, (char *) &args,
             (xdrproc_t) xdr_remote_node_device_create_xml_ret, (char *) &ret) == -1)
        goto done;

    dev = get_nonnull_node_device(conn, ret.dev);
    xdr_free ((xdrproc_t) xdr_remote_node_device_create_xml_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return dev;
}

static int
remoteNodeDeviceDestroy(virNodeDevicePtr dev)
{
    int rv = -1;
    remote_node_device_destroy_args args;
    struct private_data *priv = dev->conn->privateData;

    remoteDriverLock(priv);

    args.name = dev->name;

6051
    if (call(dev->conn, priv, 0, REMOTE_PROC_NODE_DEVICE_DESTROY,
6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063
             (xdrproc_t) xdr_remote_node_device_destroy_args, (char *) &args,
             (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}


6064 6065
/*----------------------------------------------------------------------*/

6066
static int
6067
remoteAuthenticate (virConnectPtr conn, struct private_data *priv, int in_open,
6068 6069 6070 6071 6072 6073
                    virConnectAuthPtr auth
#if !HAVE_SASL && !HAVE_POLKIT
                    ATTRIBUTE_UNUSED
#endif
                    ,
                    const char *authtype)
6074 6075
{
    struct remote_auth_list_ret ret;
6076
    int err, type = REMOTE_AUTH_NONE;
6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091 6092

    memset(&ret, 0, sizeof ret);
    err = call (conn, priv,
                REMOTE_CALL_IN_OPEN | REMOTE_CALL_QUIET_MISSING_RPC,
                REMOTE_PROC_AUTH_LIST,
                (xdrproc_t) xdr_void, (char *) NULL,
                (xdrproc_t) xdr_remote_auth_list_ret, (char *) &ret);
    if (err == -2) /* Missing RPC - old server - ignore */
        return 0;

    if (err < 0)
        return -1;

    if (ret.types.types_len == 0)
        return 0;

6093 6094 6095 6096 6097 6098 6099 6100
    if (authtype) {
        int want, i;
        if (STRCASEEQ(authtype, "sasl") ||
            STRCASEEQLEN(authtype, "sasl.", 5)) {
            want = REMOTE_AUTH_SASL;
        } else if (STRCASEEQ(authtype, "polkit")) {
            want = REMOTE_AUTH_POLKIT;
        } else {
6101
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6102 6103 6104
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR,
                             NULL, NULL, NULL, 0, 0,
                             _("unknown authentication type %s"), authtype);
6105 6106 6107 6108 6109 6110 6111
            return -1;
        }
        for (i = 0 ; i < ret.types.types_len ; i++) {
            if (ret.types.types_val[i] == want)
                type = want;
        }
        if (type == REMOTE_AUTH_NONE) {
6112
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6113
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6114 6115
                             _("requested authentication type %s rejected"),
                             authtype);
6116 6117 6118 6119 6120 6121 6122
            return -1;
        }
    } else {
        type = ret.types.types_val[0];
    }

    switch (type) {
6123
#if HAVE_SASL
6124 6125 6126 6127 6128 6129 6130
    case REMOTE_AUTH_SASL: {
        const char *mech = NULL;
        if (authtype &&
            STRCASEEQLEN(authtype, "sasl.", 5))
            mech = authtype + 5;

        if (remoteAuthSASL(conn, priv, in_open, auth, mech) < 0) {
6131
            VIR_FREE(ret.types.types_val);
6132 6133 6134
            return -1;
        }
        break;
6135
    }
6136 6137
#endif

6138 6139
#if HAVE_POLKIT
    case REMOTE_AUTH_POLKIT:
6140
        if (remoteAuthPolkit(conn, priv, in_open, auth) < 0) {
6141
            VIR_FREE(ret.types.types_val);
6142 6143 6144 6145 6146
            return -1;
        }
        break;
#endif

6147 6148 6149 6150 6151
    case REMOTE_AUTH_NONE:
        /* Nothing todo, hurrah ! */
        break;

    default:
6152
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6153 6154 6155 6156
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR,
                         NULL, NULL, NULL, 0, 0,
                         _("unsupported authentication type %d"),
                         ret.types.types_val[0]);
6157
        VIR_FREE(ret.types.types_val);
6158 6159 6160
        return -1;
    }

6161
    VIR_FREE(ret.types.types_val);
6162 6163 6164 6165 6166 6167 6168 6169

    return 0;
}



#if HAVE_SASL
/*
6170
 * NB, keep in sync with similar method in remote/remote.c
6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181
 */
static char *addrToString(struct sockaddr_storage *sa, socklen_t salen)
{
    char host[NI_MAXHOST], port[NI_MAXSERV];
    char *addr;
    int err;

    if ((err = getnameinfo((struct sockaddr *)sa, salen,
                           host, sizeof(host),
                           port, sizeof(port),
                           NI_NUMERICHOST | NI_NUMERICSERV)) != 0) {
6182
        virRaiseError (NULL, NULL, NULL, VIR_FROM_REMOTE,
6183 6184 6185 6186
                       VIR_ERR_UNKNOWN_HOST, VIR_ERR_ERROR,
                       NULL, NULL, NULL, 0, 0,
                       _("Cannot resolve address %d: %s"),
                       err, gai_strerror(err));
6187 6188 6189
        return NULL;
    }

6190
    if (virAsprintf(&addr, "%s;%s", host, port) == -1) {
6191
        virReportOOMError();
6192 6193 6194 6195 6196 6197 6198
        return NULL;
    }

    return addr;
}


6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276
static int remoteAuthCredVir2SASL(int vircred)
{
    switch (vircred) {
    case VIR_CRED_USERNAME:
        return SASL_CB_USER;

    case VIR_CRED_AUTHNAME:
        return SASL_CB_AUTHNAME;

    case VIR_CRED_LANGUAGE:
        return SASL_CB_LANGUAGE;

    case VIR_CRED_CNONCE:
        return SASL_CB_CNONCE;

    case VIR_CRED_PASSPHRASE:
        return SASL_CB_PASS;

    case VIR_CRED_ECHOPROMPT:
        return SASL_CB_ECHOPROMPT;

    case VIR_CRED_NOECHOPROMPT:
        return SASL_CB_NOECHOPROMPT;

    case VIR_CRED_REALM:
        return SASL_CB_GETREALM;
    }

    return 0;
}

static int remoteAuthCredSASL2Vir(int vircred)
{
    switch (vircred) {
    case SASL_CB_USER:
        return VIR_CRED_USERNAME;

    case SASL_CB_AUTHNAME:
        return VIR_CRED_AUTHNAME;

    case SASL_CB_LANGUAGE:
        return VIR_CRED_LANGUAGE;

    case SASL_CB_CNONCE:
        return VIR_CRED_CNONCE;

    case SASL_CB_PASS:
        return VIR_CRED_PASSPHRASE;

    case SASL_CB_ECHOPROMPT:
        return VIR_CRED_ECHOPROMPT;

    case SASL_CB_NOECHOPROMPT:
        return VIR_CRED_NOECHOPROMPT;

    case SASL_CB_GETREALM:
        return VIR_CRED_REALM;
    }

    return 0;
}

/*
 * @param credtype array of credential types client supports
 * @param ncredtype size of credtype array
 * @return the SASL callback structure, or NULL on error
 *
 * Build up the SASL callback structure. We register one callback for
 * each credential type that the libvirt client indicated they support.
 * We explicitly leav the callback function pointer at NULL though,
 * because we don't actually want to get SASL callbacks triggered.
 * Instead, we want the start/step functions to return SASL_INTERACT.
 * This lets us give the libvirt client a list of all required
 * credentials in one go, rather than triggering the callback one
 * credential at a time,
 */
static sasl_callback_t *remoteAuthMakeCallbacks(int *credtype, int ncredtype)
{
6277
    sasl_callback_t *cbs;
6278
    int i, n;
6279
    if (VIR_ALLOC_N(cbs, ncredtype+1) < 0) {
6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298
        return NULL;
    }

    for (i = 0, n = 0 ; i < ncredtype ; i++) {
        int id = remoteAuthCredVir2SASL(credtype[i]);
        if (id != 0)
            cbs[n++].id = id;
        /* Don't fill proc or context fields of sasl_callback_t
         * because we want to use interactions instead */
    }
    cbs[n].id = 0;
    return cbs;
}


/*
 * @param interact SASL interactions required
 * @param cred populated with libvirt credential metadata
 * @return the size of the cred array returned
6299
 *
6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313
 * Builds up an array of libvirt credential structs, populating
 * with data from the SASL interaction struct. These two structs
 * are basically a 1-to-1 copy of each other.
 */
static int remoteAuthMakeCredentials(sasl_interact_t *interact,
                                     virConnectCredentialPtr *cred)
{
    int ninteract;
    if (!cred)
        return -1;

    for (ninteract = 0 ; interact[ninteract].id != 0 ; ninteract++)
        ; /* empty */

6314
    if (VIR_ALLOC_N(*cred, ninteract) < 0)
6315 6316 6317 6318 6319
        return -1;

    for (ninteract = 0 ; interact[ninteract].id != 0 ; ninteract++) {
        (*cred)[ninteract].type = remoteAuthCredSASL2Vir(interact[ninteract].id);
        if (!(*cred)[ninteract].type) {
6320
            VIR_FREE(*cred);
6321 6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338
            return -1;
        }
        if (interact[ninteract].challenge)
            (*cred)[ninteract].challenge = interact[ninteract].challenge;
        (*cred)[ninteract].prompt = interact[ninteract].prompt;
        if (interact[ninteract].defresult)
            (*cred)[ninteract].defresult = interact[ninteract].defresult;
        (*cred)[ninteract].result = NULL;
    }

    return ninteract;
}

static void remoteAuthFreeCredentials(virConnectCredentialPtr cred,
                                      int ncred)
{
    int i;
    for (i = 0 ; i < ncred ; i++)
6339 6340
        VIR_FREE(cred[i].result);
    VIR_FREE(cred);
6341 6342 6343 6344 6345 6346 6347 6348 6349 6350 6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361
}


/*
 * @param cred the populated libvirt credentials
 * @param interact the SASL interactions to fill in results for
 *
 * Fills the SASL interactions with the result from the libvirt
 * callbacks
 */
static void remoteAuthFillInteract(virConnectCredentialPtr cred,
                                   sasl_interact_t *interact)
{
    int ninteract;
    for (ninteract = 0 ; interact[ninteract].id != 0 ; ninteract++) {
        interact[ninteract].result = cred[ninteract].result;
        interact[ninteract].len = cred[ninteract].resultlen;
    }
}

/* Perform the SASL authentication process
6362 6363
 */
static int
6364 6365
remoteAuthSASL (virConnectPtr conn, struct private_data *priv, int in_open,
                virConnectAuthPtr auth, const char *wantmech)
6366 6367
{
    sasl_conn_t *saslconn = NULL;
6368
    sasl_security_properties_t secprops;
6369 6370 6371 6372 6373 6374
    remote_auth_sasl_init_ret iret;
    remote_auth_sasl_start_args sargs;
    remote_auth_sasl_start_ret sret;
    remote_auth_sasl_step_args pargs;
    remote_auth_sasl_step_ret pret;
    const char *clientout;
6375
    char *serverin = NULL;
6376 6377 6378 6379 6380
    unsigned int clientoutlen, serverinlen;
    const char *mech;
    int err, complete;
    struct sockaddr_storage sa;
    socklen_t salen;
6381
    char *localAddr = NULL, *remoteAddr = NULL;
6382 6383
    const void *val;
    sasl_ssf_t ssf;
6384 6385 6386 6387 6388 6389
    sasl_callback_t *saslcb = NULL;
    sasl_interact_t *interact = NULL;
    virConnectCredentialPtr cred = NULL;
    int ncred = 0;
    int ret = -1;
    const char *mechlist;
6390

6391
    DEBUG0("Client initialize SASL authentication");
6392 6393 6394
    /* Sets up the SASL library as a whole */
    err = sasl_client_init(NULL);
    if (err != SASL_OK) {
6395
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6396
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6397
                         _("failed to initialize SASL library: %d (%s)"),
6398
                         err, sasl_errstring(err, NULL, NULL));
6399
        goto cleanup;
6400 6401 6402 6403 6404
    }

    /* Get local address in form  IPADDR:PORT */
    salen = sizeof(sa);
    if (getsockname(priv->sock, (struct sockaddr*)&sa, &salen) < 0) {
6405
        virReportSystemError(errno, "%s",
6406
                             _("failed to get sock address"));
6407
        goto cleanup;
6408
    }
6409 6410
    if ((localAddr = addrToString(&sa, salen)) == NULL)
        goto cleanup;
6411 6412 6413 6414

    /* Get remote address in form  IPADDR:PORT */
    salen = sizeof(sa);
    if (getpeername(priv->sock, (struct sockaddr*)&sa, &salen) < 0) {
6415
        virReportSystemError(errno, "%s",
6416
                             _("failed to get peer address"));
6417
        goto cleanup;
6418
    }
6419 6420 6421
    if ((remoteAddr = addrToString(&sa, salen)) == NULL)
        goto cleanup;

6422 6423 6424 6425 6426 6427
    if (auth) {
        if ((saslcb = remoteAuthMakeCallbacks(auth->credtype, auth->ncredtype)) == NULL)
            goto cleanup;
    } else {
        saslcb = NULL;
    }
6428 6429 6430 6431 6432 6433

    /* Setup a handle for being a client */
    err = sasl_client_new("libvirt",
                          priv->hostname,
                          localAddr,
                          remoteAddr,
6434
                          saslcb,
6435 6436
                          SASL_SUCCESS_DATA,
                          &saslconn);
6437

6438
    if (err != SASL_OK) {
6439
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6440
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6441
                         _("Failed to create SASL client context: %d (%s)"),
6442
                         err, sasl_errstring(err, NULL, NULL));
6443
        goto cleanup;
6444 6445
    }

6446 6447 6448 6449 6450 6451
    /* Initialize some connection props we care about */
    if (priv->uses_tls) {
        gnutls_cipher_algorithm_t cipher;

        cipher = gnutls_cipher_get(priv->session);
        if (!(ssf = (sasl_ssf_t)gnutls_cipher_get_key_size(cipher))) {
6452
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6453
                             VIR_ERR_INTERNAL_ERROR, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6454
                             "%s", _("invalid cipher size for TLS session"));
6455
            goto cleanup;
6456 6457 6458
        }
        ssf *= 8; /* key size is bytes, sasl wants bits */

6459
        DEBUG("Setting external SSF %d", ssf);
6460 6461
        err = sasl_setprop(saslconn, SASL_SSF_EXTERNAL, &ssf);
        if (err != SASL_OK) {
6462
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6463
                             VIR_ERR_INTERNAL_ERROR, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6464
                             _("cannot set external SSF %d (%s)"),
6465
                             err, sasl_errstring(err, NULL, NULL));
6466
            goto cleanup;
6467 6468 6469 6470 6471 6472 6473 6474 6475 6476 6477 6478 6479 6480
        }
    }

    memset (&secprops, 0, sizeof secprops);
    /* If we've got TLS, we don't care about SSF */
    secprops.min_ssf = priv->uses_tls ? 0 : 56; /* Equiv to DES supported by all Kerberos */
    secprops.max_ssf = priv->uses_tls ? 0 : 100000; /* Very strong ! AES == 256 */
    secprops.maxbufsize = 100000;
    /* If we're not TLS, then forbid any anonymous or trivially crackable auth */
    secprops.security_flags = priv->uses_tls ? 0 :
        SASL_SEC_NOANONYMOUS | SASL_SEC_NOPLAINTEXT;

    err = sasl_setprop(saslconn, SASL_SEC_PROPS, &secprops);
    if (err != SASL_OK) {
6481
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6482
                         VIR_ERR_INTERNAL_ERROR, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6483
                         _("cannot set security props %d (%s)"),
6484
                         err, sasl_errstring(err, NULL, NULL));
6485
        goto cleanup;
6486 6487
    }

6488 6489 6490 6491
    /* First call is to inquire about supported mechanisms in the server */
    memset (&iret, 0, sizeof iret);
    if (call (conn, priv, in_open, REMOTE_PROC_AUTH_SASL_INIT,
              (xdrproc_t) xdr_void, (char *)NULL,
6492 6493
              (xdrproc_t) xdr_remote_auth_sasl_init_ret, (char *) &iret) != 0)
        goto cleanup;
6494 6495


6496 6497 6498
    mechlist = iret.mechlist;
    if (wantmech) {
        if (strstr(mechlist, wantmech) == NULL) {
6499
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6500 6501 6502 6503
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR,
                             NULL, NULL, NULL, 0, 0,
                             _("SASL mechanism %s not supported by server"),
                             wantmech);
6504
            VIR_FREE(iret.mechlist);
6505 6506 6507 6508 6509
            goto cleanup;
        }
        mechlist = wantmech;
    }
 restart:
6510
    /* Start the auth negotiation on the client end first */
6511
    DEBUG("Client start negotiation mechlist '%s'", mechlist);
6512
    err = sasl_client_start(saslconn,
6513 6514
                            mechlist,
                            &interact,
6515 6516 6517
                            &clientout,
                            &clientoutlen,
                            &mech);
6518
    if (err != SASL_OK && err != SASL_CONTINUE && err != SASL_INTERACT) {
6519
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6520
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6521
                         _("Failed to start SASL negotiation: %d (%s)"),
6522
                         err, sasl_errdetail(saslconn));
6523
        VIR_FREE(iret.mechlist);
6524 6525 6526 6527 6528
        goto cleanup;
    }

    /* Need to gather some credentials from the client */
    if (err == SASL_INTERACT) {
6529
        const char *msg;
6530 6531 6532 6533 6534 6535
        if (cred) {
            remoteAuthFreeCredentials(cred, ncred);
            cred = NULL;
        }
        if ((ncred =
             remoteAuthMakeCredentials(interact, &cred)) < 0) {
6536
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6537 6538 6539
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR,
                             NULL, NULL, NULL, 0, 0,
                             "%s", _("Failed to make auth credentials"));
6540
            VIR_FREE(iret.mechlist);
6541 6542 6543
            goto cleanup;
        }
        /* Run the authentication callback */
6544
        if (auth && auth->cb) {
6545 6546 6547
            if ((*(auth->cb))(cred, ncred, auth->cbdata) >= 0) {
                remoteAuthFillInteract(cred, interact);
                goto restart;
6548
            }
6549
            msg = "Failed to collect auth credentials";
6550
        } else {
6551
            msg = "No authentication callback available";
6552
        }
6553
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6554
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL,
6555
                         0, 0, "%s", msg);
6556
        goto cleanup;
6557
    }
6558
    VIR_FREE(iret.mechlist);
6559 6560

    if (clientoutlen > REMOTE_AUTH_SASL_DATA_MAX) {
6561
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6562
                         VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6563 6564
                         _("SASL negotiation data too long: %d bytes"),
                         clientoutlen);
6565
        goto cleanup;
6566 6567 6568 6569 6570 6571 6572
    }
    /* NB, distinction of NULL vs "" is *critical* in SASL */
    memset(&sargs, 0, sizeof sargs);
    sargs.nil = clientout ? 0 : 1;
    sargs.data.data_val = (char*)clientout;
    sargs.data.data_len = clientoutlen;
    sargs.mech = (char*)mech;
6573
    DEBUG("Server start negotiation with mech %s. Data %d bytes %p", mech, clientoutlen, clientout);
6574 6575 6576 6577 6578

    /* Now send the initial auth data to the server */
    memset (&sret, 0, sizeof sret);
    if (call (conn, priv, in_open, REMOTE_PROC_AUTH_SASL_START,
              (xdrproc_t) xdr_remote_auth_sasl_start_args, (char *) &sargs,
6579 6580
              (xdrproc_t) xdr_remote_auth_sasl_start_ret, (char *) &sret) != 0)
        goto cleanup;
6581 6582 6583 6584 6585

    complete = sret.complete;
    /* NB, distinction of NULL vs "" is *critical* in SASL */
    serverin = sret.nil ? NULL : sret.data.data_val;
    serverinlen = sret.data.data_len;
6586 6587
    DEBUG("Client step result complete: %d. Data %d bytes %p",
          complete, serverinlen, serverin);
6588 6589 6590

    /* Loop-the-loop...
     * Even if the server has completed, the client must *always* do at least one step
D
Daniel Veillard 已提交
6591
     * in this loop to verify the server isn't lying about something. Mutual auth */
6592
    for (;;) {
6593
    restep:
6594 6595 6596
        err = sasl_client_step(saslconn,
                               serverin,
                               serverinlen,
6597
                               &interact,
6598 6599
                               &clientout,
                               &clientoutlen);
6600
        if (err != SASL_OK && err != SASL_CONTINUE && err != SASL_INTERACT) {
6601
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6602
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6603
                             _("Failed SASL step: %d (%s)"),
6604
                             err, sasl_errdetail(saslconn));
6605 6606 6607 6608
            goto cleanup;
        }
        /* Need to gather some credentials from the client */
        if (err == SASL_INTERACT) {
6609
            const char *msg;
6610 6611 6612 6613 6614
            if (cred) {
                remoteAuthFreeCredentials(cred, ncred);
                cred = NULL;
            }
            if ((ncred = remoteAuthMakeCredentials(interact, &cred)) < 0) {
6615
                virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6616
                                 VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6617
                                 "%s", _("Failed to make auth credentials"));
6618 6619 6620
                goto cleanup;
            }
            /* Run the authentication callback */
6621
            if (auth && auth->cb) {
6622 6623 6624
                if ((*(auth->cb))(cred, ncred, auth->cbdata) >= 0) {
                    remoteAuthFillInteract(cred, interact);
                    goto restep;
6625
                }
6626
                msg = "Failed to collect auth credentials";
6627
            } else {
6628
                msg = "No authentication callback available";
6629
            }
6630
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6631
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL,
6632
                             0, 0, "%s", msg);
6633
            goto cleanup;
6634 6635
        }

6636
        VIR_FREE(serverin);
6637
        DEBUG("Client step result %d. Data %d bytes %p", err, clientoutlen, clientout);
6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648

        /* Previous server call showed completion & we're now locally complete too */
        if (complete && err == SASL_OK)
            break;

        /* Not done, prepare to talk with the server for another iteration */
        /* NB, distinction of NULL vs "" is *critical* in SASL */
        memset(&pargs, 0, sizeof pargs);
        pargs.nil = clientout ? 0 : 1;
        pargs.data.data_val = (char*)clientout;
        pargs.data.data_len = clientoutlen;
6649
        DEBUG("Server step with %d bytes %p", clientoutlen, clientout);
6650 6651 6652 6653

        memset (&pret, 0, sizeof pret);
        if (call (conn, priv, in_open, REMOTE_PROC_AUTH_SASL_STEP,
                  (xdrproc_t) xdr_remote_auth_sasl_step_args, (char *) &pargs,
6654 6655
                  (xdrproc_t) xdr_remote_auth_sasl_step_ret, (char *) &pret) != 0)
            goto cleanup;
6656 6657 6658 6659 6660 6661

        complete = pret.complete;
        /* NB, distinction of NULL vs "" is *critical* in SASL */
        serverin = pret.nil ? NULL : pret.data.data_val;
        serverinlen = pret.data.data_len;

6662 6663
        DEBUG("Client step result complete: %d. Data %d bytes %p",
              complete, serverinlen, serverin);
6664 6665 6666

        /* This server call shows complete, and earlier client step was OK */
        if (complete && err == SASL_OK) {
6667
            VIR_FREE(serverin);
6668 6669 6670 6671
            break;
        }
    }

6672 6673 6674 6675
    /* Check for suitable SSF if non-TLS */
    if (!priv->uses_tls) {
        err = sasl_getprop(saslconn, SASL_SSF, &val);
        if (err != SASL_OK) {
6676
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6677
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6678
                             _("cannot query SASL ssf on connection %d (%s)"),
6679
                             err, sasl_errstring(err, NULL, NULL));
6680
            goto cleanup;
6681 6682
        }
        ssf = *(const int *)val;
6683
        DEBUG("SASL SSF value %d", ssf);
6684
        if (ssf < 56) { /* 56 == DES level, good for Kerberos */
6685
            virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6686
                             VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
6687
                             _("negotiation SSF %d was not strong enough"), ssf);
6688
            goto cleanup;
6689
        }
6690
        priv->is_secure = 1;
6691 6692
    }

6693
    DEBUG0("SASL authentication complete");
6694
    priv->saslconn = saslconn;
6695 6696 6697
    ret = 0;

 cleanup:
6698 6699 6700
    VIR_FREE(localAddr);
    VIR_FREE(remoteAddr);
    VIR_FREE(serverin);
6701

6702
    VIR_FREE(saslcb);
6703 6704 6705
    remoteAuthFreeCredentials(cred, ncred);
    if (ret != 0 && saslconn)
        sasl_dispose(&saslconn);
6706

6707
    return ret;
6708 6709 6710
}
#endif /* HAVE_SASL */

6711 6712

#if HAVE_POLKIT
6713
# if HAVE_POLKIT1
6714 6715 6716 6717 6718 6719 6720 6721 6722 6723 6724 6725 6726 6727 6728 6729 6730
static int
remoteAuthPolkit (virConnectPtr conn, struct private_data *priv, int in_open,
                  virConnectAuthPtr auth ATTRIBUTE_UNUSED)
{
    remote_auth_polkit_ret ret;
    DEBUG0("Client initialize PolicyKit-1 authentication");

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, in_open, REMOTE_PROC_AUTH_POLKIT,
              (xdrproc_t) xdr_void, (char *)NULL,
              (xdrproc_t) xdr_remote_auth_polkit_ret, (char *) &ret) != 0) {
        return -1; /* virError already set by call */
    }

    DEBUG0("PolicyKit-1 authentication complete");
    return 0;
}
6731
# elif HAVE_POLKIT0
6732 6733 6734 6735 6736 6737 6738
/* Perform the PolicyKit authentication process
 */
static int
remoteAuthPolkit (virConnectPtr conn, struct private_data *priv, int in_open,
                  virConnectAuthPtr auth)
{
    remote_auth_polkit_ret ret;
6739
    int i, allowcb = 0;
6740 6741 6742 6743 6744 6745 6746 6747
    virConnectCredential cred = {
        VIR_CRED_EXTERNAL,
        conn->flags & VIR_CONNECT_RO ? "org.libvirt.unix.monitor" : "org.libvirt.unix.manage",
        "PolicyKit",
        NULL,
        NULL,
        0,
    };
6748
    DEBUG0("Client initialize PolicyKit-0 authentication");
6749

6750
    if (auth && auth->cb) {
6751
        /* Check if the necessary credential type for PolicyKit is supported */
6752 6753 6754 6755
        for (i = 0 ; i < auth->ncredtype ; i++) {
            if (auth->credtype[i] == VIR_CRED_EXTERNAL)
                allowcb = 1;
        }
6756

6757
        if (allowcb) {
6758
            DEBUG0("Client run callback for PolicyKit authentication");
6759 6760
            /* Run the authentication callback */
            if ((*(auth->cb))(&cred, 1, auth->cbdata) < 0) {
6761
                virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
6762
                                 VIR_ERR_AUTH_FAILED, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
J
Jim Meyering 已提交
6763
                                 "%s", _("Failed to collect auth credentials"));
6764 6765
                return -1;
            }
6766
        } else {
6767
            DEBUG0("Client auth callback does not support PolicyKit");
6768 6769
        }
    } else {
6770
        DEBUG0("No auth callback provided");
6771 6772 6773 6774 6775 6776 6777 6778 6779
    }

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, in_open, REMOTE_PROC_AUTH_POLKIT,
              (xdrproc_t) xdr_void, (char *)NULL,
              (xdrproc_t) xdr_remote_auth_polkit_ret, (char *) &ret) != 0) {
        return -1; /* virError already set by call */
    }

6780
    DEBUG0("PolicyKit-0 authentication complete");
6781 6782
    return 0;
}
6783
# endif /* HAVE_POLKIT0 */
6784
#endif /* HAVE_POLKIT */
6785 6786 6787
/*----------------------------------------------------------------------*/

static int remoteDomainEventRegister (virConnectPtr conn,
6788 6789
                                      virConnectDomainEventCallback callback,
                                      void *opaque,
6790
                                      virFreeCallback freecb)
6791
{
6792
    int rv = -1;
6793 6794
    struct private_data *priv = conn->privateData;

6795 6796
    remoteDriverLock(priv);

6797 6798
    if (priv->eventFlushTimer < 0) {
         error (conn, VIR_ERR_NO_SUPPORT, _("no event support"));
6799
         goto done;
6800
    }
6801
    if (virDomainEventCallbackListAdd(conn, priv->callbackList,
6802
                                      callback, opaque, freecb) < 0) {
6803
         error (conn, VIR_ERR_RPC, _("adding cb to list"));
6804
         goto done;
6805 6806 6807 6808 6809 6810 6811
    }

    if ( priv->callbackList->count == 1 ) {
        /* Tell the server when we are the first callback deregistering */
        if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_EVENTS_REGISTER,
                (xdrproc_t) xdr_void, (char *) NULL,
                (xdrproc_t) xdr_void, (char *) NULL) == -1)
6812
            goto done;
6813 6814
    }

6815 6816 6817
    rv = 0;

done:
6818
    remoteDriverUnlock(priv);
6819
    return rv;
6820 6821 6822
}

static int remoteDomainEventDeregister (virConnectPtr conn,
6823
                                        virConnectDomainEventCallback callback)
6824 6825
{
    struct private_data *priv = conn->privateData;
6826
    int rv = -1;
6827

6828 6829
    remoteDriverLock(priv);

6830 6831 6832 6833
    if (priv->domainEventDispatching) {
        if (virDomainEventCallbackListMarkDelete(conn, priv->callbackList,
                                                 callback) < 0) {
            error (conn, VIR_ERR_RPC, _("marking cb for deletion"));
6834
            goto done;
6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845 6846 6847 6848 6849
        }
    } else {
        if (virDomainEventCallbackListRemove(conn, priv->callbackList,
                                             callback) < 0) {
            error (conn, VIR_ERR_RPC, _("removing cb from list"));
            goto done;
        }

        if ( priv->callbackList->count == 0 ) {
            /* Tell the server when we are the last callback deregistering */
            if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_EVENTS_DEREGISTER,
                      (xdrproc_t) xdr_void, (char *) NULL,
                      (xdrproc_t) xdr_void, (char *) NULL) == -1)
                goto done;
        }
6850 6851
    }

6852 6853 6854
    rv = 0;

done:
6855
    remoteDriverUnlock(priv);
6856
    return rv;
6857
}
6858

J
Jim Meyering 已提交
6859
static virDrvOpenStatus ATTRIBUTE_NONNULL (1)
6860 6861 6862 6863 6864 6865 6866
remoteSecretOpen (virConnectPtr conn,
                  virConnectAuthPtr auth,
                  int flags)
{
    if (inside_daemon)
        return VIR_DRV_OPEN_DECLINED;

J
Jim Meyering 已提交
6867
    if (conn->driver &&
6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938 6939 6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981
        STREQ (conn->driver->name, "remote")) {
        struct private_data *priv;

        /* If we're here, the remote driver is already
         * in use due to a) a QEMU uri, or b) a remote
         * URI. So we can re-use existing connection
         */
        priv = conn->privateData;
        remoteDriverLock(priv);
        priv->localUses++;
        conn->secretPrivateData = priv;
        remoteDriverUnlock(priv);
        return VIR_DRV_OPEN_SUCCESS;
    } else if (conn->networkDriver &&
               STREQ (conn->networkDriver->name, "remote")) {
        struct private_data *priv = conn->networkPrivateData;
        remoteDriverLock(priv);
        conn->secretPrivateData = priv;
        priv->localUses++;
        remoteDriverUnlock(priv);
        return VIR_DRV_OPEN_SUCCESS;
    } else {
        /* Using a non-remote driver, so we need to open a
         * new connection for secret APIs, forcing it to
         * use the UNIX transport.
         */
        struct private_data *priv;
        int ret;
        ret = remoteOpenSecondaryDriver(conn,
                                        auth,
                                        flags,
                                        &priv);
        if (ret == VIR_DRV_OPEN_SUCCESS)
            conn->secretPrivateData = priv;
        return ret;
    }
}

static int
remoteSecretClose (virConnectPtr conn)
{
    int rv = 0;
    struct private_data *priv = conn->secretPrivateData;

    conn->secretPrivateData = NULL;
    remoteDriverLock(priv);
    priv->localUses--;
    if (!priv->localUses) {
        rv = doRemoteClose(conn, priv);
        remoteDriverUnlock(priv);
        virMutexDestroy(&priv->lock);
        VIR_FREE(priv);
    }
    if (priv)
        remoteDriverUnlock(priv);
    return rv;
}

static int
remoteSecretNumOfSecrets (virConnectPtr conn)
{
    int rv = -1;
    remote_num_of_secrets_ret ret;
    struct private_data *priv = conn->secretPrivateData;

    remoteDriverLock (priv);

    memset (&ret, 0, sizeof (ret));
    if (call (conn, priv, 0, REMOTE_PROC_NUM_OF_SECRETS,
              (xdrproc_t) xdr_void, (char *) NULL,
              (xdrproc_t) xdr_remote_num_of_secrets_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.num;

done:
    remoteDriverUnlock (priv);
    return rv;
}

static int
remoteSecretListSecrets (virConnectPtr conn, char **uuids, int maxuuids)
{
    int rv = -1;
    int i;
    remote_list_secrets_args args;
    remote_list_secrets_ret ret;
    struct private_data *priv = conn->secretPrivateData;

    remoteDriverLock(priv);

    if (maxuuids > REMOTE_SECRET_UUID_LIST_MAX) {
        errorf (conn, VIR_ERR_RPC, _("too many remote secret UUIDs: %d > %d"),
                maxuuids, REMOTE_SECRET_UUID_LIST_MAX);
        goto done;
    }
    args.maxuuids = maxuuids;

    memset (&ret, 0, sizeof ret);
    if (call (conn, priv, 0, REMOTE_PROC_LIST_SECRETS,
              (xdrproc_t) xdr_remote_list_secrets_args, (char *) &args,
              (xdrproc_t) xdr_remote_list_secrets_ret, (char *) &ret) == -1)
        goto done;

    if (ret.uuids.uuids_len > maxuuids) {
        errorf (conn, VIR_ERR_RPC, _("too many remote secret UUIDs: %d > %d"),
                ret.uuids.uuids_len, maxuuids);
        goto cleanup;
    }

    /* This call is caller-frees.  However xdr_free will free up both the
     * names and the list of pointers, so we have to strdup the
     * names here.
     */
6982
    for (i = 0; i < ret.uuids.uuids_len; ++i) {
6983 6984
        uuids[i] = strdup (ret.uuids.uuids_val[i]);

6985 6986 6987 6988
        if (uuids[i] == NULL) {
            for (--i; i >= 0; --i)
                VIR_FREE(uuids[i]);

6989
            virReportOOMError();
6990 6991 6992 6993
            goto cleanup;
        }
    }

6994 6995 6996 6997 6998 6999 7000 7001 7002 7003 7004
    rv = ret.uuids.uuids_len;

cleanup:
    xdr_free ((xdrproc_t) xdr_remote_list_secrets_ret, (char *) &ret);

done:
    remoteDriverUnlock(priv);
    return rv;
}

static virSecretPtr
7005
remoteSecretLookupByUUID (virConnectPtr conn, const unsigned char *uuid)
7006 7007
{
    virSecretPtr rv = NULL;
7008 7009
    remote_secret_lookup_by_uuid_args args;
    remote_secret_lookup_by_uuid_ret ret;
7010 7011 7012 7013
    struct private_data *priv = conn->secretPrivateData;

    remoteDriverLock (priv);

7014
    memcpy (args.uuid, uuid, VIR_UUID_BUFLEN);
7015 7016

    memset (&ret, 0, sizeof (ret));
7017 7018 7019
    if (call (conn, priv, 0, REMOTE_PROC_SECRET_LOOKUP_BY_UUID,
              (xdrproc_t) xdr_remote_secret_lookup_by_uuid_args, (char *) &args,
              (xdrproc_t) xdr_remote_secret_lookup_by_uuid_ret, (char *) &ret) == -1)
7020 7021 7022
        goto done;

    rv = get_nonnull_secret (conn, ret.secret);
7023
    xdr_free ((xdrproc_t) xdr_remote_secret_lookup_by_uuid_ret,
7024 7025 7026 7027 7028 7029 7030
              (char *) &ret);

done:
    remoteDriverUnlock (priv);
    return rv;
}

7031 7032 7033 7034 7035 7036 7037 7038 7039 7040 7041 7042 7043 7044 7045 7046 7047 7048 7049 7050 7051 7052 7053 7054 7055 7056 7057 7058
static virSecretPtr
remoteSecretLookupByUsage (virConnectPtr conn, int usageType, const char *usageID)
{
    virSecretPtr rv = NULL;
    remote_secret_lookup_by_usage_args args;
    remote_secret_lookup_by_usage_ret ret;
    struct private_data *priv = conn->secretPrivateData;

    remoteDriverLock (priv);

    args.usageType = usageType;
    args.usageID = (char *)usageID;

    memset (&ret, 0, sizeof (ret));
    if (call (conn, priv, 0, REMOTE_PROC_SECRET_LOOKUP_BY_USAGE,
              (xdrproc_t) xdr_remote_secret_lookup_by_usage_args, (char *) &args,
              (xdrproc_t) xdr_remote_secret_lookup_by_usage_ret, (char *) &ret) == -1)
        goto done;

    rv = get_nonnull_secret (conn, ret.secret);
    xdr_free ((xdrproc_t) xdr_remote_secret_lookup_by_usage_ret,
              (char *) &ret);

done:
    remoteDriverUnlock (priv);
    return rv;
}

7059 7060 7061 7062 7063
static virSecretPtr
remoteSecretDefineXML (virConnectPtr conn, const char *xml, unsigned int flags)
{
    virSecretPtr rv = NULL;
    remote_secret_define_xml_args args;
7064
    remote_secret_define_xml_ret ret;
7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078
    struct private_data *priv = conn->secretPrivateData;

    remoteDriverLock (priv);

    args.xml = (char *) xml;
    args.flags = flags;

    memset (&ret, 0, sizeof (ret));
    if (call (conn, priv, 0, REMOTE_PROC_SECRET_DEFINE_XML,
              (xdrproc_t) xdr_remote_secret_define_xml_args, (char *) &args,
              (xdrproc_t) xdr_remote_secret_define_xml_ret, (char *) &ret) == -1)
        goto done;

    rv = get_nonnull_secret (conn, ret.secret);
7079
    xdr_free ((xdrproc_t) xdr_remote_secret_define_xml_ret,
7080 7081 7082 7083 7084 7085 7086 7087 7088 7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128 7129 7130 7131 7132 7133 7134 7135 7136 7137 7138 7139 7140 7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167 7168 7169 7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191
              (char *) &ret);

done:
    remoteDriverUnlock (priv);
    return rv;
}

static char *
remoteSecretGetXMLDesc (virSecretPtr secret, unsigned int flags)
{
    char *rv = NULL;
    remote_secret_get_xml_desc_args args;
    remote_secret_get_xml_desc_ret ret;
    struct private_data *priv = secret->conn->secretPrivateData;

    remoteDriverLock (priv);

    make_nonnull_secret (&args.secret, secret);
    args.flags = flags;

    memset (&ret, 0, sizeof (ret));
    if (call (secret->conn, priv, 0, REMOTE_PROC_SECRET_GET_XML_DESC,
              (xdrproc_t) xdr_remote_secret_get_xml_desc_args, (char *) &args,
              (xdrproc_t) xdr_remote_secret_get_xml_desc_ret, (char *) &ret) == -1)
        goto done;

    /* Caller frees. */
    rv = ret.xml;

done:
    remoteDriverUnlock (priv);
    return rv;
}

static int
remoteSecretSetValue (virSecretPtr secret, const unsigned char *value,
                      size_t value_size, unsigned int flags)
{
    int rv = -1;
    remote_secret_set_value_args args;
    struct private_data *priv = secret->conn->secretPrivateData;

    remoteDriverLock (priv);

    make_nonnull_secret (&args.secret, secret);
    args.value.value_len = value_size;
    args.value.value_val = (char *) value;
    args.flags = flags;

    if (call (secret->conn, priv, 0, REMOTE_PROC_SECRET_SET_VALUE,
              (xdrproc_t) xdr_remote_secret_set_value_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock (priv);
    return rv;
}

static unsigned char *
remoteSecretGetValue (virSecretPtr secret, size_t *value_size,
                      unsigned int flags)
{
    unsigned char *rv = NULL;
    remote_secret_get_value_args args;
    remote_secret_get_value_ret ret;
    struct private_data *priv = secret->conn->secretPrivateData;

    remoteDriverLock (priv);

    make_nonnull_secret (&args.secret, secret);
    args.flags = flags;

    memset (&ret, 0, sizeof (ret));
    if (call (secret->conn, priv, 0, REMOTE_PROC_SECRET_GET_VALUE,
              (xdrproc_t) xdr_remote_secret_get_value_args, (char *) &args,
              (xdrproc_t) xdr_remote_secret_get_value_ret, (char *) &ret) == -1)
        goto done;

    *value_size = ret.value.value_len;
    rv = (unsigned char *) ret.value.value_val; /* Caller frees. */

done:
    remoteDriverUnlock (priv);
    return rv;
}

static int
remoteSecretUndefine (virSecretPtr secret)
{
    int rv = -1;
    remote_secret_undefine_args args;
    struct private_data *priv = secret->conn->secretPrivateData;

    remoteDriverLock (priv);

    make_nonnull_secret (&args.secret, secret);

    if (call (secret->conn, priv, 0, REMOTE_PROC_SECRET_UNDEFINE,
              (xdrproc_t) xdr_remote_secret_undefine_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock (priv);
    return rv;
}

7192 7193 7194 7195 7196 7197 7198 7199 7200 7201

static struct private_stream_data *
remoteStreamOpen(virStreamPtr st,
                 int output ATTRIBUTE_UNUSED,
                 unsigned int proc_nr,
                 unsigned int serial)
{
    struct private_data *priv = st->conn->privateData;
    struct private_stream_data *stpriv;

7202
    if (VIR_ALLOC(stpriv) < 0) {
7203
        virReportOOMError();
7204
        return NULL;
7205
    }
7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223

    /* Initialize call object used to receive replies */
    stpriv->proc_nr = proc_nr;
    stpriv->serial = serial;

    stpriv->next = priv->streams;
    priv->streams = stpriv;

    return stpriv;
}


static int
remoteStreamPacket(virStreamPtr st,
                   int status,
                   const char *data,
                   size_t nbytes)
{
7224
    DEBUG("st=%p status=%d data=%p nbytes=%zu", st, status, data, nbytes);
7225 7226 7227 7228 7229 7230 7231 7232 7233
    struct private_data *priv = st->conn->privateData;
    struct private_stream_data *privst = st->privateData;
    XDR xdr;
    struct remote_thread_call *thiscall;
    remote_message_header hdr;

    memset(&hdr, 0, sizeof hdr);

    if (VIR_ALLOC(thiscall) < 0) {
7234
        virReportOOMError();
7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282 7283
        return -1;
    }

    thiscall->mode = REMOTE_MODE_WAIT_TX;
    thiscall->serial = privst->serial;
    thiscall->proc_nr = privst->proc_nr;
    if (status == REMOTE_OK ||
        status == REMOTE_ERROR)
        thiscall->want_reply = 1;

    if (virCondInit(&thiscall->cond) < 0) {
        VIR_FREE(thiscall);
        error (st->conn, VIR_ERR_INTERNAL_ERROR,
               _("cannot initialize mutex"));
        return -1;
    }

    /* Don't fill in any other fields in 'thiscall' since
     * we're not expecting a reply for this */

    hdr.prog = REMOTE_PROGRAM;
    hdr.vers = REMOTE_PROTOCOL_VERSION;
    hdr.proc = privst->proc_nr;
    hdr.type = REMOTE_STREAM;
    hdr.serial = privst->serial;
    hdr.status = status;


    /* Length must include the length word itself (always encoded in
     * 4 bytes as per RFC 4506), so offset start length. We write this
     * later.
     */
    thiscall->bufferLength = REMOTE_MESSAGE_HEADER_XDR_LEN;

    /* Serialise header followed by args. */
    xdrmem_create (&xdr, thiscall->buffer + thiscall->bufferLength,
                   REMOTE_MESSAGE_MAX, XDR_ENCODE);
    if (!xdr_remote_message_header (&xdr, &hdr)) {
        error (st->conn,
               VIR_ERR_RPC, _("xdr_remote_message_header failed"));
        goto error;
    }

    thiscall->bufferLength += xdr_getpos (&xdr);
    xdr_destroy (&xdr);

    if (status == REMOTE_CONTINUE) {
        if (((4 + REMOTE_MESSAGE_MAX) - thiscall->bufferLength) < nbytes) {
            errorf(st->conn,
7284
                   VIR_ERR_RPC, _("data size %zu too large for payload %d"),
7285 7286 7287 7288 7289 7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305 7306 7307 7308 7309 7310 7311 7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334 7335 7336 7337 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367 7368 7369
                   nbytes, ((4 + REMOTE_MESSAGE_MAX) - thiscall->bufferLength));
            goto error;
        }

        memcpy(thiscall->buffer + thiscall->bufferLength, data, nbytes);
        thiscall->bufferLength += nbytes;
    }

    /* Go back to packet start and encode the length word. */
    xdrmem_create (&xdr, thiscall->buffer, REMOTE_MESSAGE_HEADER_XDR_LEN, XDR_ENCODE);
    if (!xdr_u_int (&xdr, &thiscall->bufferLength)) {
        error(st->conn, VIR_ERR_RPC,
               _("xdr_u_int (length word)"));
        goto error;
    }
    xdr_destroy (&xdr);

    /* remoteIO frees 'thiscall' for us (XXX that's dubious semantics) */
    if (remoteIO(st->conn, priv, 0, thiscall) < 0)
        return -1;

    return nbytes;

error:
    xdr_destroy (&xdr);
    VIR_FREE(thiscall);
    return -1;
}

static int
remoteStreamHasError(virStreamPtr st) {
    struct private_stream_data *privst = st->privateData;
    if (!privst->has_error) {
        return 0;
    }

    VIR_WARN0("Raising async error");
    virRaiseErrorFull(st->conn,
                      __FILE__, __FUNCTION__, __LINE__,
                      privst->err.domain,
                      privst->err.code,
                      privst->err.level,
                      privst->err.str1 ? *privst->err.str1 : NULL,
                      privst->err.str2 ? *privst->err.str2 : NULL,
                      privst->err.str3 ? *privst->err.str3 : NULL,
                      privst->err.int1,
                      privst->err.int2,
                      "%s", privst->err.message ? *privst->err.message : NULL);

    return 1;
}

static void
remoteStreamRelease(virStreamPtr st)
{
    struct private_data *priv = st->conn->privateData;
    struct private_stream_data *privst = st->privateData;

    if (priv->streams == privst)
        priv->streams = privst->next;
    else {
        struct private_stream_data *tmp = priv->streams;
        while (tmp && tmp->next) {
            if (tmp->next == privst) {
                tmp->next = privst->next;
                break;
            }
        }
    }

    if (privst->has_error)
        xdr_free((xdrproc_t)xdr_remote_error,  (char *)&privst->err);

    VIR_FREE(privst);

    st->driver = NULL;
    st->privateData = NULL;
}


static int
remoteStreamSend(virStreamPtr st,
                 const char *data,
                 size_t nbytes)
{
7370
    DEBUG("st=%p data=%p nbytes=%zu", st, data, nbytes);
7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386 7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397 7398
    struct private_data *priv = st->conn->privateData;
    int rv = -1;

    remoteDriverLock(priv);

    if (remoteStreamHasError(st))
        goto cleanup;

    rv = remoteStreamPacket(st,
                            REMOTE_CONTINUE,
                            data,
                            nbytes);

cleanup:
    if (rv == -1)
        remoteStreamRelease(st);

    remoteDriverUnlock(priv);

    return rv;
}


static int
remoteStreamRecv(virStreamPtr st,
                 char *data,
                 size_t nbytes)
{
7399
    DEBUG("st=%p data=%p nbytes=%zu", st, data, nbytes);
7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412
    struct private_data *priv = st->conn->privateData;
    struct private_stream_data *privst = st->privateData;
    int rv = -1;

    remoteDriverLock(priv);

    if (remoteStreamHasError(st))
        goto cleanup;

    if (!privst->incomingOffset) {
        struct remote_thread_call *thiscall;

        if (VIR_ALLOC(thiscall) < 0) {
7413
            virReportOOMError();
7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 7426 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471 7472 7473 7474 7475 7476 7477 7478 7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490 7491 7492 7493 7494 7495 7496 7497 7498 7499 7500 7501 7502 7503 7504 7505 7506 7507 7508 7509 7510 7511 7512 7513 7514 7515 7516 7517 7518 7519 7520 7521 7522 7523 7524 7525 7526 7527 7528 7529 7530 7531 7532 7533 7534 7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546
            goto cleanup;
        }

        /* We're not really doing an RPC calls, so we're
         * skipping straight to RX part */
        thiscall->mode = REMOTE_MODE_WAIT_RX;
        thiscall->serial = privst->serial;
        thiscall->proc_nr = privst->proc_nr;
        thiscall->want_reply = 1;

        if (virCondInit(&thiscall->cond) < 0) {
            VIR_FREE(thiscall);
            error (st->conn, VIR_ERR_INTERNAL_ERROR,
                   _("cannot initialize mutex"));
            goto cleanup;
        }

        /* remoteIO frees 'thiscall' for us (XXX that's dubious semantics) */
        if (remoteIO(st->conn, priv, 0, thiscall) < 0)
            goto cleanup;
    }

    DEBUG("After IO %d", privst->incomingOffset);
    if (privst->incomingOffset) {
        int want = privst->incomingOffset;
        if (want > nbytes)
            want = nbytes;
        memcpy(data, privst->incoming, want);
        if (want < privst->incomingOffset) {
            memmove(privst->incoming, privst->incoming + want, privst->incomingOffset - want);
            privst->incomingOffset -= want;
        } else {
            VIR_FREE(privst->incoming);
            privst->incomingOffset = privst->incomingLength = 0;
        }
        rv = want;
    } else {
        rv = 0;
    }

    DEBUG("Done %d", rv);

cleanup:
    if (rv == -1)
        remoteStreamRelease(st);
    remoteDriverUnlock(priv);

    return rv;
}

static int
remoteStreamEventAddCallback(virStreamPtr stream ATTRIBUTE_UNUSED,
                             int events ATTRIBUTE_UNUSED,
                             virStreamEventCallback cb ATTRIBUTE_UNUSED,
                             void *opaque ATTRIBUTE_UNUSED,
                             virFreeCallback ff ATTRIBUTE_UNUSED)
{
    return -1;
}

static int
remoteStreamEventUpdateCallback(virStreamPtr stream ATTRIBUTE_UNUSED,
                                int events ATTRIBUTE_UNUSED)
{
    return -1;
}


static int
remoteStreamEventRemoveCallback(virStreamPtr stream ATTRIBUTE_UNUSED)
{
    return -1;
}

static int
remoteStreamFinish(virStreamPtr st)
{
    struct private_data *priv = st->conn->privateData;
    int ret = -1;

    remoteDriverLock(priv);

    if (remoteStreamHasError(st))
        goto cleanup;

    ret = remoteStreamPacket(st,
                             REMOTE_OK,
                             NULL,
                             0);

cleanup:
    remoteStreamRelease(st);

    remoteDriverUnlock(priv);
    return ret;
}

static int
remoteStreamAbort(virStreamPtr st)
{
    struct private_data *priv = st->conn->privateData;
    int ret = -1;

    remoteDriverLock(priv);

    if (remoteStreamHasError(st))
        goto cleanup;

    ret = remoteStreamPacket(st,
                             REMOTE_ERROR,
                             NULL,
                             0);

cleanup:
    remoteStreamRelease(st);

    remoteDriverUnlock(priv);
    return ret;
}



static virStreamDriver remoteStreamDrv = {
    .streamRecv = remoteStreamRecv,
    .streamSend = remoteStreamSend,
    .streamFinish = remoteStreamFinish,
    .streamAbort = remoteStreamAbort,
    .streamAddCallback = remoteStreamEventAddCallback,
    .streamUpdateCallback = remoteStreamEventUpdateCallback,
    .streamRemoveCallback = remoteStreamEventRemoveCallback,
};


C
Chris Lalancette 已提交
7547 7548 7549 7550 7551 7552 7553 7554 7555 7556 7557 7558 7559 7560 7561 7562 7563 7564 7565 7566 7567 7568 7569 7570 7571 7572 7573 7574 7575 7576 7577 7578 7579 7580 7581 7582 7583 7584 7585 7586 7587
static int
remoteDomainMigratePrepareTunnel(virConnectPtr conn,
                                 virStreamPtr st,
                                 unsigned long flags,
                                 const char *dname,
                                 unsigned long resource,
                                 const char *dom_xml)
{
    struct private_data *priv = conn->privateData;
    struct private_stream_data *privst = NULL;
    int rv = -1;
    remote_domain_migrate_prepare_tunnel_args args;

    remoteDriverLock(priv);

    if (!(privst = remoteStreamOpen(st, 1, REMOTE_PROC_DOMAIN_MIGRATE_PREPARE_TUNNEL, priv->counter)))
        goto done;

    st->driver = &remoteStreamDrv;
    st->privateData = privst;

    args.flags = flags;
    args.dname = dname == NULL ? NULL : (char **) &dname;
    args.resource = resource;
    args.dom_xml = (char *) dom_xml;

    if (call(conn, priv, 0, REMOTE_PROC_DOMAIN_MIGRATE_PREPARE_TUNNEL,
             (xdrproc_t) xdr_remote_domain_migrate_prepare_tunnel_args, (char *) &args,
             (xdrproc_t) xdr_void, NULL) == -1) {
        remoteStreamRelease(st);
        goto done;
    }

    rv = 0;

done:
    remoteDriverUnlock(priv);

    return rv;
}

J
Jiri Denemark 已提交
7588 7589 7590 7591 7592 7593 7594 7595 7596 7597 7598 7599 7600 7601 7602 7603 7604 7605 7606 7607 7608 7609 7610 7611 7612 7613 7614

static int
remoteCPUCompare(virConnectPtr conn, const char *xmlDesc,
                 unsigned int flags ATTRIBUTE_UNUSED)
{
    struct private_data *priv = conn->privateData;
    remote_cpu_compare_args args;
    remote_cpu_compare_ret ret;
    int rv = VIR_CPU_COMPARE_ERROR;

    remoteDriverLock(priv);

    args.xml = (char *) xmlDesc;

    memset(&ret, 0, sizeof (ret));
    if (call(conn, priv, 0, REMOTE_PROC_CPU_COMPARE,
             (xdrproc_t) xdr_remote_cpu_compare_args, (char *) &args,
             (xdrproc_t) xdr_remote_cpu_compare_ret, (char *) &ret) == -1)
        goto done;

    rv = ret.result;

done:
    remoteDriverUnlock(priv);
    return rv;
}

7615 7616 7617 7618 7619 7620 7621 7622 7623 7624 7625 7626 7627 7628 7629 7630 7631 7632 7633 7634 7635 7636 7637 7638 7639 7640 7641 7642 7643 7644 7645

static char *
remoteCPUBaseline(virConnectPtr conn,
                  const char **xmlCPUs,
                  unsigned int ncpus,
                  unsigned int flags)
{
    struct private_data *priv = conn->privateData;
    remote_cpu_baseline_args args;
    remote_cpu_baseline_ret ret;
    char *cpu = NULL;

    remoteDriverLock(priv);

    args.xmlCPUs.xmlCPUs_len = ncpus;
    args.xmlCPUs.xmlCPUs_val = (char **) xmlCPUs;
    args.flags = flags;

    memset(&ret, 0, sizeof (ret));
    if (call(conn, priv, 0, REMOTE_PROC_CPU_BASELINE,
             (xdrproc_t) xdr_remote_cpu_baseline_args, (char *) &args,
             (xdrproc_t) xdr_remote_cpu_baseline_ret, (char *) &ret) == -1)
        goto done;

    cpu = ret.cpu;

done:
    remoteDriverUnlock(priv);
    return cpu;
}

7646 7647 7648 7649 7650 7651 7652 7653 7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664 7665 7666 7667 7668 7669 7670 7671 7672 7673 7674 7675 7676 7677 7678 7679 7680 7681 7682 7683 7684 7685

static int
remoteDomainGetJobInfo (virDomainPtr domain, virDomainJobInfoPtr info)
{
    int rv = -1;
    remote_domain_get_job_info_args args;
    remote_domain_get_job_info_ret ret;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);

    memset (&ret, 0, sizeof ret);
    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_GET_JOB_INFO,
              (xdrproc_t) xdr_remote_domain_get_job_info_args, (char *) &args,
              (xdrproc_t) xdr_remote_domain_get_job_info_ret, (char *) &ret) == -1)
        goto done;

    info->type = ret.type;
    info->timeElapsed = ret.timeElapsed;
    info->timeRemaining = ret.timeRemaining;
    info->dataTotal = ret.dataTotal;
    info->dataProcessed = ret.dataProcessed;
    info->dataRemaining = ret.dataRemaining;
    info->memTotal = ret.memTotal;
    info->memProcessed = ret.memProcessed;
    info->memRemaining = ret.memRemaining;
    info->fileTotal = ret.fileTotal;
    info->fileProcessed = ret.fileProcessed;
    info->fileRemaining = ret.fileRemaining;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}


7686 7687 7688 7689 7690 7691 7692 7693 7694 7695 7696 7697 7698 7699 7700 7701 7702 7703 7704 7705 7706 7707 7708 7709
static int
remoteDomainAbortJob (virDomainPtr domain)
{
    int rv = -1;
    remote_domain_abort_job_args args;
    struct private_data *priv = domain->conn->privateData;

    remoteDriverLock(priv);

    make_nonnull_domain (&args.dom, domain);

    if (call (domain->conn, priv, 0, REMOTE_PROC_DOMAIN_ABORT_JOB,
              (xdrproc_t) xdr_remote_domain_abort_job_args, (char *) &args,
              (xdrproc_t) xdr_void, (char *) NULL) == -1)
        goto done;

    rv = 0;

done:
    remoteDriverUnlock(priv);
    return rv;
}


7710 7711
/*----------------------------------------------------------------------*/

7712

7713 7714 7715 7716 7717 7718 7719 7720
static struct remote_thread_call *
prepareCall(virConnectPtr conn,
            struct private_data *priv,
            int flags,
            int proc_nr,
            xdrproc_t args_filter, char *args,
            xdrproc_t ret_filter, char *ret)
{
7721
    XDR xdr;
7722 7723 7724
    struct remote_message_header hdr;
    struct remote_thread_call *rv;

7725
    if (VIR_ALLOC(rv) < 0) {
7726
        virReportOOMError();
7727
        return NULL;
7728
    }
7729 7730 7731 7732 7733 7734 7735 7736

    if (virCondInit(&rv->cond) < 0) {
        VIR_FREE(rv);
        error (flags & REMOTE_CALL_IN_OPEN ? NULL : conn,
               VIR_ERR_INTERNAL_ERROR,
               _("cannot initialize mutex"));
        return NULL;
    }
7737 7738

    /* Get a unique serial number for this message. */
7739 7740 7741 7742
    rv->serial = priv->counter++;
    rv->proc_nr = proc_nr;
    rv->ret_filter = ret_filter;
    rv->ret = ret;
7743
    rv->want_reply = 1;
7744 7745 7746 7747

    hdr.prog = REMOTE_PROGRAM;
    hdr.vers = REMOTE_PROTOCOL_VERSION;
    hdr.proc = proc_nr;
7748
    hdr.type = REMOTE_CALL;
7749
    hdr.serial = rv->serial;
7750 7751 7752
    hdr.status = REMOTE_OK;

    /* Serialise header followed by args. */
7753
    xdrmem_create (&xdr, rv->buffer+4, REMOTE_MESSAGE_MAX, XDR_ENCODE);
7754
    if (!xdr_remote_message_header (&xdr, &hdr)) {
7755
        error (flags & REMOTE_CALL_IN_OPEN ? NULL : conn,
7756
               VIR_ERR_RPC, _("xdr_remote_message_header failed"));
7757
        goto error;
7758 7759 7760
    }

    if (!(*args_filter) (&xdr, args)) {
7761 7762
        error (flags & REMOTE_CALL_IN_OPEN ? NULL : conn, VIR_ERR_RPC,
               _("marshalling args"));
7763
        goto error;
7764 7765 7766
    }

    /* Get the length stored in buffer. */
7767
    rv->bufferLength = xdr_getpos (&xdr);
7768 7769 7770 7771 7772
    xdr_destroy (&xdr);

    /* Length must include the length word itself (always encoded in
     * 4 bytes as per RFC 4506).
     */
7773
    rv->bufferLength += REMOTE_MESSAGE_HEADER_XDR_LEN;
7774 7775

    /* Encode the length word. */
7776 7777
    xdrmem_create (&xdr, rv->buffer, REMOTE_MESSAGE_HEADER_XDR_LEN, XDR_ENCODE);
    if (!xdr_u_int (&xdr, &rv->bufferLength)) {
7778
        error (flags & REMOTE_CALL_IN_OPEN ? NULL : conn, VIR_ERR_RPC,
7779
               _("xdr_u_int (length word)"));
7780
        goto error;
7781 7782 7783
    }
    xdr_destroy (&xdr);

7784 7785 7786 7787 7788 7789 7790 7791 7792 7793 7794
    return rv;

error:
    xdr_destroy (&xdr);
    VIR_FREE(rv);
    return NULL;
}



static int
7795 7796 7797 7798
remoteIOWriteBuffer(virConnectPtr conn,
                    struct private_data *priv,
                    int in_open /* if we are in virConnectOpen */,
                    const char *bytes, int len)
7799 7800 7801 7802 7803 7804 7805 7806 7807 7808 7809 7810 7811 7812 7813 7814 7815 7816 7817 7818 7819 7820 7821 7822 7823
{
    int ret;

    if (priv->uses_tls) {
    tls_resend:
        ret = gnutls_record_send (priv->session, bytes, len);
        if (ret < 0) {
            if (ret == GNUTLS_E_INTERRUPTED)
                goto tls_resend;
            if (ret == GNUTLS_E_AGAIN)
                return 0;

            error (in_open ? NULL : conn,
                   VIR_ERR_GNUTLS_ERROR, gnutls_strerror (ret));
            return -1;
        }
    } else {
    resend:
        ret = send (priv->sock, bytes, len, 0);
        if (ret == -1) {
            if (errno == EINTR)
                goto resend;
            if (errno == EWOULDBLOCK)
                return 0;

7824
            virReportSystemError(errno,
7825
                                 "%s", _("cannot send data"));
7826 7827 7828 7829 7830 7831 7832 7833 7834 7835
            return -1;

        }
    }

    return ret;
}


static int
7836 7837 7838 7839
remoteIOReadBuffer(virConnectPtr conn,
                   struct private_data *priv,
                   int in_open /* if we are in virConnectOpen */,
                   char *bytes, int len)
7840 7841 7842 7843 7844 7845 7846 7847 7848 7849 7850 7851 7852 7853 7854 7855 7856 7857 7858 7859 7860 7861 7862 7863 7864 7865 7866 7867 7868 7869 7870 7871 7872 7873
{
    int ret;

    if (priv->uses_tls) {
    tls_resend:
        ret = gnutls_record_recv (priv->session, bytes, len);
        if (ret == GNUTLS_E_INTERRUPTED)
            goto tls_resend;
        if (ret == GNUTLS_E_AGAIN)
            return 0;

        /* Treat 0 == EOF as an error */
        if (ret <= 0) {
            if (ret < 0)
                errorf (in_open ? NULL : conn,
                        VIR_ERR_GNUTLS_ERROR,
                        _("failed to read from TLS socket %s"),
                        gnutls_strerror (ret));
            else
                errorf (in_open ? NULL : conn,
                        VIR_ERR_SYSTEM_ERROR,
                        "%s", _("server closed connection"));
            return -1;
        }
    } else {
    resend:
        ret = recv (priv->sock, bytes, len, 0);
        if (ret <= 0) {
            if (ret == -1) {
                if (errno == EINTR)
                    goto resend;
                if (errno == EWOULDBLOCK)
                    return 0;

7874 7875 7876 7877 7878
                char errout[1024] = "\0";
                if (priv->errfd != -1) {
                    saferead(priv->errfd, errout, sizeof(errout));
                }

7879
                virReportSystemError(errno,
7880 7881
                                     _("cannot recv data: %s"), errout);

7882
            } else {
7883 7884 7885 7886 7887
                char errout[1024] = "\0";
                if (priv->errfd != -1) {
                    saferead(priv->errfd, errout, sizeof(errout));
                }

7888 7889
                errorf (in_open ? NULL : conn,
                        VIR_ERR_SYSTEM_ERROR,
7890
                        _("server closed connection: %s"), errout);
7891 7892 7893 7894 7895 7896 7897 7898 7899 7900
            }
            return -1;
        }
    }

    return ret;
}


static int
7901 7902 7903 7904
remoteIOWriteMessage(virConnectPtr conn,
                     struct private_data *priv,
                     int in_open,
                     struct remote_thread_call *thecall)
7905 7906 7907 7908 7909 7910 7911 7912 7913 7914 7915 7916 7917 7918 7919 7920 7921 7922 7923 7924 7925 7926 7927 7928 7929
{
#if HAVE_SASL
    if (priv->saslconn) {
        const char *output;
        unsigned int outputlen;
        int err, ret;

        if (!priv->saslEncoded) {
            err = sasl_encode(priv->saslconn,
                              thecall->buffer + thecall->bufferOffset,
                              thecall->bufferLength - thecall->bufferOffset,
                              &output, &outputlen);
            if (err != SASL_OK) {
                errorf (in_open ? NULL : conn, VIR_ERR_INTERNAL_ERROR,
                        _("failed to encode SASL data: %s"),
                        sasl_errstring(err, NULL, NULL));
                return -1;
            }
            priv->saslEncoded = output;
            priv->saslEncodedLength = outputlen;
            priv->saslEncodedOffset = 0;

            thecall->bufferOffset = thecall->bufferLength;
        }

7930 7931 7932
        ret = remoteIOWriteBuffer(conn, priv, in_open,
                                  priv->saslEncoded + priv->saslEncodedOffset,
                                  priv->saslEncodedLength - priv->saslEncodedOffset);
7933 7934 7935 7936 7937 7938 7939
        if (ret < 0)
            return ret;
        priv->saslEncodedOffset += ret;

        if (priv->saslEncodedOffset == priv->saslEncodedLength) {
            priv->saslEncoded = NULL;
            priv->saslEncodedOffset = priv->saslEncodedLength = 0;
7940 7941 7942 7943
            if (thecall->want_reply)
                thecall->mode = REMOTE_MODE_WAIT_RX;
            else
                thecall->mode = REMOTE_MODE_COMPLETE;
7944 7945 7946 7947
        }
    } else {
#endif
        int ret;
7948 7949 7950
        ret = remoteIOWriteBuffer(conn, priv, in_open,
                                  thecall->buffer + thecall->bufferOffset,
                                  thecall->bufferLength - thecall->bufferOffset);
7951 7952 7953 7954 7955 7956
        if (ret < 0)
            return ret;
        thecall->bufferOffset += ret;

        if (thecall->bufferOffset == thecall->bufferLength) {
            thecall->bufferOffset = thecall->bufferLength = 0;
7957 7958 7959 7960
            if (thecall->want_reply)
                thecall->mode = REMOTE_MODE_WAIT_RX;
            else
                thecall->mode = REMOTE_MODE_COMPLETE;
7961 7962 7963 7964 7965 7966 7967 7968 7969
        }
#if HAVE_SASL
    }
#endif
    return 0;
}


static int
7970 7971
remoteIOHandleOutput(virConnectPtr conn, struct private_data *priv,
                     int in_open) {
7972 7973 7974 7975 7976 7977 7978 7979 7980 7981
    struct remote_thread_call *thecall = priv->waitDispatch;

    while (thecall &&
           thecall->mode != REMOTE_MODE_WAIT_TX)
        thecall = thecall->next;

    if (!thecall)
        return -1; /* Shouldn't happen, but you never know... */

    while (thecall) {
7982
        int ret = remoteIOWriteMessage(conn, priv, in_open, thecall);
7983 7984 7985 7986 7987 7988 7989 7990 7991 7992 7993 7994 7995
        if (ret < 0)
            return ret;

        if (thecall->mode == REMOTE_MODE_WAIT_TX)
            return 0; /* Blocking write, to back to event loop */

        thecall = thecall->next;
    }

    return 0; /* No more calls to send, all done */
}

static int
7996
remoteIOReadMessage(virConnectPtr conn, struct private_data *priv,
7997 7998 7999 8000 8001 8002 8003 8004 8005 8006 8007 8008 8009 8010
                    int in_open) {
    unsigned int wantData;

    /* Start by reading length word */
    if (priv->bufferLength == 0)
        priv->bufferLength = 4;

    wantData = priv->bufferLength - priv->bufferOffset;

#if HAVE_SASL
    if (priv->saslconn) {
        if (priv->saslDecoded == NULL) {
            char encoded[8192];
            int ret, err;
8011
            ret = remoteIOReadBuffer(conn, priv, in_open,
8012
                                     encoded, sizeof(encoded));
8013 8014 8015 8016 8017 8018 8019 8020 8021 8022 8023 8024 8025 8026 8027 8028 8029 8030 8031 8032 8033 8034 8035 8036 8037
            if (ret < 0)
                return -1;
            if (ret == 0)
                return 0;

            err = sasl_decode(priv->saslconn, encoded, ret,
                              &priv->saslDecoded, &priv->saslDecodedLength);
            if (err != SASL_OK) {
                errorf (in_open ? NULL : conn, VIR_ERR_INTERNAL_ERROR,
                        _("failed to decode SASL data: %s"),
                        sasl_errstring(err, NULL, NULL));
                return -1;
            }
            priv->saslDecodedOffset = 0;
        }

        if ((priv->saslDecodedLength - priv->saslDecodedOffset) < wantData)
            wantData = (priv->saslDecodedLength - priv->saslDecodedOffset);

        memcpy(priv->buffer + priv->bufferOffset,
               priv->saslDecoded + priv->saslDecodedOffset,
               wantData);
        priv->saslDecodedOffset += wantData;
        priv->bufferOffset += wantData;
        if (priv->saslDecodedOffset == priv->saslDecodedLength) {
8038
            priv->saslDecodedOffset = priv->saslDecodedLength = 0;
8039 8040 8041 8042 8043 8044 8045 8046
            priv->saslDecoded = NULL;
        }

        return wantData;
    } else {
#endif
        int ret;

8047 8048 8049
        ret = remoteIOReadBuffer(conn, priv, in_open,
                                 priv->buffer + priv->bufferOffset,
                                 wantData);
8050 8051 8052 8053 8054 8055 8056 8057 8058 8059 8060 8061
        if (ret < 0)
            return -1;
        if (ret == 0)
            return 0;

        priv->bufferOffset += ret;

        return ret;
#if HAVE_SASL
    }
#endif
}
8062 8063


8064
static int
8065 8066
remoteIODecodeMessageLength(virConnectPtr conn, struct private_data *priv,
                            int in_open) {
8067
    XDR xdr;
8068
    unsigned int len;
8069 8070

    xdrmem_create (&xdr, priv->buffer, priv->bufferLength, XDR_DECODE);
8071
    if (!xdr_u_int (&xdr, &len)) {
8072
        error (in_open ? NULL : conn,
8073
               VIR_ERR_RPC, _("xdr_u_int (length word, reply)"));
8074 8075 8076 8077
        return -1;
    }
    xdr_destroy (&xdr);

8078 8079 8080 8081 8082 8083
    if (len < REMOTE_MESSAGE_HEADER_XDR_LEN) {
        error (in_open ? NULL : conn,
               VIR_ERR_RPC, _("packet received from server too small"));
        return -1;
    }

8084
    /* Length includes length word - adjust to real length to read. */
8085
    len -= REMOTE_MESSAGE_HEADER_XDR_LEN;
8086

8087
    if (len > REMOTE_MESSAGE_MAX) {
8088
        error (in_open ? NULL : conn,
8089
               VIR_ERR_RPC, _("packet received from server too large"));
8090 8091 8092
        return -1;
    }

8093 8094 8095 8096 8097 8098 8099 8100 8101
    /* Extend our declared buffer length and carry
       on reading the header + payload */
    priv->bufferLength += len;
    DEBUG("Got length, now need %d total (%d more)", priv->bufferLength, len);
    return 0;
}


static int
8102 8103 8104 8105 8106 8107 8108 8109 8110 8111 8112
processCallDispatchReply(virConnectPtr conn, struct private_data *priv,
                         int in_open,
                         remote_message_header *hdr,
                         XDR *xdr);

static int
processCallDispatchMessage(virConnectPtr conn, struct private_data *priv,
                           int in_open,
                           remote_message_header *hdr,
                           XDR *xdr);

8113 8114 8115 8116 8117 8118
static int
processCallDispatchStream(virConnectPtr conn, struct private_data *priv,
                          int in_open,
                          remote_message_header *hdr,
                          XDR *xdr);

8119 8120 8121 8122

static int
processCallDispatch(virConnectPtr conn, struct private_data *priv,
                    int in_open) {
8123 8124 8125
    XDR xdr;
    struct remote_message_header hdr;
    int len = priv->bufferLength - 4;
8126
    int rv = -1;
8127

8128 8129 8130
    /* Length word has already been read */
    priv->bufferOffset = 4;

8131
    /* Deserialise reply header. */
8132
    xdrmem_create (&xdr, priv->buffer + priv->bufferOffset, len, XDR_DECODE);
8133
    if (!xdr_remote_message_header (&xdr, &hdr)) {
8134
        error (in_open ? NULL : conn,
8135
               VIR_ERR_RPC, _("invalid header in reply"));
8136 8137 8138
        return -1;
    }

8139 8140
    priv->bufferOffset += xdr_getpos(&xdr);

8141 8142
    /* Check program, version, etc. are what we expect. */
    if (hdr.prog != REMOTE_PROGRAM) {
8143 8144 8145 8146 8147
        virRaiseError (in_open ? NULL : conn,
                       NULL, NULL, VIR_FROM_REMOTE,
                       VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                       _("unknown program (received %x, expected %x)"),
                       hdr.prog, REMOTE_PROGRAM);
8148 8149 8150
        return -1;
    }
    if (hdr.vers != REMOTE_PROTOCOL_VERSION) {
8151 8152 8153 8154 8155
        virRaiseError (in_open ? NULL : conn,
                       NULL, NULL, VIR_FROM_REMOTE,
                       VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                       _("unknown protocol version (received %x, expected %x)"),
                       hdr.vers, REMOTE_PROTOCOL_VERSION);
8156 8157 8158
        return -1;
    }

8159

8160 8161 8162 8163 8164
    switch (hdr.type) {
    case REMOTE_REPLY: /* Normal RPC replies */
        rv = processCallDispatchReply(conn, priv, in_open,
                                      &hdr, &xdr);
        break;
8165

8166 8167 8168 8169 8170
    case REMOTE_MESSAGE: /* Async notifications */
        rv = processCallDispatchMessage(conn, priv, in_open,
                                        &hdr, &xdr);
        break;

8171 8172 8173 8174 8175
    case REMOTE_STREAM: /* Stream protocol */
        rv = processCallDispatchStream(conn, priv, in_open,
                                       &hdr, &xdr);
        break;

8176 8177 8178 8179 8180 8181 8182 8183
    default:
         virRaiseError (in_open ? NULL : conn,
                        NULL, NULL, VIR_FROM_REMOTE,
                        VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                        _("got unexpected RPC call %d from server"),
                        hdr.proc);
        rv = -1;
        break;
8184
    }
8185

8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196 8197
    xdr_destroy(&xdr);
    return rv;
}


static int
processCallDispatchReply(virConnectPtr conn, struct private_data *priv,
                         int in_open,
                         remote_message_header *hdr,
                         XDR *xdr) {
    struct remote_thread_call *thecall;

8198 8199 8200 8201
    /* Ok, definitely got an RPC reply now find
       out who's been waiting for it */
    thecall = priv->waitDispatch;
    while (thecall &&
8202
           thecall->serial != hdr->serial)
8203 8204 8205 8206 8207 8208 8209
        thecall = thecall->next;

    if (!thecall) {
        virRaiseError (in_open ? NULL : conn,
                       NULL, NULL, VIR_FROM_REMOTE,
                       VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                       _("no call waiting for reply with serial %d"),
8210
                       hdr->serial);
8211 8212
        return -1;
    }
8213

8214
    if (hdr->proc != thecall->proc_nr) {
8215 8216 8217 8218
        virRaiseError (in_open ? NULL : conn,
                       NULL, NULL, VIR_FROM_REMOTE,
                       VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                       _("unknown procedure (received %x, expected %x)"),
8219
                       hdr->proc, thecall->proc_nr);
8220 8221 8222 8223 8224 8225 8226
        return -1;
    }

    /* Status is either REMOTE_OK (meaning that what follows is a ret
     * structure), or REMOTE_ERROR (and what follows is a remote_error
     * structure).
     */
8227
    switch (hdr->status) {
8228
    case REMOTE_OK:
8229
        if (!(*thecall->ret_filter) (xdr, thecall->ret)) {
8230
            error (in_open ? NULL : conn, VIR_ERR_RPC,
8231
                   _("unmarshalling ret"));
8232 8233
            return -1;
        }
8234
        thecall->mode = REMOTE_MODE_COMPLETE;
8235 8236 8237
        return 0;

    case REMOTE_ERROR:
8238
        memset (&thecall->err, 0, sizeof thecall->err);
8239
        if (!xdr_remote_error (xdr, &thecall->err)) {
8240
            error (in_open ? NULL : conn,
8241
                   VIR_ERR_RPC, _("unmarshalling remote_error"));
8242 8243
            return -1;
        }
8244 8245
        thecall->mode = REMOTE_MODE_ERROR;
        return 0;
8246 8247

    default:
8248 8249 8250
        virRaiseError (in_open ? NULL : conn, NULL, NULL, VIR_FROM_REMOTE,
                       VIR_ERR_RPC, VIR_ERR_ERROR, NULL, NULL, NULL, 0, 0,
                       _("unknown status (received %x)"),
8251
                       hdr->status);
8252 8253 8254 8255
        return -1;
    }
}

8256 8257 8258 8259 8260 8261 8262 8263 8264 8265 8266 8267 8268 8269 8270 8271 8272 8273 8274 8275 8276 8277 8278 8279 8280
static int
processCallDispatchMessage(virConnectPtr conn, struct private_data *priv,
                           int in_open,
                           remote_message_header *hdr,
                           XDR *xdr) {
    /* An async message has come in while we were waiting for the
     * response. Process it to pull it off the wire, and try again
     */
    DEBUG0("Encountered an event while waiting for a response");

    if (in_open) {
        DEBUG("Ignoring bogus event %d received while in open", hdr->proc);
        return -1;
    }

    if (hdr->proc == REMOTE_PROC_DOMAIN_EVENT) {
        remoteDomainQueueEvent(conn, xdr);
        virEventUpdateTimeout(priv->eventFlushTimer, 0);
    } else {
        return -1;
        DEBUG("Unexpected event proc %d", hdr->proc);
    }
    return 0;
}

8281 8282 8283 8284 8285 8286 8287 8288 8289 8290 8291 8292 8293 8294 8295 8296 8297 8298 8299 8300 8301 8302 8303 8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314 8315 8316 8317 8318 8319 8320 8321 8322 8323 8324 8325 8326 8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343 8344 8345 8346 8347 8348 8349 8350 8351 8352 8353 8354 8355 8356 8357 8358 8359 8360 8361 8362 8363 8364 8365 8366 8367 8368 8369 8370 8371 8372 8373 8374 8375 8376 8377 8378 8379 8380 8381 8382 8383 8384 8385 8386 8387
static int
processCallDispatchStream(virConnectPtr conn ATTRIBUTE_UNUSED,
                          struct private_data *priv,
                          int in_open ATTRIBUTE_UNUSED,
                          remote_message_header *hdr,
                          XDR *xdr) {
    struct private_stream_data *privst;
    struct remote_thread_call *thecall;

    /* Try and find a matching stream */
    privst = priv->streams;
    while (privst &&
           privst->serial != hdr->serial &&
           privst->proc_nr != hdr->proc)
        privst = privst->next;

    if (!privst) {
        VIR_WARN("No registered stream matching serial=%d, proc=%d",
                 hdr->serial, hdr->proc);
        return -1;
    }

    /* See if there's also a (optional) call waiting for this reply */
    thecall = priv->waitDispatch;
    while (thecall &&
           thecall->serial != hdr->serial)
        thecall = thecall->next;


    /* Status is either REMOTE_OK (meaning that what follows is a ret
     * structure), or REMOTE_ERROR (and what follows is a remote_error
     * structure).
     */
    switch (hdr->status) {
    case REMOTE_CONTINUE: {
        int avail = privst->incomingLength - privst->incomingOffset;
        int need = priv->bufferLength - priv->bufferOffset;
        VIR_WARN0("Got a stream data packet");

        /* XXX flag stream as complete somwhere if need==0 */

        if (need > avail) {
            int extra = need - avail;
            if (VIR_REALLOC_N(privst->incoming,
                              privst->incomingLength + extra) < 0) {
                VIR_WARN0("Out of memory");
                return -1;
            }
            privst->incomingLength += extra;
        }

        memcpy(privst->incoming + privst->incomingOffset,
               priv->buffer + priv->bufferOffset,
               priv->bufferLength - priv->bufferOffset);
        privst->incomingOffset += (priv->bufferLength - priv->bufferOffset);

        if (thecall && thecall->want_reply) {
            VIR_WARN("Got sync data packet offset=%d", privst->incomingOffset);
            thecall->mode = REMOTE_MODE_COMPLETE;
        } else {
            VIR_WARN("Got aysnc data packet offset=%d", privst->incomingOffset);
        }
        return 0;
    }

    case REMOTE_OK:
        VIR_WARN0("Got a synchronous confirm");
        if (!thecall) {
            VIR_WARN0("Got unexpected stream finish confirmation");
            return -1;
        }
        thecall->mode = REMOTE_MODE_COMPLETE;
        return 0;

    case REMOTE_ERROR:
        if (thecall && thecall->want_reply) {
            VIR_WARN0("Got a synchronous error");
            /* Give the error straight to this call */
            memset (&thecall->err, 0, sizeof thecall->err);
            if (!xdr_remote_error (xdr, &thecall->err)) {
                error (in_open ? NULL : conn,
                       VIR_ERR_RPC, _("unmarshalling remote_error"));
                return -1;
            }
            thecall->mode = REMOTE_MODE_ERROR;
        } else {
            VIR_WARN0("Got a asynchronous error");
            /* No call, so queue the error against the stream */
            if (privst->has_error) {
                VIR_WARN0("Got unexpected duplicate stream error");
                return -1;
            }
            privst->has_error = 1;
            memset (&privst->err, 0, sizeof privst->err);
            if (!xdr_remote_error (xdr, &privst->err)) {
                VIR_WARN0("Failed to unmarshall error");
                return -1;
            }
        }
        return 0;

    default:
        VIR_WARN("Stream with unexpected serial=%d, proc=%d, status=%d",
                 hdr->serial, hdr->proc, hdr->status);
        return -1;
    }
}
8388 8389

static int
8390 8391
remoteIOHandleInput(virConnectPtr conn, struct private_data *priv,
                    int in_open)
8392
{
8393
    /* Read as much data as is available, until we get
8394
     * EAGAIN
8395
     */
8396
    for (;;) {
8397
        int ret = remoteIOReadMessage(conn, priv, in_open);
8398

8399 8400 8401 8402
        if (ret < 0)
            return -1;
        if (ret == 0)
            return 0;  /* Blocking on read */
8403

8404 8405 8406
        /* Check for completion of our goal */
        if (priv->bufferOffset == priv->bufferLength) {
            if (priv->bufferOffset == 4) {
8407
                ret = remoteIODecodeMessageLength(conn, priv, in_open);
8408 8409 8410 8411 8412 8413 8414 8415 8416
                if (ret < 0)
                    return -1;

                /*
                 * We'll carry on around the loop to immediately
                 * process the message body, because it has probably
                 * already arrived. Worst case, we'll get EAGAIN on
                 * next iteration.
                 */
8417
            } else {
8418
                ret = processCallDispatch(conn, priv, in_open);
8419
                priv->bufferOffset = priv->bufferLength = 0;
8420 8421 8422 8423 8424 8425 8426 8427
                /*
                 * We've completed one call, so return even
                 * though there might still be more data on
                 * the wire. We need to actually let the caller
                 * deal with this arrived message to keep good
                 * response, and also to correctly handle EOF.
                 */
                return ret;
8428 8429 8430
            }
        }
    }
8431 8432
}

8433 8434 8435 8436 8437
/*
 * Process all calls pending dispatch/receive until we
 * get a reply to our own call. Then quit and pass the buck
 * to someone else.
 */
8438
static int
8439 8440 8441 8442
remoteIOEventLoop(virConnectPtr conn,
                  struct private_data *priv,
                  int in_open,
                  struct remote_thread_call *thiscall)
8443
{
8444 8445
    struct pollfd fds[2];
    int ret;
8446

8447 8448 8449 8450 8451 8452 8453
    fds[0].fd = priv->sock;
    fds[1].fd = priv->wakeupReadFD;

    for (;;) {
        struct remote_thread_call *tmp = priv->waitDispatch;
        struct remote_thread_call *prev;
        char ignore;
8454
        sigset_t oldmask, blockedsigs;
8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468

        fds[0].events = fds[0].revents = 0;
        fds[1].events = fds[1].revents = 0;

        fds[1].events = POLLIN;
        while (tmp) {
            if (tmp->mode == REMOTE_MODE_WAIT_RX)
                fds[0].events |= POLLIN;
            if (tmp->mode == REMOTE_MODE_WAIT_TX)
                fds[0].events |= POLLOUT;

            tmp = tmp->next;
        }

8469 8470 8471
        if (priv->streams)
            fds[0].events |= POLLIN;

8472 8473 8474 8475
        /* Release lock while poll'ing so other threads
         * can stuff themselves on the queue */
        remoteDriverUnlock(priv);

8476 8477 8478 8479 8480 8481 8482 8483 8484 8485 8486
        /* Block SIGWINCH from interrupting poll in curses programs,
         * then restore the original signal mask again immediately
         * after the call (RHBZ#567931).  Same for SIGCHLD and SIGPIPE
         * at the suggestion of Paolo Bonzini and Daniel Berrange.
         */
        sigemptyset (&blockedsigs);
        sigaddset (&blockedsigs, SIGWINCH);
        sigaddset (&blockedsigs, SIGCHLD);
        sigaddset (&blockedsigs, SIGPIPE);
        ignore_value (pthread_sigmask(SIG_BLOCK, &blockedsigs, &oldmask));

8487 8488
    repoll:
        ret = poll(fds, ARRAY_CARDINALITY(fds), -1);
8489
        if (ret < 0 && errno == EAGAIN)
8490
            goto repoll;
8491 8492 8493

        ignore_value (pthread_sigmask(SIG_SETMASK, &oldmask, NULL));

8494 8495 8496 8497 8498 8499 8500 8501 8502 8503
        remoteDriverLock(priv);

        if (fds[1].revents) {
            DEBUG0("Woken up from poll by other thread");
            saferead(priv->wakeupReadFD, &ignore, sizeof(ignore));
        }

        if (ret < 0) {
            if (errno == EWOULDBLOCK)
                continue;
8504
            virReportSystemError(errno,
8505
                                 "%s", _("poll on socket failed"));
8506
            goto error;
8507 8508 8509
        }

        if (fds[0].revents & POLLOUT) {
8510
            if (remoteIOHandleOutput(conn, priv, in_open) < 0)
8511
                goto error;
8512
        }
8513 8514

        if (fds[0].revents & POLLIN) {
8515
            if (remoteIOHandleInput(conn, priv, in_open) < 0)
8516
                goto error;
8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540
        }

        /* Iterate through waiting threads and if
         * any are complete then tell 'em to wakeup
         */
        tmp = priv->waitDispatch;
        prev = NULL;
        while (tmp) {
            if (tmp != thiscall &&
                (tmp->mode == REMOTE_MODE_COMPLETE ||
                 tmp->mode == REMOTE_MODE_ERROR)) {
                /* Take them out of the list */
                if (prev)
                    prev->next = tmp->next;
                else
                    priv->waitDispatch = tmp->next;

                /* And wake them up....
                 * ...they won't actually wakeup until
                 * we release our mutex a short while
                 * later...
                 */
                DEBUG("Waking up sleep %d %p %p", tmp->proc_nr, tmp, priv->waitDispatch);
                virCondSignal(&tmp->cond);
8541
            }
8542 8543
            prev = tmp;
            tmp = tmp->next;
8544 8545
        }

8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561
        /* Now see if *we* are done */
        if (thiscall->mode == REMOTE_MODE_COMPLETE ||
            thiscall->mode == REMOTE_MODE_ERROR) {
            /* We're at head of the list already, so
             * remove us
             */
            priv->waitDispatch = thiscall->next;
            DEBUG("Giving up the buck %d %p %p", thiscall->proc_nr, thiscall, priv->waitDispatch);
            /* See if someone else is still waiting
             * and if so, then pass the buck ! */
            if (priv->waitDispatch) {
                DEBUG("Passing the buck to %d %p", priv->waitDispatch->proc_nr, priv->waitDispatch);
                virCondSignal(&priv->waitDispatch->cond);
            }
            return 0;
        }
8562

8563 8564 8565 8566

        if (fds[0].revents & (POLLHUP | POLLERR)) {
            errorf(in_open ? NULL : conn, VIR_ERR_INTERNAL_ERROR,
                   "%s", _("received hangup / error event on socket"));
8567
            goto error;
8568 8569
        }
    }
8570 8571 8572 8573 8574 8575 8576 8577 8578 8579 8580 8581


error:
    priv->waitDispatch = thiscall->next;
    DEBUG("Giving up the buck due to I/O error %d %p %p", thiscall->proc_nr, thiscall, priv->waitDispatch);
    /* See if someone else is still waiting
     * and if so, then pass the buck ! */
    if (priv->waitDispatch) {
        DEBUG("Passing the buck to %d %p", priv->waitDispatch->proc_nr, priv->waitDispatch);
        virCondSignal(&priv->waitDispatch->cond);
    }
    return -1;
8582 8583
}

8584
/*
8585
 * This function sends a message to remote server and awaits a reply
8586 8587 8588 8589 8590 8591 8592 8593 8594 8595 8596 8597 8598 8599
 *
 * NB. This does not free the args structure (not desirable, since you
 * often want this allocated on the stack or else it contains strings
 * which come from the user).  It does however free any intermediate
 * results, eg. the error structure if there is one.
 *
 * NB(2). Make sure to memset (&ret, 0, sizeof ret) before calling,
 * else Bad Things will happen in the XDR code.
 *
 * NB(3) You must have the private_data lock before calling this
 *
 * NB(4) This is very complicated. Due to connection cloning, multiple
 * threads can want to use the socket at once. Obviously only one of
 * them can. So if someone's using the socket, other threads are put
8600
 * to sleep on condition variables. The existing thread may completely
8601 8602 8603 8604 8605 8606 8607 8608 8609 8610 8611 8612 8613 8614 8615 8616
 * send & receive their RPC call/reply while they're asleep. Or it
 * may only get around to dealing with sending the call. Or it may
 * get around to neither. So upon waking up from slumber, the other
 * thread may or may not have more work todo.
 *
 * We call this dance  'passing the buck'
 *
 *      http://en.wikipedia.org/wiki/Passing_the_buck
 *
 *   "Buck passing or passing the buck is the action of transferring
 *    responsibility or blame unto another person. It is also used as
 *    a strategy in power politics when the actions of one country/
 *    nation are blamed on another, providing an opportunity for war."
 *
 * NB(5) Don't Panic!
 */
8617
static int
8618 8619 8620 8621
remoteIO(virConnectPtr conn,
         struct private_data *priv,
         int flags,
         struct remote_thread_call *thiscall)
8622
{
8623 8624
    int rv;

8625 8626 8627
    DEBUG("Do proc=%d serial=%d length=%d wait=%p",
          thiscall->proc_nr, thiscall->serial,
          thiscall->bufferLength, priv->waitDispatch);
8628

8629 8630 8631 8632 8633 8634 8635 8636 8637 8638 8639
    /* Check to see if another thread is dispatching */
    if (priv->waitDispatch) {
        /* Stick ourselves on the end of the wait queue */
        struct remote_thread_call *tmp = priv->waitDispatch;
        char ignore = 1;
        while (tmp && tmp->next)
            tmp = tmp->next;
        if (tmp)
            tmp->next = thiscall;
        else
            priv->waitDispatch = thiscall;
8640

8641 8642
        /* Force other thread to wakup from poll */
        safewrite(priv->wakeupSendFD, &ignore, sizeof(ignore));
8643

8644
        DEBUG("Going to sleep %d %p %p", thiscall->proc_nr, priv->waitDispatch, thiscall);
8645 8646 8647 8648 8649 8650 8651 8652 8653 8654 8655 8656 8657 8658 8659 8660 8661
        /* Go to sleep while other thread is working... */
        if (virCondWait(&thiscall->cond, &priv->lock) < 0) {
            if (priv->waitDispatch == thiscall) {
                priv->waitDispatch = thiscall->next;
            } else {
                tmp = priv->waitDispatch;
                while (tmp && tmp->next &&
                       tmp->next != thiscall) {
                    tmp = tmp->next;
                }
                if (tmp && tmp->next == thiscall)
                    tmp->next = thiscall->next;
            }
            errorf(flags & REMOTE_CALL_IN_OPEN ? NULL : conn,
                   VIR_ERR_INTERNAL_ERROR, "%s",
                   _("failed to wait on condition"));
            VIR_FREE(thiscall);
8662
            return -1;
8663
        }
8664

8665
        DEBUG("Wokeup from sleep %d %p %p", thiscall->proc_nr, priv->waitDispatch, thiscall);
8666 8667 8668 8669 8670 8671 8672 8673 8674 8675 8676 8677 8678 8679
        /* Two reasons we can be woken up
         *  1. Other thread has got our reply ready for us
         *  2. Other thread is all done, and it is our turn to
         *     be the dispatcher to finish waiting for
         *     our reply
         */
        if (thiscall->mode == REMOTE_MODE_COMPLETE ||
            thiscall->mode == REMOTE_MODE_ERROR) {
            /*
             * We avoided catching the buck and our reply is ready !
             * We've already had 'thiscall' removed from the list
             * so just need to (maybe) handle errors & free it
             */
            goto cleanup;
8680
        }
8681 8682 8683

        /* Grr, someone passed the buck onto us ... */

8684
    } else {
8685 8686 8687 8688
        /* We're first to catch the buck */
        priv->waitDispatch = thiscall;
    }

8689
    DEBUG("We have the buck %d %p %p", thiscall->proc_nr, priv->waitDispatch, thiscall);
8690 8691 8692 8693 8694 8695 8696 8697 8698 8699 8700 8701 8702 8703 8704 8705 8706
    /*
     * The buck stops here!
     *
     * At this point we're about to own the dispatch
     * process...
     */

    /*
     * Avoid needless wake-ups of the event loop in the
     * case where this call is being made from a different
     * thread than the event loop. These wake-ups would
     * cause the event loop thread to be blocked on the
     * mutex for the duration of the call
     */
    if (priv->watch >= 0)
        virEventUpdateHandle(priv->watch, 0);

8707 8708 8709
    rv = remoteIOEventLoop(conn, priv,
                           flags & REMOTE_CALL_IN_OPEN ? 1 : 0,
                           thiscall);
8710 8711 8712 8713 8714 8715 8716 8717 8718 8719

    if (priv->watch >= 0)
        virEventUpdateHandle(priv->watch, VIR_EVENT_HANDLE_READABLE);

    if (rv < 0) {
        VIR_FREE(thiscall);
        return -1;
    }

cleanup:
8720
    DEBUG("All done with our call %d %p %p", thiscall->proc_nr, priv->waitDispatch, thiscall);
8721 8722 8723 8724 8725 8726 8727
    if (thiscall->mode == REMOTE_MODE_ERROR) {
        /* See if caller asked us to keep quiet about missing RPCs
         * eg for interop with older servers */
        if (flags & REMOTE_CALL_QUIET_MISSING_RPC &&
            thiscall->err.domain == VIR_FROM_REMOTE &&
            thiscall->err.code == VIR_ERR_RPC &&
            thiscall->err.level == VIR_ERR_ERROR &&
8728
            thiscall->err.message &&
8729 8730
            STRPREFIX(*thiscall->err.message, "unknown procedure")) {
            rv = -2;
8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741 8742 8743 8744 8745 8746 8747 8748 8749 8750 8751
        } else if (thiscall->err.domain == VIR_FROM_REMOTE &&
                   thiscall->err.code == VIR_ERR_RPC &&
                   thiscall->err.level == VIR_ERR_ERROR &&
                   thiscall->err.message &&
                   STRPREFIX(*thiscall->err.message, "unknown procedure")) {
            /*
             * convert missing remote entry points into the unsupported
             * feature error
             */
            virRaiseErrorFull(flags & REMOTE_CALL_IN_OPEN ? NULL : conn,
                              __FILE__, __FUNCTION__, __LINE__,
                              thiscall->err.domain,
                              VIR_ERR_NO_SUPPORT,
                              thiscall->err.level,
                              thiscall->err.str1 ? *thiscall->err.str1 : NULL,
                              thiscall->err.str2 ? *thiscall->err.str2 : NULL,
                              thiscall->err.str3 ? *thiscall->err.str3 : NULL,
                              thiscall->err.int1,
                              thiscall->err.int2,
                              "%s", *thiscall->err.message);
            rv = -1;
8752
        } else {
8753 8754 8755 8756 8757 8758 8759 8760 8761 8762
            virRaiseErrorFull(flags & REMOTE_CALL_IN_OPEN ? NULL : conn,
                              __FILE__, __FUNCTION__, __LINE__,
                              thiscall->err.domain,
                              thiscall->err.code,
                              thiscall->err.level,
                              thiscall->err.str1 ? *thiscall->err.str1 : NULL,
                              thiscall->err.str2 ? *thiscall->err.str2 : NULL,
                              thiscall->err.str3 ? *thiscall->err.str3 : NULL,
                              thiscall->err.int1,
                              thiscall->err.int2,
8763
                              "%s", thiscall->err.message ? *thiscall->err.message : "unknown");
8764
            rv = -1;
8765
        }
8766
        xdr_free((xdrproc_t)xdr_remote_error,  (char *)&thiscall->err);
8767 8768
    } else {
        rv = 0;
8769
    }
8770 8771 8772
    VIR_FREE(thiscall);
    return rv;
}
8773

8774 8775 8776 8777 8778 8779 8780 8781 8782 8783 8784 8785 8786 8787 8788 8789 8790 8791 8792

/*
 * Serial a set of arguments into a method call message,
 * send that to the server and wait for reply
 */
static int
call (virConnectPtr conn, struct private_data *priv,
      int flags /* if we are in virConnectOpen */,
      int proc_nr,
      xdrproc_t args_filter, char *args,
      xdrproc_t ret_filter, char *ret)
{
    struct remote_thread_call *thiscall;

    thiscall = prepareCall(conn, priv, flags, proc_nr,
                           args_filter, args,
                           ret_filter, ret);

    if (!thiscall) {
8793
        virReportOOMError();
8794 8795 8796 8797 8798 8799 8800 8801
        return -1;
    }

    return remoteIO(conn, priv, flags, thiscall);
}



8802 8803 8804 8805 8806 8807 8808 8809
/**
 * remoteDomainReadEvent
 *
 * Read the event data off the wire
 */
static virDomainEventPtr
remoteDomainReadEvent(virConnectPtr conn, XDR *xdr)
{
8810
    remote_domain_event_msg msg;
8811 8812
    virDomainPtr dom;
    virDomainEventPtr event = NULL;
8813
    memset (&msg, 0, sizeof msg);
8814 8815

    /* unmarshall parameters, and process it*/
8816
    if (! xdr_remote_domain_event_msg(xdr, &msg) ) {
8817
        error (conn, VIR_ERR_RPC,
8818
               _("remoteDomainProcessEvent: unmarshalling msg"));
8819 8820 8821
        return NULL;
    }

8822
    dom = get_nonnull_domain(conn,msg.dom);
8823 8824 8825
    if (!dom)
        return NULL;

8826
    event = virDomainEventNewFromDom(dom, msg.event, msg.detail);
8827 8828 8829

    virDomainFree(dom);
    return event;
8830 8831
}

8832 8833
static void
remoteDomainQueueEvent(virConnectPtr conn, XDR *xdr)
8834
{
8835 8836
    struct private_data *priv = conn->privateData;
    virDomainEventPtr event;
8837

8838 8839 8840
    event = remoteDomainReadEvent(conn, xdr);
    if (!event)
        return;
8841

8842 8843 8844 8845 8846
    if (virDomainEventQueuePush(priv->domainEvents,
                                event) < 0) {
        DEBUG0("Error adding event to queue");
        virDomainEventFree(event);
    }
8847 8848
}

8849 8850 8851 8852 8853 8854 8855 8856 8857 8858
/** remoteDomainEventFired:
 *
 * The callback for monitoring the remote socket
 * for event data
 */
void
remoteDomainEventFired(int watch,
                       int fd,
                       int event,
                       void *opaque)
8859
{
8860 8861
    virConnectPtr        conn = opaque;
    struct private_data *priv = conn->privateData;
8862

8863
    remoteDriverLock(priv);
8864

8865 8866 8867
    /* This should be impossible, but it doesn't hurt to check */
    if (priv->waitDispatch)
        goto done;
8868

8869
    DEBUG("Event fired %d %d %d %X", watch, fd, event, event);
8870

8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883 8884
    if (event & (VIR_EVENT_HANDLE_HANGUP | VIR_EVENT_HANDLE_ERROR)) {
         DEBUG("%s : VIR_EVENT_HANDLE_HANGUP or "
               "VIR_EVENT_HANDLE_ERROR encountered", __FUNCTION__);
         virEventRemoveHandle(watch);
         priv->watch = -1;
         goto done;
    }

    if (fd != priv->sock) {
        virEventRemoveHandle(watch);
        priv->watch = -1;
        goto done;
    }

8885
    if (remoteIOHandleInput(conn, priv, 0) < 0)
8886 8887 8888 8889
        DEBUG0("Something went wrong during async message processing");

done:
    remoteDriverUnlock(priv);
8890 8891
}

8892 8893 8894 8895 8896 8897 8898 8899 8900 8901 8902 8903 8904 8905
static void remoteDomainEventDispatchFunc(virConnectPtr conn,
                                          virDomainEventPtr event,
                                          virConnectDomainEventCallback cb,
                                          void *cbopaque,
                                          void *opaque)
{
    struct private_data *priv = opaque;

    /* Drop the lock whle dispatching, for sake of re-entrancy */
    remoteDriverUnlock(priv);
    virDomainEventDispatchDefaultFunc(conn, event, cb, cbopaque, NULL);
    remoteDriverLock(priv);
}

8906 8907
void
remoteDomainEventQueueFlush(int timer ATTRIBUTE_UNUSED, void *opaque)
8908
{
8909 8910
    virConnectPtr conn = opaque;
    struct private_data *priv = conn->privateData;
8911
    virDomainEventQueue tempQueue;
8912 8913 8914

    remoteDriverLock(priv);

8915 8916 8917 8918 8919 8920 8921 8922 8923 8924
    priv->domainEventDispatching = 1;

    /* Copy the queue, so we're reentrant safe */
    tempQueue.count = priv->domainEvents->count;
    tempQueue.events = priv->domainEvents->events;
    priv->domainEvents->count = 0;
    priv->domainEvents->events = NULL;

    virDomainEventQueueDispatch(&tempQueue, priv->callbackList,
                                remoteDomainEventDispatchFunc, priv);
8925 8926
    virEventUpdateTimeout(priv->eventFlushTimer, -1);

8927 8928 8929 8930 8931 8932 8933 8934 8935 8936 8937 8938 8939
    /* Purge any deleted callbacks */
    virDomainEventCallbackListPurgeMarked(priv->callbackList);

    if ( priv->callbackList->count == 0 ) {
        /* Tell the server when we are the last callback deregistering */
        if (call (conn, priv, 0, REMOTE_PROC_DOMAIN_EVENTS_DEREGISTER,
                  (xdrproc_t) xdr_void, (char *) NULL,
                  (xdrproc_t) xdr_void, (char *) NULL) == -1)
            VIR_WARN0("Failed to de-register events");
    }

    priv->domainEventDispatching = 0;

8940
    remoteDriverUnlock(priv);
8941 8942
}

8943

8944 8945
/* get_nonnull_domain and get_nonnull_network turn an on-wire
 * (name, uuid) pair into virDomainPtr or virNetworkPtr object.
8946
 * These can return NULL if underlying memory allocations fail,
8947
 * but if they do then virterror_internal.has been set.
8948 8949 8950 8951 8952 8953 8954 8955 8956 8957 8958 8959 8960 8961 8962 8963
 */
static virDomainPtr
get_nonnull_domain (virConnectPtr conn, remote_nonnull_domain domain)
{
    virDomainPtr dom;
    dom = virGetDomain (conn, domain.name, BAD_CAST domain.uuid);
    if (dom) dom->id = domain.id;
    return dom;
}

static virNetworkPtr
get_nonnull_network (virConnectPtr conn, remote_nonnull_network network)
{
    return virGetNetwork (conn, network.name, BAD_CAST network.uuid);
}

D
Daniel Veillard 已提交
8964
static virInterfacePtr
8965
get_nonnull_interface (virConnectPtr conn, remote_nonnull_interface iface)
D
Daniel Veillard 已提交
8966
{
8967
    return virGetInterface (conn, iface.name, iface.mac);
D
Daniel Veillard 已提交
8968 8969
}

8970 8971 8972 8973 8974 8975 8976 8977 8978 8979 8980 8981
static virStoragePoolPtr
get_nonnull_storage_pool (virConnectPtr conn, remote_nonnull_storage_pool pool)
{
    return virGetStoragePool (conn, pool.name, BAD_CAST pool.uuid);
}

static virStorageVolPtr
get_nonnull_storage_vol (virConnectPtr conn, remote_nonnull_storage_vol vol)
{
    return virGetStorageVol (conn, vol.pool, vol.name, vol.key);
}

8982 8983 8984 8985 8986 8987
static virNodeDevicePtr
get_nonnull_node_device (virConnectPtr conn, remote_nonnull_node_device dev)
{
    return virGetNodeDevice(conn, dev.name);
}

8988 8989 8990
static virSecretPtr
get_nonnull_secret (virConnectPtr conn, remote_nonnull_secret secret)
{
8991
    return virGetSecret(conn, BAD_CAST secret.uuid, secret.usageType, secret.usageID);
8992 8993
}

8994 8995 8996 8997
/* Make remote_nonnull_domain and remote_nonnull_network. */
static void
make_nonnull_domain (remote_nonnull_domain *dom_dst, virDomainPtr dom_src)
{
8998
    dom_dst->id = dom_src->id;
8999 9000 9001 9002 9003 9004 9005 9006 9007 9008 9009
    dom_dst->name = dom_src->name;
    memcpy (dom_dst->uuid, dom_src->uuid, VIR_UUID_BUFLEN);
}

static void
make_nonnull_network (remote_nonnull_network *net_dst, virNetworkPtr net_src)
{
    net_dst->name = net_src->name;
    memcpy (net_dst->uuid, net_src->uuid, VIR_UUID_BUFLEN);
}

D
Daniel Veillard 已提交
9010 9011 9012 9013 9014 9015 9016 9017
static void
make_nonnull_interface (remote_nonnull_interface *interface_dst,
                        virInterfacePtr interface_src)
{
    interface_dst->name = interface_src->name;
    interface_dst->mac = interface_src->mac;
}

9018 9019 9020 9021 9022 9023 9024 9025 9026 9027 9028 9029 9030 9031 9032
static void
make_nonnull_storage_pool (remote_nonnull_storage_pool *pool_dst, virStoragePoolPtr pool_src)
{
    pool_dst->name = pool_src->name;
    memcpy (pool_dst->uuid, pool_src->uuid, VIR_UUID_BUFLEN);
}

static void
make_nonnull_storage_vol (remote_nonnull_storage_vol *vol_dst, virStorageVolPtr vol_src)
{
    vol_dst->pool = vol_src->pool;
    vol_dst->name = vol_src->name;
    vol_dst->key = vol_src->key;
}

9033 9034 9035
static void
make_nonnull_secret (remote_nonnull_secret *secret_dst, virSecretPtr secret_src)
{
9036
    memcpy (secret_dst->uuid, secret_src->uuid, VIR_UUID_BUFLEN);
9037 9038
    secret_dst->usageType = secret_src->usageType;
    secret_dst->usageID = secret_src->usageID;
9039 9040
}

9041 9042
/*----------------------------------------------------------------------*/

9043 9044 9045 9046 9047
unsigned long remoteVersion(void)
{
    return REMOTE_PROTOCOL_VERSION;
}

9048
static virDriver remote_driver = {
9049 9050 9051 9052 9053 9054 9055
    VIR_DRV_REMOTE,
    "remote",
    remoteOpen, /* open */
    remoteClose, /* close */
    remoteSupportsFeature, /* supports_feature */
    remoteType, /* type */
    remoteGetVersion, /* version */
9056
    remoteGetLibVersion, /* libvirtVersion */
9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086
    remoteGetHostname, /* getHostname */
    remoteGetMaxVcpus, /* getMaxVcpus */
    remoteNodeGetInfo, /* nodeGetInfo */
    remoteGetCapabilities, /* getCapabilities */
    remoteListDomains, /* listDomains */
    remoteNumOfDomains, /* numOfDomains */
    remoteDomainCreateXML, /* domainCreateXML */
    remoteDomainLookupByID, /* domainLookupByID */
    remoteDomainLookupByUUID, /* domainLookupByUUID */
    remoteDomainLookupByName, /* domainLookupByName */
    remoteDomainSuspend, /* domainSuspend */
    remoteDomainResume, /* domainResume */
    remoteDomainShutdown, /* domainShutdown */
    remoteDomainReboot, /* domainReboot */
    remoteDomainDestroy, /* domainDestroy */
    remoteDomainGetOSType, /* domainGetOSType */
    remoteDomainGetMaxMemory, /* domainGetMaxMemory */
    remoteDomainSetMaxMemory, /* domainSetMaxMemory */
    remoteDomainSetMemory, /* domainSetMemory */
    remoteDomainGetInfo, /* domainGetInfo */
    remoteDomainSave, /* domainSave */
    remoteDomainRestore, /* domainRestore */
    remoteDomainCoreDump, /* domainCoreDump */
    remoteDomainSetVcpus, /* domainSetVcpus */
    remoteDomainPinVcpu, /* domainPinVcpu */
    remoteDomainGetVcpus, /* domainGetVcpus */
    remoteDomainGetMaxVcpus, /* domainGetMaxVcpus */
    remoteDomainGetSecurityLabel, /* domainGetSecurityLabel */
    remoteNodeGetSecurityModel, /* nodeGetSecurityModel */
    remoteDomainDumpXML, /* domainDumpXML */
9087 9088
    remoteDomainXMLFromNative, /* domainXMLFromNative */
    remoteDomainXMLToNative, /* domainXMLToNative */
9089 9090 9091 9092 9093 9094
    remoteListDefinedDomains, /* listDefinedDomains */
    remoteNumOfDefinedDomains, /* numOfDefinedDomains */
    remoteDomainCreate, /* domainCreate */
    remoteDomainDefineXML, /* domainDefineXML */
    remoteDomainUndefine, /* domainUndefine */
    remoteDomainAttachDevice, /* domainAttachDevice */
J
Jim Fehlig 已提交
9095
    remoteDomainAttachDeviceFlags, /* domainAttachDeviceFlags */
9096
    remoteDomainDetachDevice, /* domainDetachDevice */
J
Jim Fehlig 已提交
9097
    remoteDomainDetachDeviceFlags, /* domainDetachDeviceFlags */
9098 9099 9100 9101 9102 9103 9104 9105 9106 9107
    remoteDomainGetAutostart, /* domainGetAutostart */
    remoteDomainSetAutostart, /* domainSetAutostart */
    remoteDomainGetSchedulerType, /* domainGetSchedulerType */
    remoteDomainGetSchedulerParameters, /* domainGetSchedulerParameters */
    remoteDomainSetSchedulerParameters, /* domainSetSchedulerParameters */
    remoteDomainMigratePrepare, /* domainMigratePrepare */
    remoteDomainMigratePerform, /* domainMigratePerform */
    remoteDomainMigrateFinish, /* domainMigrateFinish */
    remoteDomainBlockStats, /* domainBlockStats */
    remoteDomainInterfaceStats, /* domainInterfaceStats */
9108
    remoteDomainMemoryStats, /* domainMemoryStats */
9109 9110 9111 9112 9113 9114 9115 9116 9117 9118 9119
    remoteDomainBlockPeek, /* domainBlockPeek */
    remoteDomainMemoryPeek, /* domainMemoryPeek */
    remoteNodeGetCellsFreeMemory, /* nodeGetCellsFreeMemory */
    remoteNodeGetFreeMemory, /* getFreeMemory */
    remoteDomainEventRegister, /* domainEventRegister */
    remoteDomainEventDeregister, /* domainEventDeregister */
    remoteDomainMigratePrepare2, /* domainMigratePrepare2 */
    remoteDomainMigrateFinish2, /* domainMigrateFinish2 */
    remoteNodeDeviceDettach, /* nodeDeviceDettach */
    remoteNodeDeviceReAttach, /* nodeDeviceReAttach */
    remoteNodeDeviceReset, /* nodeDeviceReset */
C
Chris Lalancette 已提交
9120
    remoteDomainMigratePrepareTunnel, /* domainMigratePrepareTunnel */
9121 9122 9123 9124
    remoteIsEncrypted, /* isEncrypted */
    remoteIsSecure, /* isSecure */
    remoteDomainIsActive, /* domainIsActive */
    remoteDomainIsPersistent, /* domainIsPersistent */
J
Jiri Denemark 已提交
9125
    remoteCPUCompare, /* cpuCompare */
9126
    remoteCPUBaseline, /* cpuBaseline */
9127
    remoteDomainGetJobInfo, /* domainGetJobInfo */
9128
    remoteDomainAbortJob, /* domainFinishJob */
9129 9130 9131
};

static virNetworkDriver network_driver = {
9132
    .name = "remote",
9133 9134 9135 9136 9137 9138 9139 9140 9141 9142 9143 9144 9145 9146 9147 9148 9149
    .open = remoteNetworkOpen,
    .close = remoteNetworkClose,
    .numOfNetworks = remoteNumOfNetworks,
    .listNetworks = remoteListNetworks,
    .numOfDefinedNetworks = remoteNumOfDefinedNetworks,
    .listDefinedNetworks = remoteListDefinedNetworks,
    .networkLookupByUUID = remoteNetworkLookupByUUID,
    .networkLookupByName = remoteNetworkLookupByName,
    .networkCreateXML = remoteNetworkCreateXML,
    .networkDefineXML = remoteNetworkDefineXML,
    .networkUndefine = remoteNetworkUndefine,
    .networkCreate = remoteNetworkCreate,
    .networkDestroy = remoteNetworkDestroy,
    .networkDumpXML = remoteNetworkDumpXML,
    .networkGetBridgeName = remoteNetworkGetBridgeName,
    .networkGetAutostart = remoteNetworkGetAutostart,
    .networkSetAutostart = remoteNetworkSetAutostart,
9150 9151
    .networkIsActive = remoteNetworkIsActive,
    .networkIsPersistent = remoteNetworkIsPersistent,
9152 9153
};

D
Daniel Veillard 已提交
9154 9155 9156 9157 9158 9159
static virInterfaceDriver interface_driver = {
    .name = "remote",
    .open = remoteInterfaceOpen,
    .close = remoteInterfaceClose,
    .numOfInterfaces = remoteNumOfInterfaces,
    .listInterfaces = remoteListInterfaces,
9160 9161
    .numOfDefinedInterfaces = remoteNumOfDefinedInterfaces,
    .listDefinedInterfaces = remoteListDefinedInterfaces,
D
Daniel Veillard 已提交
9162 9163 9164 9165 9166 9167 9168
    .interfaceLookupByName = remoteInterfaceLookupByName,
    .interfaceLookupByMACString = remoteInterfaceLookupByMACString,
    .interfaceGetXMLDesc = remoteInterfaceGetXMLDesc,
    .interfaceDefineXML = remoteInterfaceDefineXML,
    .interfaceUndefine = remoteInterfaceUndefine,
    .interfaceCreate = remoteInterfaceCreate,
    .interfaceDestroy = remoteInterfaceDestroy,
9169
    .interfaceIsActive = remoteInterfaceIsActive,
D
Daniel Veillard 已提交
9170 9171
};

9172 9173 9174 9175 9176 9177 9178 9179
static virStorageDriver storage_driver = {
    .name = "remote",
    .open = remoteStorageOpen,
    .close = remoteStorageClose,
    .numOfPools = remoteNumOfStoragePools,
    .listPools = remoteListStoragePools,
    .numOfDefinedPools = remoteNumOfDefinedStoragePools,
    .listDefinedPools = remoteListDefinedStoragePools,
9180
    .findPoolSources = remoteFindStoragePoolSources,
9181
    .poolLookupByName = remoteStoragePoolLookupByName,
9182
    .poolLookupByUUID = remoteStoragePoolLookupByUUID,
9183 9184 9185
    .poolLookupByVolume = remoteStoragePoolLookupByVolume,
    .poolCreateXML = remoteStoragePoolCreateXML,
    .poolDefineXML = remoteStoragePoolDefineXML,
9186
    .poolBuild = remoteStoragePoolBuild,
9187 9188 9189 9190 9191 9192 9193 9194 9195 9196 9197 9198 9199 9200 9201 9202
    .poolUndefine = remoteStoragePoolUndefine,
    .poolCreate = remoteStoragePoolCreate,
    .poolDestroy = remoteStoragePoolDestroy,
    .poolDelete = remoteStoragePoolDelete,
    .poolRefresh = remoteStoragePoolRefresh,
    .poolGetInfo = remoteStoragePoolGetInfo,
    .poolGetXMLDesc = remoteStoragePoolDumpXML,
    .poolGetAutostart = remoteStoragePoolGetAutostart,
    .poolSetAutostart = remoteStoragePoolSetAutostart,
    .poolNumOfVolumes = remoteStoragePoolNumOfVolumes,
    .poolListVolumes = remoteStoragePoolListVolumes,

    .volLookupByName = remoteStorageVolLookupByName,
    .volLookupByKey = remoteStorageVolLookupByKey,
    .volLookupByPath = remoteStorageVolLookupByPath,
    .volCreateXML = remoteStorageVolCreateXML,
9203
    .volCreateXMLFrom = remoteStorageVolCreateXMLFrom,
9204 9205 9206 9207
    .volDelete = remoteStorageVolDelete,
    .volGetInfo = remoteStorageVolGetInfo,
    .volGetXMLDesc = remoteStorageVolDumpXML,
    .volGetPath = remoteStorageVolGetPath,
9208 9209
    .poolIsActive = remoteStoragePoolIsActive,
    .poolIsPersistent = remoteStoragePoolIsPersistent,
9210 9211
};

9212 9213 9214 9215 9216 9217
static virSecretDriver secret_driver = {
    .name = "remote",
    .open = remoteSecretOpen,
    .close = remoteSecretClose,
    .numOfSecrets = remoteSecretNumOfSecrets,
    .listSecrets = remoteSecretListSecrets,
9218
    .lookupByUUID = remoteSecretLookupByUUID,
9219
    .lookupByUsage = remoteSecretLookupByUsage,
9220 9221 9222 9223 9224 9225 9226
    .defineXML = remoteSecretDefineXML,
    .getXMLDesc = remoteSecretGetXMLDesc,
    .setValue = remoteSecretSetValue,
    .getValue = remoteSecretGetValue,
    .undefine = remoteSecretUndefine
};

9227 9228 9229 9230 9231 9232 9233 9234 9235 9236 9237
static virDeviceMonitor dev_monitor = {
    .name = "remote",
    .open = remoteDevMonOpen,
    .close = remoteDevMonClose,
    .numOfDevices = remoteNodeNumOfDevices,
    .listDevices = remoteNodeListDevices,
    .deviceLookupByName = remoteNodeDeviceLookupByName,
    .deviceDumpXML = remoteNodeDeviceDumpXML,
    .deviceGetParent = remoteNodeDeviceGetParent,
    .deviceNumOfCaps = remoteNodeDeviceNumOfCaps,
    .deviceListCaps = remoteNodeDeviceListCaps,
9238 9239
    .deviceCreateXML = remoteNodeDeviceCreateXML,
    .deviceDestroy = remoteNodeDeviceDestroy
9240 9241 9242
};


A
Atsushi SAKAI 已提交
9243
#ifdef WITH_LIBVIRTD
9244
static virStateDriver state_driver = {
9245
    .name = "Remote",
9246
    .initialize = remoteStartup,
9247
};
A
Atsushi SAKAI 已提交
9248
#endif
9249 9250


9251
/** remoteRegister:
9252 9253
 *
 * Register driver with libvirt driver system.
9254 9255
 *
 * Returns -1 on error.
9256 9257 9258 9259
 */
int
remoteRegister (void)
{
9260
    if (virRegisterDriver (&remote_driver) == -1) return -1;
9261
    if (virRegisterNetworkDriver (&network_driver) == -1) return -1;
D
Daniel Veillard 已提交
9262
    if (virRegisterInterfaceDriver (&interface_driver) == -1) return -1;
9263
    if (virRegisterStorageDriver (&storage_driver) == -1) return -1;
9264
    if (virRegisterDeviceMonitor (&dev_monitor) == -1) return -1;
9265
    if (virRegisterSecretDriver (&secret_driver) == -1) return -1;
A
Atsushi SAKAI 已提交
9266
#ifdef WITH_LIBVIRTD
9267
    if (virRegisterStateDriver (&state_driver) == -1) return -1;
A
Atsushi SAKAI 已提交
9268
#endif
9269 9270 9271

    return 0;
}