libvirtd.c 46.0 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
D
Daniel P. Berrange 已提交
2
 * libvirtd.c: daemon start of day, guest process & i/o management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21 22 23
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <unistd.h>
#include <fcntl.h>
28 29
#include <sys/wait.h>
#include <sys/stat.h>
D
Daniel P. Berrange 已提交
30
#include <getopt.h>
31
#include <stdlib.h>
32
#include <grp.h>
E
Eric Blake 已提交
33
#include <locale.h>
34

35
#include "libvirt_internal.h"
36
#include "virerror.h"
E
Eric Blake 已提交
37
#include "virfile.h"
38
#include "virpidfile.h"
39
#include "virprocess.h"
40

41 42
#define VIR_FROM_THIS VIR_FROM_QEMU

D
Daniel P. Berrange 已提交
43
#include "libvirtd.h"
44
#include "libvirtd-config.h"
45

46
#include "viruuid.h"
47
#include "remote_driver.h"
48
#include "viralloc.h"
49
#include "virconf.h"
50
#include "virnetlink.h"
51 52
#include "virnetserver.h"
#include "remote.h"
53
#include "virhook.h"
54
#include "viraudit.h"
55
#include "virstring.h"
56 57
#include "locking/lock_manager.h"
#include "viraccessmanager.h"
D
Daniel P. Berrange 已提交
58

59
#ifdef WITH_DRIVER_MODULES
60
# include "driver.h"
61
#else
62 63 64 65 66 67
# ifdef WITH_QEMU
#  include "qemu/qemu_driver.h"
# endif
# ifdef WITH_LXC
#  include "lxc/lxc_driver.h"
# endif
68 69 70
# ifdef WITH_XEN
#  include "xen/xen_driver.h"
# endif
J
Jim Fehlig 已提交
71 72 73
# ifdef WITH_LIBXL
#  include "libxl/libxl_driver.h"
# endif
74 75 76
# ifdef WITH_UML
#  include "uml/uml_driver.h"
# endif
77 78 79
# ifdef WITH_VBOX
#  include "vbox/vbox_driver.h"
# endif
R
Roman Bogorodskiy 已提交
80 81 82
# ifdef WITH_BHYVE
#  include "bhyve/bhyve_driver.h"
# endif
83 84 85
# ifdef WITH_NETWORK
#  include "network/bridge_driver.h"
# endif
86 87
# ifdef WITH_INTERFACE
#  include "interface/interface_driver.h"
88
# endif
89
# ifdef WITH_STORAGE
90 91 92 93 94 95 96 97
#  include "storage/storage_driver.h"
# endif
# ifdef WITH_NODE_DEVICES
#  include "node_device/node_device_driver.h"
# endif
# ifdef WITH_SECRETS
#  include "secret/secret_driver.h"
# endif
98 99 100
# ifdef WITH_NWFILTER
#  include "nwfilter/nwfilter_driver.h"
# endif
101
#endif
102

103 104
#include "configmake.h"

105 106
#include "virdbus.h"

107
#if WITH_SASL
108
virNetSASLContextPtr saslCtxt = NULL;
109
#endif
110 111
virNetServerProgramPtr remoteProgram = NULL;
virNetServerProgramPtr qemuProgram = NULL;
112
virNetServerProgramPtr lxcProgram = NULL;
113

114 115
volatile bool driversInitialized = false;

116 117 118 119 120 121 122 123 124
enum {
    VIR_DAEMON_ERR_NONE = 0,
    VIR_DAEMON_ERR_PIDFILE,
    VIR_DAEMON_ERR_RUNDIR,
    VIR_DAEMON_ERR_INIT,
    VIR_DAEMON_ERR_SIGNAL,
    VIR_DAEMON_ERR_PRIVS,
    VIR_DAEMON_ERR_NETWORK,
    VIR_DAEMON_ERR_CONFIG,
125
    VIR_DAEMON_ERR_HOOKS,
126
    VIR_DAEMON_ERR_AUDIT,
127 128 129 130 131 132 133 134 135 136 137 138 139

    VIR_DAEMON_ERR_LAST
};

VIR_ENUM_DECL(virDaemonErr)
VIR_ENUM_IMPL(virDaemonErr, VIR_DAEMON_ERR_LAST,
              "Initialization successful",
              "Unable to obtain pidfile",
              "Unable to create rundir",
              "Unable to initialize libvirt",
              "Unable to setup signal handlers",
              "Unable to drop privileges",
              "Unable to initialize network sockets",
140
              "Unable to load configuration file",
141 142
              "Unable to look for hook scripts",
              "Unable to initialize audit system")
143

144
static int daemonForkIntoBackground(const char *argv0)
145
{
146 147 148 149
    int statuspipe[2];
    if (pipe(statuspipe) < 0)
        return -1;

150
    pid_t pid = fork();
D
Daniel P. Berrange 已提交
151 152 153
    switch (pid) {
    case 0:
        {
E
Eric Blake 已提交
154
            /* intermediate child */
D
Daniel P. Berrange 已提交
155 156
            int stdinfd = -1;
            int stdoutfd = -1;
157
            int nextpid;
D
Daniel P. Berrange 已提交
158

159
            VIR_FORCE_CLOSE(statuspipe[0]);
160

161
            if ((stdinfd = open("/dev/null", O_RDONLY)) < 0)
D
Daniel P. Berrange 已提交
162
                goto cleanup;
163
            if ((stdoutfd = open("/dev/null", O_WRONLY)) < 0)
D
Daniel P. Berrange 已提交
164 165 166 167 168 169 170
                goto cleanup;
            if (dup2(stdinfd, STDIN_FILENO) != STDIN_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDOUT_FILENO) != STDOUT_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDERR_FILENO) != STDERR_FILENO)
                goto cleanup;
E
Eric Blake 已提交
171
            if (stdinfd > STDERR_FILENO && VIR_CLOSE(stdinfd) < 0)
D
Daniel P. Berrange 已提交
172
                goto cleanup;
E
Eric Blake 已提交
173
            if (stdoutfd > STDERR_FILENO && VIR_CLOSE(stdoutfd) < 0)
D
Daniel P. Berrange 已提交
174 175 176 177 178 179 180
                goto cleanup;

            if (setsid() < 0)
                goto cleanup;

            nextpid = fork();
            switch (nextpid) {
E
Eric Blake 已提交
181
            case 0: /* grandchild */
182
                return statuspipe[1];
E
Eric Blake 已提交
183 184 185 186
            case -1: /* error */
                goto cleanup;
            default: /* intermediate child succeeded */
                _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
187 188 189
            }

        cleanup:
190 191
            VIR_FORCE_CLOSE(stdoutfd);
            VIR_FORCE_CLOSE(stdinfd);
E
Eric Blake 已提交
192 193
            VIR_FORCE_CLOSE(statuspipe[1]);
            _exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
194 195 196

        }

E
Eric Blake 已提交
197 198
    case -1: /* error in parent */
        goto error;
D
Daniel P. Berrange 已提交
199 200 201

    default:
        {
E
Eric Blake 已提交
202
            /* parent */
203 204 205
            int ret;
            char status;

206
            VIR_FORCE_CLOSE(statuspipe[1]);
207 208

            /* We wait to make sure the first child forked successfully */
209
            if (virProcessWait(pid, NULL, false) < 0)
E
Eric Blake 已提交
210
                goto error;
211

E
Eric Blake 已提交
212 213 214
            /* If we get here, then the grandchild was spawned, so we
             * must exit.  Block until the second child initializes
             * successfully */
215 216 217 218 219
        again:
            ret = read(statuspipe[0], &status, 1);
            if (ret == -1 && errno == EINTR)
                goto again;

E
Eric Blake 已提交
220 221 222 223 224
            VIR_FORCE_CLOSE(statuspipe[0]);

            if (ret != 1) {
                char ebuf[1024];

225
                fprintf(stderr,
E
Eric Blake 已提交
226 227 228 229 230 231 232 233
                        _("%s: error: unable to determine if daemon is "
                          "running: %s\n"), argv0,
                        virStrerror(errno, ebuf, sizeof(ebuf)));
                exit(EXIT_FAILURE);
            } else if (status != 0) {
                fprintf(stderr,
                        _("%s: error: %s. Check /var/log/messages or run "
                          "without --daemon for more info.\n"), argv0,
234
                        virDaemonErrTypeToString(status));
E
Eric Blake 已提交
235
                exit(EXIT_FAILURE);
236
            }
E
Eric Blake 已提交
237
            _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
238 239
        }
    }
E
Eric Blake 已提交
240 241 242 243 244

error:
    VIR_FORCE_CLOSE(statuspipe[0]);
    VIR_FORCE_CLOSE(statuspipe[1]);
    return -1;
D
Daniel P. Berrange 已提交
245 246
}

247 248

static int
249 250
daemonPidFilePath(bool privileged,
                  char **pidfile)
251
{
252
    if (privileged) {
253 254
        if (VIR_STRDUP(*pidfile, LOCALSTATEDIR "/run/libvirtd.pid") < 0)
            goto error;
255
    } else {
256 257
        char *rundir = NULL;
        mode_t old_umask;
258

259
        if (!(rundir = virGetUserRuntimeDirectory()))
260
            goto error;
261

262 263 264 265 266 267 268 269 270
        old_umask = umask(077);
        if (virFileMakePath(rundir) < 0) {
            umask(old_umask);
            goto error;
        }
        umask(old_umask);

        if (virAsprintf(pidfile, "%s/libvirtd.pid", rundir) < 0) {
            VIR_FREE(rundir);
271
            goto error;
E
Eric Blake 已提交
272
        }
273

274
        VIR_FREE(rundir);
275 276 277
    }

    return 0;
278

279
error:
280
    return -1;
281 282
}

283 284 285 286 287
static int
daemonUnixSocketPaths(struct daemonConfig *config,
                      bool privileged,
                      char **sockfile,
                      char **rosockfile)
J
John Levon 已提交
288
{
289 290
    if (config->unix_sock_dir) {
        if (virAsprintf(sockfile, "%s/libvirt-sock", config->unix_sock_dir) < 0)
291
            goto error;
292 293
        if (privileged &&
            virAsprintf(rosockfile, "%s/libvirt-sock-ro", config->unix_sock_dir) < 0)
294
            goto error;
D
Daniel P. Berrange 已提交
295
    } else {
296
        if (privileged) {
297 298 299
            if (VIR_STRDUP(*sockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock") < 0 ||
                VIR_STRDUP(*rosockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock-ro") < 0)
                goto error;
300
        } else {
301 302
            char *rundir = NULL;
            mode_t old_umask;
303

304
            if (!(rundir = virGetUserRuntimeDirectory()))
305
                goto error;
306

307 308 309 310 311 312 313
            old_umask = umask(077);
            if (virFileMakePath(rundir) < 0) {
                umask(old_umask);
                goto error;
            }
            umask(old_umask);

314
            if (virAsprintf(sockfile, "%s/libvirt-sock", rundir) < 0) {
315
                VIR_FREE(rundir);
316
                goto error;
317
            }
318

319
            VIR_FREE(rundir);
320 321 322
        }
    }
    return 0;
323

324 325
error:
    return -1;
D
Daniel P. Berrange 已提交
326 327
}

328 329 330

static void daemonErrorHandler(void *opaque ATTRIBUTE_UNUSED,
                               virErrorPtr err ATTRIBUTE_UNUSED)
331 332 333 334 335
{
    /* Don't do anything, since logging infrastructure already
     * took care of reporting the error */
}

336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352
static int daemonErrorLogFilter(virErrorPtr err, int priority)
{
    /* These error codes don't really reflect real errors. They
     * are expected events that occur when an app tries to check
     * whether a particular guest already exists. This filters
     * them to a lower log level to prevent pollution of syslog
     */
    switch (err->code) {
    case VIR_ERR_NO_DOMAIN:
    case VIR_ERR_NO_NETWORK:
    case VIR_ERR_NO_STORAGE_POOL:
    case VIR_ERR_NO_STORAGE_VOL:
    case VIR_ERR_NO_NODE_DEVICE:
    case VIR_ERR_NO_INTERFACE:
    case VIR_ERR_NO_NWFILTER:
    case VIR_ERR_NO_SECRET:
    case VIR_ERR_NO_DOMAIN_SNAPSHOT:
353
    case VIR_ERR_OPERATION_INVALID:
354 355 356 357 358 359
        return VIR_LOG_DEBUG;
    }

    return priority;
}

360 361
static void daemonInitialize(void)
{
362 363 364 365 366 367 368
    /*
     * Note that the order is important: the first ones have a higher
     * priority when calling virStateInitialize. We must register
     * the network, storage and nodedev drivers before any domain
     * drivers, since their resources must be auto-started before
     * any domains can be auto-started.
     */
369 370 371
#ifdef WITH_DRIVER_MODULES
    /* We don't care if any of these fail, because the whole point
     * is to allow users to only install modules they want to use.
D
Dan Kenigsberg 已提交
372
     * If they try to open a connection for a module that
373 374
     * is not loaded they'll get a suitable error at that point
     */
375
# ifdef WITH_NETWORK
376
    virDriverLoadModule("network");
377 378
# endif
# ifdef WITH_STORAGE
379
    virDriverLoadModule("storage");
380 381
# endif
# ifdef WITH_NODE_DEVICES
382
    virDriverLoadModule("nodedev");
383 384
# endif
# ifdef WITH_SECRETS
385
    virDriverLoadModule("secret");
386 387 388 389
# endif
# ifdef WITH_NWFILTER
    virDriverLoadModule("nwfilter");
# endif
390
# ifdef WITH_INTERFACE
391 392
    virDriverLoadModule("interface");
# endif
393 394 395 396 397 398
# ifdef WITH_XEN
    virDriverLoadModule("xen");
# endif
# ifdef WITH_LIBXL
    virDriverLoadModule("libxl");
# endif
399
# ifdef WITH_QEMU
400
    virDriverLoadModule("qemu");
401 402
# endif
# ifdef WITH_LXC
403
    virDriverLoadModule("lxc");
404 405
# endif
# ifdef WITH_UML
406
    virDriverLoadModule("uml");
407
# endif
408 409 410
# ifdef WITH_VBOX
    virDriverLoadModule("vbox");
# endif
R
Roman Bogorodskiy 已提交
411 412 413
# ifdef WITH_BHYVE
    virDriverLoadModule("bhyve");
# endif
414
#else
415
# ifdef WITH_NETWORK
416
    networkRegister();
417
# endif
418
# ifdef WITH_INTERFACE
419
    interfaceRegister();
420
# endif
421
# ifdef WITH_STORAGE
422
    storageRegister();
423
# endif
424
# ifdef WITH_NODE_DEVICES
425
    nodedevRegister();
426 427
# endif
# ifdef WITH_SECRETS
428
    secretRegister();
429
# endif
430 431 432
# ifdef WITH_NWFILTER
    nwfilterRegister();
# endif
433 434 435
# ifdef WITH_XEN
    xenRegister();
# endif
J
Jim Fehlig 已提交
436 437 438
# ifdef WITH_LIBXL
    libxlRegister();
# endif
439
# ifdef WITH_QEMU
440
    qemuRegister();
441 442
# endif
# ifdef WITH_LXC
443
    lxcRegister();
444 445
# endif
# ifdef WITH_UML
446
    umlRegister();
447
# endif
448 449 450
# ifdef WITH_VBOX
    vboxRegister();
# endif
R
Roman Bogorodskiy 已提交
451 452 453
# ifdef WITH_BHYVE
    bhyveRegister();
# endif
454
#endif
455 456 457
}


458 459 460 461 462 463 464 465 466 467
static int daemonSetupNetworking(virNetServerPtr srv,
                                 struct daemonConfig *config,
                                 const char *sock_path,
                                 const char *sock_path_ro,
                                 bool ipsock,
                                 bool privileged)
{
    virNetServerServicePtr svc = NULL;
    virNetServerServicePtr svcRO = NULL;
    virNetServerServicePtr svcTCP = NULL;
468
#if WITH_GNUTLS
469
    virNetServerServicePtr svcTLS = NULL;
470
#endif
471 472 473 474 475 476 477 478
    gid_t unix_sock_gid = 0;
    int unix_sock_ro_mask = 0;
    int unix_sock_rw_mask = 0;

    if (config->unix_sock_group) {
        if (virGetGroupID(config->unix_sock_group, &unix_sock_gid) < 0)
            return -1;
    }
479

480 481 482 483
    if (virStrToLong_i(config->unix_sock_ro_perms, NULL, 8, &unix_sock_ro_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_ro_perms);
        goto error;
    }
484

485 486 487 488
    if (virStrToLong_i(config->unix_sock_rw_perms, NULL, 8, &unix_sock_rw_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_rw_perms);
        goto error;
    }
489

490
    VIR_DEBUG("Registering unix socket %s", sock_path);
491 492 493 494
    if (!(svc = virNetServerServiceNewUNIX(sock_path,
                                           unix_sock_rw_mask,
                                           unix_sock_gid,
                                           config->auth_unix_rw,
495
#if WITH_GNUTLS
496 497
                                           NULL,
#endif
498
                                           false,
M
Michal Privoznik 已提交
499
                                           config->max_queued_clients,
500
                                           config->max_client_requests)))
501
        goto error;
502 503 504 505 506 507
    if (sock_path_ro) {
        VIR_DEBUG("Registering unix socket %s", sock_path_ro);
        if (!(svcRO = virNetServerServiceNewUNIX(sock_path_ro,
                                                 unix_sock_ro_mask,
                                                 unix_sock_gid,
                                                 config->auth_unix_ro,
508
#if WITH_GNUTLS
509 510
                                                 NULL,
#endif
511
                                                 true,
M
Michal Privoznik 已提交
512
                                                 config->max_queued_clients,
513
                                                 config->max_client_requests)))
514 515
            goto error;
    }
516

517 518 519 520
    if (virNetServerAddService(srv, svc,
                               config->mdns_adv && !ipsock ?
                               "_libvirt._tcp" :
                               NULL) < 0)
521
        goto error;
522

523 524 525
    if (svcRO &&
        virNetServerAddService(srv, svcRO, NULL) < 0)
        goto error;
526

527
    if (ipsock) {
528
        if (config->listen_tcp) {
529 530
            VIR_DEBUG("Registering TCP socket %s:%s",
                      config->listen_addr, config->tcp_port);
531 532 533
            if (!(svcTCP = virNetServerServiceNewTCP(config->listen_addr,
                                                     config->tcp_port,
                                                     config->auth_tcp,
534
#if WITH_GNUTLS
535 536
                                                     NULL,
#endif
537
                                                     false,
M
Michal Privoznik 已提交
538
                                                     config->max_queued_clients,
539
                                                     config->max_client_requests)))
540
                goto error;
541

542 543 544
            if (virNetServerAddService(srv, svcTCP,
                                       config->mdns_adv ? "_libvirt._tcp" : NULL) < 0)
                goto error;
545 546
        }

547
#if WITH_GNUTLS
548 549
        if (config->listen_tls) {
            virNetTLSContextPtr ctxt = NULL;
550

551 552 553 554 555 556 557 558
            if (config->ca_file ||
                config->cert_file ||
                config->key_file) {
                if (!(ctxt = virNetTLSContextNewServer(config->ca_file,
                                                       config->crl_file,
                                                       config->cert_file,
                                                       config->key_file,
                                                       (const char *const*)config->tls_allowed_dn_list,
559
                                                       config->tls_no_sanity_certificate ? false : true,
560 561 562 563 564 565
                                                       config->tls_no_verify_certificate ? false : true)))
                    goto error;
            } else {
                if (!(ctxt = virNetTLSContextNewServerPath(NULL,
                                                           !privileged,
                                                           (const char *const*)config->tls_allowed_dn_list,
566
                                                           config->tls_no_sanity_certificate ? false : true,
567 568
                                                           config->tls_no_verify_certificate ? false : true)))
                    goto error;
569 570
            }

571 572
            VIR_DEBUG("Registering TLS socket %s:%s",
                      config->listen_addr, config->tls_port);
573 574 575 576
            if (!(svcTLS =
                  virNetServerServiceNewTCP(config->listen_addr,
                                            config->tls_port,
                                            config->auth_tls,
577
                                            ctxt,
578
                                            false,
M
Michal Privoznik 已提交
579
                                            config->max_queued_clients,
580
                                            config->max_client_requests))) {
581
                virObjectUnref(ctxt);
582
                goto error;
583
            }
584 585 586 587
            if (virNetServerAddService(srv, svcTLS,
                                       config->mdns_adv &&
                                       !config->listen_tcp ? "_libvirt._tcp" : NULL) < 0)
                goto error;
588

589
            virObjectUnref(ctxt);
590
        }
591 592 593 594 595 596 597 598
#else
        (void)privileged;
        if (config->listen_tls) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This libvirtd build does not support TLS"));
            goto error;
        }
#endif
599 600
    }

601
#if WITH_SASL
602 603
    if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
        config->auth_unix_ro == REMOTE_AUTH_SASL ||
604
# if WITH_GNUTLS
605 606 607
        config->auth_tls == REMOTE_AUTH_SASL ||
# endif
        config->auth_tcp == REMOTE_AUTH_SASL) {
608 609 610
        saslCtxt = virNetSASLContextNewServer(
            (const char *const*)config->sasl_allowed_username_list);
        if (!saslCtxt)
611
            goto error;
D
Daniel P. Berrange 已提交
612
    }
613
#endif
D
Daniel P. Berrange 已提交
614 615

    return 0;
616

617
error:
618
#if WITH_GNUTLS
619
    virObjectUnref(svcTLS);
620
#endif
621 622 623
    virObjectUnref(svcTCP);
    virObjectUnref(svc);
    virObjectUnref(svcRO);
624
    return -1;
D
Daniel P. Berrange 已提交
625 626 627
}


628 629
/*
 * Set up the logging environment
630 631
 * By default if daemonized all errors go to the logfile libvirtd.log,
 * but if verbose or error debugging is asked for then also output
632
 * informational and debug messages. Default size if 64 kB.
633
 */
634
static int
635 636 637 638
daemonSetupLogging(struct daemonConfig *config,
                   bool privileged,
                   bool verbose,
                   bool godaemon)
639
{
640 641
    virLogReset();

642
    /*
643 644 645 646 647 648 649 650 651 652 653 654
     * Libvirtd's order of precedence is:
     * cmdline > environment > config
     *
     * In order to achieve this, we must process configuration in
     * different order for the log level versus the filters and
     * outputs. Because filters and outputs append, we have to look at
     * the environment first and then only check the config file if
     * there was no result from the environment. The default output is
     * then applied only if there was no setting from either of the
     * first two. Because we don't have a way to determine if the log
     * level has been set, we must process variables in the opposite
     * order, each one overriding the previous.
655
     */
656 657
    if (config->log_level != 0)
        virLogSetDefaultPriority(config->log_level);
658

659
    virLogSetFromEnv();
660

661
    virLogSetBufferSize(config->log_buffer_size);
662

663 664 665 666 667
    if (virLogGetNbFilters() == 0)
        virLogParseFilters(config->log_filters);

    if (virLogGetNbOutputs() == 0)
        virLogParseOutputs(config->log_outputs);
668 669

    /*
670 671 672 673
     * If no defined outputs, and either running
     * as daemon or not on a tty, then first try
     * to direct it to the systemd journal
     * (if it exists)....
674
     */
675 676
    if (virLogGetNbOutputs() == 0 &&
        (godaemon || !isatty(STDIN_FILENO))) {
677 678 679
        char *tmp;
        if (access("/run/systemd/journal/socket", W_OK) >= 0) {
            if (virAsprintf(&tmp, "%d:journald", virLogGetDefaultPriority()) < 0)
680
                goto error;
681 682 683 684 685 686 687
            virLogParseOutputs(tmp);
            VIR_FREE(tmp);
        }
    }

    /*
     * otherwise direct to libvirtd.log when running
688
     * as daemon. Otherwise the default output is stderr.
689
     */
690
    if (virLogGetNbOutputs() == 0) {
691
        char *tmp = NULL;
692

693
        if (godaemon) {
694
            if (privileged) {
695 696 697
                if (virAsprintf(&tmp, "%d:file:%s/log/libvirt/libvirtd.log",
                                virLogGetDefaultPriority(),
                                LOCALSTATEDIR) == -1)
698
                    goto error;
699
            } else {
700
                char *logdir = virGetUserCacheDirectory();
701 702 703 704 705 706 707 708
                mode_t old_umask;

                if (!logdir)
                    goto error;

                old_umask = umask(077);
                if (virFileMakePath(logdir) < 0) {
                    umask(old_umask);
709
                    goto error;
710 711
                }
                umask(old_umask);
712

713 714 715
                if (virAsprintf(&tmp, "%d:file:%s/libvirtd.log",
                                virLogGetDefaultPriority(), logdir) == -1) {
                    VIR_FREE(logdir);
716
                    goto error;
E
Eric Blake 已提交
717
                }
718
                VIR_FREE(logdir);
719
            }
720
        } else {
721
            if (virAsprintf(&tmp, "%d:stderr", virLogGetDefaultPriority()) < 0)
722
                goto error;
723
        }
724 725
        virLogParseOutputs(tmp);
        VIR_FREE(tmp);
726
    }
727 728 729 730 731 732 733

    /*
     * Command line override for --verbose
     */
    if ((verbose) && (virLogGetDefaultPriority() > VIR_LOG_INFO))
        virLogSetDefaultPriority(VIR_LOG_INFO);

734 735 736 737 738 739
    return 0;

error:
    return -1;
}

740

741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760
static int
daemonSetupAccessManager(struct daemonConfig *config)
{
    virAccessManagerPtr mgr;
    const char *none[] = { "none", NULL };
    const char **driver = (const char **)config->access_drivers;

    if (!driver ||
        !driver[0])
        driver = none;

    if (!(mgr = virAccessManagerNewStack(driver)))
        return -1;

    virAccessManagerSetDefault(mgr);
    virObjectUnref(mgr);
    return 0;
}


761 762
/* Display version information. */
static void
763
daemonVersion(const char *argv0)
764
{
765
    printf("%s (%s) %s\n", argv0, PACKAGE_NAME, PACKAGE_VERSION);
766 767
}

J
John Levon 已提交
768 769
#ifdef __sun
static int
770
daemonSetupPrivs(void)
J
John Levon 已提交
771
{
772
    chown("/var/run/libvirt", SYSTEM_UID, SYSTEM_UID);
J
John Levon 已提交
773

774 775
    if (__init_daemon_priv(PU_RESETGROUPS | PU_CLEARLIMITSET,
                           SYSTEM_UID, SYSTEM_UID, PRIV_XVM_CONTROL, NULL)) {
776
        VIR_ERROR(_("additional privileges are required"));
J
John Levon 已提交
777 778 779
        return -1;
    }

780 781
    if (priv_set(PRIV_OFF, PRIV_ALLSETS, PRIV_FILE_LINK_ANY, PRIV_PROC_INFO,
                 PRIV_PROC_SESSION, PRIV_PROC_EXEC, PRIV_PROC_FORK, NULL)) {
782
        VIR_ERROR(_("failed to set reduced privileges"));
J
John Levon 已提交
783 784 785 786 787 788
        return -1;
    }

    return 0;
}
#else
789
# define daemonSetupPrivs() 0
J
John Levon 已提交
790 791
#endif

792

793 794 795
static void daemonShutdownHandler(virNetServerPtr srv,
                                  siginfo_t *sig ATTRIBUTE_UNUSED,
                                  void *opaque ATTRIBUTE_UNUSED)
796
{
797 798
    virNetServerQuit(srv);
}
799

800 801 802 803 804 805
static void daemonReloadHandler(virNetServerPtr srv ATTRIBUTE_UNUSED,
                                siginfo_t *sig ATTRIBUTE_UNUSED,
                                void *opaque ATTRIBUTE_UNUSED)
{
        VIR_INFO("Reloading configuration on SIGHUP");
        virHookCall(VIR_HOOK_DRIVER_DAEMON, "-",
806
                    VIR_HOOK_DAEMON_OP_RELOAD, SIGHUP, "SIGHUP", NULL, NULL);
807 808 809 810
        if (virStateReload() < 0)
            VIR_WARN("Error while reloading drivers");
}

811 812 813
static int daemonSetupSignals(virNetServerPtr srv)
{
    if (virNetServerAddSignalHandler(srv, SIGINT, daemonShutdownHandler, NULL) < 0)
814
        return -1;
815 816 817 818
    if (virNetServerAddSignalHandler(srv, SIGQUIT, daemonShutdownHandler, NULL) < 0)
        return -1;
    if (virNetServerAddSignalHandler(srv, SIGTERM, daemonShutdownHandler, NULL) < 0)
        return -1;
819 820
    if (virNetServerAddSignalHandler(srv, SIGHUP, daemonReloadHandler, NULL) < 0)
        return -1;
821 822
    return 0;
}
823

824 825 826 827 828 829 830 831 832 833 834 835

static void daemonInhibitCallback(bool inhibit, void *opaque)
{
    virNetServerPtr srv = opaque;

    if (inhibit)
        virNetServerAddShutdownInhibition(srv);
    else
        virNetServerRemoveShutdownInhibition(srv);
}


836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901
#ifdef HAVE_DBUS
static DBusConnection *sessionBus;
static DBusConnection *systemBus;

static void daemonStopWorker(void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("Begin stop srv=%p", srv);

    ignore_value(virStateStop());

    VIR_DEBUG("Completed stop srv=%p", srv);

    /* Exit libvirtd cleanly */
    virNetServerQuit(srv);
}


/* We do this in a thread to not block the main loop */
static void daemonStop(virNetServerPtr srv)
{
    virThread thr;
    virObjectRef(srv);
    if (virThreadCreate(&thr, false, daemonStopWorker, srv) < 0)
        virObjectUnref(srv);
}


static DBusHandlerResult
handleSessionMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                         DBusMessage *message,
                         void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("srv=%p", srv);

    if (dbus_message_is_signal(message,
                               DBUS_INTERFACE_LOCAL,
                               "Disconnected"))
        daemonStop(srv);

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}


static DBusHandlerResult
handleSystemMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                        DBusMessage *message,
                        void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("srv=%p", srv);

    if (dbus_message_is_signal(message,
                               "org.freedesktop.login1.Manager",
                               "PrepareForShutdown"))
        daemonStop(srv);

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
#endif


902 903 904
static void daemonRunStateInit(void *opaque)
{
    virNetServerPtr srv = opaque;
905 906 907
    virIdentityPtr sysident = virIdentityGetSystem();

    virIdentitySetCurrent(sysident);
908

909 910 911 912
    /* Since driver initialization can take time inhibit daemon shutdown until
       we're done so clients get a chance to connect */
    daemonInhibitCallback(true, srv);

913
    /* Start the stateful HV drivers
E
Eric Blake 已提交
914
     * This is deliberately done after telling the parent process
915 916
     * we're ready, since it can take a long time and this will
     * seriously delay OS bootup process */
917 918 919
    if (virStateInitialize(virNetServerIsPrivileged(srv),
                           daemonInhibitCallback,
                           srv) < 0) {
920
        VIR_ERROR(_("Driver state initialization failed"));
921 922
        /* Ensure the main event loop quits */
        kill(getpid(), SIGTERM);
923
        goto cleanup;
924 925
    }

926 927
    driversInitialized = true;

928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946
#ifdef HAVE_DBUS
    /* Tie the non-priviledged libvirtd to the session/shutdown lifecycle */
    if (!virNetServerIsPrivileged(srv)) {

        sessionBus = virDBusGetSessionBus();
        if (sessionBus != NULL)
            dbus_connection_add_filter(sessionBus,
                                       handleSessionMessageFunc, srv, NULL);

        systemBus = virDBusGetSystemBus();
        if (systemBus != NULL) {
            dbus_connection_add_filter(systemBus,
                                       handleSystemMessageFunc, srv, NULL);
            dbus_bus_add_match(systemBus,
                               "type='signal',sender='org.freedesktop.login1', interface='org.freedesktop.login1.Manager'",
                               NULL);
        }
    }
#endif
947 948
    /* Only now accept clients from network */
    virNetServerUpdateServices(srv, true);
949 950
cleanup:
    daemonInhibitCallback(false, srv);
951
    virObjectUnref(srv);
952 953
    virObjectUnref(sysident);
    virIdentitySetCurrent(NULL);
954
}
955

956 957 958
static int daemonStateInit(virNetServerPtr srv)
{
    virThread thr;
959
    virObjectRef(srv);
960
    if (virThreadCreate(&thr, false, daemonRunStateInit, srv) < 0) {
961
        virObjectUnref(srv);
962 963
        return -1;
    }
964 965 966
    return 0;
}

967 968 969 970 971 972 973 974 975 976 977
static int migrateProfile(void)
{
    char *old_base = NULL;
    char *updated = NULL;
    char *home = NULL;
    char *xdg_dir = NULL;
    char *config_dir = NULL;
    const char *config_home;
    int ret = -1;
    mode_t old_umask;

978 979
    VIR_DEBUG("Checking if user profile needs migrating");

980
    if (!(home = virGetUserDirectory()))
981 982 983 984 985 986 987
        goto cleanup;

    if (virAsprintf(&old_base, "%s/.libvirt", home) < 0) {
        goto cleanup;
    }

    /* if the new directory is there or the old one is not: do nothing */
988
    if (!(config_dir = virGetUserConfigDirectory()))
989 990 991
        goto cleanup;

    if (!virFileIsDir(old_base) || virFileExists(config_dir)) {
992 993 994
        VIR_DEBUG("No old profile in '%s' / "
                  "new profile directory already present '%s'",
                  old_base, config_dir);
995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006
        ret = 0;
        goto cleanup;
    }

    /* test if we already attempted to migrate first */
    if (virAsprintf(&updated, "%s/DEPRECATED-DIRECTORY", old_base) < 0) {
        goto cleanup;
    }
    if (virFileExists(updated)) {
        goto cleanup;
    }

1007
    config_home = virGetEnvBlockSUID("XDG_CONFIG_HOME");
1008
    if (config_home && config_home[0] != '\0') {
1009 1010
        if (VIR_STRDUP(xdg_dir, config_home) < 0)
            goto cleanup;
1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030
    } else {
        if (virAsprintf(&xdg_dir, "%s/.config", home) < 0) {
            goto cleanup;
        }
    }

    old_umask = umask(077);
    if (virFileMakePath(xdg_dir) < 0) {
        umask(old_umask);
        goto cleanup;
    }
    umask(old_umask);

    if (rename(old_base, config_dir) < 0) {
        int fd = creat(updated, 0600);
        VIR_FORCE_CLOSE(fd);
        VIR_ERROR(_("Unable to migrate %s to %s"), old_base, config_dir);
        goto cleanup;
    }

1031
    VIR_DEBUG("Profile migrated from %s to %s", old_base, config_dir);
1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043
    ret = 0;

 cleanup:
    VIR_FREE(home);
    VIR_FREE(old_base);
    VIR_FREE(xdg_dir);
    VIR_FREE(config_dir);
    VIR_FREE(updated);

    return ret;
}

1044 1045
/* Print command-line usage. */
static void
1046
daemonUsage(const char *argv0, bool privileged)
1047
{
1048 1049 1050 1051 1052 1053
    fprintf(stderr,
            _("\n"
              "Usage:\n"
              "  %s [options]\n"
              "\n"
              "Options:\n"
1054
              "  -h | --help            Display program help:\n"
1055 1056 1057 1058 1059
              "  -v | --verbose         Verbose messages.\n"
              "  -d | --daemon          Run as a daemon & write PID file.\n"
              "  -l | --listen          Listen for TCP/IP connections.\n"
              "  -t | --timeout <secs>  Exit after timeout period.\n"
              "  -f | --config <file>   Configuration file.\n"
1060
              "  -V | --version         Display version information.\n"
1061 1062 1063 1064
              "  -p | --pid-file <file> Change name of PID file.\n"
              "\n"
              "libvirt management daemon:\n"),
            argv0);
1065 1066 1067

    if (privileged) {
        fprintf(stderr,
1068 1069 1070 1071
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
1072
                  "      %s\n"
1073 1074
                  "\n"
                  "    Sockets:\n"
1075 1076
                  "      %s\n"
                  "      %s\n"
1077 1078
                  "\n"
                  "    TLS:\n"
1079 1080 1081
                  "      CA certificate:     %s\n"
                  "      Server certificate: %s\n"
                  "      Server private key: %s\n"
1082 1083 1084 1085
                  "\n"
                  "    PID file (unless overridden by -p):\n"
                  "      %s/run/libvirtd.pid\n"
                  "\n"),
1086 1087 1088
                LIBVIRTD_CONFIGURATION_FILE,
                LIBVIRTD_PRIV_UNIX_SOCKET,
                LIBVIRTD_PRIV_UNIX_SOCKET_RO,
1089 1090 1091
                LIBVIRT_CACERT,
                LIBVIRT_SERVERCERT,
                LIBVIRT_SERVERKEY,
1092 1093
                LOCALSTATEDIR);
    } else {
1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111
        fprintf(stderr, "%s",
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
                  "      $XDG_CONFIG_HOME/libvirt/libvirtd.conf\n"
                  "\n"
                  "    Sockets:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirt-sock\n"
                  "\n"
                  "    TLS:\n"
                  "      CA certificate:     $HOME/.pki/libvirt/cacert.pem\n"
                  "      Server certificate: $HOME/.pki/libvirt/servercert.pem\n"
                  "      Server private key: $HOME/.pki/libvirt/serverkey.pem\n"
                  "\n"
                  "    PID file:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirtd.pid\n"
                  "\n"));
1112
    }
1113 1114
}

D
Daniel P. Berrange 已提交
1115 1116
#define MAX_LISTEN 5
int main(int argc, char **argv) {
1117 1118
    virNetServerPtr srv = NULL;
    char *remote_config_file = NULL;
1119
    int statuswrite = -1;
1120
    int ret = 1;
1121
    int pid_file_fd = -1;
1122 1123 1124 1125 1126 1127 1128 1129 1130
    char *pid_file = NULL;
    char *sock_file = NULL;
    char *sock_file_ro = NULL;
    int timeout = -1;        /* -t: Shutdown timeout */
    int verbose = 0;
    int godaemon = 0;
    int ipsock = 0;
    struct daemonConfig *config;
    bool privileged = geteuid() == 0 ? true : false;
1131
    bool implicit_conf = false;
1132 1133
    char *run_dir = NULL;
    mode_t old_umask;
D
Daniel P. Berrange 已提交
1134 1135

    struct option opts[] = {
1136 1137 1138
        { "verbose", no_argument, &verbose, 'v'},
        { "daemon", no_argument, &godaemon, 'd'},
        { "listen", no_argument, &ipsock, 'l'},
1139
        { "config", required_argument, NULL, 'f'},
1140 1141
        { "timeout", required_argument, NULL, 't'},
        { "pid-file", required_argument, NULL, 'p'},
1142 1143
        { "version", no_argument, NULL, 'V' },
        { "help", no_argument, NULL, 'h' },
D
Daniel P. Berrange 已提交
1144 1145 1146
        {0, 0, 0, 0}
    };

1147 1148
    if (setlocale(LC_ALL, "") == NULL ||
        bindtextdomain(PACKAGE, LOCALEDIR) == NULL ||
E
Eric Blake 已提交
1149 1150
        textdomain(PACKAGE) == NULL ||
        virInitialize() < 0) {
1151
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
E
Eric Blake 已提交
1152
        exit(EXIT_FAILURE);
1153
    }
D
Daniel P. Berrange 已提交
1154

1155 1156
    virUpdateSelfLastChanged(argv[0]);

1157 1158
    if (strstr(argv[0], "lt-libvirtd") ||
        strstr(argv[0], "/daemon/.libs/libvirtd")) {
1159 1160 1161 1162 1163 1164 1165
        char *tmp = strrchr(argv[0], '/');
        if (!tmp) {
            fprintf(stderr, _("%s: cannot identify driver directory\n"), argv[0]);
            exit(EXIT_FAILURE);
        }
        *tmp = '\0';
        char *driverdir;
1166
        if (virAsprintfQuiet(&driverdir, "%s/../../src/.libs", argv[0]) < 0) {
1167 1168 1169 1170 1171 1172 1173 1174
            fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
            exit(EXIT_FAILURE);
        }
        if (access(driverdir, R_OK) < 0) {
            fprintf(stderr, _("%s: expected driver directory '%s' is missing\n"),
                    argv[0], driverdir);
            exit(EXIT_FAILURE);
        }
1175 1176
        virLockManagerSetPluginDir(driverdir);
#ifdef WITH_DRIVER_MODULES
1177
        virDriverModuleInitialize(driverdir);
1178
#endif
1179 1180 1181
        *tmp = '/';
        /* Must not free 'driverdir' - it is still used */
    }
1182

D
Daniel P. Berrange 已提交
1183 1184 1185 1186 1187
    while (1) {
        int optidx = 0;
        int c;
        char *tmp;

1188
        c = getopt_long(argc, argv, "ldf:p:t:vVh", opts, &optidx);
D
Daniel P. Berrange 已提交
1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203

        if (c == -1) {
            break;
        }

        switch (c) {
        case 0:
            /* Got one of the flags */
            break;
        case 'v':
            verbose = 1;
            break;
        case 'd':
            godaemon = 1;
            break;
1204 1205
        case 'l':
            ipsock = 1;
D
Daniel P. Berrange 已提交
1206 1207 1208
            break;

        case 't':
1209
            if (virStrToLong_i(optarg, &tmp, 10, &timeout) != 0
1210 1211
                || timeout <= 0
                /* Ensure that we can multiply by 1000 without overflowing.  */
1212 1213 1214 1215
                || timeout > INT_MAX / 1000) {
                VIR_ERROR(_("Invalid value for timeout"));
                exit(EXIT_FAILURE);
            }
D
Daniel P. Berrange 已提交
1216
            break;
1217 1218

        case 'p':
1219
            VIR_FREE(pid_file);
1220
            if (VIR_STRDUP_QUIET(pid_file, optarg) < 0) {
1221
                VIR_ERROR(_("Can't allocate memory"));
1222
                exit(EXIT_FAILURE);
1223
            }
1224 1225 1226
            break;

        case 'f':
1227
            VIR_FREE(remote_config_file);
1228
            if (VIR_STRDUP_QUIET(remote_config_file, optarg) < 0) {
1229
                VIR_ERROR(_("Can't allocate memory"));
1230
                exit(EXIT_FAILURE);
1231
            }
1232 1233
            break;

1234
        case 'V':
1235
            daemonVersion(argv[0]);
1236
            exit(EXIT_SUCCESS);
1237

1238
        case 'h':
1239
            daemonUsage(argv[0], privileged);
1240
            exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
1241

1242
        case '?':
D
Daniel P. Berrange 已提交
1243
        default:
1244
            daemonUsage(argv[0], privileged);
1245
            exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
1246 1247 1248
        }
    }

1249 1250 1251 1252 1253 1254
    if (optind != argc) {
        fprintf(stderr, "%s: unexpected, non-option, command line arguments\n",
                argv[0]);
        exit(EXIT_FAILURE);
    }

1255 1256
    if (!(config = daemonConfigNew(privileged))) {
        VIR_ERROR(_("Can't create initial configuration"));
1257
        exit(EXIT_FAILURE);
1258
    }
1259 1260

    /* No explicit config, so try and find a default one */
1261 1262 1263
    if (remote_config_file == NULL) {
        implicit_conf = true;
        if (daemonConfigFilePath(privileged,
1264 1265
                                 &remote_config_file) < 0) {
            VIR_ERROR(_("Can't determine config path"));
1266
            exit(EXIT_FAILURE);
1267
        }
1268
    }
1269 1270 1271

    /* Read the config file if it exists*/
    if (remote_config_file &&
1272
        daemonConfigLoadFile(config, remote_config_file, implicit_conf) < 0) {
1273 1274 1275 1276 1277 1278
        virErrorPtr err = virGetLastError();
        if (err && err->message)
            VIR_ERROR(_("Can't load config file: %s: %s"),
                      err->message, remote_config_file);
        else
            VIR_ERROR(_("Can't load config file: %s"), remote_config_file);
1279
        exit(EXIT_FAILURE);
1280
    }
1281

1282
    if (!privileged &&
1283 1284
        migrateProfile() < 0) {
        VIR_ERROR(_("Exiting due to failure to migrate profile"));
1285
        exit(EXIT_FAILURE);
1286
    }
1287

1288 1289 1290 1291
    if (config->host_uuid &&
        virSetHostUUIDStr(config->host_uuid) < 0) {
        VIR_ERROR(_("invalid host UUID: %s"), config->host_uuid);
        exit(EXIT_FAILURE);
1292 1293
    }

1294 1295
    if (daemonSetupLogging(config, privileged, verbose, godaemon) < 0) {
        VIR_ERROR(_("Can't initialize logging"));
1296
        exit(EXIT_FAILURE);
1297
    }
1298

1299 1300 1301 1302 1303
    if (daemonSetupAccessManager(config) < 0) {
        VIR_ERROR(_("Can't initialize access manager"));
        exit(EXIT_FAILURE);
    }

1304
    if (!pid_file &&
1305
        daemonPidFilePath(privileged,
1306 1307
                          &pid_file) < 0) {
        VIR_ERROR(_("Can't determine pid file path."));
1308
        exit(EXIT_FAILURE);
1309
    }
1310
    VIR_DEBUG("Decided on pid file path '%s'", NULLSTR(pid_file));
1311 1312 1313 1314

    if (daemonUnixSocketPaths(config,
                              privileged,
                              &sock_file,
1315 1316
                              &sock_file_ro) < 0) {
        VIR_ERROR(_("Can't determine socket paths"));
1317
        exit(EXIT_FAILURE);
1318
    }
1319 1320
    VIR_DEBUG("Decided on socket paths '%s' and '%s'",
              sock_file, NULLSTR(sock_file_ro));
1321

1322
    if (godaemon) {
1323
        char ebuf[1024];
1324 1325 1326 1327

        if (chdir("/") < 0) {
            VIR_ERROR(_("cannot change to root directory: %s"),
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1328
            goto cleanup;
1329 1330
        }

1331
        if ((statuswrite = daemonForkIntoBackground(argv[0])) < 0) {
1332
            VIR_ERROR(_("Failed to fork as daemon: %s"),
1333
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1334
            goto cleanup;
1335 1336 1337
        }
    }

J
John Levon 已提交
1338
    /* Ensure the rundir exists (on tmpfs on some systems) */
1339
    if (privileged) {
1340 1341 1342 1343
        if (VIR_STRDUP_QUIET(run_dir, LOCALSTATEDIR "/run/libvirt") < 0) {
            VIR_ERROR(_("Can't allocate memory"));
            goto cleanup;
        }
1344
    } else {
1345
        run_dir = virGetUserRuntimeDirectory();
1346

1347
        if (!run_dir) {
1348 1349
            VIR_ERROR(_("Can't determine user directory"));
            goto cleanup;
J
John Levon 已提交
1350 1351
        }
    }
1352 1353 1354 1355
    if (privileged)
        old_umask = umask(022);
    else
        old_umask = umask(077);
1356
    VIR_DEBUG("Ensuring run dir '%s' exists", run_dir);
1357 1358 1359 1360 1361 1362 1363 1364
    if (virFileMakePath(run_dir) < 0) {
        char ebuf[1024];
        VIR_ERROR(_("unable to create rundir %s: %s"), run_dir,
                  virStrerror(errno, ebuf, sizeof(ebuf)));
        ret = VIR_DAEMON_ERR_RUNDIR;
        goto cleanup;
    }
    umask(old_umask);
J
John Levon 已提交
1365

1366 1367 1368 1369 1370 1371
    /* Try to claim the pidfile, exiting if we can't */
    if ((pid_file_fd = virPidFileAcquirePath(pid_file, getpid())) < 0) {
        ret = VIR_DAEMON_ERR_PIDFILE;
        goto cleanup;
    }

1372 1373 1374 1375 1376
    if (virNetlinkStartup() < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1377 1378
    if (!(srv = virNetServerNew(config->min_workers,
                                config->max_workers,
1379
                                config->prio_workers,
1380
                                config->max_clients,
1381 1382 1383
                                config->keepalive_interval,
                                config->keepalive_count,
                                !!config->keepalive_required,
1384
                                config->mdns_adv ? config->mdns_name : NULL,
1385
                                remoteClientInitHook,
1386
                                NULL,
1387
                                remoteClientFreeFunc,
1388
                                NULL))) {
1389 1390 1391 1392
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1393 1394 1395
    /* Beyond this point, nothing should rely on using
     * getuid/geteuid() == 0, for privilege level checks.
     */
1396
    VIR_DEBUG("Dropping privileges (if required)");
1397
    if (daemonSetupPrivs() < 0) {
1398
        ret = VIR_DAEMON_ERR_PRIVS;
1399
        goto cleanup;
1400
    }
J
John Levon 已提交
1401

1402
    daemonInitialize();
1403

1404 1405 1406 1407 1408 1409 1410 1411 1412
    remoteProcs[REMOTE_PROC_AUTH_LIST].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_INIT].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_STEP].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_START].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_POLKIT].needAuth = false;
    if (!(remoteProgram = virNetServerProgramNew(REMOTE_PROGRAM,
                                                 REMOTE_PROTOCOL_VERSION,
                                                 remoteProcs,
                                                 remoteNProcs))) {
1413
        ret = VIR_DAEMON_ERR_INIT;
1414 1415 1416 1417 1418
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, remoteProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1419
    }
1420

1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432
    if (!(lxcProgram = virNetServerProgramNew(LXC_PROGRAM,
                                              LXC_PROTOCOL_VERSION,
                                              lxcProcs,
                                              lxcNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, lxcProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1433 1434 1435 1436 1437 1438 1439 1440 1441 1442
    if (!(qemuProgram = virNetServerProgramNew(QEMU_PROGRAM,
                                               QEMU_PROTOCOL_VERSION,
                                               qemuProcs,
                                               qemuNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, qemuProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1443
    }
1444

1445 1446
    if (timeout != -1) {
        VIR_DEBUG("Registering shutdown timeout %d", timeout);
1447
        virNetServerAutoShutdown(srv,
1448
                                 timeout);
1449
    }
1450 1451 1452 1453

    if ((daemonSetupSignals(srv)) < 0) {
        ret = VIR_DAEMON_ERR_SIGNAL;
        goto cleanup;
1454
    }
D
Daniel P. Berrange 已提交
1455

1456
    if (config->audit_level) {
1457
        VIR_DEBUG("Attempting to configure auditing subsystem");
1458
        if (virAuditOpen() < 0) {
1459
            if (config->audit_level > 1) {
1460
                ret = VIR_DAEMON_ERR_AUDIT;
1461
                goto cleanup;
1462
            }
1463
            VIR_DEBUG("Proceeding without auditing");
1464 1465
        }
    }
1466
    virAuditLog(config->audit_logging);
1467

1468
    /* setup the hooks if any */
1469
    if (virHookInitialize() < 0) {
1470
        ret = VIR_DAEMON_ERR_HOOKS;
1471
        goto cleanup;
1472 1473
    }

1474
    /* Disable error func, now logging is setup */
1475
    virSetErrorFunc(NULL, daemonErrorHandler);
1476
    virSetErrorLogPriorityFunc(daemonErrorLogFilter);
1477

1478 1479 1480 1481 1482 1483
    /*
     * Call the daemon startup hook
     * TODO: should we abort the daemon startup if the script returned
     *       an error ?
     */
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_START,
1484
                0, "start", NULL, NULL);
1485

1486 1487 1488
    if (daemonSetupNetworking(srv, config,
                              sock_file, sock_file_ro,
                              ipsock, privileged) < 0) {
1489
        ret = VIR_DAEMON_ERR_NETWORK;
1490
        goto cleanup;
1491 1492
    }

1493 1494 1495 1496 1497 1498 1499 1500 1501
    /* Tell parent of daemon that basic initialization is complete
     * In particular we're ready to accept net connections & have
     * written the pidfile
     */
    if (statuswrite != -1) {
        char status = 0;
        while (write(statuswrite, &status, 1) == -1 &&
               errno == EINTR)
            ;
1502
        VIR_FORCE_CLOSE(statuswrite);
1503 1504
    }

1505 1506 1507 1508
    /* Initialize drivers & then start accepting new clients from network */
    if (daemonStateInit(srv) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1509
    }
D
Daniel P. Berrange 已提交
1510

1511
#if defined(__linux__) && defined(NETLINK_ROUTE)
1512 1513
    /* Register the netlink event service for NETLINK_ROUTE */
    if (virNetlinkEventServiceStart(NETLINK_ROUTE, 0) < 0) {
1514 1515 1516
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1517
#endif
1518

1519
#if defined(__linux__) && defined(NETLINK_KOBJECT_UEVENT)
T
Tang Chen 已提交
1520 1521 1522 1523 1524
    /* Register the netlink event service for NETLINK_KOBJECT_UEVENT */
    if (virNetlinkEventServiceStart(NETLINK_KOBJECT_UEVENT, 1) < 0) {
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1525
#endif
T
Tang Chen 已提交
1526

1527 1528
    /* Run event loop. */
    virNetServerRun(srv);
1529

1530 1531
    ret = 0;

1532
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_SHUTDOWN,
1533
                0, "shutdown", NULL, NULL);
1534

1535
cleanup:
1536
    virNetlinkEventServiceStopAll();
1537
    virObjectUnref(remoteProgram);
1538
    virObjectUnref(lxcProgram);
1539
    virObjectUnref(qemuProgram);
1540
    virNetServerClose(srv);
1541
    virObjectUnref(srv);
1542
    virNetlinkShutdown();
1543 1544 1545 1546 1547 1548 1549 1550
    if (statuswrite != -1) {
        if (ret != 0) {
            /* Tell parent of daemon what failed */
            char status = ret;
            while (write(statuswrite, &status, 1) == -1 &&
                   errno == EINTR)
                ;
        }
1551
        VIR_FORCE_CLOSE(statuswrite);
1552
    }
1553 1554
    if (pid_file_fd != -1)
        virPidFileReleasePath(pid_file, pid_file_fd);
1555 1556 1557 1558 1559

    VIR_FREE(sock_file);
    VIR_FREE(sock_file_ro);
    VIR_FREE(pid_file);
    VIR_FREE(remote_config_file);
1560 1561
    VIR_FREE(run_dir);

1562 1563
    daemonConfigFree(config);

1564 1565
    if (driversInitialized)
        virStateCleanup();
1566

1567
    return ret;
D
Daniel P. Berrange 已提交
1568
}