*/
bool mpqemu_msg_send(MPQemuMsg *msg, QIOChannel *ioc, Error **errp)
{
- ERRP_GUARD();
bool iolock = qemu_mutex_iothread_locked();
bool iothread = qemu_in_iothread();
struct iovec send[2] = {};
static ssize_t mpqemu_read(QIOChannel *ioc, void *buf, size_t len, int **fds,
size_t *nfds, Error **errp)
{
- ERRP_GUARD();
struct iovec iov = { .iov_base = buf, .iov_len = len };
bool iolock = qemu_mutex_iothread_locked();
bool iothread = qemu_in_iothread();
uint64_t mpqemu_msg_send_and_await_reply(MPQemuMsg *msg, PCIProxyDev *pdev,
Error **errp)
{
- ERRP_GUARD();
MPQemuMsg msg_reply = {0};
uint64_t ret = UINT64_MAX;
g_autoptr(GError) err = NULL;
struct passwd *p;
- ERRP_GUARD();
-
p = g_unix_get_passwd_entry_qemu(username, &err);
if (p == NULL) {
error_setg(errp, "failed to lookup user '%s': %s",
mkdir_for_user(const char *path, const struct passwd *p,
mode_t mode, Error **errp)
{
- ERRP_GUARD();
-
if (g_mkdir(path, mode) == -1) {
error_setg(errp, "failed to create directory '%s': %s",
path, g_strerror(errno));
static bool
check_openssh_pub_key(const char *key, Error **errp)
{
- ERRP_GUARD();
-
/* simple sanity-check, we may want more? */
if (!key || key[0] == '#' || strchr(key, '\n')) {
error_setg(errp, "invalid OpenSSH public key: '%s'", key);
size_t n = 0;
strList *k;
- ERRP_GUARD();
-
for (k = keys; k != NULL; k = k->next) {
if (!check_openssh_pub_key(k->value, errp)) {
return false;
g_autofree char *contents = NULL;
g_autoptr(GError) err = NULL;
- ERRP_GUARD();
-
contents = g_strjoinv("\n", keys);
if (!g_file_set_contents(path, contents, -1, &err)) {
error_setg(errp, "failed to write to '%s': %s", path, err->message);
g_autoptr(GError) err = NULL;
g_autofree char *contents = NULL;
- ERRP_GUARD();
-
if (!g_file_get_contents(path, &contents, NULL, &err)) {
error_setg(errp, "failed to read '%s': %s", path, err->message);
return NULL;
strList *k;
size_t nkeys, nauthkeys;
- ERRP_GUARD();
reset = has_reset && reset;
if (!check_openssh_pub_keys(keys, &nkeys, errp)) {
GStrv a;
size_t nkeys = 0;
- ERRP_GUARD();
-
if (!check_openssh_pub_keys(keys, NULL, errp)) {
return;
}
g_autoptr(GuestAuthorizedKeys) ret = NULL;
int i;
- ERRP_GUARD();
-
p = get_passwd_entry(username, errp);
if (p == NULL) {
return NULL;