util.c 26.2 KB
Newer Older
1 2 3
/*
 * utils.c: common, generic utility functions
 *
4
 * Copyright (C) 2006, 2007, 2008 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
 * Copyright (C) 2006 Daniel P. Berrange
 * Copyright (C) 2006, 2007 Binary Karma
 * Copyright (C) 2006 Shuveb Hussain
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 * File created Jul 18, 2007 - Shuveb Hussain <shuveb@binarykarma.com>
 */

27
#include <config.h>
28

29 30 31 32 33
#include <stdio.h>
#include <stdarg.h>
#include <unistd.h>
#include <fcntl.h>
#include <errno.h>
34 35
#include <sys/types.h>
#include <sys/stat.h>
R
Richard W.M. Jones 已提交
36
#if HAVE_SYS_WAIT_H
37
#include <sys/wait.h>
R
Richard W.M. Jones 已提交
38
#endif
39
#include <string.h>
40
#include <signal.h>
41 42 43
#if HAVE_TERMIOS_H
#include <termios.h>
#endif
J
Jim Meyering 已提交
44
#include "c-ctype.h"
45

46 47 48 49
#ifdef HAVE_PATHS_H
#include <paths.h>
#endif

50
#include "internal.h"
51 52
#include "event.h"
#include "buf.h"
D
Daniel Veillard 已提交
53
#include "util.h"
54
#include "memory.h"
55 56
#include "util-lib.c"

57 58 59 60
#ifndef NSIG
# define NSIG 32
#endif

61 62 63 64
#ifndef MIN
# define MIN(a, b) ((a) < (b) ? (a) : (b))
#endif

65 66
#define virLog(msg...) fprintf(stderr, msg)

67
#ifndef PROXY
68

69 70 71
#define ReportError(conn, code, fmt...)                                      \
        __virReportErrorHelper(conn, VIR_FROM_NONE, code, __FILE__,          \
                               __FUNCTION__, __LINE__, fmt)
72

73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
int virFileStripSuffix(char *str,
                       const char *suffix)
{
    int len = strlen(str);
    int suffixlen = strlen(suffix);

    if (len < suffixlen)
        return 0;

    if (!STREQ(str + len - suffixlen, suffix))
        return 0;

    str[len-suffixlen] = '\0';

    return 1;
}

90 91
#ifndef __MINGW32__

92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111
static int virSetCloseExec(int fd) {
    int flags;
    if ((flags = fcntl(fd, F_GETFD)) < 0)
        return -1;
    flags |= FD_CLOEXEC;
    if ((fcntl(fd, F_SETFD, flags)) < 0)
        return -1;
    return 0;
}

static int virSetNonBlock(int fd) {
    int flags;
    if ((flags = fcntl(fd, F_GETFL)) < 0)
        return -1;
    flags |= O_NONBLOCK;
    if ((fcntl(fd, F_SETFL, flags)) < 0)
        return -1;
    return 0;
}

112 113 114 115
int
virExec(virConnectPtr conn,
        const char *const*argv,
        const char *const*envp,
116
        const fd_set *keepfd,
117 118 119 120
        int *retpid,
        int infd, int *outfd, int *errfd,
        int flags) {
    int pid, null, i, openmax;
121 122
    int pipeout[2] = {-1,-1};
    int pipeerr[2] = {-1,-1};
123 124
    int childout = -1;
    int childerr = -1;
125 126 127 128 129 130 131 132 133 134 135 136 137 138
    sigset_t oldmask, newmask;
    struct sigaction sig_action;

    /*
     * Need to block signals now, so that child process can safely
     * kill off caller's signal handlers without a race.
     */
    sigfillset(&newmask);
    if (pthread_sigmask(SIG_SETMASK, &newmask, &oldmask) != 0) {
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("cannot block signals: %s"),
                    strerror(errno));
        return -1;
    }
139 140

    if ((null = open(_PATH_DEVNULL, O_RDONLY)) < 0) {
141
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
142 143
                    _("cannot open %s: %s"),
                    _PATH_DEVNULL, strerror(errno));
144 145 146
        goto cleanup;
    }

147 148 149 150 151 152 153 154
    if (outfd != NULL) {
        if (*outfd == -1) {
            if (pipe(pipeout) < 0) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("cannot create pipe: %s"), strerror(errno));
                goto cleanup;
            }

155
            if ((flags & VIR_EXEC_NONBLOCK) &&
156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
                virSetNonBlock(pipeout[0]) == -1) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("Failed to set non-blocking file descriptor flag"));
                goto cleanup;
            }

            if (virSetCloseExec(pipeout[0]) == -1) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("Failed to set close-on-exec file descriptor flag"));
                goto cleanup;
            }

            childout = pipeout[1];
        } else {
            childout = *outfd;
171
        }
172 173 174 175
#ifndef ENABLE_DEBUG
    } else {
        childout = null;
#endif
176
    }
177 178 179 180 181 182 183 184 185

    if (errfd != NULL) {
        if (*errfd == -1) {
            if (pipe(pipeerr) < 0) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("Failed to create pipe: %s"), strerror(errno));
                goto cleanup;
            }

186
            if ((flags & VIR_EXEC_NONBLOCK) &&
187 188 189 190 191 192 193 194 195 196 197 198 199 200 201
                virSetNonBlock(pipeerr[0]) == -1) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("Failed to set non-blocking file descriptor flag"));
                goto cleanup;
            }

            if (virSetCloseExec(pipeerr[0]) == -1) {
                ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                            _("Failed to set close-on-exec file descriptor flag"));
                goto cleanup;
            }

            childerr = pipeerr[1];
        } else {
            childerr = *errfd;
202
        }
203 204 205 206
#ifndef ENABLE_DEBUG
    } else {
        childerr = null;
#endif
207 208
    }

209
    if ((pid = fork()) < 0) {
210
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
211
                    _("cannot fork child process: %s"), strerror(errno));
212 213 214 215 216
        goto cleanup;
    }

    if (pid) { /* parent */
        close(null);
217
        if (outfd && *outfd == -1) {
218 219 220
            close(pipeout[1]);
            *outfd = pipeout[0];
        }
221
        if (errfd && *errfd == -1) {
222 223 224
            close(pipeerr[1]);
            *errfd = pipeerr[0];
        }
225 226 227 228 229 230 231 232 233 234

        /* Restore our original signal mask now child is safely
           running */
        if (pthread_sigmask(SIG_SETMASK, &oldmask, NULL) != 0) {
            ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                        _("cannot unblock signals: %s"),
                        strerror(errno));
            return -1;
        }

235 236 237 238 239 240
        *retpid = pid;
        return 0;
    }

    /* child */

241 242 243 244 245 246 247 248
    /* Don't want to report errors against this accidentally, so
       just discard it */
    conn = NULL;
    /* Remove any error callback too, so errors in child now
       get sent to stderr where they stand a fighting chance
       of being seen / logged */
    virSetErrorFunc(NULL, NULL);

249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272
    /* Clear out all signal handlers from parent so nothing
       unexpected can happen in our child once we unblock
       signals */
    sig_action.sa_handler = SIG_DFL;
    sig_action.sa_flags = 0;
    sigemptyset(&sig_action.sa_mask);

    for (i = 1 ; i < NSIG ; i++)
        /* Only possible errors are EFAULT or EINVAL
           The former wont happen, the latter we
           expect, so no need to check return value */
        sigaction(i, &sig_action, NULL);

    /* Unmask all signals in child, since we've no idea
       what the caller's done with their signal mask
       and don't want to propagate that to children */
    sigemptyset(&newmask);
    if (pthread_sigmask(SIG_SETMASK, &newmask, NULL) != 0) {
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("cannot unblock signals: %s"),
                    strerror(errno));
        return -1;
    }

273 274 275 276 277
    openmax = sysconf (_SC_OPEN_MAX);
    for (i = 3; i < openmax; i++)
        if (i != infd &&
            i != null &&
            i != childout &&
278 279 280
            i != childerr &&
            (!keepfd ||
             !FD_ISSET(i, keepfd)))
281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
            close(i);

    if (flags & VIR_EXEC_DAEMON) {
        if (setsid() < 0) {
            ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                        _("cannot become session leader: %s"),
                        strerror(errno));
            _exit(1);
        }

        if (chdir("/") < 0) {
            ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                        _("cannot change to root directory: %s"),
                        strerror(errno));
            _exit(1);
        }

        pid = fork();
        if (pid < 0) {
            ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                        _("cannot fork child process: %s"),
                        strerror(errno));
            _exit(1);
        }

        if (pid > 0)
            _exit(0);
    }
309

310

311 312 313
    if (dup2(infd >= 0 ? infd : null, STDIN_FILENO) < 0) {
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("failed to setup stdin file handle: %s"), strerror(errno));
314
        _exit(1);
315
    }
316 317
    if (childout > 0 &&
        dup2(childout, STDOUT_FILENO) < 0) {
318 319
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("failed to setup stdout file handle: %s"), strerror(errno));
320
        _exit(1);
321
    }
322 323
    if (childerr > 0 &&
        dup2(childerr, STDERR_FILENO) < 0) {
324 325
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("failed to setup stderr file handle: %s"), strerror(errno));
326
        _exit(1);
327
    }
328 329

    close(null);
330 331 332 333 334
    if (childout > 0)
        close(childout);
    if (childerr > 0 &&
        childerr != childout)
        close(childerr);
335

336 337 338 339
    if (envp)
        execve(argv[0], (char **) argv, (char**)envp);
    else
        execvp(argv[0], (char **) argv);
340

341 342 343 344
    ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                _("cannot execute binary '%s': %s"),
                argv[0], strerror(errno));

345 346 347 348 349
    _exit(1);

    return 0;

 cleanup:
350 351 352 353 354 355
    /* This is cleanup of parent process only - child
       should never jump here on error */

    /* NB we don't ReportError() on any failures here
       because the code which jumped hre already raised
       an error condition which we must not overwrite */
356 357 358 359 360 361 362 363 364 365 366 367 368
    if (pipeerr[0] > 0)
        close(pipeerr[0]);
    if (pipeerr[1] > 0)
        close(pipeerr[1]);
    if (pipeout[0] > 0)
        close(pipeout[0]);
    if (pipeout[1] > 0)
        close(pipeout[1]);
    if (null > 0)
        close(null);
    return -1;
}

369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385
/**
 * @conn connection to report errors against
 * @argv NULL terminated argv to run
 * @status optional variable to return exit status in
 *
 * Run a command without using the shell.
 *
 * If status is NULL, then return 0 if the command run and
 * exited with 0 status; Otherwise return -1
 *
 * If status is not-NULL, then return 0 if the command ran.
 * The status variable is filled with the command exit status
 * and should be checked by caller for success. Return -1
 * only if the command could not be run.
 */
int
virRun(virConnectPtr conn,
386
       const char *const*argv,
387 388 389
       int *status) {
    int childpid, exitstatus, ret;

390 391
    if ((ret = virExec(conn, argv, NULL, NULL,
                       &childpid, -1, NULL, NULL, VIR_EXEC_NONE)) < 0)
392 393 394
        return ret;

    while ((ret = waitpid(childpid, &exitstatus, 0) == -1) && errno == EINTR);
395 396 397 398
    if (ret == -1) {
        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("cannot wait for '%s': %s"),
                    argv[0], strerror(errno));
399
        return -1;
400
    }
401 402 403

    if (status == NULL) {
        errno = EINVAL;
404 405 406 407 408 409 410 411 412
        if (WIFEXITED(exitstatus) && WEXITSTATUS(exitstatus) == 0)
            return 0;

        ReportError(conn, VIR_ERR_INTERNAL_ERROR,
                    _("%s exited with non-zero status %d and signal %d"),
                    argv[0],
                    WIFEXITED(exitstatus) ? WEXITSTATUS(exitstatus) : 0,
                    WIFSIGNALED(exitstatus) ? WTERMSIG(exitstatus) : 0);
        return -1;
413 414 415 416 417 418
    } else {
        *status = exitstatus;
        return 0;
    }
}

419 420 421 422
#else /* __MINGW32__ */

int
virExec(virConnectPtr conn,
A
Atsushi SAKAI 已提交
423
        const char *const*argv ATTRIBUTE_UNUSED,
D
Daniel P. Berrange 已提交
424 425
        const char *const*envp ATTRIBUTE_UNUSED,
        const fd_set *keepfd ATTRIBUTE_UNUSED,
426 427 428
        int *retpid ATTRIBUTE_UNUSED,
        int infd ATTRIBUTE_UNUSED,
        int *outfd ATTRIBUTE_UNUSED,
D
Daniel P. Berrange 已提交
429 430
        int *errfd ATTRIBUTE_UNUSED,
        int flags ATTRIBUTE_UNUSED)
431
{
432
    ReportError (conn, VIR_ERR_INTERNAL_ERROR, __FUNCTION__);
433 434 435 436 437
    return -1;
}

#endif /* __MINGW32__ */

438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
/* Like gnulib's fread_file, but read no more than the specified maximum
   number of bytes.  If the length of the input is <= max_len, and
   upon error while reading that data, it works just like fread_file.  */
static char *
fread_file_lim (FILE *stream, size_t max_len, size_t *length)
{
    char *buf = NULL;
    size_t alloc = 0;
    size_t size = 0;
    int save_errno;

    for (;;) {
        size_t count;
        size_t requested;

        if (size + BUFSIZ + 1 > alloc) {
            alloc += alloc / 2;
            if (alloc < size + BUFSIZ + 1)
                alloc = size + BUFSIZ + 1;

458
            if (VIR_REALLOC_N(buf, alloc) < 0) {
459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483
                save_errno = errno;
                break;
            }
        }

        /* Ensure that (size + requested <= max_len); */
        requested = MIN (size < max_len ? max_len - size : 0,
                         alloc - size - 1);
        count = fread (buf + size, 1, requested, stream);
        size += count;

        if (count != requested || requested == 0) {
            save_errno = errno;
            if (ferror (stream))
                break;
            buf[size] = '\0';
            *length = size;
            return buf;
        }
    }

    free (buf);
    errno = save_errno;
    return NULL;
}
484

485 486 487
/* A wrapper around fread_file_lim that maps a failure due to
   exceeding the maximum size limitation to EOVERFLOW.  */
static int virFileReadLimFP(FILE *fp, int maxlen, char **buf)
488
{
489
    size_t len;
490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523
    char *s = fread_file_lim (fp, maxlen+1, &len);
    if (s == NULL)
        return -1;
    if (len > maxlen || (int)len != len) {
        VIR_FREE(s);
        /* There was at least one byte more than MAXLEN.
           Set errno accordingly. */
        errno = EOVERFLOW;
        return -1;
    }
    *buf = s;
    return len;
}

/* Like virFileReadLimFP, but use a file descriptor rather than a FILE*.  */
int __virFileReadLimFD(int fd_arg, int maxlen, char **buf)
{
    int fd = dup (fd_arg);
    if (fd >= 0) {
        FILE *fp = fdopen (fd, "r");
        if (fp) {
            int len = virFileReadLimFP (fp, maxlen, buf);
            int saved_errno = errno;
            fclose (fp);
            errno = saved_errno;
            return len;
        } else {
            int saved_errno = errno;
            close (fd);
            errno = saved_errno;
        }
    }
    return -1;
}
524

525 526 527 528
int __virFileReadAll(const char *path, int maxlen, char **buf)
{
    FILE *fh = fopen(path, "r");
    if (fh == NULL) {
529
        virLog("Failed to open file '%s': %s\n",
530
               path, strerror(errno));
531
        return -1;
532 533
    }

534 535 536
    int len = virFileReadLimFP (fh, maxlen, buf);
    fclose(fh);
    if (len < 0) {
537
        virLog("Failed to read '%s': %s\n", path, strerror (errno));
538
        return -1;
539 540
    }

541
    return len;
542 543 544 545 546 547 548 549 550 551 552
}

int virFileMatchesNameSuffix(const char *file,
                             const char *name,
                             const char *suffix)
{
    int filelen = strlen(file);
    int namelen = strlen(name);
    int suffixlen = strlen(suffix);

    if (filelen == (namelen + suffixlen) &&
553 554
        STREQLEN(file, name, namelen) &&
        STREQLEN(file + namelen, suffix, suffixlen))
555 556 557 558 559 560 561 562 563 564 565 566 567 568
        return 1;
    else
        return 0;
}

int virFileHasSuffix(const char *str,
                     const char *suffix)
{
    int len = strlen(str);
    int suffixlen = strlen(suffix);

    if (len < suffixlen)
        return 0;

569
    return STREQ(str + len - suffixlen, suffix);
570 571
}

J
Jim Meyering 已提交
572 573 574
#define SAME_INODE(Stat_buf_1, Stat_buf_2) \
  ((Stat_buf_1).st_ino == (Stat_buf_2).st_ino \
   && (Stat_buf_1).st_dev == (Stat_buf_2).st_dev)
575

J
Jim Meyering 已提交
576 577
/* Return nonzero if checkLink and checkDest
   refer to the same file.  Otherwise, return 0.  */
578 579 580
int virFileLinkPointsTo(const char *checkLink,
                        const char *checkDest)
{
J
Jim Meyering 已提交
581 582
    struct stat src_sb;
    struct stat dest_sb;
583

J
Jim Meyering 已提交
584 585 586
    return (stat (checkLink, &src_sb) == 0
            && stat (checkDest, &dest_sb) == 0
            && SAME_INODE (src_sb, dest_sb));
587 588
}

589 590 591 592 593 594 595 596 597
int virFileExists(const char *path)
{
    struct stat st;

    if (stat(path, &st) >= 0)
        return(1);
    return(0);
}

598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613
int virFileMakePath(const char *path)
{
    struct stat st;
    char parent[PATH_MAX];
    char *p;
    int err;

    if (stat(path, &st) >= 0)
        return 0;

    strncpy(parent, path, PATH_MAX);
    parent[PATH_MAX - 1] = '\0';

    if (!(p = strrchr(parent, '/')))
        return EINVAL;

614 615 616 617 618
    if (p != parent) {
        *p = '\0';
        if ((err = virFileMakePath(parent)))
            return err;
    }
619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644

    if (mkdir(path, 0777) < 0 && errno != EEXIST)
        return errno;

    return 0;
}

/* Build up a fully qualfiied path for a config file to be
 * associated with a persistent guest or network */
int virFileBuildPath(const char *dir,
                     const char *name,
                     const char *ext,
                     char *buf,
                     unsigned int buflen)
{
    if ((strlen(dir) + 1 + strlen(name) + (ext ? strlen(ext) : 0) + 1) >= (buflen-1))
        return -1;

    strcpy(buf, dir);
    strcat(buf, "/");
    strcat(buf, name);
    if (ext)
        strcat(buf, ext);
    return 0;
}

645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807

#ifdef __linux__
int virFileOpenTty(int *ttymaster,
                   char **ttyName,
                   int rawmode)
{
    int rc = -1;

    if ((*ttymaster = posix_openpt(O_RDWR|O_NOCTTY|O_NONBLOCK)) < 0)
        goto cleanup;

    if (unlockpt(*ttymaster) < 0)
        goto cleanup;

    if (grantpt(*ttymaster) < 0)
        goto cleanup;

    if (rawmode) {
        struct termios ttyAttr;
        if (tcgetattr(*ttymaster, &ttyAttr) < 0)
            goto cleanup;

        cfmakeraw(&ttyAttr);

        if (tcsetattr(*ttymaster, TCSADRAIN, &ttyAttr) < 0)
            goto cleanup;
    }

    if (ttyName) {
        char tempTtyName[PATH_MAX];
        if (ptsname_r(*ttymaster, tempTtyName, sizeof(tempTtyName)) < 0)
            goto cleanup;

        if ((*ttyName = strdup(tempTtyName)) == NULL) {
            errno = ENOMEM;
            goto cleanup;
        }
    }

    rc = 0;

cleanup:
    if (rc != 0 &&
        *ttymaster != -1) {
        close(*ttymaster);
    }

    return rc;

}
#else
int virFileOpenTty(int *ttymaster ATTRIBUTE_UNUSED,
                   char **ttyName ATTRIBUTE_UNUSED,
                   int rawmode ATTRIBUTE_UNUSED)
{
    return -1;
}
#endif


int virFileWritePid(const char *dir,
                    const char *name,
                    pid_t pid)
{
    int rc;
    int fd;
    FILE *file = NULL;
    char *pidfile = NULL;

    if ((rc = virFileMakePath(dir)))
        goto cleanup;

    if (asprintf(&pidfile, "%s/%s.pid", dir, name) < 0) {
        rc = ENOMEM;
        goto cleanup;
    }

    if ((fd = open(pidfile,
                   O_WRONLY | O_CREAT | O_TRUNC,
                   S_IRUSR | S_IWUSR)) < 0) {
        rc = errno;
        goto cleanup;
    }

    if (!(file = fdopen(fd, "w"))) {
        rc = errno;
        close(fd);
        goto cleanup;
    }

    if (fprintf(file, "%d", pid) < 0) {
        rc = errno;
        goto cleanup;
    }

    rc = 0;

cleanup:
    if (file &&
        fclose(file) < 0) {
        rc = errno;
    }

    VIR_FREE(pidfile);
    return rc;
}

int virFileReadPid(const char *dir,
                   const char *name,
                   pid_t *pid)
{
    int rc;
    FILE *file;
    char *pidfile = NULL;
    *pid = 0;
    if (asprintf(&pidfile, "%s/%s.pid", dir, name) < 0) {
        rc = ENOMEM;
        goto cleanup;
    }

    if (!(file = fopen(pidfile, "r"))) {
        rc = errno;
        goto cleanup;
    }

    if (fscanf(file, "%d", pid) != 1) {
        rc = EINVAL;
        goto cleanup;
    }

    if (fclose(file) < 0) {
        rc = errno;
        goto cleanup;
    }

    rc = 0;

 cleanup:
    VIR_FREE(pidfile);
    return rc;
}

int virFileDeletePid(const char *dir,
                     const char *name)
{
    int rc = 0;
    char *pidfile = NULL;

    if (asprintf(&pidfile, "%s/%s.pid", dir, name) < 0) {
        rc = errno;
        goto cleanup;
    }

    if (unlink(pidfile) < 0 && errno != ENOENT)
        rc = errno;

cleanup:
    VIR_FREE(pidfile);
    return rc;
}



808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871
/* Like strtol, but produce an "int" result, and check more carefully.
   Return 0 upon success;  return -1 to indicate failure.
   When END_PTR is NULL, the byte after the final valid digit must be NUL.
   Otherwise, it's like strtol and lets the caller check any suffix for
   validity.  This function is careful to return -1 when the string S
   represents a number that is not representable as an "int". */
int
__virStrToLong_i(char const *s, char **end_ptr, int base, int *result)
{
    long int val;
    char *p;
    int err;

    errno = 0;
    val = strtol(s, &p, base);
    err = (errno || (!end_ptr && *p) || p == s || (int) val != val);
    if (end_ptr)
        *end_ptr = p;
    if (err)
        return -1;
    *result = val;
    return 0;
}

/* Just like virStrToLong_i, above, but produce an "unsigned int" value.  */
int
virStrToLong_ui(char const *s, char **end_ptr, int base, unsigned int *result)
{
    unsigned long int val;
    char *p;
    int err;

    errno = 0;
    val = strtoul(s, &p, base);
    err = (errno || (!end_ptr && *p) || p == s || (unsigned int) val != val);
    if (end_ptr)
        *end_ptr = p;
    if (err)
        return -1;
    *result = val;
    return 0;
}

/* Just like virStrToLong_i, above, but produce an "long long" value.  */
int
virStrToLong_ll(char const *s, char **end_ptr, int base, long long *result)
{
    long long val;
    char *p;
    int err;

    errno = 0;
    val = strtoll(s, &p, base);
    err = (errno || (!end_ptr && *p) || p == s || (long long) val != val);
    if (end_ptr)
        *end_ptr = p;
    if (err)
        return -1;
    *result = val;
    return 0;
}

/* Just like virStrToLong_i, above, but produce an "unsigned long long" value.  */
int
872
__virStrToLong_ull(char const *s, char **end_ptr, int base, unsigned long long *result)
873 874 875 876 877 878 879 880 881 882 883 884 885 886 887
{
    unsigned long long val;
    char *p;
    int err;

    errno = 0;
    val = strtoull(s, &p, base);
    err = (errno || (!end_ptr && *p) || p == s || (unsigned long long) val != val);
    if (end_ptr)
        *end_ptr = p;
    if (err)
        return -1;
    *result = val;
    return 0;
}
888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926
#endif /* PROXY */

/**
 * virSkipSpaces:
 * @str: pointer to the char pointer used
 *
 * Skip potential blanks, this includes space tabs, line feed,
 * carriage returns and also '\\' which can be erronously emitted
 * by xend
 */
void
virSkipSpaces(const char **str)
{
    const char *cur = *str;

    while ((*cur == ' ') || (*cur == '\t') || (*cur == '\n') ||
           (*cur == '\r') || (*cur == '\\'))
        cur++;
    *str = cur;
}

/**
 * virParseNumber:
 * @str: pointer to the char pointer used
 *
 * Parse an unsigned number
 *
 * Returns the unsigned number or -1 in case of error. @str will be
 *         updated to skip the number.
 */
int
virParseNumber(const char **str)
{
    int ret = 0;
    const char *cur = *str;

    if ((*cur < '0') || (*cur > '9'))
        return (-1);

J
Jim Meyering 已提交
927
    while (c_isdigit(*cur)) {
928 929 930 931 932 933 934 935 936 937 938
        unsigned int c = *cur - '0';

        if ((ret > INT_MAX / 10) ||
            ((ret == INT_MAX / 10) && (c > INT_MAX % 10)))
            return (-1);
        ret = ret * 10 + c;
        cur++;
    }
    *str = cur;
    return (ret);
}
939

940 941
/* Compare two MAC addresses, ignoring differences in case,
 * as well as leading zeros.
942 943
 */
int
944
__virMacAddrCompare (const char *p, const char *q)
945
{
946 947
    unsigned char c, d;
    do {
948
        while (*p == '0' && c_isxdigit (p[1]))
949
            ++p;
950
        while (*q == '0' && c_isxdigit (q[1]))
951
            ++q;
952 953
        c = c_tolower (*p);
        d = c_tolower (*q);
954 955 956 957 958 959 960 961 962 963 964 965 966 967 968

        if (c == 0 || d == 0)
            break;

        ++p;
        ++q;
    } while (c == d);

    if (UCHAR_MAX <= INT_MAX)
        return c - d;

    /* On machines where 'char' and 'int' are types of the same size, the
       difference of two 'unsigned char' values - including the sign bit -
       doesn't fit in an 'int'.  */
    return (c > d ? 1 : c < d ? -1 : 0);
969 970
}

971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992
/**
 * virParseMacAddr:
 * @str: string representation of MAC address, e.g., "0:1E:FC:E:3a:CB"
 * @addr: 6-byte MAC address
 *
 * Parse a MAC address
 *
 * Return 0 upon success, or -1 in case of error.
 */
int
virParseMacAddr(const char* str, unsigned char *addr)
{
    int i;

    errno = 0;
    for (i = 0; i < 6; i++) {
        char *end_ptr;
        unsigned long result;

        /* This is solely to avoid accepting the leading
         * space or "+" that strtoul would otherwise accept.
         */
993
        if (!c_isxdigit(*str))
994 995 996 997 998 999 1000 1001 1002 1003 1004
            break;

        result = strtoul(str, &end_ptr, 16);

        if ((end_ptr - str) < 1 || 2 < (end_ptr - str) ||
            (errno != 0) ||
            (0xFF < result))
            break;

        addr[i] = (unsigned char) result;

1005 1006 1007 1008
        if ((i == 5) && (*end_ptr == '\0'))
            return 0;
        if (*end_ptr != ':')
            break;
1009 1010 1011 1012 1013 1014

        str = end_ptr + 1;
    }

    return -1;
}
1015

1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037
int virEnumFromString(const char *const*types,
                      unsigned int ntypes,
                      const char *type)
{
    unsigned int i;
    for (i = 0 ; i < ntypes ; i++)
        if (STREQ(types[i], type))
            return i;

    return -1;
}

const char *virEnumToString(const char *const*types,
                            unsigned int ntypes,
                            int type)
{
    if (type < 0 || type >= ntypes)
        return NULL;

    return types[type];
}

1038
/* Translates a device name of the form (regex) "[fhv]d[a-z]+" into
D
Daniel Veillard 已提交
1039
 * the corresponding index (e.g. sda => 0, hdz => 25, vdaa => 26)
1040 1041 1042 1043 1044 1045
 * @param name The name of the device
 * @return name's index, or -1 on failure
 */
int virDiskNameToIndex(const char *name) {
    const char *ptr = NULL;
    int idx = 0;
1046 1047
    static char const* const drive_prefix[] = {"fd", "hd", "vd", "sd", "xvd"};
    unsigned int i;
1048

1049 1050 1051
    for (i = 0; i < ARRAY_CARDINALITY(drive_prefix); i++) {
        if (STRPREFIX(name, drive_prefix[i])) {
            ptr = name + strlen(drive_prefix[i]);
1052
            break;
1053
        }
1054 1055
    }

1056
    if (!ptr)
1057 1058
        return -1;

D
Daniel Veillard 已提交
1059 1060
    for (i = 0; *ptr; i++) {
        idx = (idx + i) * 26;
1061

J
Jim Meyering 已提交
1062
        if (!c_islower(*ptr))
1063 1064 1065 1066 1067 1068 1069 1070
            return -1;

        idx += *ptr - 'a';
        ptr++;
    }

    return idx;
}