2008-10-31 21:49:55 +03:00
|
|
|
/*
|
|
|
|
* QEMU System Emulator
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003-2008 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
2016-01-29 20:50:05 +03:00
|
|
|
#include "qemu/osdep.h"
|
2008-10-31 21:49:55 +03:00
|
|
|
#include "qemu-common.h"
|
2016-03-20 20:16:19 +03:00
|
|
|
#include "qemu/cutils.h"
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "monitor/monitor.h"
|
2012-12-17 21:20:04 +04:00
|
|
|
#include "sysemu/sysemu.h"
|
2016-12-12 20:22:24 +03:00
|
|
|
#include "qemu/config-file.h"
|
2015-03-17 20:29:20 +03:00
|
|
|
#include "qemu/error-report.h"
|
2013-04-08 18:55:25 +04:00
|
|
|
#include "sysemu/char.h"
|
2011-09-14 23:05:49 +04:00
|
|
|
#include "qmp-commands.h"
|
2014-10-02 20:17:35 +04:00
|
|
|
#include "qapi-visit.h"
|
2016-03-14 10:44:36 +03:00
|
|
|
#include "sysemu/replay.h"
|
2016-08-16 20:13:52 +03:00
|
|
|
#include "qemu/help_option.h"
|
2008-10-31 21:49:55 +03:00
|
|
|
|
2016-12-12 15:06:14 +03:00
|
|
|
#include "char-mux.h"
|
2016-12-12 17:07:52 +03:00
|
|
|
#include "char-io.h"
|
2016-12-12 20:13:11 +03:00
|
|
|
#include "char-parallel.h"
|
2016-12-12 19:48:49 +03:00
|
|
|
#include "char-serial.h"
|
2016-12-12 15:06:14 +03:00
|
|
|
|
2008-10-31 21:49:55 +03:00
|
|
|
/***********************************************************/
|
|
|
|
/* character device */
|
|
|
|
|
2016-12-14 15:23:36 +03:00
|
|
|
static Object *get_chardevs_root(void)
|
|
|
|
{
|
|
|
|
return container_get(object_get_root(), "/chardevs");
|
|
|
|
}
|
2009-03-06 01:59:58 +03:00
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
void qemu_chr_be_event(Chardev *s, int event)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-10-22 12:53:01 +03:00
|
|
|
CharBackend *be = s->be;
|
|
|
|
|
2010-04-01 20:42:39 +04:00
|
|
|
/* Keep track if the char device is open */
|
|
|
|
switch (event) {
|
|
|
|
case CHR_EVENT_OPENED:
|
2013-03-26 14:07:53 +04:00
|
|
|
s->be_open = 1;
|
2010-04-01 20:42:39 +04:00
|
|
|
break;
|
|
|
|
case CHR_EVENT_CLOSED:
|
2013-03-26 14:07:53 +04:00
|
|
|
s->be_open = 0;
|
2010-04-01 20:42:39 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:53:01 +03:00
|
|
|
if (!be || !be->chr_event) {
|
2008-10-31 21:49:55 +03:00
|
|
|
return;
|
2016-10-22 12:53:01 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
be->chr_event(be->opaque, event);
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
/* Not reporting errors from writing to logfile, as logs are
|
|
|
|
* defined to be "best effort" only */
|
2016-12-07 16:20:22 +03:00
|
|
|
static void qemu_chr_fe_write_log(Chardev *s,
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
const uint8_t *buf, size_t len)
|
|
|
|
{
|
|
|
|
size_t done = 0;
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
if (s->logfd < 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (done < len) {
|
2016-03-31 18:29:27 +03:00
|
|
|
retry:
|
|
|
|
ret = write(s->logfd, buf + done, len - done);
|
|
|
|
if (ret == -1 && errno == EAGAIN) {
|
|
|
|
g_usleep(100);
|
|
|
|
goto retry;
|
|
|
|
}
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
|
|
|
|
if (ret <= 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
done += ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
static int qemu_chr_fe_write_buffer(Chardev *s,
|
|
|
|
const uint8_t *buf, int len, int *offset)
|
2016-03-14 10:44:36 +03:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
ChardevClass *cc = CHARDEV_GET_CLASS(s);
|
2016-03-14 10:44:36 +03:00
|
|
|
int res = 0;
|
|
|
|
*offset = 0;
|
|
|
|
|
|
|
|
qemu_mutex_lock(&s->chr_write_lock);
|
|
|
|
while (*offset < len) {
|
2016-03-31 18:29:27 +03:00
|
|
|
retry:
|
2016-12-07 18:39:10 +03:00
|
|
|
res = cc->chr_write(s, buf + *offset, len - *offset);
|
2016-03-31 18:29:27 +03:00
|
|
|
if (res < 0 && errno == EAGAIN) {
|
|
|
|
g_usleep(100);
|
|
|
|
goto retry;
|
|
|
|
}
|
2016-03-14 10:44:36 +03:00
|
|
|
|
|
|
|
if (res <= 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
*offset += res;
|
|
|
|
}
|
|
|
|
if (*offset > 0) {
|
|
|
|
qemu_chr_fe_write_log(s, buf, *offset);
|
|
|
|
}
|
|
|
|
qemu_mutex_unlock(&s->chr_write_lock);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
static bool qemu_chr_replay(Chardev *chr)
|
2016-10-21 22:58:45 +03:00
|
|
|
{
|
|
|
|
return qemu_chr_has_feature(chr, QEMU_CHAR_FEATURE_REPLAY);
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_write(CharBackend *be, const uint8_t *buf, int len)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-12-07 18:39:10 +03:00
|
|
|
ChardevClass *cc;
|
2014-06-18 10:43:58 +04:00
|
|
|
int ret;
|
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!s) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_PLAY) {
|
2016-03-14 10:44:36 +03:00
|
|
|
int offset;
|
|
|
|
replay_char_write_event_load(&ret, &offset);
|
|
|
|
assert(offset <= len);
|
|
|
|
qemu_chr_fe_write_buffer(s, buf, offset, &offset);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
cc = CHARDEV_GET_CLASS(s);
|
2014-06-18 10:43:58 +04:00
|
|
|
qemu_mutex_lock(&s->chr_write_lock);
|
2016-12-07 18:39:10 +03:00
|
|
|
ret = cc->chr_write(s, buf, len);
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
|
|
|
|
if (ret > 0) {
|
|
|
|
qemu_chr_fe_write_log(s, buf, ret);
|
|
|
|
}
|
|
|
|
|
2014-06-18 10:43:58 +04:00
|
|
|
qemu_mutex_unlock(&s->chr_write_lock);
|
2016-03-14 10:44:36 +03:00
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_RECORD) {
|
2016-03-14 10:44:36 +03:00
|
|
|
replay_char_write_event_save(ret, ret < 0 ? 0 : ret);
|
|
|
|
}
|
|
|
|
|
2014-06-18 10:43:58 +04:00
|
|
|
return ret;
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-12-12 15:06:14 +03:00
|
|
|
int qemu_chr_write_all(Chardev *s, const uint8_t *buf, int len)
|
2013-03-26 19:04:17 +04:00
|
|
|
{
|
2016-03-14 10:44:36 +03:00
|
|
|
int offset;
|
|
|
|
int res;
|
2013-03-26 19:04:17 +04:00
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_PLAY) {
|
2016-03-14 10:44:36 +03:00
|
|
|
replay_char_write_event_load(&res, &offset);
|
|
|
|
assert(offset <= len);
|
|
|
|
qemu_chr_fe_write_buffer(s, buf, offset, &offset);
|
|
|
|
return res;
|
|
|
|
}
|
2013-03-26 19:04:17 +04:00
|
|
|
|
2016-03-14 10:44:36 +03:00
|
|
|
res = qemu_chr_fe_write_buffer(s, buf, len, &offset);
|
2013-03-26 19:04:17 +04:00
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_RECORD) {
|
2016-03-14 10:44:36 +03:00
|
|
|
replay_char_write_event_save(res, offset);
|
2013-03-26 19:04:17 +04:00
|
|
|
}
|
|
|
|
|
2014-06-18 10:43:58 +04:00
|
|
|
if (res < 0) {
|
|
|
|
return res;
|
|
|
|
}
|
2013-03-26 19:04:17 +04:00
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_write_all(CharBackend *be, const uint8_t *buf, int len)
|
2014-05-27 16:03:48 +04:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!s) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
return qemu_chr_write_all(s, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
int qemu_chr_fe_read_all(CharBackend *be, uint8_t *buf, int len)
|
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2014-05-27 16:03:48 +04:00
|
|
|
int offset = 0, counter = 10;
|
|
|
|
int res;
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (!s || !CHARDEV_GET_CLASS(s)->chr_sync_read) {
|
2014-05-27 16:03:48 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2016-10-22 12:52:59 +03:00
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_PLAY) {
|
2016-03-14 10:44:36 +03:00
|
|
|
return replay_char_read_all_load(buf);
|
|
|
|
}
|
2014-05-27 16:03:48 +04:00
|
|
|
|
|
|
|
while (offset < len) {
|
2016-03-31 18:29:27 +03:00
|
|
|
retry:
|
2016-12-07 18:39:10 +03:00
|
|
|
res = CHARDEV_GET_CLASS(s)->chr_sync_read(s, buf + offset,
|
|
|
|
len - offset);
|
2016-03-31 18:29:27 +03:00
|
|
|
if (res == -1 && errno == EAGAIN) {
|
|
|
|
g_usleep(100);
|
|
|
|
goto retry;
|
|
|
|
}
|
2014-05-27 16:03:48 +04:00
|
|
|
|
|
|
|
if (res == 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (res < 0) {
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_RECORD) {
|
2016-03-14 10:44:36 +03:00
|
|
|
replay_char_read_all_save_error(res);
|
|
|
|
}
|
2014-05-27 16:03:48 +04:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
offset += res;
|
|
|
|
|
|
|
|
if (!counter--) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s) && replay_mode == REPLAY_MODE_RECORD) {
|
2016-03-14 10:44:36 +03:00
|
|
|
replay_char_read_all_save_buf(buf, offset);
|
|
|
|
}
|
2014-05-27 16:03:48 +04:00
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_ioctl(CharBackend *be, int cmd, void *arg)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-03-14 10:44:36 +03:00
|
|
|
int res;
|
2016-10-22 12:52:59 +03:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (!s || !CHARDEV_GET_CLASS(s)->chr_ioctl || qemu_chr_replay(s)) {
|
2016-03-14 10:44:36 +03:00
|
|
|
res = -ENOTSUP;
|
|
|
|
} else {
|
2016-12-07 18:39:10 +03:00
|
|
|
res = CHARDEV_GET_CLASS(s)->chr_ioctl(s, cmd, arg);
|
2016-03-14 10:44:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
int qemu_chr_be_can_write(Chardev *s)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-10-22 12:53:01 +03:00
|
|
|
CharBackend *be = s->be;
|
|
|
|
|
|
|
|
if (!be || !be->chr_can_read) {
|
2008-10-31 21:49:55 +03:00
|
|
|
return 0;
|
2016-10-22 12:53:01 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return be->chr_can_read(be->opaque);
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
void qemu_chr_be_write_impl(Chardev *s, uint8_t *buf, int len)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-10-22 12:53:01 +03:00
|
|
|
CharBackend *be = s->be;
|
|
|
|
|
|
|
|
if (be && be->chr_read) {
|
|
|
|
be->chr_read(be->opaque, buf, len);
|
2012-04-20 00:27:14 +04:00
|
|
|
}
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
void qemu_chr_be_write(Chardev *s, uint8_t *buf, int len)
|
2016-03-14 10:44:36 +03:00
|
|
|
{
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(s)) {
|
2016-03-14 10:44:36 +03:00
|
|
|
if (replay_mode == REPLAY_MODE_PLAY) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
replay_chr_be_write(s, buf, len);
|
|
|
|
} else {
|
|
|
|
qemu_chr_be_write_impl(s, buf, len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_get_msgfd(CharBackend *be)
|
2009-07-22 12:11:39 +04:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2014-05-27 16:04:15 +04:00
|
|
|
int fd;
|
2016-10-22 12:52:55 +03:00
|
|
|
int res = (qemu_chr_fe_get_msgfds(be, &fd, 1) == 1) ? fd : -1;
|
2016-10-21 22:58:45 +03:00
|
|
|
if (s && qemu_chr_replay(s)) {
|
2016-11-30 21:57:24 +03:00
|
|
|
error_report("Replay: get msgfd is not supported "
|
|
|
|
"for serial devices yet");
|
2016-03-14 10:44:36 +03:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
return res;
|
2014-05-27 16:04:15 +04:00
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_get_msgfds(CharBackend *be, int *fds, int len)
|
2014-05-27 16:04:15 +04:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!s) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
return CHARDEV_GET_CLASS(s)->get_msgfds ?
|
|
|
|
CHARDEV_GET_CLASS(s)->get_msgfds(s, fds, len) : -1;
|
2009-07-22 12:11:39 +04:00
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_set_msgfds(CharBackend *be, int *fds, int num)
|
2014-05-27 16:04:02 +04:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!s) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
return CHARDEV_GET_CLASS(s)->set_msgfds ?
|
|
|
|
CHARDEV_GET_CLASS(s)->set_msgfds(s, fds, num) : -1;
|
2014-05-27 16:04:02 +04:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
int qemu_chr_add_client(Chardev *s, int fd)
|
Introduce a 'client_add' monitor command accepting an open FD
Allow client connections for VNC and socket based character
devices to be passed in over the monitor using SCM_RIGHTS.
One intended usage scenario is to start QEMU with VNC on a
UNIX domain socket. An unprivileged user which cannot access
the UNIX domain socket, can then connect to QEMU's VNC server
by passing an open FD to libvirt, which passes it onto QEMU.
{ "execute": "get_fd", "arguments": { "fdname": "myclient" } }
{ "return": {} }
{ "execute": "add_client", "arguments": { "protocol": "vnc",
"fdname": "myclient",
"skipauth": true } }
{ "return": {} }
In this case 'protocol' can be 'vnc' or 'spice', or the name
of a character device (eg from -chardev id=XXXX)
The 'skipauth' parameter can be used to skip any configured
VNC authentication scheme, which is useful if the mgmt layer
talking to the monitor has already authenticated the client
in another way.
* console.h: Define 'vnc_display_add_client' method
* monitor.c: Implement 'client_add' command
* qemu-char.c, qemu-char.h: Add 'qemu_char_add_client' method
* qerror.c, qerror.h: Add QERR_ADD_CLIENT_FAILED
* qmp-commands.hx: Declare 'client_add' command
* ui/vnc.c: Implement 'vnc_display_add_client' method
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-06-23 16:31:42 +04:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
return CHARDEV_GET_CLASS(s)->chr_add_client ?
|
|
|
|
CHARDEV_GET_CLASS(s)->chr_add_client(s, fd) : -1;
|
Introduce a 'client_add' monitor command accepting an open FD
Allow client connections for VNC and socket based character
devices to be passed in over the monitor using SCM_RIGHTS.
One intended usage scenario is to start QEMU with VNC on a
UNIX domain socket. An unprivileged user which cannot access
the UNIX domain socket, can then connect to QEMU's VNC server
by passing an open FD to libvirt, which passes it onto QEMU.
{ "execute": "get_fd", "arguments": { "fdname": "myclient" } }
{ "return": {} }
{ "execute": "add_client", "arguments": { "protocol": "vnc",
"fdname": "myclient",
"skipauth": true } }
{ "return": {} }
In this case 'protocol' can be 'vnc' or 'spice', or the name
of a character device (eg from -chardev id=XXXX)
The 'skipauth' parameter can be used to skip any configured
VNC authentication scheme, which is useful if the mgmt layer
talking to the monitor has already authenticated the client
in another way.
* console.h: Define 'vnc_display_add_client' method
* monitor.c: Implement 'client_add' command
* qemu-char.c, qemu-char.h: Add 'qemu_char_add_client' method
* qerror.c, qerror.h: Add QERR_ADD_CLIENT_FAILED
* qmp-commands.hx: Declare 'client_add' command
* ui/vnc.c: Implement 'vnc_display_add_client' method
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-06-23 16:31:42 +04:00
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
void qemu_chr_fe_accept_input(CharBackend *be)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!s) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_GET_CLASS(s)->chr_accept_input) {
|
|
|
|
CHARDEV_GET_CLASS(s)->chr_accept_input(s);
|
2016-10-21 20:49:37 +03:00
|
|
|
}
|
2012-03-16 16:18:00 +04:00
|
|
|
qemu_notify_event();
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
void qemu_chr_fe_printf(CharBackend *be, const char *fmt, ...)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-12 16:39:35 +03:00
|
|
|
char buf[CHR_READ_BUF_LEN];
|
2008-10-31 21:49:55 +03:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
vsnprintf(buf, sizeof(buf), fmt, ap);
|
2016-09-06 16:56:05 +03:00
|
|
|
/* XXX this blocks entire thread. Rewrite to use
|
|
|
|
* qemu_chr_fe_write and background I/O callbacks */
|
2016-10-22 12:52:55 +03:00
|
|
|
qemu_chr_fe_write_all(be, (uint8_t *)buf, strlen(buf));
|
2008-10-31 21:49:55 +03:00
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
static void qemu_char_open(Chardev *chr, ChardevBackend *backend,
|
|
|
|
bool *be_opened, Error **errp)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
ChardevClass *cc = CHARDEV_GET_CLASS(chr);
|
|
|
|
/* Any ChardevCommon member would work */
|
|
|
|
ChardevCommon *common = backend ? backend->u.null.data : NULL;
|
|
|
|
|
|
|
|
if (common && common->has_logfile) {
|
|
|
|
int flags = O_WRONLY | O_CREAT;
|
|
|
|
if (common->has_logappend &&
|
|
|
|
common->logappend) {
|
|
|
|
flags |= O_APPEND;
|
|
|
|
} else {
|
|
|
|
flags |= O_TRUNC;
|
|
|
|
}
|
|
|
|
chr->logfd = qemu_open(common->logfile, flags, 0666);
|
|
|
|
if (chr->logfd < 0) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"Unable to open logfile %s",
|
|
|
|
common->logfile);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cc->open) {
|
|
|
|
cc->open(chr, backend, be_opened, errp);
|
|
|
|
}
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
static void char_init(Object *obj)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
Chardev *chr = CHARDEV(obj);
|
2008-10-31 21:49:55 +03:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
chr->logfd = -1;
|
|
|
|
qemu_mutex_init(&chr->chr_write_lock);
|
|
|
|
}
|
|
|
|
|
2016-12-12 13:41:40 +03:00
|
|
|
static int null_chr_write(Chardev *chr, const uint8_t *buf, int len)
|
|
|
|
{
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void char_class_init(ObjectClass *oc, void *data)
|
|
|
|
{
|
|
|
|
ChardevClass *cc = CHARDEV_CLASS(oc);
|
|
|
|
|
|
|
|
cc->chr_write = null_chr_write;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
static void char_finalize(Object *obj)
|
|
|
|
{
|
|
|
|
Chardev *chr = CHARDEV(obj);
|
|
|
|
|
|
|
|
if (chr->be) {
|
|
|
|
chr->be->chr = NULL;
|
|
|
|
}
|
|
|
|
g_free(chr->filename);
|
|
|
|
g_free(chr->label);
|
|
|
|
if (chr->logfd != -1) {
|
|
|
|
close(chr->logfd);
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
}
|
2016-12-07 18:39:10 +03:00
|
|
|
qemu_mutex_destroy(&chr->chr_write_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo char_type_info = {
|
|
|
|
.name = TYPE_CHARDEV,
|
|
|
|
.parent = TYPE_OBJECT,
|
|
|
|
.instance_size = sizeof(Chardev),
|
|
|
|
.instance_init = char_init,
|
|
|
|
.instance_finalize = char_finalize,
|
|
|
|
.abstract = true,
|
|
|
|
.class_size = sizeof(ChardevClass),
|
2016-12-12 13:41:40 +03:00
|
|
|
.class_init = char_class_init,
|
2016-12-07 18:39:10 +03:00
|
|
|
};
|
|
|
|
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
/**
|
|
|
|
* Called after processing of default and command-line-specified
|
|
|
|
* chardevs to deliver CHR_EVENT_OPENED events to any FEs attached
|
|
|
|
* to a mux chardev. This is done here to ensure that
|
|
|
|
* output/prompts/banners are only displayed for the FE that has
|
|
|
|
* focus when initial command-line processing/machine init is
|
|
|
|
* completed.
|
|
|
|
*
|
|
|
|
* After this point, any new FE attached to any new or existing
|
|
|
|
* mux will receive CHR_EVENT_OPENED notifications for the BE
|
|
|
|
* immediately.
|
|
|
|
*/
|
2016-12-14 16:44:19 +03:00
|
|
|
static int open_muxes(Object *child, void *opaque)
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
{
|
2016-12-14 16:44:19 +03:00
|
|
|
if (CHARDEV_IS_MUX(child)) {
|
|
|
|
/* send OPENED to all already-attached FEs */
|
|
|
|
mux_chr_send_all_event(CHARDEV(child), CHR_EVENT_OPENED);
|
|
|
|
/* mark mux as OPENED so any new FEs will immediately receive
|
|
|
|
* OPENED event
|
|
|
|
*/
|
|
|
|
qemu_chr_be_event(CHARDEV(child), CHR_EVENT_OPENED);
|
|
|
|
}
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
|
2016-12-14 16:44:19 +03:00
|
|
|
return 0;
|
|
|
|
}
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
|
2016-12-14 16:44:19 +03:00
|
|
|
static void muxes_realize_done(Notifier *notifier, void *unused)
|
|
|
|
{
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
muxes_realized = true;
|
2016-12-14 16:44:19 +03:00
|
|
|
object_child_foreach(get_chardevs_root(), open_muxes, NULL);
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static Notifier muxes_realize_notify = {
|
|
|
|
.notify = muxes_realize_done,
|
|
|
|
};
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *qemu_chr_fe_get_driver(CharBackend *be)
|
2016-10-22 12:52:49 +03:00
|
|
|
{
|
|
|
|
return be->chr;
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
bool qemu_chr_fe_init(CharBackend *b, Chardev *s, Error **errp)
|
2016-10-22 12:52:49 +03:00
|
|
|
{
|
|
|
|
int tag = 0;
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_IS_MUX(s)) {
|
|
|
|
MuxChardev *d = MUX_CHARDEV(s);
|
2016-10-22 13:09:41 +03:00
|
|
|
|
|
|
|
if (d->mux_cnt >= MAX_MUX) {
|
|
|
|
goto unavailable;
|
2016-10-22 12:52:49 +03:00
|
|
|
}
|
2016-10-22 13:09:41 +03:00
|
|
|
|
|
|
|
d->backends[d->mux_cnt] = b;
|
|
|
|
tag = d->mux_cnt++;
|
|
|
|
} else if (s->be) {
|
|
|
|
goto unavailable;
|
2016-10-22 12:53:01 +03:00
|
|
|
} else {
|
|
|
|
s->be = b;
|
2016-10-22 12:52:49 +03:00
|
|
|
}
|
|
|
|
|
2016-10-22 13:09:37 +03:00
|
|
|
b->fe_open = false;
|
2016-10-22 12:52:49 +03:00
|
|
|
b->tag = tag;
|
|
|
|
b->chr = s;
|
|
|
|
return true;
|
2016-10-22 13:09:41 +03:00
|
|
|
|
|
|
|
unavailable:
|
|
|
|
error_setg(errp, QERR_DEVICE_IN_USE, s->label);
|
|
|
|
return false;
|
2016-10-22 12:52:49 +03:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
static bool qemu_chr_is_busy(Chardev *s)
|
2016-10-22 12:53:01 +03:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_IS_MUX(s)) {
|
|
|
|
MuxChardev *d = MUX_CHARDEV(s);
|
2016-10-22 12:53:01 +03:00
|
|
|
return d->mux_cnt >= 0;
|
|
|
|
} else {
|
|
|
|
return s->be != NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:58 +03:00
|
|
|
void qemu_chr_fe_deinit(CharBackend *b)
|
|
|
|
{
|
|
|
|
assert(b);
|
|
|
|
|
|
|
|
if (b->chr) {
|
2016-10-22 12:53:03 +03:00
|
|
|
qemu_chr_fe_set_handlers(b, NULL, NULL, NULL, NULL, NULL, true);
|
2017-01-10 14:06:21 +03:00
|
|
|
if (b->chr->be == b) {
|
|
|
|
b->chr->be = NULL;
|
|
|
|
}
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_IS_MUX(b->chr)) {
|
|
|
|
MuxChardev *d = MUX_CHARDEV(b->chr);
|
2016-10-22 12:53:01 +03:00
|
|
|
d->backends[b->tag] = NULL;
|
|
|
|
}
|
2016-10-22 12:52:58 +03:00
|
|
|
b->chr = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:49 +03:00
|
|
|
void qemu_chr_fe_set_handlers(CharBackend *b,
|
|
|
|
IOCanReadHandler *fd_can_read,
|
|
|
|
IOReadHandler *fd_read,
|
|
|
|
IOEventHandler *fd_event,
|
|
|
|
void *opaque,
|
2016-10-22 12:53:03 +03:00
|
|
|
GMainContext *context,
|
|
|
|
bool set_open)
|
2016-10-22 12:52:49 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s;
|
2016-12-07 18:39:10 +03:00
|
|
|
ChardevClass *cc;
|
2016-10-22 12:52:56 +03:00
|
|
|
int fe_open;
|
|
|
|
|
|
|
|
s = b->chr;
|
|
|
|
if (!s) {
|
2016-10-22 12:52:49 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
cc = CHARDEV_GET_CLASS(s);
|
2016-10-22 12:52:56 +03:00
|
|
|
if (!opaque && !fd_can_read && !fd_read && !fd_event) {
|
|
|
|
fe_open = 0;
|
2017-02-17 05:53:13 +03:00
|
|
|
remove_fd_in_watch(s, context);
|
2016-10-22 12:52:56 +03:00
|
|
|
} else {
|
|
|
|
fe_open = 1;
|
|
|
|
}
|
2016-10-22 12:53:01 +03:00
|
|
|
b->chr_can_read = fd_can_read;
|
|
|
|
b->chr_read = fd_read;
|
|
|
|
b->chr_event = fd_event;
|
|
|
|
b->opaque = opaque;
|
2016-12-07 18:39:10 +03:00
|
|
|
if (cc->chr_update_read_handler) {
|
|
|
|
cc->chr_update_read_handler(s, context);
|
2016-10-22 12:52:56 +03:00
|
|
|
}
|
|
|
|
|
2016-10-22 12:53:03 +03:00
|
|
|
if (set_open) {
|
2016-10-22 12:52:56 +03:00
|
|
|
qemu_chr_fe_set_open(b, fe_open);
|
|
|
|
}
|
2016-10-22 12:52:49 +03:00
|
|
|
|
2016-10-22 12:52:56 +03:00
|
|
|
if (fe_open) {
|
|
|
|
qemu_chr_fe_take_focus(b);
|
|
|
|
/* We're connecting to an already opened device, so let's make sure we
|
|
|
|
also get the open event */
|
|
|
|
if (s->be_open) {
|
2016-12-14 14:23:02 +03:00
|
|
|
qemu_chr_be_event(s, CHR_EVENT_OPENED);
|
2016-10-22 12:52:56 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_IS_MUX(s)) {
|
2016-10-22 12:52:56 +03:00
|
|
|
mux_chr_set_handlers(s, context);
|
2016-10-22 12:52:49 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void qemu_chr_fe_take_focus(CharBackend *b)
|
|
|
|
{
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!b->chr) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_IS_MUX(b->chr)) {
|
2017-01-10 14:06:21 +03:00
|
|
|
mux_set_focus(b->chr, b->tag);
|
2016-10-22 12:52:49 +03:00
|
|
|
}
|
|
|
|
}
|
2008-10-31 21:49:55 +03:00
|
|
|
|
2016-12-12 18:41:00 +03:00
|
|
|
int qemu_chr_wait_connected(Chardev *chr, Error **errp)
|
2016-07-27 00:15:17 +03:00
|
|
|
{
|
2016-12-07 18:39:10 +03:00
|
|
|
ChardevClass *cc = CHARDEV_GET_CLASS(chr);
|
|
|
|
|
|
|
|
if (cc->chr_wait_connected) {
|
|
|
|
return cc->chr_wait_connected(chr, errp);
|
2016-07-27 00:15:17 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
int qemu_chr_fe_wait_connected(CharBackend *be, Error **errp)
|
|
|
|
{
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!be->chr) {
|
|
|
|
error_setg(errp, "missing associated backend");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
return qemu_chr_wait_connected(be->chr, errp);
|
|
|
|
}
|
|
|
|
|
2009-12-08 15:11:49 +03:00
|
|
|
QemuOpts *qemu_chr_parse_compat(const char *label, const char *filename)
|
2009-09-10 12:58:35 +04:00
|
|
|
{
|
2009-09-10 12:58:49 +04:00
|
|
|
char host[65], port[33], width[8], height[8];
|
2009-09-10 12:58:42 +04:00
|
|
|
int pos;
|
2009-09-10 12:58:36 +04:00
|
|
|
const char *p;
|
2009-09-10 12:58:35 +04:00
|
|
|
QemuOpts *opts;
|
2012-03-20 22:51:57 +04:00
|
|
|
Error *local_err = NULL;
|
2009-09-10 12:58:35 +04:00
|
|
|
|
2012-03-20 22:51:57 +04:00
|
|
|
opts = qemu_opts_create(qemu_find_opts("chardev"), label, 1, &local_err);
|
2014-01-30 18:07:28 +04:00
|
|
|
if (local_err) {
|
2015-02-10 17:21:26 +03:00
|
|
|
error_report_err(local_err);
|
2009-09-10 12:58:35 +04:00
|
|
|
return NULL;
|
2012-03-20 22:51:57 +04:00
|
|
|
}
|
2009-09-10 12:58:35 +04:00
|
|
|
|
2009-09-10 12:58:50 +04:00
|
|
|
if (strstart(filename, "mon:", &p)) {
|
|
|
|
filename = p;
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "mux", "on", &error_abort);
|
2013-07-03 20:29:45 +04:00
|
|
|
if (strcmp(filename, "stdio") == 0) {
|
|
|
|
/* Monitor is muxed to stdio: do not exit on Ctrl+C by default
|
|
|
|
* but pass it to the guest. Handle this only for compat syntax,
|
|
|
|
* for -chardev syntax we have special option for this.
|
|
|
|
* This is what -nographic did, redirecting+muxing serial+monitor
|
|
|
|
* to stdio causing Ctrl+C to be passed to guest. */
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "signal", "off", &error_abort);
|
2013-07-03 20:29:45 +04:00
|
|
|
}
|
2009-09-10 12:58:50 +04:00
|
|
|
}
|
|
|
|
|
2009-09-10 12:58:45 +04:00
|
|
|
if (strcmp(filename, "null") == 0 ||
|
|
|
|
strcmp(filename, "pty") == 0 ||
|
|
|
|
strcmp(filename, "msmouse") == 0 ||
|
2017-02-06 17:23:27 +03:00
|
|
|
strcmp(filename, "wctablet") == 0 ||
|
2009-09-10 12:58:46 +04:00
|
|
|
strcmp(filename, "braille") == 0 ||
|
backends: Introduce chr-testdev
From: Paolo Bonzini <pbonzini@redhat.com>
chr-testdev enables a virtio serial channel to be used for guest
initiated qemu exits. hw/misc/debugexit already enables guest
initiated qemu exits, but only for PC targets. chr-testdev supports
any virtio-capable target. kvm-unit-tests/arm is already making use
of this backend.
Currently there is a single command implemented, "q". It takes a
(prefix) argument for the exit code, thus an exit is implemented by
writing, e.g. "1q", to the virtio-serial port.
It can be used as:
$QEMU ... \
-device virtio-serial-device \
-device virtserialport,chardev=ctd -chardev testdev,id=ctd
or, use:
$QEMU ... \
-device virtio-serial-device \
-device virtconsole,chardev=ctd -chardev testdev,id=ctd
to bind it to virtio-serial port0.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2014-07-11 11:44:26 +04:00
|
|
|
strcmp(filename, "testdev") == 0 ||
|
2009-09-10 12:58:45 +04:00
|
|
|
strcmp(filename, "stdio") == 0) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", filename, &error_abort);
|
2009-09-10 12:58:35 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:49 +04:00
|
|
|
if (strstart(filename, "vc", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "vc", &error_abort);
|
2009-09-10 12:58:49 +04:00
|
|
|
if (*p == ':') {
|
2013-10-01 01:04:49 +04:00
|
|
|
if (sscanf(p+1, "%7[0-9]x%7[0-9]", width, height) == 2) {
|
2009-09-10 12:58:49 +04:00
|
|
|
/* pixels */
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "width", width, &error_abort);
|
|
|
|
qemu_opt_set(opts, "height", height, &error_abort);
|
2013-10-01 01:04:49 +04:00
|
|
|
} else if (sscanf(p+1, "%7[0-9]Cx%7[0-9]C", width, height) == 2) {
|
2009-09-10 12:58:49 +04:00
|
|
|
/* chars */
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "cols", width, &error_abort);
|
|
|
|
qemu_opt_set(opts, "rows", height, &error_abort);
|
2009-09-10 12:58:49 +04:00
|
|
|
} else {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:47 +04:00
|
|
|
if (strcmp(filename, "con:") == 0) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "console", &error_abort);
|
2009-09-10 12:58:47 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:48 +04:00
|
|
|
if (strstart(filename, "COM", NULL)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "serial", &error_abort);
|
|
|
|
qemu_opt_set(opts, "path", filename, &error_abort);
|
2009-09-10 12:58:48 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:36 +04:00
|
|
|
if (strstart(filename, "file:", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "file", &error_abort);
|
|
|
|
qemu_opt_set(opts, "path", p, &error_abort);
|
2009-09-10 12:58:36 +04:00
|
|
|
return opts;
|
|
|
|
}
|
|
|
|
if (strstart(filename, "pipe:", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "pipe", &error_abort);
|
|
|
|
qemu_opt_set(opts, "path", p, &error_abort);
|
2009-09-10 12:58:36 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:42 +04:00
|
|
|
if (strstart(filename, "tcp:", &p) ||
|
2016-09-23 09:06:11 +03:00
|
|
|
strstart(filename, "telnet:", &p) ||
|
|
|
|
strstart(filename, "tn3270:", &p)) {
|
2009-09-10 12:58:42 +04:00
|
|
|
if (sscanf(p, "%64[^:]:%32[^,]%n", host, port, &pos) < 2) {
|
|
|
|
host[0] = 0;
|
|
|
|
if (sscanf(p, ":%32[^,]%n", port, &pos) < 1)
|
|
|
|
goto fail;
|
|
|
|
}
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "socket", &error_abort);
|
|
|
|
qemu_opt_set(opts, "host", host, &error_abort);
|
|
|
|
qemu_opt_set(opts, "port", port, &error_abort);
|
2009-09-10 12:58:42 +04:00
|
|
|
if (p[pos] == ',') {
|
2015-02-12 20:37:11 +03:00
|
|
|
qemu_opts_do_parse(opts, p+pos+1, NULL, &local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
2009-09-10 12:58:42 +04:00
|
|
|
goto fail;
|
2015-02-12 20:37:11 +03:00
|
|
|
}
|
2009-09-10 12:58:42 +04:00
|
|
|
}
|
2016-09-23 09:06:11 +03:00
|
|
|
if (strstart(filename, "telnet:", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "telnet", "on", &error_abort);
|
2016-09-23 09:06:11 +03:00
|
|
|
} else if (strstart(filename, "tn3270:", &p)) {
|
|
|
|
qemu_opt_set(opts, "tn3270", "on", &error_abort);
|
|
|
|
}
|
2009-09-10 12:58:42 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:51 +04:00
|
|
|
if (strstart(filename, "udp:", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "udp", &error_abort);
|
2009-09-10 12:58:51 +04:00
|
|
|
if (sscanf(p, "%64[^:]:%32[^@,]%n", host, port, &pos) < 2) {
|
|
|
|
host[0] = 0;
|
2010-03-07 13:28:48 +03:00
|
|
|
if (sscanf(p, ":%32[^@,]%n", port, &pos) < 1) {
|
2009-09-10 12:58:51 +04:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "host", host, &error_abort);
|
|
|
|
qemu_opt_set(opts, "port", port, &error_abort);
|
2009-09-10 12:58:51 +04:00
|
|
|
if (p[pos] == '@') {
|
|
|
|
p += pos + 1;
|
|
|
|
if (sscanf(p, "%64[^:]:%32[^,]%n", host, port, &pos) < 2) {
|
|
|
|
host[0] = 0;
|
|
|
|
if (sscanf(p, ":%32[^,]%n", port, &pos) < 1) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "localaddr", host, &error_abort);
|
|
|
|
qemu_opt_set(opts, "localport", port, &error_abort);
|
2009-09-10 12:58:51 +04:00
|
|
|
}
|
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:42 +04:00
|
|
|
if (strstart(filename, "unix:", &p)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "socket", &error_abort);
|
2015-02-12 20:37:11 +03:00
|
|
|
qemu_opts_do_parse(opts, p, "path", &local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
2009-09-10 12:58:42 +04:00
|
|
|
goto fail;
|
2015-02-12 20:37:11 +03:00
|
|
|
}
|
2009-09-10 12:58:42 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:48 +04:00
|
|
|
if (strstart(filename, "/dev/parport", NULL) ||
|
|
|
|
strstart(filename, "/dev/ppi", NULL)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "parport", &error_abort);
|
|
|
|
qemu_opt_set(opts, "path", filename, &error_abort);
|
2009-09-10 12:58:48 +04:00
|
|
|
return opts;
|
|
|
|
}
|
|
|
|
if (strstart(filename, "/dev/", NULL)) {
|
2015-02-12 19:52:20 +03:00
|
|
|
qemu_opt_set(opts, "backend", "tty", &error_abort);
|
|
|
|
qemu_opt_set(opts, "path", filename, &error_abort);
|
2009-09-10 12:58:48 +04:00
|
|
|
return opts;
|
|
|
|
}
|
2009-09-10 12:58:35 +04:00
|
|
|
|
2009-09-10 12:58:42 +04:00
|
|
|
fail:
|
2009-09-10 12:58:35 +04:00
|
|
|
qemu_opts_del(opts);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-02-20 03:19:31 +03:00
|
|
|
void qemu_chr_parse_common(QemuOpts *opts, ChardevCommon *backend)
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
{
|
|
|
|
const char *logfile = qemu_opt_get(opts, "logfile");
|
|
|
|
|
|
|
|
backend->has_logfile = logfile != NULL;
|
2016-12-14 23:15:44 +03:00
|
|
|
backend->logfile = g_strdup(logfile);
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
|
|
|
|
backend->has_logappend = true;
|
|
|
|
backend->logappend = qemu_opt_get_bool(opts, "logappend", false);
|
|
|
|
}
|
|
|
|
|
2016-12-09 00:50:12 +03:00
|
|
|
static const ChardevClass *char_get_class(const char *driver, Error **errp)
|
|
|
|
{
|
|
|
|
ObjectClass *oc;
|
|
|
|
const ChardevClass *cc;
|
|
|
|
char *typename = g_strdup_printf("chardev-%s", driver);
|
|
|
|
|
|
|
|
oc = object_class_by_name(typename);
|
|
|
|
g_free(typename);
|
|
|
|
|
|
|
|
if (!object_class_dynamic_cast(oc, TYPE_CHARDEV)) {
|
|
|
|
error_setg(errp, "'%s' is not a valid char driver name", driver);
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-03-05 21:51:28 +04:00
|
|
|
|
2016-12-09 00:50:12 +03:00
|
|
|
if (object_class_is_abstract(oc)) {
|
|
|
|
error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "driver",
|
|
|
|
"abstract device type");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
cc = CHARDEV_CLASS(oc);
|
|
|
|
if (cc->internal) {
|
|
|
|
error_setg(errp, "'%s' is not a valid char driver name", driver);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return cc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct ChardevAlias {
|
|
|
|
const char *typename;
|
|
|
|
const char *alias;
|
|
|
|
} chardev_alias_table[] = {
|
|
|
|
#ifdef HAVE_CHARDEV_PARPORT
|
|
|
|
{ "parallel", "parport" },
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_CHARDEV_SERIAL
|
|
|
|
{ "serial", "tty" },
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct ChadevClassFE {
|
|
|
|
void (*fn)(const char *name, void *opaque);
|
|
|
|
void *opaque;
|
|
|
|
} ChadevClassFE;
|
|
|
|
|
|
|
|
static void
|
|
|
|
chardev_class_foreach(ObjectClass *klass, void *opaque)
|
2013-02-21 14:39:12 +04:00
|
|
|
{
|
2016-12-09 00:50:12 +03:00
|
|
|
ChadevClassFE *fe = opaque;
|
|
|
|
|
|
|
|
assert(g_str_has_prefix(object_class_get_name(klass), "chardev-"));
|
|
|
|
if (CHARDEV_CLASS(klass)->internal) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
fe->fn(object_class_get_name(klass) + 8, fe->opaque);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
chardev_name_foreach(void (*fn)(const char *name, void *opaque), void *opaque)
|
|
|
|
{
|
|
|
|
ChadevClassFE fe = { .fn = fn, .opaque = opaque };
|
|
|
|
int i;
|
|
|
|
|
|
|
|
object_class_foreach(chardev_class_foreach, TYPE_CHARDEV, false, &fe);
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(chardev_alias_table); i++) {
|
|
|
|
fn(chardev_alias_table[i].alias, opaque);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
help_string_append(const char *name, void *opaque)
|
|
|
|
{
|
|
|
|
GString *str = opaque;
|
|
|
|
|
|
|
|
g_string_append_printf(str, "\n%s", name);
|
2013-02-21 14:39:12 +04:00
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *qemu_chr_new_from_opts(QemuOpts *opts,
|
|
|
|
Error **errp)
|
2009-09-10 12:58:35 +04:00
|
|
|
{
|
2014-05-19 20:57:35 +04:00
|
|
|
Error *local_err = NULL;
|
2016-12-09 00:50:12 +03:00
|
|
|
const ChardevClass *cc;
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr;
|
2016-10-21 16:30:29 +03:00
|
|
|
int i;
|
2016-12-09 11:04:51 +03:00
|
|
|
ChardevBackend *backend = NULL;
|
2016-10-21 16:07:45 +03:00
|
|
|
const char *name = qemu_opt_get(opts, "backend");
|
2014-09-02 14:24:16 +04:00
|
|
|
const char *id = qemu_opts_id(opts);
|
|
|
|
char *bid = NULL;
|
2009-09-10 12:58:35 +04:00
|
|
|
|
2016-10-21 16:07:45 +03:00
|
|
|
if (name == NULL) {
|
error: Strip trailing '\n' from error string arguments (again)
Commit 6daf194d and be62a2eb got rid of a bunch, but they keep coming
back. Tracked down with this Coccinelle semantic patch:
@r@
expression err, eno, cls, fmt;
position p;
@@
(
error_report(fmt, ...)@p
|
error_set(err, cls, fmt, ...)@p
|
error_set_errno(err, eno, cls, fmt, ...)@p
|
error_setg(err, fmt, ...)@p
|
error_setg_errno(err, eno, fmt, ...)@p
)
@script:python@
fmt << r.fmt;
p << r.p;
@@
if "\\n" in str(fmt):
print "%s:%s:%s:%s" % (p[0].file, p[0].line, p[0].column, fmt)
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-id: 1360354939-10994-4-git-send-email-armbru@redhat.com
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-02-09 00:22:16 +04:00
|
|
|
error_setg(errp, "chardev: \"%s\" missing backend",
|
2012-10-15 11:28:05 +04:00
|
|
|
qemu_opts_id(opts));
|
2016-12-09 11:04:51 +03:00
|
|
|
return NULL;
|
2011-01-22 16:07:26 +03:00
|
|
|
}
|
2016-08-16 20:13:52 +03:00
|
|
|
|
2016-10-21 16:07:45 +03:00
|
|
|
if (is_help_option(name)) {
|
2016-11-30 21:57:24 +03:00
|
|
|
GString *str = g_string_new("");
|
2016-12-09 00:50:12 +03:00
|
|
|
|
|
|
|
chardev_name_foreach(help_string_append, str);
|
2016-11-30 21:57:24 +03:00
|
|
|
|
|
|
|
error_report("Available chardev backend types: %s", str->str);
|
|
|
|
g_string_free(str, true);
|
2016-10-21 16:07:45 +03:00
|
|
|
exit(0);
|
2016-08-16 20:13:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (id == NULL) {
|
|
|
|
error_setg(errp, "chardev: no id specified");
|
2016-12-09 11:04:51 +03:00
|
|
|
return NULL;
|
2016-08-16 20:13:52 +03:00
|
|
|
}
|
|
|
|
|
2016-12-09 00:50:12 +03:00
|
|
|
for (i = 0; i < ARRAY_SIZE(chardev_alias_table); i++) {
|
|
|
|
if (g_strcmp0(chardev_alias_table[i].alias, name) == 0) {
|
|
|
|
name = chardev_alias_table[i].typename;
|
2009-09-10 12:58:35 +04:00
|
|
|
break;
|
2013-03-05 21:51:28 +04:00
|
|
|
}
|
2009-09-10 12:58:35 +04:00
|
|
|
}
|
2016-12-09 00:50:12 +03:00
|
|
|
|
|
|
|
cc = char_get_class(name, errp);
|
|
|
|
if (cc == NULL) {
|
2016-12-09 11:04:51 +03:00
|
|
|
return NULL;
|
2009-09-10 12:58:35 +04:00
|
|
|
}
|
|
|
|
|
2014-09-02 14:24:16 +04:00
|
|
|
backend = g_new0(ChardevBackend, 1);
|
2016-12-09 11:04:51 +03:00
|
|
|
backend->type = CHARDEV_BACKEND_KIND_NULL;
|
2013-02-21 19:16:42 +04:00
|
|
|
|
2014-09-02 14:24:16 +04:00
|
|
|
if (qemu_opt_get_bool(opts, "mux", 0)) {
|
|
|
|
bid = g_strdup_printf("%s-base", id);
|
|
|
|
}
|
2013-02-21 14:39:12 +04:00
|
|
|
|
2014-09-02 14:24:16 +04:00
|
|
|
chr = NULL;
|
2016-12-09 00:50:12 +03:00
|
|
|
if (cc->parse) {
|
|
|
|
cc->parse(opts, backend, &local_err);
|
2014-09-02 14:24:16 +04:00
|
|
|
if (local_err) {
|
|
|
|
error_propagate(errp, local_err);
|
2016-12-09 11:04:51 +03:00
|
|
|
goto out;
|
2013-02-21 14:39:12 +04:00
|
|
|
}
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
} else {
|
2016-12-09 00:50:12 +03:00
|
|
|
ChardevCommon *ccom = g_new0(ChardevCommon, 1);
|
|
|
|
qemu_chr_parse_common(opts, ccom);
|
|
|
|
backend->u.null.data = ccom; /* Any ChardevCommon member would work */
|
2013-02-21 14:39:12 +04:00
|
|
|
}
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
|
2016-12-14 20:58:50 +03:00
|
|
|
chr = qemu_chardev_new(bid ? bid : id,
|
2016-12-09 11:04:51 +03:00
|
|
|
object_class_get_name(OBJECT_CLASS(cc)),
|
|
|
|
backend, errp);
|
2016-12-14 20:58:50 +03:00
|
|
|
|
2016-12-09 11:04:51 +03:00
|
|
|
if (chr == NULL) {
|
|
|
|
goto out;
|
2009-09-10 12:58:35 +04:00
|
|
|
}
|
|
|
|
|
2014-09-02 14:24:16 +04:00
|
|
|
if (bid) {
|
2016-12-09 11:04:51 +03:00
|
|
|
Chardev *mux;
|
2014-09-02 14:24:16 +04:00
|
|
|
qapi_free_ChardevBackend(backend);
|
|
|
|
backend = g_new0(ChardevBackend, 1);
|
2015-10-27 01:34:57 +03:00
|
|
|
backend->type = CHARDEV_BACKEND_KIND_MUX;
|
2016-12-09 11:04:51 +03:00
|
|
|
backend->u.mux.data = g_new0(ChardevMux, 1);
|
qapi: Don't special-case simple union wrappers
Simple unions were carrying a special case that hid their 'data'
QMP member from the resulting C struct, via the hack method
QAPISchemaObjectTypeVariant.simple_union_type(). But by using
the work we started by unboxing flat union and alternate
branches, coupled with the ability to visit the members of an
implicit type, we can now expose the simple union's implicit
type in qapi-types.h:
| struct q_obj_ImageInfoSpecificQCow2_wrapper {
| ImageInfoSpecificQCow2 *data;
| };
|
| struct q_obj_ImageInfoSpecificVmdk_wrapper {
| ImageInfoSpecificVmdk *data;
| };
...
| struct ImageInfoSpecific {
| ImageInfoSpecificKind type;
| union { /* union tag is @type */
| void *data;
|- ImageInfoSpecificQCow2 *qcow2;
|- ImageInfoSpecificVmdk *vmdk;
|+ q_obj_ImageInfoSpecificQCow2_wrapper qcow2;
|+ q_obj_ImageInfoSpecificVmdk_wrapper vmdk;
| } u;
| };
Doing this removes asymmetry between QAPI's QMP side and its
C side (both sides now expose 'data'), and means that the
treatment of a simple union as sugar for a flat union is now
equivalent in both languages (previously the two approaches used
a different layer of dereferencing, where the simple union could
be converted to a flat union with equivalent C layout but
different {} on the wire, or to an equivalent QMP wire form
but with different C representation). Using the implicit type
also lets us get rid of the simple_union_type() hack.
Of course, now all clients of simple unions have to adjust from
using su->u.member to using su->u.member.data; while this touches
a number of files in the tree, some earlier cleanup patches
helped minimize the change to the initialization of a temporary
variable rather than every single member access. The generated
qapi-visit.c code is also affected by the layout change:
|@@ -7393,10 +7393,10 @@ void visit_type_ImageInfoSpecific_member
| }
| switch (obj->type) {
| case IMAGE_INFO_SPECIFIC_KIND_QCOW2:
|- visit_type_ImageInfoSpecificQCow2(v, "data", &obj->u.qcow2, &err);
|+ visit_type_q_obj_ImageInfoSpecificQCow2_wrapper_members(v, &obj->u.qcow2, &err);
| break;
| case IMAGE_INFO_SPECIFIC_KIND_VMDK:
|- visit_type_ImageInfoSpecificVmdk(v, "data", &obj->u.vmdk, &err);
|+ visit_type_q_obj_ImageInfoSpecificVmdk_wrapper_members(v, &obj->u.vmdk, &err);
| break;
| default:
| abort();
Signed-off-by: Eric Blake <eblake@redhat.com>
Message-Id: <1458254921-17042-13-git-send-email-eblake@redhat.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
2016-03-18 01:48:37 +03:00
|
|
|
backend->u.mux.data->chardev = g_strdup(bid);
|
2016-12-14 20:58:50 +03:00
|
|
|
mux = qemu_chardev_new(id, TYPE_CHARDEV_MUX, backend, errp);
|
2016-12-09 11:04:51 +03:00
|
|
|
if (mux == NULL) {
|
2016-12-14 15:23:36 +03:00
|
|
|
object_unparent(OBJECT(chr));
|
2014-09-02 14:24:16 +04:00
|
|
|
chr = NULL;
|
2016-12-09 11:04:51 +03:00
|
|
|
goto out;
|
2014-09-02 14:24:16 +04:00
|
|
|
}
|
2016-12-09 11:04:51 +03:00
|
|
|
chr = mux;
|
qemu-char: don't issue CHR_EVENT_OPEN in a BH
When CHR_EVENT_OPENED was initially added, it was CHR_EVENT_RESET,
and it was issued as a bottom-half:
86e94dea5b740dad65446c857f6959eae43e0ba6
Which we basically used to print out a greeting/prompt for the
monitor.
AFAICT the only reason this was ever done in a BH was because in
some cases we'd modify the chr_write handler for a new chardev
backend *after* the site where we issued the reset (see:
86e94d:qemu_chr_open_stdio())
At some point this event was renamed to CHR_EVENT_OPENED, and we've
maintained the use of this BH ever since.
However, due to 9f939df955a4152aad69a19a77e0898631bb2c18, we schedule
the BH via g_idle_add(), which is causing events to sometimes be
delivered after we've already begun processing data from backends,
leading to:
known bugs:
QMP:
session negotation resets with OPENED event, in some cases this
is causing new sessions to get sporadically reset
potential bugs:
hw/usb/redirect.c:
can_read handler checks for dev->parser != NULL, which may be
true if CLOSED BH has not been executed yet. In the past, OPENED
quiesced outstanding CLOSED events prior to us reading client
data. If it's delayed, our check may allow reads to occur even
though we haven't processed the OPENED event yet, and when we
do finally get the OPENED event, our state may get reset.
qtest.c:
can begin session before OPENED event is processed, leading to
a spurious reset of the system and irq_levels
gdbstub.c:
may start a gdb session prior to the machine being paused
To fix these, let's just drop the BH.
Since the initial reasoning for using it still applies to an extent,
work around that by deferring the delivery of CHR_EVENT_OPENED until
after the chardevs have been fully initialized, toward the end of
qmp_chardev_add() (or some cases, qemu_chr_new_from_opts()). This
defers delivery long enough that we can be assured a CharDriverState
is fully initialized before CHR_EVENT_OPENED is sent.
Also, rather than requiring each chardev to do an explicit open, do it
automatically, and allow the small few who don't desire such behavior to
suppress the OPENED-on-init behavior by setting a 'explicit_be_open'
flag.
We additionally add missing OPENED events for stdio backends on w32,
which were previously not being issued, causing us to not recieve the
banner and initial prompts for qmp/hmp.
Reported-by: Stefan Priebe <s.priebe@profihost.ag>
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1370636393-21044-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-06-08 00:19:53 +04:00
|
|
|
}
|
2009-09-10 12:58:50 +04:00
|
|
|
|
2016-12-09 11:04:51 +03:00
|
|
|
out:
|
2014-09-02 14:24:16 +04:00
|
|
|
qapi_free_ChardevBackend(backend);
|
|
|
|
g_free(bid);
|
2009-09-10 12:58:35 +04:00
|
|
|
return chr;
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *qemu_chr_new_noreplay(const char *label, const char *filename)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
|
|
|
const char *p;
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr;
|
2009-09-10 12:58:35 +04:00
|
|
|
QemuOpts *opts;
|
2012-10-15 11:28:05 +04:00
|
|
|
Error *err = NULL;
|
2009-09-10 12:58:35 +04:00
|
|
|
|
2009-09-10 12:58:52 +04:00
|
|
|
if (strstart(filename, "chardev:", &p)) {
|
|
|
|
return qemu_chr_find(p);
|
|
|
|
}
|
|
|
|
|
2009-09-10 12:58:35 +04:00
|
|
|
opts = qemu_chr_parse_compat(label, filename);
|
2009-09-10 12:58:51 +04:00
|
|
|
if (!opts)
|
|
|
|
return NULL;
|
2008-10-31 21:49:55 +03:00
|
|
|
|
2016-10-22 12:52:46 +03:00
|
|
|
chr = qemu_chr_new_from_opts(opts, &err);
|
2014-01-30 18:07:28 +04:00
|
|
|
if (err) {
|
2015-02-12 15:55:05 +03:00
|
|
|
error_report_err(err);
|
2012-10-15 11:28:05 +04:00
|
|
|
}
|
2009-09-10 12:58:51 +04:00
|
|
|
if (chr && qemu_opt_get_bool(opts, "mux", 0)) {
|
|
|
|
monitor_init(chr, MONITOR_USE_READLINE);
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
net: don't poke at chardev internal QemuOpts
The vhost-user & colo code is poking at the QemuOpts instance
in the CharDriverState struct, not realizing that it is valid
for this to be NULL. e.g. the following crash shows a codepath
where it will be NULL:
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
617 QTAILQ_FOREACH(opt, &opts->head, next) {
[Current thread is 1 (Thread 0x7f1d4970bb40 (LWP 6603))]
(gdb) bt
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
#1 0x000055baf696b7da in net_vhost_parse_chardev (opts=0x55baf8ff9260, errp=0x7ffc51368e48) at net/vhost-user.c:314
#2 0x000055baf696b985 in net_init_vhost_user (netdev=0x55baf8ff9250, name=0x55baf879d270 "hostnet2", peer=0x0, errp=0x7ffc51368e48) at net/vhost-user.c:360
#3 0x000055baf6960216 in net_client_init1 (object=0x55baf8ff9250, is_netdev=true, errp=0x7ffc51368e48) at net/net.c:1051
#4 0x000055baf6960518 in net_client_init (opts=0x55baf776e7e0, is_netdev=true, errp=0x7ffc51368f00) at net/net.c:1108
#5 0x000055baf696083f in netdev_add (opts=0x55baf776e7e0, errp=0x7ffc51368f00) at net/net.c:1186
#6 0x000055baf69608c7 in qmp_netdev_add (qdict=0x55baf7afaf60, ret=0x7ffc51368f50, errp=0x7ffc51368f48) at net/net.c:1205
#7 0x000055baf6622135 in handle_qmp_command (parser=0x55baf77fb590, tokens=0x7f1d24011960) at /path/to/qemu.git/monitor.c:3978
#8 0x000055baf6a9d099 in json_message_process_token (lexer=0x55baf77fb598, input=0x55baf75acd20, type=JSON_RCURLY, x=113, y=19) at qobject/json-streamer.c:105
#9 0x000055baf6abf7aa in json_lexer_feed_char (lexer=0x55baf77fb598, ch=125 '}', flush=false) at qobject/json-lexer.c:319
#10 0x000055baf6abf8f2 in json_lexer_feed (lexer=0x55baf77fb598, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-lexer.c:369
#11 0x000055baf6a9d13c in json_message_parser_feed (parser=0x55baf77fb590, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-streamer.c:124
#12 0x000055baf66221f7 in monitor_qmp_read (opaque=0x55baf77fb530, buf=0x7ffc51369170 "}R\204\367\272U", size=1) at /path/to/qemu.git/monitor.c:3994
#13 0x000055baf6757014 in qemu_chr_be_write_impl (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:387
#14 0x000055baf6757076 in qemu_chr_be_write (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:399
#15 0x000055baf675b3b0 in tcp_chr_read (chan=0x55baf90244b0, cond=G_IO_IN, opaque=0x55baf7610a40) at qemu-char.c:2927
#16 0x000055baf6a5d655 in qio_channel_fd_source_dispatch (source=0x55baf7610df0, callback=0x55baf675b25a <tcp_chr_read>, user_data=0x55baf7610a40) at io/channel-watch.c:84
#17 0x00007f1d3e80cbbd in g_main_context_dispatch () from /usr/lib64/libglib-2.0.so.0
#18 0x000055baf69d3720 in glib_pollfds_poll () at main-loop.c:213
#19 0x000055baf69d37fd in os_host_main_loop_wait (timeout=126000000) at main-loop.c:258
#20 0x000055baf69d38ad in main_loop_wait (nonblocking=0) at main-loop.c:506
#21 0x000055baf676587b in main_loop () at vl.c:1908
#22 0x000055baf676d3bf in main (argc=101, argv=0x7ffc5136a6c8, envp=0x7ffc5136a9f8) at vl.c:4604
(gdb) p opts
$1 = (QemuOpts *) 0x0
The crash occurred when attaching vhost-user net via QMP:
{
"execute": "chardev-add",
"arguments": {
"id": "charnet2",
"backend": {
"type": "socket",
"data": {
"addr": {
"type": "unix",
"data": {
"path": "/var/run/openvswitch/vhost-user1"
}
},
"wait": false,
"server": false
}
}
},
"id": "libvirt-19"
}
{
"return": {
},
"id": "libvirt-19"
}
{
"execute": "netdev_add",
"arguments": {
"type": "vhost-user",
"chardev": "charnet2",
"id": "hostnet2"
},
"id": "libvirt-20"
}
Code using chardevs should not be poking at the internals of the
CharDriverState struct. What vhost-user wants is a chardev that is
operating as reconnectable network service, along with the ability
to do FD passing over the connection. The colo code simply wants
a network service. Add a feature concept to the char drivers so
that chardev users can query the actual features they wish to have
supported. The QemuOpts member is removed to prevent future mistakes
in this area.
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-10-07 15:18:34 +03:00
|
|
|
qemu_opts_del(opts);
|
2008-10-31 21:49:55 +03:00
|
|
|
return chr;
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *qemu_chr_new(const char *label, const char *filename)
|
2016-03-14 10:44:36 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr;
|
2016-10-22 12:52:46 +03:00
|
|
|
chr = qemu_chr_new_noreplay(label, filename);
|
2016-03-14 10:44:36 +03:00
|
|
|
if (chr) {
|
2016-10-21 22:58:45 +03:00
|
|
|
if (replay_mode != REPLAY_MODE_NONE) {
|
|
|
|
qemu_chr_set_feature(chr, QEMU_CHAR_FEATURE_REPLAY);
|
|
|
|
}
|
2016-12-07 18:39:10 +03:00
|
|
|
if (qemu_chr_replay(chr) && CHARDEV_GET_CLASS(chr)->chr_ioctl) {
|
2016-11-30 21:57:24 +03:00
|
|
|
error_report("Replay: ioctl is not supported "
|
|
|
|
"for serial devices yet");
|
2016-03-14 10:44:36 +03:00
|
|
|
}
|
|
|
|
replay_register_char_driver(chr);
|
|
|
|
}
|
|
|
|
return chr;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
void qemu_chr_fe_set_echo(CharBackend *be, bool echo)
|
2010-12-23 15:42:48 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (chr && CHARDEV_GET_CLASS(chr)->chr_set_echo) {
|
|
|
|
CHARDEV_GET_CLASS(chr)->chr_set_echo(chr, echo);
|
2010-12-23 15:42:48 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
void qemu_chr_fe_set_open(CharBackend *be, int fe_open)
|
2011-03-24 13:12:02 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-10-22 12:52:59 +03:00
|
|
|
if (!chr) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-10-22 13:09:37 +03:00
|
|
|
if (be->fe_open == fe_open) {
|
2013-03-26 14:07:55 +04:00
|
|
|
return;
|
|
|
|
}
|
2016-10-22 13:09:37 +03:00
|
|
|
be->fe_open = fe_open;
|
2016-12-07 18:39:10 +03:00
|
|
|
if (CHARDEV_GET_CLASS(chr)->chr_set_fe_open) {
|
|
|
|
CHARDEV_GET_CLASS(chr)->chr_set_fe_open(chr, fe_open);
|
2011-03-24 13:12:02 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
guint qemu_chr_fe_add_watch(CharBackend *be, GIOCondition cond,
|
2016-06-20 16:02:40 +03:00
|
|
|
GIOFunc func, void *user_data)
|
2013-03-05 21:51:23 +04:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *s = be->chr;
|
2013-03-05 21:51:23 +04:00
|
|
|
GSource *src;
|
|
|
|
guint tag;
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (!s || CHARDEV_GET_CLASS(s)->chr_add_watch == NULL) {
|
2016-06-20 16:02:40 +03:00
|
|
|
return 0;
|
2013-03-05 21:51:23 +04:00
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
src = CHARDEV_GET_CLASS(s)->chr_add_watch(s, cond);
|
2014-07-24 18:08:04 +04:00
|
|
|
if (!src) {
|
2016-06-20 16:02:40 +03:00
|
|
|
return 0;
|
2014-07-24 18:08:04 +04:00
|
|
|
}
|
|
|
|
|
2013-03-05 21:51:23 +04:00
|
|
|
g_source_set_callback(src, (GSourceFunc)func, user_data, NULL);
|
|
|
|
tag = g_source_attach(src, NULL);
|
|
|
|
g_source_unref(src);
|
|
|
|
|
|
|
|
return tag;
|
|
|
|
}
|
|
|
|
|
2016-10-22 12:52:55 +03:00
|
|
|
void qemu_chr_fe_disconnect(CharBackend *be)
|
2016-06-06 19:45:02 +03:00
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr = be->chr;
|
2016-10-22 12:52:55 +03:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
if (chr && CHARDEV_GET_CLASS(chr)->chr_disconnect) {
|
|
|
|
CHARDEV_GET_CLASS(chr)->chr_disconnect(chr);
|
2016-06-06 19:45:02 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-14 16:44:19 +03:00
|
|
|
static int qmp_query_chardev_foreach(Object *obj, void *data)
|
2015-06-22 19:20:18 +03:00
|
|
|
{
|
2016-12-14 16:44:19 +03:00
|
|
|
Chardev *chr = CHARDEV(obj);
|
|
|
|
ChardevInfoList **list = data;
|
|
|
|
ChardevInfoList *info = g_malloc0(sizeof(*info));
|
|
|
|
|
|
|
|
info->value = g_malloc0(sizeof(*info->value));
|
|
|
|
info->value->label = g_strdup(chr->label);
|
|
|
|
info->value->filename = g_strdup(chr->filename);
|
|
|
|
info->value->frontend_open = chr->be && chr->be->fe_open;
|
|
|
|
|
|
|
|
info->next = *list;
|
|
|
|
*list = info;
|
|
|
|
|
|
|
|
return 0;
|
2015-06-22 19:20:18 +03:00
|
|
|
}
|
|
|
|
|
2011-09-14 23:05:49 +04:00
|
|
|
ChardevInfoList *qmp_query_chardev(Error **errp)
|
2008-10-31 21:49:55 +03:00
|
|
|
{
|
2011-09-14 23:05:49 +04:00
|
|
|
ChardevInfoList *chr_list = NULL;
|
2008-10-31 21:49:55 +03:00
|
|
|
|
2016-12-14 16:44:19 +03:00
|
|
|
object_child_foreach(get_chardevs_root(),
|
|
|
|
qmp_query_chardev_foreach, &chr_list);
|
2009-12-10 22:16:08 +03:00
|
|
|
|
2011-09-14 23:05:49 +04:00
|
|
|
return chr_list;
|
2008-10-31 21:49:55 +03:00
|
|
|
}
|
2009-09-10 12:58:52 +04:00
|
|
|
|
2016-12-09 00:50:12 +03:00
|
|
|
static void
|
|
|
|
qmp_prepend_backend(const char *name, void *opaque)
|
2016-10-21 16:07:45 +03:00
|
|
|
{
|
2016-12-09 00:50:12 +03:00
|
|
|
ChardevBackendInfoList **list = opaque;
|
2016-10-21 16:07:45 +03:00
|
|
|
ChardevBackendInfoList *info = g_malloc0(sizeof(*info));
|
2016-12-09 00:50:12 +03:00
|
|
|
|
2016-10-21 16:07:45 +03:00
|
|
|
info->value = g_malloc0(sizeof(*info->value));
|
|
|
|
info->value->name = g_strdup(name);
|
2016-12-09 00:50:12 +03:00
|
|
|
info->next = *list;
|
|
|
|
*list = info;
|
2016-10-21 16:07:45 +03:00
|
|
|
}
|
|
|
|
|
2014-02-01 15:52:42 +04:00
|
|
|
ChardevBackendInfoList *qmp_query_chardev_backends(Error **errp)
|
|
|
|
{
|
|
|
|
ChardevBackendInfoList *backend_list = NULL;
|
2016-10-21 16:30:29 +03:00
|
|
|
|
2016-12-09 00:50:12 +03:00
|
|
|
chardev_name_foreach(qmp_prepend_backend, &backend_list);
|
2014-02-01 15:52:42 +04:00
|
|
|
|
|
|
|
return backend_list;
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *qemu_chr_find(const char *name)
|
2009-09-10 12:58:52 +04:00
|
|
|
{
|
2016-12-14 16:44:19 +03:00
|
|
|
Object *obj = object_resolve_path_component(get_chardevs_root(), name);
|
2009-09-10 12:58:52 +04:00
|
|
|
|
2016-12-14 16:44:19 +03:00
|
|
|
return obj ? CHARDEV(obj) : NULL;
|
2009-09-10 12:58:52 +04:00
|
|
|
}
|
2011-12-23 01:29:25 +04:00
|
|
|
|
2012-11-26 19:03:42 +04:00
|
|
|
QemuOptsList qemu_chardev_opts = {
|
|
|
|
.name = "chardev",
|
|
|
|
.implied_opt_name = "backend",
|
|
|
|
.head = QTAILQ_HEAD_INITIALIZER(qemu_chardev_opts.head),
|
|
|
|
.desc = {
|
|
|
|
{
|
|
|
|
.name = "backend",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "path",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "host",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "port",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "localaddr",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "localport",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "to",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
|
|
|
},{
|
|
|
|
.name = "ipv4",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "ipv6",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "wait",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "server",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "delay",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
2014-10-02 20:17:37 +04:00
|
|
|
},{
|
|
|
|
.name = "reconnect",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
2012-11-26 19:03:42 +04:00
|
|
|
},{
|
|
|
|
.name = "telnet",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
2016-09-23 09:06:11 +03:00
|
|
|
},{
|
|
|
|
.name = "tn3270",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
char: introduce support for TLS encrypted TCP chardev backend
This integrates support for QIOChannelTLS object in the TCP
chardev backend. If the 'tls-creds=NAME' option is passed with
the '-chardev tcp' argument, then it will setup the chardev
such that the client is required to establish a TLS handshake
when connecting. There is no support for checking the client
certificate against ACLs in this initial patch. This is pending
work to QOM-ify the ACL object code.
A complete invocation to run QEMU as the server for a TLS
encrypted serial dev might be
$ qemu-system-x86_64 \
-nodefconfig -nodefaults -device sga -display none \
-chardev socket,id=s0,host=127.0.0.1,port=9000,tls-creds=tls0,server \
-device isa-serial,chardev=s0 \
-object tls-creds-x509,id=tls0,endpoint=server,verify-peer=off,\
dir=/home/berrange/security/qemutls
To test with the gnutls-cli tool as the client:
$ gnutls-cli --priority=NORMAL -p 9000 \
--x509cafile=/home/berrange/security/qemutls/ca-cert.pem \
127.0.0.1
If QEMU was told to use 'anon' credential type, then use the
priority string 'NORMAL:+ANON-DH' with gnutls-cli
Alternatively, if setting up a chardev to operate as a client,
then the TLS credentials registered must be for the client
endpoint. First a TLS server must be setup, which can be done
with the gnutls-serv tool
$ gnutls-serv --priority=NORMAL -p 9000 --echo \
--x509cafile=/home/berrange/security/qemutls/ca-cert.pem \
--x509certfile=/home/berrange/security/qemutls/server-cert.pem \
--x509keyfile=/home/berrange/security/qemutls/server-key.pem
Then QEMU can connect with
$ qemu-system-x86_64 \
-nodefconfig -nodefaults -device sga -display none \
-chardev socket,id=s0,host=127.0.0.1,port=9000,tls-creds=tls0 \
-device isa-serial,chardev=s0 \
-object tls-creds-x509,id=tls0,endpoint=client,\
dir=/home/berrange/security/qemutls
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1453202071-10289-5-git-send-email-berrange@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-19 14:14:31 +03:00
|
|
|
},{
|
|
|
|
.name = "tls-creds",
|
|
|
|
.type = QEMU_OPT_STRING,
|
2012-11-26 19:03:42 +04:00
|
|
|
},{
|
|
|
|
.name = "width",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
|
|
|
},{
|
|
|
|
.name = "height",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
|
|
|
},{
|
|
|
|
.name = "cols",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
|
|
|
},{
|
|
|
|
.name = "rows",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
|
|
|
},{
|
|
|
|
.name = "mux",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "signal",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
|
|
|
},{
|
|
|
|
.name = "name",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "debug",
|
|
|
|
.type = QEMU_OPT_NUMBER,
|
2013-01-24 20:03:19 +04:00
|
|
|
},{
|
qemu-char: Saner naming of memchar stuff & doc fixes
New device, has never been released, so we can still improve things
without worrying about compatibility.
Naming is a mess. The code calls the device driver CirMemCharDriver,
the public API calls it "memory", "memchardev", or "memchar", and the
special commands are named like "memchar-FOO". "memory" is a
particularly unfortunate choice, because there's another character
device driver called MemoryDriver. Moreover, the device's distinctive
property is that it's a ring buffer, not that's in memory. Therefore:
* Rename CirMemCharDriver to RingBufCharDriver, and call the thing a
"ringbuf" in the API.
* Rename QMP and HMP commands from memchar-FOO to ringbuf-FOO.
* Rename device parameter from maxcapacity to size (simple words are
good for you).
* Clearly mark the parameter as optional in documentation.
* Fix error reporting so that chardev-add reports to current monitor,
not stderr.
* Replace cirmem in C identifiers by ringbuf.
* Rework documentation. Document the impact of our crappy UTF-8
handling on reading.
* QMP examples that even work.
I could split this up into multiple commits, but they'd change the
same documentation lines multiple times. Not worth it.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-02-07 00:27:24 +04:00
|
|
|
.name = "size",
|
2013-02-07 00:27:25 +04:00
|
|
|
.type = QEMU_OPT_SIZE,
|
2013-06-24 10:39:54 +04:00
|
|
|
},{
|
|
|
|
.name = "chardev",
|
|
|
|
.type = QEMU_OPT_STRING,
|
2015-12-04 09:42:04 +03:00
|
|
|
},{
|
|
|
|
.name = "append",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
qemu-char: add logfile facility to all chardev backends
Typically a UNIX guest OS will log boot messages to a serial
port in addition to any graphical console. An admin user
may also wish to use the serial port for an interactive
console. A virtualization management system may wish to
collect system boot messages by logging the serial port,
but also wish to allow admins interactive access.
Currently providing such a feature forces the mgmt app
to either provide 2 separate serial ports, one for
logging boot messages and one for interactive console
login, or to proxy all output via a separate service
that can multiplex the two needs onto one serial port.
While both are valid approaches, they each have their
own downsides. The former causes confusion and extra
setup work for VM admins creating disk images. The latter
places an extra burden to re-implement much of the QEMU
chardev backends logic in libvirt or even higher level
mgmt apps and adds extra hops in the data transfer path.
A simpler approach that is satisfactory for many use
cases is to allow the QEMU chardev backends to have a
"logfile" property associated with them.
$QEMU -chardev socket,host=localhost,port=9000,\
server=on,nowait,id-charserial0,\
logfile=/var/log/libvirt/qemu/test-serial0.log
-device isa-serial,chardev=charserial0,id=serial0
This patch introduces a 'ChardevCommon' struct which
is setup as a base for all the ChardevBackend types.
Ideally this would be registered directly as a base
against ChardevBackend, rather than each type, but
the QAPI generator doesn't allow that since the
ChardevBackend is a non-discriminated union. The
ChardevCommon struct provides the optional 'logfile'
parameter, as well as 'logappend' which controls
whether QEMU truncates or appends (default truncate).
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1452516281-27519-1-git-send-email-berrange@redhat.com>
[Call qemu_chr_parse_common if cd->parse is NULL. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-01-11 15:44:41 +03:00
|
|
|
},{
|
|
|
|
.name = "logfile",
|
|
|
|
.type = QEMU_OPT_STRING,
|
|
|
|
},{
|
|
|
|
.name = "logappend",
|
|
|
|
.type = QEMU_OPT_BOOL,
|
2012-11-26 19:03:42 +04:00
|
|
|
},
|
|
|
|
{ /* end of list */ }
|
|
|
|
},
|
|
|
|
};
|
2012-12-19 13:33:56 +04:00
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
bool qemu_chr_has_feature(Chardev *chr,
|
2016-12-14 13:27:58 +03:00
|
|
|
ChardevFeature feature)
|
net: don't poke at chardev internal QemuOpts
The vhost-user & colo code is poking at the QemuOpts instance
in the CharDriverState struct, not realizing that it is valid
for this to be NULL. e.g. the following crash shows a codepath
where it will be NULL:
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
617 QTAILQ_FOREACH(opt, &opts->head, next) {
[Current thread is 1 (Thread 0x7f1d4970bb40 (LWP 6603))]
(gdb) bt
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
#1 0x000055baf696b7da in net_vhost_parse_chardev (opts=0x55baf8ff9260, errp=0x7ffc51368e48) at net/vhost-user.c:314
#2 0x000055baf696b985 in net_init_vhost_user (netdev=0x55baf8ff9250, name=0x55baf879d270 "hostnet2", peer=0x0, errp=0x7ffc51368e48) at net/vhost-user.c:360
#3 0x000055baf6960216 in net_client_init1 (object=0x55baf8ff9250, is_netdev=true, errp=0x7ffc51368e48) at net/net.c:1051
#4 0x000055baf6960518 in net_client_init (opts=0x55baf776e7e0, is_netdev=true, errp=0x7ffc51368f00) at net/net.c:1108
#5 0x000055baf696083f in netdev_add (opts=0x55baf776e7e0, errp=0x7ffc51368f00) at net/net.c:1186
#6 0x000055baf69608c7 in qmp_netdev_add (qdict=0x55baf7afaf60, ret=0x7ffc51368f50, errp=0x7ffc51368f48) at net/net.c:1205
#7 0x000055baf6622135 in handle_qmp_command (parser=0x55baf77fb590, tokens=0x7f1d24011960) at /path/to/qemu.git/monitor.c:3978
#8 0x000055baf6a9d099 in json_message_process_token (lexer=0x55baf77fb598, input=0x55baf75acd20, type=JSON_RCURLY, x=113, y=19) at qobject/json-streamer.c:105
#9 0x000055baf6abf7aa in json_lexer_feed_char (lexer=0x55baf77fb598, ch=125 '}', flush=false) at qobject/json-lexer.c:319
#10 0x000055baf6abf8f2 in json_lexer_feed (lexer=0x55baf77fb598, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-lexer.c:369
#11 0x000055baf6a9d13c in json_message_parser_feed (parser=0x55baf77fb590, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-streamer.c:124
#12 0x000055baf66221f7 in monitor_qmp_read (opaque=0x55baf77fb530, buf=0x7ffc51369170 "}R\204\367\272U", size=1) at /path/to/qemu.git/monitor.c:3994
#13 0x000055baf6757014 in qemu_chr_be_write_impl (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:387
#14 0x000055baf6757076 in qemu_chr_be_write (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:399
#15 0x000055baf675b3b0 in tcp_chr_read (chan=0x55baf90244b0, cond=G_IO_IN, opaque=0x55baf7610a40) at qemu-char.c:2927
#16 0x000055baf6a5d655 in qio_channel_fd_source_dispatch (source=0x55baf7610df0, callback=0x55baf675b25a <tcp_chr_read>, user_data=0x55baf7610a40) at io/channel-watch.c:84
#17 0x00007f1d3e80cbbd in g_main_context_dispatch () from /usr/lib64/libglib-2.0.so.0
#18 0x000055baf69d3720 in glib_pollfds_poll () at main-loop.c:213
#19 0x000055baf69d37fd in os_host_main_loop_wait (timeout=126000000) at main-loop.c:258
#20 0x000055baf69d38ad in main_loop_wait (nonblocking=0) at main-loop.c:506
#21 0x000055baf676587b in main_loop () at vl.c:1908
#22 0x000055baf676d3bf in main (argc=101, argv=0x7ffc5136a6c8, envp=0x7ffc5136a9f8) at vl.c:4604
(gdb) p opts
$1 = (QemuOpts *) 0x0
The crash occurred when attaching vhost-user net via QMP:
{
"execute": "chardev-add",
"arguments": {
"id": "charnet2",
"backend": {
"type": "socket",
"data": {
"addr": {
"type": "unix",
"data": {
"path": "/var/run/openvswitch/vhost-user1"
}
},
"wait": false,
"server": false
}
}
},
"id": "libvirt-19"
}
{
"return": {
},
"id": "libvirt-19"
}
{
"execute": "netdev_add",
"arguments": {
"type": "vhost-user",
"chardev": "charnet2",
"id": "hostnet2"
},
"id": "libvirt-20"
}
Code using chardevs should not be poking at the internals of the
CharDriverState struct. What vhost-user wants is a chardev that is
operating as reconnectable network service, along with the ability
to do FD passing over the connection. The colo code simply wants
a network service. Add a feature concept to the char drivers so
that chardev users can query the actual features they wish to have
supported. The QemuOpts member is removed to prevent future mistakes
in this area.
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-10-07 15:18:34 +03:00
|
|
|
{
|
|
|
|
return test_bit(feature, chr->features);
|
|
|
|
}
|
|
|
|
|
2016-12-07 16:20:22 +03:00
|
|
|
void qemu_chr_set_feature(Chardev *chr,
|
2016-12-14 13:27:58 +03:00
|
|
|
ChardevFeature feature)
|
net: don't poke at chardev internal QemuOpts
The vhost-user & colo code is poking at the QemuOpts instance
in the CharDriverState struct, not realizing that it is valid
for this to be NULL. e.g. the following crash shows a codepath
where it will be NULL:
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
617 QTAILQ_FOREACH(opt, &opts->head, next) {
[Current thread is 1 (Thread 0x7f1d4970bb40 (LWP 6603))]
(gdb) bt
#0 0x000055baf6ab4adc in qemu_opt_foreach (opts=0x0, func=0x55baf696b650 <net_vhost_chardev_opts>, opaque=0x7ffc51368c00, errp=0x7ffc51368e48) at util/qemu-option.c:617
#1 0x000055baf696b7da in net_vhost_parse_chardev (opts=0x55baf8ff9260, errp=0x7ffc51368e48) at net/vhost-user.c:314
#2 0x000055baf696b985 in net_init_vhost_user (netdev=0x55baf8ff9250, name=0x55baf879d270 "hostnet2", peer=0x0, errp=0x7ffc51368e48) at net/vhost-user.c:360
#3 0x000055baf6960216 in net_client_init1 (object=0x55baf8ff9250, is_netdev=true, errp=0x7ffc51368e48) at net/net.c:1051
#4 0x000055baf6960518 in net_client_init (opts=0x55baf776e7e0, is_netdev=true, errp=0x7ffc51368f00) at net/net.c:1108
#5 0x000055baf696083f in netdev_add (opts=0x55baf776e7e0, errp=0x7ffc51368f00) at net/net.c:1186
#6 0x000055baf69608c7 in qmp_netdev_add (qdict=0x55baf7afaf60, ret=0x7ffc51368f50, errp=0x7ffc51368f48) at net/net.c:1205
#7 0x000055baf6622135 in handle_qmp_command (parser=0x55baf77fb590, tokens=0x7f1d24011960) at /path/to/qemu.git/monitor.c:3978
#8 0x000055baf6a9d099 in json_message_process_token (lexer=0x55baf77fb598, input=0x55baf75acd20, type=JSON_RCURLY, x=113, y=19) at qobject/json-streamer.c:105
#9 0x000055baf6abf7aa in json_lexer_feed_char (lexer=0x55baf77fb598, ch=125 '}', flush=false) at qobject/json-lexer.c:319
#10 0x000055baf6abf8f2 in json_lexer_feed (lexer=0x55baf77fb598, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-lexer.c:369
#11 0x000055baf6a9d13c in json_message_parser_feed (parser=0x55baf77fb590, buffer=0x7ffc51369170 "}R\204\367\272U", size=1) at qobject/json-streamer.c:124
#12 0x000055baf66221f7 in monitor_qmp_read (opaque=0x55baf77fb530, buf=0x7ffc51369170 "}R\204\367\272U", size=1) at /path/to/qemu.git/monitor.c:3994
#13 0x000055baf6757014 in qemu_chr_be_write_impl (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:387
#14 0x000055baf6757076 in qemu_chr_be_write (s=0x55baf7610a40, buf=0x7ffc51369170 "}R\204\367\272U", len=1) at qemu-char.c:399
#15 0x000055baf675b3b0 in tcp_chr_read (chan=0x55baf90244b0, cond=G_IO_IN, opaque=0x55baf7610a40) at qemu-char.c:2927
#16 0x000055baf6a5d655 in qio_channel_fd_source_dispatch (source=0x55baf7610df0, callback=0x55baf675b25a <tcp_chr_read>, user_data=0x55baf7610a40) at io/channel-watch.c:84
#17 0x00007f1d3e80cbbd in g_main_context_dispatch () from /usr/lib64/libglib-2.0.so.0
#18 0x000055baf69d3720 in glib_pollfds_poll () at main-loop.c:213
#19 0x000055baf69d37fd in os_host_main_loop_wait (timeout=126000000) at main-loop.c:258
#20 0x000055baf69d38ad in main_loop_wait (nonblocking=0) at main-loop.c:506
#21 0x000055baf676587b in main_loop () at vl.c:1908
#22 0x000055baf676d3bf in main (argc=101, argv=0x7ffc5136a6c8, envp=0x7ffc5136a9f8) at vl.c:4604
(gdb) p opts
$1 = (QemuOpts *) 0x0
The crash occurred when attaching vhost-user net via QMP:
{
"execute": "chardev-add",
"arguments": {
"id": "charnet2",
"backend": {
"type": "socket",
"data": {
"addr": {
"type": "unix",
"data": {
"path": "/var/run/openvswitch/vhost-user1"
}
},
"wait": false,
"server": false
}
}
},
"id": "libvirt-19"
}
{
"return": {
},
"id": "libvirt-19"
}
{
"execute": "netdev_add",
"arguments": {
"type": "vhost-user",
"chardev": "charnet2",
"id": "hostnet2"
},
"id": "libvirt-20"
}
Code using chardevs should not be poking at the internals of the
CharDriverState struct. What vhost-user wants is a chardev that is
operating as reconnectable network service, along with the ability
to do FD passing over the connection. The colo code simply wants
a network service. Add a feature concept to the char drivers so
that chardev users can query the actual features they wish to have
supported. The QemuOpts member is removed to prevent future mistakes
in this area.
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-10-07 15:18:34 +03:00
|
|
|
{
|
|
|
|
return set_bit(feature, chr->features);
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
Chardev *qemu_chardev_new(const char *id, const char *typename,
|
2016-12-14 15:23:36 +03:00
|
|
|
ChardevBackend *backend,
|
|
|
|
Error **errp)
|
2012-12-19 13:33:56 +04:00
|
|
|
{
|
2016-12-14 15:23:36 +03:00
|
|
|
Object *obj;
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr = NULL;
|
2015-09-29 15:54:05 +03:00
|
|
|
Error *local_err = NULL;
|
2016-10-22 13:09:43 +03:00
|
|
|
bool be_opened = true;
|
2012-12-19 13:33:56 +04:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
assert(g_str_has_prefix(typename, "chardev-"));
|
2012-12-19 13:33:56 +04:00
|
|
|
|
2016-12-14 15:23:36 +03:00
|
|
|
obj = object_new(typename);
|
|
|
|
chr = CHARDEV(obj);
|
2016-12-07 18:39:10 +03:00
|
|
|
chr->label = g_strdup(id);
|
2015-09-29 15:55:59 +03:00
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
qemu_char_open(chr, backend, &be_opened, &local_err);
|
2016-10-21 16:30:29 +03:00
|
|
|
if (local_err) {
|
2016-12-14 15:23:36 +03:00
|
|
|
goto end;
|
2015-09-29 15:54:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!chr->filename) {
|
2016-12-07 18:39:10 +03:00
|
|
|
chr->filename = g_strdup(typename + 8);
|
2012-12-19 13:33:56 +04:00
|
|
|
}
|
2016-10-22 13:09:43 +03:00
|
|
|
if (be_opened) {
|
2015-09-29 15:54:05 +03:00
|
|
|
qemu_chr_be_event(chr, CHR_EVENT_OPENED);
|
|
|
|
}
|
2016-12-07 18:39:10 +03:00
|
|
|
|
2016-12-14 15:23:36 +03:00
|
|
|
if (id) {
|
|
|
|
object_property_add_child(get_chardevs_root(), id, obj, &local_err);
|
|
|
|
if (local_err) {
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
object_unref(obj);
|
|
|
|
}
|
|
|
|
|
|
|
|
end:
|
|
|
|
if (local_err) {
|
|
|
|
error_propagate(errp, local_err);
|
|
|
|
object_unref(obj);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-12-07 18:39:10 +03:00
|
|
|
return chr;
|
|
|
|
}
|
|
|
|
|
|
|
|
ChardevReturn *qmp_chardev_add(const char *id, ChardevBackend *backend,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
const ChardevClass *cc;
|
|
|
|
ChardevReturn *ret;
|
|
|
|
Chardev *chr;
|
|
|
|
|
|
|
|
cc = char_get_class(ChardevBackendKind_lookup[backend->type], errp);
|
|
|
|
if (!cc) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-12-14 20:58:50 +03:00
|
|
|
chr = qemu_chardev_new(id, object_class_get_name(OBJECT_CLASS(cc)),
|
2016-12-07 18:39:10 +03:00
|
|
|
backend, errp);
|
|
|
|
if (!chr) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = g_new0(ChardevReturn, 1);
|
|
|
|
if (CHARDEV_IS_PTY(chr)) {
|
|
|
|
ret->pty = g_strdup(chr->filename + 4);
|
|
|
|
ret->has_pty = true;
|
|
|
|
}
|
|
|
|
|
2015-09-29 15:54:05 +03:00
|
|
|
return ret;
|
2012-12-19 13:33:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void qmp_chardev_remove(const char *id, Error **errp)
|
|
|
|
{
|
2016-12-07 16:20:22 +03:00
|
|
|
Chardev *chr;
|
2012-12-19 13:33:56 +04:00
|
|
|
|
|
|
|
chr = qemu_chr_find(id);
|
2014-08-11 17:00:55 +04:00
|
|
|
if (chr == NULL) {
|
2012-12-19 13:33:56 +04:00
|
|
|
error_setg(errp, "Chardev '%s' not found", id);
|
|
|
|
return;
|
|
|
|
}
|
2016-10-22 12:53:01 +03:00
|
|
|
if (qemu_chr_is_busy(chr)) {
|
2012-12-19 13:33:56 +04:00
|
|
|
error_setg(errp, "Chardev '%s' is busy", id);
|
|
|
|
return;
|
|
|
|
}
|
2016-10-21 22:58:45 +03:00
|
|
|
if (qemu_chr_replay(chr)) {
|
2016-03-14 10:44:36 +03:00
|
|
|
error_setg(errp,
|
|
|
|
"Chardev '%s' cannot be unplugged in record/replay mode", id);
|
|
|
|
return;
|
|
|
|
}
|
2016-12-14 15:23:36 +03:00
|
|
|
object_unparent(OBJECT(chr));
|
2012-12-19 13:33:56 +04:00
|
|
|
}
|
2013-03-05 21:51:28 +04:00
|
|
|
|
char: do not use atexit cleanup handler
It turns out qemu is calling exit() in various places from various
threads without taking much care of resources state. The atexit()
cleanup handlers cannot easily destroy resources that are in use (by
the same thread or other).
Since c1111a24a3, TCG arm guests run into the following abort() when
running tests, the chardev mutex is locked during the write, so
qemu_mutex_destroy() returns an error:
#0 0x00007fffdbb806f5 in raise () at /lib64/libc.so.6
#1 0x00007fffdbb822fa in abort () at /lib64/libc.so.6
#2 0x00005555557616fe in error_exit (err=<optimized out>, msg=msg@entry=0x555555c38c30 <__func__.14622> "qemu_mutex_destroy")
at /home/drjones/code/qemu/util/qemu-thread-posix.c:39
#3 0x0000555555b0be20 in qemu_mutex_destroy (mutex=mutex@entry=0x5555566aa0e0) at /home/drjones/code/qemu/util/qemu-thread-posix.c:57
#4 0x00005555558aab00 in qemu_chr_free_common (chr=0x5555566aa0e0) at /home/drjones/code/qemu/qemu-char.c:4029
#5 0x00005555558b05f9 in qemu_chr_delete (chr=<optimized out>) at /home/drjones/code/qemu/qemu-char.c:4038
#6 0x00005555558b05f9 in qemu_chr_delete (chr=<optimized out>) at /home/drjones/code/qemu/qemu-char.c:4044
#7 0x00005555558b062c in qemu_chr_cleanup () at /home/drjones/code/qemu/qemu-char.c:4557
#8 0x00007fffdbb851e8 in __run_exit_handlers () at /lib64/libc.so.6
#9 0x00007fffdbb85235 in () at /lib64/libc.so.6
#10 0x00005555558d1b39 in testdev_write (testdev=0x5555566aa0a0) at /home/drjones/code/qemu/backends/testdev.c:71
#11 0x00005555558d1b39 in testdev_write (chr=<optimized out>, buf=0x7fffc343fd9a "", len=0) at /home/drjones/code/qemu/backends/testdev.c:95
#12 0x00005555558adced in qemu_chr_fe_write (s=0x5555566aa0e0, buf=buf@entry=0x7fffc343fd98 "0q", len=len@entry=2) at /home/drjones/code/qemu/qemu-char.c:282
Instead of using a atexit() handler, only run the chardev cleanup as
initially proposed at the end of main(), where there are less chances
(hic) of conflicts or other races.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reported-by: Andrew Jones <drjones@redhat.com>
Message-Id: <20160704153823.16879-1-marcandre.lureau@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-07-04 18:38:23 +03:00
|
|
|
void qemu_chr_cleanup(void)
|
2016-06-16 22:28:50 +03:00
|
|
|
{
|
2016-12-14 15:23:36 +03:00
|
|
|
object_unparent(get_chardevs_root());
|
2016-06-16 22:28:50 +03:00
|
|
|
}
|
|
|
|
|
2013-03-05 21:51:28 +04:00
|
|
|
static void register_types(void)
|
|
|
|
{
|
2016-12-09 00:50:12 +03:00
|
|
|
type_register_static(&char_type_info);
|
2016-10-21 16:07:45 +03:00
|
|
|
|
chardev: fix CHR_EVENT_OPENED events for mux chardevs
As of bd5c51ee6c4f1c79cae5ad2516d711a27b4ea8ec, chardevs no longer use
bottom-halves to issue CHR_EVENT_OPENED events. To maintain past
semantics, we instead defer the CHR_EVENT_OPENED events toward the end
of chardev initialization.
For muxes, this isn't good enough, since a range of FEs must be able
to attach to the mux prior to any CHR_EVENT_OPENED being issued, else
each FE will immediately print it's initial output (prompts, banners,
etc.) just prior to us switching to the next FE as part of
initialization.
The is new and confusing behavior for users, as they'll see output for
things like the HMP monitor, even though their the current mux focus
may be a guest serial port with potentially no output.
We fix this by further deferring CHR_EVENT_OPENED events for FEs
associated with muxes until after machine init by flagging mux chardevs
with 'explicit_be_open', which suppresses emission of CHR_EVENT_OPENED
events until we explicitly set the mux as opened later.
Currently, we must defer till after machine init since we potentially
associate FEs with muxes as part of realize (for instance,
serial_isa_realizefn).
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
Message-id: 1375207462-8141-1-git-send-email-mdroth@linux.vnet.ibm.com
Cc: qemu-stable@nongnu.org
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-07-30 22:04:22 +04:00
|
|
|
/* this must be done after machine init, since we register FEs with muxes
|
|
|
|
* as part of realize functions like serial_isa_realizefn when -nographic
|
|
|
|
* is specified
|
|
|
|
*/
|
|
|
|
qemu_add_machine_init_done_notifier(&muxes_realize_notify);
|
2013-03-05 21:51:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
type_init(register_types);
|