mirror of https://gitee.com/openkylin/qemu.git
qga: move agent run in a separate function
Once the options are populated, move the running state to a run_agent() function. Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> Reviewed-by: Michael Roth <mdroth@linux.vnet.ibm.com> Reviewed-by: Denis V. Lunev <den@openvz.org> * fixed up an s/ga_state/s/ artifact causing segfault * replaced g_list_free_full with g_list_foreach to maintain glib 2.22 compatibility Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
This commit is contained in:
parent
ef8be55429
commit
e3d3103975
285
qga/main.c
285
qga/main.c
|
@ -1059,9 +1059,147 @@ static void config_free(GAConfig *config)
|
||||||
g_free(config);
|
g_free(config);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static bool check_is_frozen(GAState *s)
|
||||||
|
{
|
||||||
|
#ifndef _WIN32
|
||||||
|
/* check if a previous instance of qemu-ga exited with filesystems' state
|
||||||
|
* marked as frozen. this could be a stale value (a non-qemu-ga process
|
||||||
|
* or reboot may have since unfrozen them), but better to require an
|
||||||
|
* uneeded unfreeze than to risk hanging on start-up
|
||||||
|
*/
|
||||||
|
struct stat st;
|
||||||
|
if (stat(s->state_filepath_isfrozen, &st) == -1) {
|
||||||
|
/* it's okay if the file doesn't exist, but if we can't access for
|
||||||
|
* some other reason, such as permissions, there's a configuration
|
||||||
|
* that needs to be addressed. so just bail now before we get into
|
||||||
|
* more trouble later
|
||||||
|
*/
|
||||||
|
if (errno != ENOENT) {
|
||||||
|
g_critical("unable to access state file at path %s: %s",
|
||||||
|
s->state_filepath_isfrozen, strerror(errno));
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
g_warning("previous instance appears to have exited with frozen"
|
||||||
|
" filesystems. deferring logging/pidfile creation and"
|
||||||
|
" disabling non-fsfreeze-safe commands until"
|
||||||
|
" guest-fsfreeze-thaw is issued, or filesystems are"
|
||||||
|
" manually unfrozen and the file %s is removed",
|
||||||
|
s->state_filepath_isfrozen);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int run_agent(GAState *s, GAConfig *config)
|
||||||
|
{
|
||||||
|
ga_state = s;
|
||||||
|
|
||||||
|
g_log_set_default_handler(ga_log, s);
|
||||||
|
g_log_set_fatal_mask(NULL, G_LOG_LEVEL_ERROR);
|
||||||
|
ga_enable_logging(s);
|
||||||
|
|
||||||
|
#ifdef _WIN32
|
||||||
|
/* On win32 the state directory is application specific (be it the default
|
||||||
|
* or a user override). We got past the command line parsing; let's create
|
||||||
|
* the directory (with any intermediate directories). If we run into an
|
||||||
|
* error later on, we won't try to clean up the directory, it is considered
|
||||||
|
* persistent.
|
||||||
|
*/
|
||||||
|
if (g_mkdir_with_parents(config->state_dir, S_IRWXU) == -1) {
|
||||||
|
g_critical("unable to create (an ancestor of) the state directory"
|
||||||
|
" '%s': %s", config->state_dir, strerror(errno));
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (ga_is_frozen(s)) {
|
||||||
|
if (config->daemonize) {
|
||||||
|
/* delay opening/locking of pidfile till filesystems are unfrozen */
|
||||||
|
s->deferred_options.pid_filepath = config->pid_filepath;
|
||||||
|
become_daemon(NULL);
|
||||||
|
}
|
||||||
|
if (config->log_filepath) {
|
||||||
|
/* delay opening the log file till filesystems are unfrozen */
|
||||||
|
s->deferred_options.log_filepath = config->log_filepath;
|
||||||
|
}
|
||||||
|
ga_disable_logging(s);
|
||||||
|
qmp_for_each_command(ga_disable_non_whitelisted, NULL);
|
||||||
|
} else {
|
||||||
|
if (config->daemonize) {
|
||||||
|
become_daemon(config->pid_filepath);
|
||||||
|
}
|
||||||
|
if (config->log_filepath) {
|
||||||
|
FILE *log_file = ga_open_logfile(config->log_filepath);
|
||||||
|
if (!log_file) {
|
||||||
|
g_critical("unable to open specified log file: %s",
|
||||||
|
strerror(errno));
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
s->log_file = log_file;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* load persistent state from disk */
|
||||||
|
if (!read_persistent_state(&s->pstate,
|
||||||
|
s->pstate_filepath,
|
||||||
|
ga_is_frozen(s))) {
|
||||||
|
g_critical("failed to load persistent state");
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
config->blacklist = ga_command_blacklist_init(config->blacklist);
|
||||||
|
if (config->blacklist) {
|
||||||
|
GList *l = config->blacklist;
|
||||||
|
s->blacklist = config->blacklist;
|
||||||
|
do {
|
||||||
|
g_debug("disabling command: %s", (char *)l->data);
|
||||||
|
qmp_disable_command(l->data);
|
||||||
|
l = g_list_next(l);
|
||||||
|
} while (l);
|
||||||
|
}
|
||||||
|
s->command_state = ga_command_state_new();
|
||||||
|
ga_command_state_init(s, s->command_state);
|
||||||
|
ga_command_state_init_all(s->command_state);
|
||||||
|
json_message_parser_init(&s->parser, process_event);
|
||||||
|
ga_state = s;
|
||||||
|
#ifndef _WIN32
|
||||||
|
if (!register_signal_handlers()) {
|
||||||
|
g_critical("failed to register signal handlers");
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
s->main_loop = g_main_loop_new(NULL, false);
|
||||||
|
if (!channel_init(ga_state, config->method, config->channel_path)) {
|
||||||
|
g_critical("failed to initialize guest agent channel");
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
#ifndef _WIN32
|
||||||
|
g_main_loop_run(ga_state->main_loop);
|
||||||
|
#else
|
||||||
|
if (config->daemonize) {
|
||||||
|
SERVICE_TABLE_ENTRY service_table[] = {
|
||||||
|
{ (char *)QGA_SERVICE_NAME, service_main }, { NULL, NULL } };
|
||||||
|
StartServiceCtrlDispatcher(service_table);
|
||||||
|
} else {
|
||||||
|
g_main_loop_run(ga_state->main_loop);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return EXIT_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void free_blacklist_entry(gpointer entry, gpointer unused)
|
||||||
|
{
|
||||||
|
g_free(entry);
|
||||||
|
}
|
||||||
|
|
||||||
int main(int argc, char **argv)
|
int main(int argc, char **argv)
|
||||||
{
|
{
|
||||||
GAState *s;
|
int ret = EXIT_SUCCESS;
|
||||||
|
GAState *s = g_new0(GAState, 1);
|
||||||
GAConfig *config;
|
GAConfig *config;
|
||||||
|
|
||||||
module_call_init(MODULE_INIT_QAPI);
|
module_call_init(MODULE_INIT_QAPI);
|
||||||
|
@ -1091,156 +1229,37 @@ int main(int argc, char **argv)
|
||||||
config->channel_path = g_strdup(QGA_SERIAL_PATH_DEFAULT);
|
config->channel_path = g_strdup(QGA_SERIAL_PATH_DEFAULT);
|
||||||
} else {
|
} else {
|
||||||
g_critical("must specify a path for this channel");
|
g_critical("must specify a path for this channel");
|
||||||
goto out_bad;
|
ret = EXIT_FAILURE;
|
||||||
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef _WIN32
|
|
||||||
/* On win32 the state directory is application specific (be it the default
|
|
||||||
* or a user override). We got past the command line parsing; let's create
|
|
||||||
* the directory (with any intermediate directories). If we run into an
|
|
||||||
* error later on, we won't try to clean up the directory, it is considered
|
|
||||||
* persistent.
|
|
||||||
*/
|
|
||||||
if (g_mkdir_with_parents(config->state_dir, S_IRWXU) == -1) {
|
|
||||||
g_critical("unable to create (an ancestor of) the state directory"
|
|
||||||
" '%s': %s", config->state_dir, strerror(errno));
|
|
||||||
return EXIT_FAILURE;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
s = g_malloc0(sizeof(GAState));
|
|
||||||
s->log_level = config->log_level;
|
s->log_level = config->log_level;
|
||||||
s->log_file = stderr;
|
s->log_file = stderr;
|
||||||
#ifdef CONFIG_FSFREEZE
|
#ifdef CONFIG_FSFREEZE
|
||||||
s->fsfreeze_hook = config->fsfreeze_hook;
|
s->fsfreeze_hook = config->fsfreeze_hook;
|
||||||
#endif
|
#endif
|
||||||
g_log_set_default_handler(ga_log, s);
|
s->pstate_filepath = g_strdup_printf("%s/qga.state", config->state_dir);
|
||||||
g_log_set_fatal_mask(NULL, G_LOG_LEVEL_ERROR);
|
|
||||||
ga_enable_logging(s);
|
|
||||||
s->state_filepath_isfrozen = g_strdup_printf("%s/qga.state.isfrozen",
|
s->state_filepath_isfrozen = g_strdup_printf("%s/qga.state.isfrozen",
|
||||||
config->state_dir);
|
config->state_dir);
|
||||||
s->pstate_filepath = g_strdup_printf("%s/qga.state", config->state_dir);
|
s->frozen = check_is_frozen(s);
|
||||||
s->frozen = false;
|
|
||||||
|
|
||||||
#ifndef _WIN32
|
ret = run_agent(s, config);
|
||||||
/* check if a previous instance of qemu-ga exited with filesystems' state
|
|
||||||
* marked as frozen. this could be a stale value (a non-qemu-ga process
|
|
||||||
* or reboot may have since unfrozen them), but better to require an
|
|
||||||
* uneeded unfreeze than to risk hanging on start-up
|
|
||||||
*/
|
|
||||||
struct stat st;
|
|
||||||
if (stat(s->state_filepath_isfrozen, &st) == -1) {
|
|
||||||
/* it's okay if the file doesn't exist, but if we can't access for
|
|
||||||
* some other reason, such as permissions, there's a configuration
|
|
||||||
* that needs to be addressed. so just bail now before we get into
|
|
||||||
* more trouble later
|
|
||||||
*/
|
|
||||||
if (errno != ENOENT) {
|
|
||||||
g_critical("unable to access state file at path %s: %s",
|
|
||||||
s->state_filepath_isfrozen, strerror(errno));
|
|
||||||
return EXIT_FAILURE;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
g_warning("previous instance appears to have exited with frozen"
|
|
||||||
" filesystems. deferring logging/pidfile creation and"
|
|
||||||
" disabling non-fsfreeze-safe commands until"
|
|
||||||
" guest-fsfreeze-thaw is issued, or filesystems are"
|
|
||||||
" manually unfrozen and the file %s is removed",
|
|
||||||
s->state_filepath_isfrozen);
|
|
||||||
s->frozen = true;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (ga_is_frozen(s)) {
|
end:
|
||||||
if (config->daemonize) {
|
if (s->command_state) {
|
||||||
/* delay opening/locking of pidfile till filesystems are unfrozen */
|
ga_command_state_cleanup_all(s->command_state);
|
||||||
s->deferred_options.pid_filepath = config->pid_filepath;
|
|
||||||
become_daemon(NULL);
|
|
||||||
}
|
|
||||||
if (config->log_filepath) {
|
|
||||||
/* delay opening the log file till filesystems are unfrozen */
|
|
||||||
s->deferred_options.log_filepath = config->log_filepath;
|
|
||||||
}
|
|
||||||
ga_disable_logging(s);
|
|
||||||
qmp_for_each_command(ga_disable_non_whitelisted, NULL);
|
|
||||||
} else {
|
|
||||||
if (config->daemonize) {
|
|
||||||
become_daemon(config->pid_filepath);
|
|
||||||
}
|
|
||||||
if (config->log_filepath) {
|
|
||||||
FILE *log_file = ga_open_logfile(config->log_filepath);
|
|
||||||
if (!log_file) {
|
|
||||||
g_critical("unable to open specified log file: %s",
|
|
||||||
strerror(errno));
|
|
||||||
goto out_bad;
|
|
||||||
}
|
|
||||||
s->log_file = log_file;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
if (s->channel) {
|
||||||
|
ga_channel_free(s->channel);
|
||||||
|
}
|
||||||
|
g_list_foreach(config->blacklist, free_blacklist_entry, NULL);
|
||||||
|
|
||||||
/* load persistent state from disk */
|
|
||||||
if (!read_persistent_state(&s->pstate,
|
|
||||||
s->pstate_filepath,
|
|
||||||
ga_is_frozen(s))) {
|
|
||||||
g_critical("failed to load persistent state");
|
|
||||||
goto out_bad;
|
|
||||||
}
|
|
||||||
|
|
||||||
config->blacklist = ga_command_blacklist_init(config->blacklist);
|
|
||||||
if (config->blacklist) {
|
|
||||||
GList *l = config->blacklist;
|
|
||||||
s->blacklist = config->blacklist;
|
|
||||||
do {
|
|
||||||
g_debug("disabling command: %s", (char *)l->data);
|
|
||||||
qmp_disable_command(l->data);
|
|
||||||
l = g_list_next(l);
|
|
||||||
} while (l);
|
|
||||||
}
|
|
||||||
s->command_state = ga_command_state_new();
|
|
||||||
ga_command_state_init(s, s->command_state);
|
|
||||||
ga_command_state_init_all(s->command_state);
|
|
||||||
json_message_parser_init(&s->parser, process_event);
|
|
||||||
ga_state = s;
|
|
||||||
#ifndef _WIN32
|
|
||||||
if (!register_signal_handlers()) {
|
|
||||||
g_critical("failed to register signal handlers");
|
|
||||||
goto out_bad;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
s->main_loop = g_main_loop_new(NULL, false);
|
|
||||||
if (!channel_init(ga_state, config->method, config->channel_path)) {
|
|
||||||
g_critical("failed to initialize guest agent channel");
|
|
||||||
goto out_bad;
|
|
||||||
}
|
|
||||||
#ifndef _WIN32
|
|
||||||
g_main_loop_run(ga_state->main_loop);
|
|
||||||
#else
|
|
||||||
if (config->daemonize) {
|
|
||||||
SERVICE_TABLE_ENTRY service_table[] = {
|
|
||||||
{ (char *)QGA_SERVICE_NAME, service_main }, { NULL, NULL } };
|
|
||||||
StartServiceCtrlDispatcher(service_table);
|
|
||||||
} else {
|
|
||||||
g_main_loop_run(ga_state->main_loop);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
g_list_free_full(ga_state->blacklist, g_free);
|
|
||||||
ga_command_state_cleanup_all(ga_state->command_state);
|
|
||||||
ga_channel_free(ga_state->channel);
|
|
||||||
|
|
||||||
if (config->daemonize) {
|
|
||||||
unlink(config->pid_filepath);
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
out_bad:
|
|
||||||
if (config->daemonize) {
|
if (config->daemonize) {
|
||||||
unlink(config->pid_filepath);
|
unlink(config->pid_filepath);
|
||||||
}
|
}
|
||||||
|
|
||||||
config_free(config);
|
config_free(config);
|
||||||
|
|
||||||
return EXIT_FAILURE;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue