remote_daemon.c 47.0 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * remote_daemon.c: daemon start of day, guest process & i/o management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2018 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21 22 23
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <unistd.h>
#include <fcntl.h>
28 29
#include <sys/wait.h>
#include <sys/stat.h>
D
Daniel P. Berrange 已提交
30
#include <getopt.h>
31
#include <stdlib.h>
32
#include <grp.h>
33

34
#include "libvirt_internal.h"
35
#include "virerror.h"
E
Eric Blake 已提交
36
#include "virfile.h"
37
#include "virlog.h"
38
#include "virpidfile.h"
39
#include "virprocess.h"
40

41 42
#define VIR_FROM_THIS VIR_FROM_QEMU

43 44
#include "remote_daemon.h"
#include "remote_daemon_config.h"
45

46
#include "admin/admin_server_dispatch.h"
47
#include "viruuid.h"
48
#include "remote_driver.h"
49
#include "viralloc.h"
50
#include "virconf.h"
51
#include "virnetlink.h"
52
#include "virnetdaemon.h"
53
#include "remote_daemon_dispatch.h"
54
#include "virhook.h"
55
#include "viraudit.h"
56
#include "virstring.h"
57 58
#include "locking/lock_manager.h"
#include "viraccessmanager.h"
59
#include "virutil.h"
60
#include "virgettext.h"
61
#include "util/virnetdevopenvswitch.h"
D
Daniel P. Berrange 已提交
62

63
#include "driver.h"
64

65 66
#include "configmake.h"

67 68
#include "virdbus.h"

69 70
VIR_LOG_INIT("daemon.libvirtd");

71
#if WITH_SASL
72
virNetSASLContextPtr saslCtxt = NULL;
73
#endif
74 75
virNetServerProgramPtr remoteProgram = NULL;
virNetServerProgramPtr qemuProgram = NULL;
76

77 78
volatile bool driversInitialized = false;

79 80 81 82 83 84 85 86 87
enum {
    VIR_DAEMON_ERR_NONE = 0,
    VIR_DAEMON_ERR_PIDFILE,
    VIR_DAEMON_ERR_RUNDIR,
    VIR_DAEMON_ERR_INIT,
    VIR_DAEMON_ERR_SIGNAL,
    VIR_DAEMON_ERR_PRIVS,
    VIR_DAEMON_ERR_NETWORK,
    VIR_DAEMON_ERR_CONFIG,
88
    VIR_DAEMON_ERR_HOOKS,
89
    VIR_DAEMON_ERR_AUDIT,
90
    VIR_DAEMON_ERR_DRIVER,
91 92 93 94 95 96 97 98 99 100 101 102 103

    VIR_DAEMON_ERR_LAST
};

VIR_ENUM_DECL(virDaemonErr)
VIR_ENUM_IMPL(virDaemonErr, VIR_DAEMON_ERR_LAST,
              "Initialization successful",
              "Unable to obtain pidfile",
              "Unable to create rundir",
              "Unable to initialize libvirt",
              "Unable to setup signal handlers",
              "Unable to drop privileges",
              "Unable to initialize network sockets",
104
              "Unable to load configuration file",
105
              "Unable to look for hook scripts",
106 107
              "Unable to initialize audit system",
              "Unable to initialize driver")
108

109
static int daemonForkIntoBackground(const char *argv0)
110
{
111 112 113 114
    int statuspipe[2];
    if (pipe(statuspipe) < 0)
        return -1;

115
    pid_t pid = fork();
D
Daniel P. Berrange 已提交
116 117 118
    switch (pid) {
    case 0:
        {
E
Eric Blake 已提交
119
            /* intermediate child */
D
Daniel P. Berrange 已提交
120 121
            int stdinfd = -1;
            int stdoutfd = -1;
122
            int nextpid;
D
Daniel P. Berrange 已提交
123

124
            VIR_FORCE_CLOSE(statuspipe[0]);
125

126
            if ((stdinfd = open("/dev/null", O_RDONLY)) <= STDERR_FILENO)
D
Daniel P. Berrange 已提交
127
                goto cleanup;
128
            if ((stdoutfd = open("/dev/null", O_WRONLY)) <= STDERR_FILENO)
D
Daniel P. Berrange 已提交
129 130 131 132 133 134 135
                goto cleanup;
            if (dup2(stdinfd, STDIN_FILENO) != STDIN_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDOUT_FILENO) != STDOUT_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDERR_FILENO) != STDERR_FILENO)
                goto cleanup;
136
            if (VIR_CLOSE(stdinfd) < 0)
D
Daniel P. Berrange 已提交
137
                goto cleanup;
138
            if (VIR_CLOSE(stdoutfd) < 0)
D
Daniel P. Berrange 已提交
139 140 141 142 143 144 145
                goto cleanup;

            if (setsid() < 0)
                goto cleanup;

            nextpid = fork();
            switch (nextpid) {
E
Eric Blake 已提交
146
            case 0: /* grandchild */
147
                return statuspipe[1];
E
Eric Blake 已提交
148 149 150 151
            case -1: /* error */
                goto cleanup;
            default: /* intermediate child succeeded */
                _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
152 153 154
            }

        cleanup:
155 156
            VIR_FORCE_CLOSE(stdoutfd);
            VIR_FORCE_CLOSE(stdinfd);
E
Eric Blake 已提交
157 158
            VIR_FORCE_CLOSE(statuspipe[1]);
            _exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
159 160 161

        }

E
Eric Blake 已提交
162 163
    case -1: /* error in parent */
        goto error;
D
Daniel P. Berrange 已提交
164 165 166

    default:
        {
E
Eric Blake 已提交
167
            /* parent */
168 169 170
            int ret;
            char status;

171
            VIR_FORCE_CLOSE(statuspipe[1]);
172 173

            /* We wait to make sure the first child forked successfully */
174
            if (virProcessWait(pid, NULL, false) < 0)
E
Eric Blake 已提交
175
                goto error;
176

E
Eric Blake 已提交
177 178 179
            /* If we get here, then the grandchild was spawned, so we
             * must exit.  Block until the second child initializes
             * successfully */
180 181 182 183 184
        again:
            ret = read(statuspipe[0], &status, 1);
            if (ret == -1 && errno == EINTR)
                goto again;

E
Eric Blake 已提交
185 186 187 188 189
            VIR_FORCE_CLOSE(statuspipe[0]);

            if (ret != 1) {
                char ebuf[1024];

190
                fprintf(stderr,
E
Eric Blake 已提交
191 192 193 194 195 196 197 198
                        _("%s: error: unable to determine if daemon is "
                          "running: %s\n"), argv0,
                        virStrerror(errno, ebuf, sizeof(ebuf)));
                exit(EXIT_FAILURE);
            } else if (status != 0) {
                fprintf(stderr,
                        _("%s: error: %s. Check /var/log/messages or run "
                          "without --daemon for more info.\n"), argv0,
199
                        virDaemonErrTypeToString(status));
E
Eric Blake 已提交
200
                exit(EXIT_FAILURE);
201
            }
E
Eric Blake 已提交
202
            _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
203 204
        }
    }
E
Eric Blake 已提交
205

206
 error:
E
Eric Blake 已提交
207 208 209
    VIR_FORCE_CLOSE(statuspipe[0]);
    VIR_FORCE_CLOSE(statuspipe[1]);
    return -1;
D
Daniel P. Berrange 已提交
210 211
}

212

213 214 215 216
static int
daemonUnixSocketPaths(struct daemonConfig *config,
                      bool privileged,
                      char **sockfile,
217 218
                      char **rosockfile,
                      char **admsockfile)
J
John Levon 已提交
219
{
220 221 222
    int ret = -1;
    char *rundir = NULL;

223 224
    if (config->unix_sock_dir) {
        if (virAsprintf(sockfile, "%s/libvirt-sock", config->unix_sock_dir) < 0)
225
            goto cleanup;
226 227

        if (privileged) {
228 229 230
            if (virAsprintf(rosockfile, "%s/libvirt-sock-ro", config->unix_sock_dir) < 0 ||
                virAsprintf(admsockfile, "%s/libvirt-admin-sock", config->unix_sock_dir) < 0)
                goto cleanup;
231
        }
D
Daniel P. Berrange 已提交
232
    } else {
233
        if (privileged) {
234
            if (VIR_STRDUP(*sockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock") < 0 ||
235 236
                VIR_STRDUP(*rosockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock-ro") < 0 ||
                VIR_STRDUP(*admsockfile, LOCALSTATEDIR "/run/libvirt/libvirt-admin-sock") < 0)
237
                goto cleanup;
238
        } else {
239
            mode_t old_umask;
240

241
            if (!(rundir = virGetUserRuntimeDirectory()))
242
                goto cleanup;
243

244 245 246
            old_umask = umask(077);
            if (virFileMakePath(rundir) < 0) {
                umask(old_umask);
247
                goto cleanup;
248 249 250
            }
            umask(old_umask);

251
            if (virAsprintf(sockfile, "%s/libvirt-sock", rundir) < 0 ||
252 253
                virAsprintf(admsockfile, "%s/libvirt-admin-sock", rundir) < 0)
                goto cleanup;
254 255
        }
    }
256

257 258 259 260
    ret = 0;
 cleanup:
    VIR_FREE(rundir);
    return ret;
D
Daniel P. Berrange 已提交
261 262
}

263 264 265

static void daemonErrorHandler(void *opaque ATTRIBUTE_UNUSED,
                               virErrorPtr err ATTRIBUTE_UNUSED)
266 267 268 269 270
{
    /* Don't do anything, since logging infrastructure already
     * took care of reporting the error */
}

271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
static int daemonErrorLogFilter(virErrorPtr err, int priority)
{
    /* These error codes don't really reflect real errors. They
     * are expected events that occur when an app tries to check
     * whether a particular guest already exists. This filters
     * them to a lower log level to prevent pollution of syslog
     */
    switch (err->code) {
    case VIR_ERR_NO_DOMAIN:
    case VIR_ERR_NO_NETWORK:
    case VIR_ERR_NO_STORAGE_POOL:
    case VIR_ERR_NO_STORAGE_VOL:
    case VIR_ERR_NO_NODE_DEVICE:
    case VIR_ERR_NO_INTERFACE:
    case VIR_ERR_NO_NWFILTER:
    case VIR_ERR_NO_SECRET:
    case VIR_ERR_NO_DOMAIN_SNAPSHOT:
288
    case VIR_ERR_OPERATION_INVALID:
289
    case VIR_ERR_NO_DOMAIN_METADATA:
290 291
    case VIR_ERR_NO_SERVER:
    case VIR_ERR_NO_CLIENT:
292 293 294 295 296 297
        return VIR_LOG_DEBUG;
    }

    return priority;
}

298

299
static int daemonInitialize(void)
300
{
301 302
    /*
     * Note that the order is important: the first ones have a higher
303 304 305
     * priority when calling virStateInitialize. We must register the
     * network, storage and nodedev drivers before any stateful domain
     * driver, since their resources must be auto-started before any
306
     * domains can be auto-started.
307
     */
308
#ifdef WITH_NETWORK
309 310
    if (virDriverLoadModule("network", "networkRegister", false) < 0)
        return -1;
311 312
#endif
#ifdef WITH_INTERFACE
313 314
    if (virDriverLoadModule("interface", "interfaceRegister", false) < 0)
        return -1;
315 316
#endif
#ifdef WITH_STORAGE
317 318
    if (virDriverLoadModule("storage", "storageRegister", false) < 0)
        return -1;
319 320
#endif
#ifdef WITH_NODE_DEVICES
321 322
    if (virDriverLoadModule("nodedev", "nodedevRegister", false) < 0)
        return -1;
323 324
#endif
#ifdef WITH_SECRETS
325 326
    if (virDriverLoadModule("secret", "secretRegister", false) < 0)
        return -1;
327 328
#endif
#ifdef WITH_NWFILTER
329 330
    if (virDriverLoadModule("nwfilter", "nwfilterRegister", false) < 0)
        return -1;
331 332
#endif
#ifdef WITH_LIBXL
333 334
    if (virDriverLoadModule("libxl", "libxlRegister", false) < 0)
        return -1;
335 336
#endif
#ifdef WITH_QEMU
337 338
    if (virDriverLoadModule("qemu", "qemuRegister", false) < 0)
        return -1;
339 340
#endif
#ifdef WITH_LXC
341 342
    if (virDriverLoadModule("lxc", "lxcRegister", false) < 0)
        return -1;
343 344
#endif
#ifdef WITH_UML
345 346
    if (virDriverLoadModule("uml", "umlRegister", false) < 0)
        return -1;
347 348
#endif
#ifdef WITH_VBOX
349 350
    if (virDriverLoadModule("vbox", "vboxRegister", false) < 0)
        return -1;
351 352
#endif
#ifdef WITH_BHYVE
353 354
    if (virDriverLoadModule("bhyve", "bhyveRegister", false) < 0)
        return -1;
355 356
#endif
#ifdef WITH_VZ
357 358
    if (virDriverLoadModule("vz", "vzRegister", false) < 0)
        return -1;
359
#endif
360
    return 0;
361 362 363
}


364 365
static int ATTRIBUTE_NONNULL(3)
daemonSetupNetworking(virNetServerPtr srv,
366
                      virNetServerPtr srvAdm,
367 368 369
                      struct daemonConfig *config,
                      const char *sock_path,
                      const char *sock_path_ro,
370
                      const char *sock_path_adm,
371 372
                      bool ipsock,
                      bool privileged)
373 374
{
    virNetServerServicePtr svc = NULL;
375
    virNetServerServicePtr svcAdm = NULL;
376 377 378 379 380 381
    virNetServerServicePtr svcRO = NULL;
    virNetServerServicePtr svcTCP = NULL;
    virNetServerServicePtr svcTLS = NULL;
    gid_t unix_sock_gid = 0;
    int unix_sock_ro_mask = 0;
    int unix_sock_rw_mask = 0;
382
    int unix_sock_adm_mask = 0;
383
    int ret = -1;
384

385 386 387
    unsigned int cur_fd = STDERR_FILENO + 1;
    unsigned int nfds = virGetListenFDs();

388 389
    if (config->unix_sock_group) {
        if (virGetGroupID(config->unix_sock_group, &unix_sock_gid) < 0)
390
            return ret;
391
    }
392

393
    if (nfds > (sock_path_ro ? 2 : 1)) {
394
        VIR_ERROR(_("Too many (%u) FDs passed from caller"), nfds);
395
        return ret;
396 397
    }

398 399
    if (virStrToLong_i(config->unix_sock_ro_perms, NULL, 8, &unix_sock_ro_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_ro_perms);
400
        goto cleanup;
401
    }
402

403 404
    if (virStrToLong_i(config->unix_sock_admin_perms, NULL, 8, &unix_sock_adm_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_admin_perms);
405
        goto cleanup;
406 407
    }

408 409
    if (virStrToLong_i(config->unix_sock_rw_perms, NULL, 8, &unix_sock_rw_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_rw_perms);
410
        goto cleanup;
411
    }
412

413 414 415 416 417 418 419 420 421
    if (!(svc = virNetServerServiceNewFDOrUNIX(sock_path,
                                               unix_sock_rw_mask,
                                               unix_sock_gid,
                                               config->auth_unix_rw,
                                               NULL,
                                               false,
                                               config->max_queued_clients,
                                               config->max_client_requests,
                                               nfds, &cur_fd)))
422
        goto cleanup;
423
    if (sock_path_ro) {
424 425 426 427 428 429 430 431 432
        if (!(svcRO = virNetServerServiceNewFDOrUNIX(sock_path_ro,
                                                     unix_sock_ro_mask,
                                                     unix_sock_gid,
                                                     config->auth_unix_ro,
                                                     NULL,
                                                     true,
                                                     config->max_queued_clients,
                                                     config->max_client_requests,
                                                     nfds, &cur_fd)))
433
            goto cleanup;
434
    }
435

436 437 438 439
    if (virNetServerAddService(srv, svc,
                               config->mdns_adv && !ipsock ?
                               "_libvirt._tcp" :
                               NULL) < 0)
440
        goto cleanup;
441

442 443
    if (svcRO &&
        virNetServerAddService(srv, svcRO, NULL) < 0)
444
        goto cleanup;
445

446
    if (sock_path_adm) {
447 448 449 450 451 452
        VIR_DEBUG("Registering unix socket %s", sock_path_adm);
        if (!(svcAdm = virNetServerServiceNewUNIX(sock_path_adm,
                                                  unix_sock_adm_mask,
                                                  unix_sock_gid,
                                                  REMOTE_AUTH_NONE,
                                                  NULL,
453
                                                  false,
454 455
                                                  config->admin_max_queued_clients,
                                                  config->admin_max_client_requests)))
456
            goto cleanup;
457

458
        if (virNetServerAddService(srvAdm, svcAdm, NULL) < 0)
459
            goto cleanup;
460
    }
461

462
    if (ipsock) {
463
        if (config->listen_tcp) {
464 465
            VIR_DEBUG("Registering TCP socket %s:%s",
                      config->listen_addr, config->tcp_port);
466 467
            if (!(svcTCP = virNetServerServiceNewTCP(config->listen_addr,
                                                     config->tcp_port,
468
                                                     AF_UNSPEC,
469
                                                     config->auth_tcp,
470
                                                     NULL,
471
                                                     false,
M
Michal Privoznik 已提交
472
                                                     config->max_queued_clients,
473
                                                     config->max_client_requests)))
474
                goto cleanup;
475

476 477
            if (virNetServerAddService(srv, svcTCP,
                                       config->mdns_adv ? "_libvirt._tcp" : NULL) < 0)
478
                goto cleanup;
479 480
        }

481 482
        if (config->listen_tls) {
            virNetTLSContextPtr ctxt = NULL;
483

484 485 486
            if (config->ca_file ||
                config->cert_file ||
                config->key_file) {
487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503
                if (!config->ca_file) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("No CA certificate path set to match server key/cert"));
                    goto cleanup;
                }
                if (!config->cert_file) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("No server certificate path set to match server key"));
                    goto cleanup;
                }
                if (!config->key_file) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("No server key path set to match server cert"));
                    goto cleanup;
                }
                VIR_DEBUG("Using CA='%s' cert='%s' key='%s'",
                          config->ca_file, config->cert_file, config->key_file);
504 505 506 507 508
                if (!(ctxt = virNetTLSContextNewServer(config->ca_file,
                                                       config->crl_file,
                                                       config->cert_file,
                                                       config->key_file,
                                                       (const char *const*)config->tls_allowed_dn_list,
509
                                                       config->tls_priority,
510
                                                       config->tls_no_sanity_certificate ? false : true,
511
                                                       config->tls_no_verify_certificate ? false : true)))
512
                    goto cleanup;
513 514 515 516
            } else {
                if (!(ctxt = virNetTLSContextNewServerPath(NULL,
                                                           !privileged,
                                                           (const char *const*)config->tls_allowed_dn_list,
517
                                                           config->tls_priority,
518
                                                           config->tls_no_sanity_certificate ? false : true,
519
                                                           config->tls_no_verify_certificate ? false : true)))
520
                    goto cleanup;
521 522
            }

523 524
            VIR_DEBUG("Registering TLS socket %s:%s",
                      config->listen_addr, config->tls_port);
525 526 527
            if (!(svcTLS =
                  virNetServerServiceNewTCP(config->listen_addr,
                                            config->tls_port,
528
                                            AF_UNSPEC,
529
                                            config->auth_tls,
530
                                            ctxt,
531
                                            false,
M
Michal Privoznik 已提交
532
                                            config->max_queued_clients,
533
                                            config->max_client_requests))) {
534
                virObjectUnref(ctxt);
535
                goto cleanup;
536
            }
537 538 539
            if (virNetServerAddService(srv, svcTLS,
                                       config->mdns_adv &&
                                       !config->listen_tcp ? "_libvirt._tcp" : NULL) < 0)
540
                goto cleanup;
541

542
            virObjectUnref(ctxt);
543 544 545
        }
    }

546
#if WITH_SASL
547
    if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
548 549 550
        (sock_path_ro && config->auth_unix_ro == REMOTE_AUTH_SASL) ||
        (ipsock && config->listen_tls && config->auth_tls == REMOTE_AUTH_SASL) ||
        (ipsock && config->listen_tcp && config->auth_tcp == REMOTE_AUTH_SASL)) {
551 552 553
        saslCtxt = virNetSASLContextNewServer(
            (const char *const*)config->sasl_allowed_username_list);
        if (!saslCtxt)
554
            goto cleanup;
D
Daniel P. Berrange 已提交
555
    }
556
#endif
D
Daniel P. Berrange 已提交
557

558
    ret = 0;
559

560
 cleanup:
561 562 563
    virObjectUnref(svcTLS);
    virObjectUnref(svcTCP);
    virObjectUnref(svcRO);
564
    virObjectUnref(svcAdm);
565 566
    virObjectUnref(svc);
    return ret;
D
Daniel P. Berrange 已提交
567 568 569
}


570 571 572 573 574 575 576 577 578 579
/*
 * Set up the openvswitch timeout
 */
static void
daemonSetupNetDevOpenvswitch(struct daemonConfig *config)
{
    virNetDevOpenvswitchSetTimeout(config->ovs_timeout);
}


580 581
/*
 * Set up the logging environment
582 583
 * By default if daemonized all errors go to the logfile libvirtd.log,
 * but if verbose or error debugging is asked for then also output
584
 * informational and debug messages. Default size if 64 kB.
585
 */
586
static int
587 588 589 590
daemonSetupLogging(struct daemonConfig *config,
                   bool privileged,
                   bool verbose,
                   bool godaemon)
591
{
592 593
    virLogReset();

594
    /*
595 596 597
     * Libvirtd's order of precedence is:
     * cmdline > environment > config
     *
598
     * Given the precedence, we must process the variables in the opposite
599
     * order, each one overriding the previous.
600
     */
601 602
    if (config->log_level != 0)
        virLogSetDefaultPriority(config->log_level);
603

604 605 606
    /* In case the config is empty, both filters and outputs will become empty,
     * however we can't start with empty outputs, thus we'll need to define and
     * setup a default one.
607 608 609
     */
    ignore_value(virLogSetFilters(config->log_filters));
    ignore_value(virLogSetOutputs(config->log_outputs));
610

611 612
    /* If there are some environment variables defined, use those instead */
    virLogSetFromEnv();
613

614 615 616 617 618 619
    /*
     * Command line override for --verbose
     */
    if ((verbose) && (virLogGetDefaultPriority() > VIR_LOG_INFO))
        virLogSetDefaultPriority(VIR_LOG_INFO);

620 621 622 623 624 625 626 627 628
    /* Define the default output. This is only applied if there was no setting
     * from either the config or the environment.
     */
    if (virLogSetDefaultOutput("libvirtd.log", godaemon, privileged) < 0)
        return -1;

    if (virLogGetNbOutputs() == 0)
        virLogSetOutputs(virLogGetDefaultOutput());

629 630 631
    return 0;
}

632

633 634 635 636 637
static int
daemonSetupAccessManager(struct daemonConfig *config)
{
    virAccessManagerPtr mgr;
    const char *none[] = { "none", NULL };
J
Ján Tomko 已提交
638
    const char **drv = (const char **)config->access_drivers;
639

J
Ján Tomko 已提交
640 641 642
    if (!drv ||
        !drv[0])
        drv = none;
643

J
Ján Tomko 已提交
644
    if (!(mgr = virAccessManagerNewStack(drv)))
645 646 647 648 649 650 651 652
        return -1;

    virAccessManagerSetDefault(mgr);
    virObjectUnref(mgr);
    return 0;
}


653 654
/* Display version information. */
static void
655
daemonVersion(const char *argv0)
656
{
657
    printf("%s (%s) %s\n", argv0, PACKAGE_NAME, PACKAGE_VERSION);
658 659
}

660

661
static void daemonShutdownHandler(virNetDaemonPtr dmn,
662 663
                                  siginfo_t *sig ATTRIBUTE_UNUSED,
                                  void *opaque ATTRIBUTE_UNUSED)
664
{
665
    virNetDaemonQuit(dmn);
666
}
667

668 669 670 671 672 673 674 675 676
static void daemonReloadHandlerThread(void *opague ATTRIBUTE_UNUSED)
{
    VIR_INFO("Reloading configuration on SIGHUP");
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-",
                VIR_HOOK_DAEMON_OP_RELOAD, SIGHUP, "SIGHUP", NULL, NULL);
    if (virStateReload() < 0)
        VIR_WARN("Error while reloading drivers");
}

677
static void daemonReloadHandler(virNetDaemonPtr dmn ATTRIBUTE_UNUSED,
678 679 680
                                siginfo_t *sig ATTRIBUTE_UNUSED,
                                void *opaque ATTRIBUTE_UNUSED)
{
681 682
    virThread thr;

683 684 685 686 687
    if (!driversInitialized) {
        VIR_WARN("Drivers are not initialized, reload ignored");
        return;
    }

688 689 690 691 692 693
    if (virThreadCreate(&thr, false, daemonReloadHandlerThread, NULL) < 0) {
        /*
         * Not much we can do on error here except log it.
         */
        VIR_ERROR(_("Failed to create thread to handle daemon restart"));
    }
694 695
}

696
static int daemonSetupSignals(virNetDaemonPtr dmn)
697
{
698
    if (virNetDaemonAddSignalHandler(dmn, SIGINT, daemonShutdownHandler, NULL) < 0)
699
        return -1;
700
    if (virNetDaemonAddSignalHandler(dmn, SIGQUIT, daemonShutdownHandler, NULL) < 0)
701
        return -1;
702
    if (virNetDaemonAddSignalHandler(dmn, SIGTERM, daemonShutdownHandler, NULL) < 0)
703
        return -1;
704
    if (virNetDaemonAddSignalHandler(dmn, SIGHUP, daemonReloadHandler, NULL) < 0)
705
        return -1;
706 707
    return 0;
}
708

709 710 711

static void daemonInhibitCallback(bool inhibit, void *opaque)
{
712
    virNetDaemonPtr dmn = opaque;
713 714

    if (inhibit)
715
        virNetDaemonAddShutdownInhibition(dmn);
716
    else
717
        virNetDaemonRemoveShutdownInhibition(dmn);
718 719 720
}


721
#ifdef WITH_DBUS
722 723 724 725 726
static DBusConnection *sessionBus;
static DBusConnection *systemBus;

static void daemonStopWorker(void *opaque)
{
727
    virNetDaemonPtr dmn = opaque;
728

729
    VIR_DEBUG("Begin stop dmn=%p", dmn);
730 731 732

    ignore_value(virStateStop());

733
    VIR_DEBUG("Completed stop dmn=%p", dmn);
734 735

    /* Exit libvirtd cleanly */
736
    virNetDaemonQuit(dmn);
737 738 739 740
}


/* We do this in a thread to not block the main loop */
741
static void daemonStop(virNetDaemonPtr dmn)
742 743
{
    virThread thr;
744 745 746
    virObjectRef(dmn);
    if (virThreadCreate(&thr, false, daemonStopWorker, dmn) < 0)
        virObjectUnref(dmn);
747 748 749 750 751 752 753 754
}


static DBusHandlerResult
handleSessionMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                         DBusMessage *message,
                         void *opaque)
{
755
    virNetDaemonPtr dmn = opaque;
756

757
    VIR_DEBUG("dmn=%p", dmn);
758 759 760 761

    if (dbus_message_is_signal(message,
                               DBUS_INTERFACE_LOCAL,
                               "Disconnected"))
762
        daemonStop(dmn);
763 764 765 766 767 768 769 770 771 772

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}


static DBusHandlerResult
handleSystemMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                        DBusMessage *message,
                        void *opaque)
{
773
    virNetDaemonPtr dmn = opaque;
774

775
    VIR_DEBUG("dmn=%p", dmn);
776 777 778 779

    if (dbus_message_is_signal(message,
                               "org.freedesktop.login1.Manager",
                               "PrepareForShutdown"))
780
        daemonStop(dmn);
781 782 783 784 785 786

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
#endif


787 788
static void daemonRunStateInit(void *opaque)
{
789
    virNetDaemonPtr dmn = opaque;
790 791 792
    virIdentityPtr sysident = virIdentityGetSystem();

    virIdentitySetCurrent(sysident);
793

794 795
    /* Since driver initialization can take time inhibit daemon shutdown until
       we're done so clients get a chance to connect */
796
    daemonInhibitCallback(true, dmn);
797

798
    /* Start the stateful HV drivers
E
Eric Blake 已提交
799
     * This is deliberately done after telling the parent process
800 801
     * we're ready, since it can take a long time and this will
     * seriously delay OS bootup process */
802
    if (virStateInitialize(virNetDaemonIsPrivileged(dmn),
803
                           daemonInhibitCallback,
804
                           dmn) < 0) {
805
        VIR_ERROR(_("Driver state initialization failed"));
806 807
        /* Ensure the main event loop quits */
        kill(getpid(), SIGTERM);
808
        goto cleanup;
809 810
    }

811 812
    driversInitialized = true;

813
#ifdef WITH_DBUS
814
    /* Tie the non-privileged libvirtd to the session/shutdown lifecycle */
815
    if (!virNetDaemonIsPrivileged(dmn)) {
816 817 818 819

        sessionBus = virDBusGetSessionBus();
        if (sessionBus != NULL)
            dbus_connection_add_filter(sessionBus,
820
                                       handleSessionMessageFunc, dmn, NULL);
821 822 823 824

        systemBus = virDBusGetSystemBus();
        if (systemBus != NULL) {
            dbus_connection_add_filter(systemBus,
825
                                       handleSystemMessageFunc, dmn, NULL);
826 827 828 829 830 831
            dbus_bus_add_match(systemBus,
                               "type='signal',sender='org.freedesktop.login1', interface='org.freedesktop.login1.Manager'",
                               NULL);
        }
    }
#endif
832
    /* Only now accept clients from network */
833
    virNetDaemonUpdateServices(dmn, true);
834
 cleanup:
835 836
    daemonInhibitCallback(false, dmn);
    virObjectUnref(dmn);
837 838
    virObjectUnref(sysident);
    virIdentitySetCurrent(NULL);
839
}
840

841
static int daemonStateInit(virNetDaemonPtr dmn)
842 843
{
    virThread thr;
844 845 846
    virObjectRef(dmn);
    if (virThreadCreate(&thr, false, daemonRunStateInit, dmn) < 0) {
        virObjectUnref(dmn);
847 848
        return -1;
    }
849 850 851
    return 0;
}

852 853 854 855 856 857 858 859 860 861 862
static int migrateProfile(void)
{
    char *old_base = NULL;
    char *updated = NULL;
    char *home = NULL;
    char *xdg_dir = NULL;
    char *config_dir = NULL;
    const char *config_home;
    int ret = -1;
    mode_t old_umask;

863 864
    VIR_DEBUG("Checking if user profile needs migrating");

865
    if (!(home = virGetUserDirectory()))
866 867
        goto cleanup;

868
    if (virAsprintf(&old_base, "%s/.libvirt", home) < 0)
869 870 871
        goto cleanup;

    /* if the new directory is there or the old one is not: do nothing */
872
    if (!(config_dir = virGetUserConfigDirectory()))
873 874 875
        goto cleanup;

    if (!virFileIsDir(old_base) || virFileExists(config_dir)) {
876 877 878
        VIR_DEBUG("No old profile in '%s' / "
                  "new profile directory already present '%s'",
                  old_base, config_dir);
879 880 881 882 883
        ret = 0;
        goto cleanup;
    }

    /* test if we already attempted to migrate first */
884
    if (virAsprintf(&updated, "%s/DEPRECATED-DIRECTORY", old_base) < 0)
885
        goto cleanup;
886
    if (virFileExists(updated))
887 888
        goto cleanup;

889
    config_home = virGetEnvBlockSUID("XDG_CONFIG_HOME");
890
    if (config_home && config_home[0] != '\0') {
891 892
        if (VIR_STRDUP(xdg_dir, config_home) < 0)
            goto cleanup;
893
    } else {
894
        if (virAsprintf(&xdg_dir, "%s/.config", home) < 0)
895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911
            goto cleanup;
    }

    old_umask = umask(077);
    if (virFileMakePath(xdg_dir) < 0) {
        umask(old_umask);
        goto cleanup;
    }
    umask(old_umask);

    if (rename(old_base, config_dir) < 0) {
        int fd = creat(updated, 0600);
        VIR_FORCE_CLOSE(fd);
        VIR_ERROR(_("Unable to migrate %s to %s"), old_base, config_dir);
        goto cleanup;
    }

912
    VIR_DEBUG("Profile migrated from %s to %s", old_base, config_dir);
913 914 915 916 917 918 919 920 921 922 923 924
    ret = 0;

 cleanup:
    VIR_FREE(home);
    VIR_FREE(old_base);
    VIR_FREE(xdg_dir);
    VIR_FREE(config_dir);
    VIR_FREE(updated);

    return ret;
}

925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957
static int
daemonSetupHostUUID(const struct daemonConfig *config)
{
    static const char *machine_id = "/etc/machine-id";
    char buf[VIR_UUID_STRING_BUFLEN];
    const char *uuid;

    if (config->host_uuid) {
        uuid = config->host_uuid;
    } else if (!config->host_uuid_source ||
               STREQ(config->host_uuid_source, "smbios")) {
        /* smbios UUID is fetched on demand in virGetHostUUID */
        return 0;
    } else if (STREQ(config->host_uuid_source, "machine-id")) {
        if (virFileReadBufQuiet(machine_id, buf, sizeof(buf)) < 0) {
            VIR_ERROR(_("Can't read %s"), machine_id);
            return -1;
        }

        uuid = buf;
    } else {
        VIR_ERROR(_("invalid UUID source: %s"), config->host_uuid_source);
        return -1;
    }

    if (virSetHostUUIDStr(uuid)) {
        VIR_ERROR(_("invalid host UUID: %s"), uuid);
        return -1;
    }

    return 0;
}

958 959
/* Print command-line usage. */
static void
960
daemonUsage(const char *argv0, bool privileged)
961
{
962 963 964 965 966 967
    fprintf(stderr,
            _("\n"
              "Usage:\n"
              "  %s [options]\n"
              "\n"
              "Options:\n"
968
              "  -h | --help            Display program help:\n"
969 970 971 972 973
              "  -v | --verbose         Verbose messages.\n"
              "  -d | --daemon          Run as a daemon & write PID file.\n"
              "  -l | --listen          Listen for TCP/IP connections.\n"
              "  -t | --timeout <secs>  Exit after timeout period.\n"
              "  -f | --config <file>   Configuration file.\n"
974
              "  -V | --version         Display version information.\n"
975 976 977 978
              "  -p | --pid-file <file> Change name of PID file.\n"
              "\n"
              "libvirt management daemon:\n"),
            argv0);
979 980 981

    if (privileged) {
        fprintf(stderr,
982 983 984 985
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
986
                  "      %s\n"
987 988
                  "\n"
                  "    Sockets:\n"
989 990
                  "      %s\n"
                  "      %s\n"
991 992
                  "\n"
                  "    TLS:\n"
993 994 995
                  "      CA certificate:     %s\n"
                  "      Server certificate: %s\n"
                  "      Server private key: %s\n"
996 997 998 999
                  "\n"
                  "    PID file (unless overridden by -p):\n"
                  "      %s/run/libvirtd.pid\n"
                  "\n"),
1000 1001 1002
                LIBVIRTD_CONFIGURATION_FILE,
                LIBVIRTD_PRIV_UNIX_SOCKET,
                LIBVIRTD_PRIV_UNIX_SOCKET_RO,
1003 1004 1005
                LIBVIRT_CACERT,
                LIBVIRT_SERVERCERT,
                LIBVIRT_SERVERKEY,
1006 1007
                LOCALSTATEDIR);
    } else {
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025
        fprintf(stderr, "%s",
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
                  "      $XDG_CONFIG_HOME/libvirt/libvirtd.conf\n"
                  "\n"
                  "    Sockets:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirt-sock\n"
                  "\n"
                  "    TLS:\n"
                  "      CA certificate:     $HOME/.pki/libvirt/cacert.pem\n"
                  "      Server certificate: $HOME/.pki/libvirt/servercert.pem\n"
                  "      Server private key: $HOME/.pki/libvirt/serverkey.pem\n"
                  "\n"
                  "    PID file:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirtd.pid\n"
                  "\n"));
1026
    }
1027 1028
}

D
Daniel P. Berrange 已提交
1029
int main(int argc, char **argv) {
1030
    virNetDaemonPtr dmn = NULL;
1031
    virNetServerPtr srv = NULL;
1032
    virNetServerPtr srvAdm = NULL;
1033 1034
    virNetServerProgramPtr adminProgram = NULL;
    virNetServerProgramPtr lxcProgram = NULL;
1035
    char *remote_config_file = NULL;
1036
    int statuswrite = -1;
1037
    int ret = 1;
1038
    int pid_file_fd = -1;
1039 1040 1041
    char *pid_file = NULL;
    char *sock_file = NULL;
    char *sock_file_ro = NULL;
1042
    char *sock_file_adm = NULL;
1043 1044 1045 1046 1047 1048
    int timeout = -1;        /* -t: Shutdown timeout */
    int verbose = 0;
    int godaemon = 0;
    int ipsock = 0;
    struct daemonConfig *config;
    bool privileged = geteuid() == 0 ? true : false;
1049
    bool implicit_conf = false;
1050 1051
    char *run_dir = NULL;
    mode_t old_umask;
D
Daniel P. Berrange 已提交
1052 1053

    struct option opts[] = {
1054 1055 1056
        { "verbose", no_argument, &verbose, 'v'},
        { "daemon", no_argument, &godaemon, 'd'},
        { "listen", no_argument, &ipsock, 'l'},
1057
        { "config", required_argument, NULL, 'f'},
1058 1059
        { "timeout", required_argument, NULL, 't'},
        { "pid-file", required_argument, NULL, 'p'},
1060 1061
        { "version", no_argument, NULL, 'V' },
        { "help", no_argument, NULL, 'h' },
D
Daniel P. Berrange 已提交
1062 1063 1064
        {0, 0, 0, 0}
    };

1065
    if (virGettextInitialize() < 0 ||
E
Eric Blake 已提交
1066
        virInitialize() < 0) {
1067
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
E
Eric Blake 已提交
1068
        exit(EXIT_FAILURE);
1069
    }
D
Daniel P. Berrange 已提交
1070

1071 1072
    virUpdateSelfLastChanged(argv[0]);

1073 1074
    virFileActivateDirOverride(argv[0]);

D
Daniel P. Berrange 已提交
1075 1076 1077 1078 1079
    while (1) {
        int optidx = 0;
        int c;
        char *tmp;

1080
        c = getopt_long(argc, argv, "ldf:p:t:vVh", opts, &optidx);
D
Daniel P. Berrange 已提交
1081

1082
        if (c == -1)
D
Daniel P. Berrange 已提交
1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
            break;

        switch (c) {
        case 0:
            /* Got one of the flags */
            break;
        case 'v':
            verbose = 1;
            break;
        case 'd':
            godaemon = 1;
            break;
1095 1096
        case 'l':
            ipsock = 1;
D
Daniel P. Berrange 已提交
1097 1098 1099
            break;

        case 't':
1100
            if (virStrToLong_i(optarg, &tmp, 10, &timeout) != 0
1101 1102
                || timeout <= 0
                /* Ensure that we can multiply by 1000 without overflowing.  */
1103 1104 1105 1106
                || timeout > INT_MAX / 1000) {
                VIR_ERROR(_("Invalid value for timeout"));
                exit(EXIT_FAILURE);
            }
D
Daniel P. Berrange 已提交
1107
            break;
1108 1109

        case 'p':
1110
            VIR_FREE(pid_file);
1111
            if (VIR_STRDUP_QUIET(pid_file, optarg) < 0) {
1112
                VIR_ERROR(_("Can't allocate memory"));
1113
                exit(EXIT_FAILURE);
1114
            }
1115 1116 1117
            break;

        case 'f':
1118
            VIR_FREE(remote_config_file);
1119
            if (VIR_STRDUP_QUIET(remote_config_file, optarg) < 0) {
1120
                VIR_ERROR(_("Can't allocate memory"));
1121
                exit(EXIT_FAILURE);
1122
            }
1123 1124
            break;

1125
        case 'V':
1126
            daemonVersion(argv[0]);
1127
            exit(EXIT_SUCCESS);
1128

1129
        case 'h':
1130
            daemonUsage(argv[0], privileged);
1131
            exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
1132

1133
        case '?':
D
Daniel P. Berrange 已提交
1134
        default:
1135
            daemonUsage(argv[0], privileged);
1136
            exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
1137 1138 1139
        }
    }

1140 1141 1142 1143 1144 1145
    if (optind != argc) {
        fprintf(stderr, "%s: unexpected, non-option, command line arguments\n",
                argv[0]);
        exit(EXIT_FAILURE);
    }

1146 1147
    if (!(config = daemonConfigNew(privileged))) {
        VIR_ERROR(_("Can't create initial configuration"));
1148
        exit(EXIT_FAILURE);
1149
    }
1150 1151

    /* No explicit config, so try and find a default one */
1152 1153 1154
    if (remote_config_file == NULL) {
        implicit_conf = true;
        if (daemonConfigFilePath(privileged,
1155 1156
                                 &remote_config_file) < 0) {
            VIR_ERROR(_("Can't determine config path"));
1157
            exit(EXIT_FAILURE);
1158
        }
1159
    }
1160 1161 1162

    /* Read the config file if it exists*/
    if (remote_config_file &&
1163
        daemonConfigLoadFile(config, remote_config_file, implicit_conf) < 0) {
1164 1165
        VIR_ERROR(_("Can't load config file: %s: %s"),
                  virGetLastErrorMessage(), remote_config_file);
1166
        exit(EXIT_FAILURE);
1167
    }
1168

1169
    if (!privileged &&
1170 1171
        migrateProfile() < 0) {
        VIR_ERROR(_("Exiting due to failure to migrate profile"));
1172
        exit(EXIT_FAILURE);
1173
    }
1174

1175 1176
    if (daemonSetupHostUUID(config) < 0) {
        VIR_ERROR(_("Can't setup host uuid"));
1177
        exit(EXIT_FAILURE);
1178 1179
    }

1180 1181
    if (daemonSetupLogging(config, privileged, verbose, godaemon) < 0) {
        VIR_ERROR(_("Can't initialize logging"));
1182
        exit(EXIT_FAILURE);
1183
    }
1184

1185 1186
    daemonSetupNetDevOpenvswitch(config);

1187 1188 1189 1190 1191
    if (daemonSetupAccessManager(config) < 0) {
        VIR_ERROR(_("Can't initialize access manager"));
        exit(EXIT_FAILURE);
    }

1192
    if (!pid_file &&
1193 1194 1195 1196
        virPidFileConstructPath(privileged,
                                LOCALSTATEDIR,
                                "libvirtd",
                                &pid_file) < 0) {
1197
        VIR_ERROR(_("Can't determine pid file path."));
1198
        exit(EXIT_FAILURE);
1199
    }
1200
    VIR_DEBUG("Decided on pid file path '%s'", NULLSTR(pid_file));
1201 1202 1203 1204

    if (daemonUnixSocketPaths(config,
                              privileged,
                              &sock_file,
1205 1206
                              &sock_file_ro,
                              &sock_file_adm) < 0) {
1207
        VIR_ERROR(_("Can't determine socket paths"));
1208
        exit(EXIT_FAILURE);
1209
    }
1210 1211 1212 1213
    VIR_DEBUG("Decided on socket paths '%s', '%s' and '%s'",
              sock_file,
              NULLSTR(sock_file_ro),
              NULLSTR(sock_file_adm));
1214

1215
    if (godaemon) {
1216
        char ebuf[1024];
1217 1218 1219 1220

        if (chdir("/") < 0) {
            VIR_ERROR(_("cannot change to root directory: %s"),
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1221
            goto cleanup;
1222 1223
        }

1224
        if ((statuswrite = daemonForkIntoBackground(argv[0])) < 0) {
1225
            VIR_ERROR(_("Failed to fork as daemon: %s"),
1226
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1227
            goto cleanup;
1228 1229 1230
        }
    }

1231 1232 1233 1234 1235 1236
    /* Try to claim the pidfile, exiting if we can't */
    if ((pid_file_fd = virPidFileAcquirePath(pid_file, false, getpid())) < 0) {
        ret = VIR_DAEMON_ERR_PIDFILE;
        goto cleanup;
    }

J
John Levon 已提交
1237
    /* Ensure the rundir exists (on tmpfs on some systems) */
1238
    if (privileged) {
1239 1240 1241 1242
        if (VIR_STRDUP_QUIET(run_dir, LOCALSTATEDIR "/run/libvirt") < 0) {
            VIR_ERROR(_("Can't allocate memory"));
            goto cleanup;
        }
1243
    } else {
1244
        run_dir = virGetUserRuntimeDirectory();
1245

1246
        if (!run_dir) {
1247 1248
            VIR_ERROR(_("Can't determine user directory"));
            goto cleanup;
J
John Levon 已提交
1249 1250
        }
    }
1251 1252 1253 1254
    if (privileged)
        old_umask = umask(022);
    else
        old_umask = umask(077);
1255
    VIR_DEBUG("Ensuring run dir '%s' exists", run_dir);
1256 1257 1258 1259 1260 1261 1262 1263
    if (virFileMakePath(run_dir) < 0) {
        char ebuf[1024];
        VIR_ERROR(_("unable to create rundir %s: %s"), run_dir,
                  virStrerror(errno, ebuf, sizeof(ebuf)));
        ret = VIR_DAEMON_ERR_RUNDIR;
        goto cleanup;
    }
    umask(old_umask);
J
John Levon 已提交
1264

1265 1266 1267 1268 1269
    if (virNetlinkStartup() < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1270
    if (!(dmn = virNetDaemonNew())) {
1271
        ret = VIR_DAEMON_ERR_DRIVER;
1272 1273 1274
        goto cleanup;
    }

1275
    if (!(srv = virNetServerNew("libvirtd", 1,
1276
                                config->min_workers,
1277
                                config->max_workers,
1278
                                config->prio_workers,
1279
                                config->max_clients,
1280
                                config->max_anonymous_clients,
1281 1282
                                config->keepalive_interval,
                                config->keepalive_count,
1283
                                config->mdns_adv ? config->mdns_name : NULL,
1284
                                remoteClientNew,
1285
                                NULL,
1286
                                remoteClientFree,
1287
                                NULL))) {
1288 1289 1290 1291
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1292
    if (virNetDaemonAddServer(dmn, srv) < 0) {
1293 1294 1295 1296
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1297 1298 1299 1300
    if (daemonInitialize() < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
1301

1302 1303 1304 1305 1306 1307 1308 1309 1310
    remoteProcs[REMOTE_PROC_AUTH_LIST].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_INIT].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_STEP].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_START].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_POLKIT].needAuth = false;
    if (!(remoteProgram = virNetServerProgramNew(REMOTE_PROGRAM,
                                                 REMOTE_PROTOCOL_VERSION,
                                                 remoteProcs,
                                                 remoteNProcs))) {
1311
        ret = VIR_DAEMON_ERR_INIT;
1312 1313 1314 1315 1316
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, remoteProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1317
    }
1318

1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330
    if (!(lxcProgram = virNetServerProgramNew(LXC_PROGRAM,
                                              LXC_PROTOCOL_VERSION,
                                              lxcProcs,
                                              lxcNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, lxcProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1331 1332 1333 1334 1335 1336 1337 1338 1339 1340
    if (!(qemuProgram = virNetServerProgramNew(QEMU_PROGRAM,
                                               QEMU_PROTOCOL_VERSION,
                                               qemuProcs,
                                               qemuNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, qemuProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1341
    }
1342

1343
    if (!(srvAdm = virNetServerNew("admin", 1,
1344
                                   config->admin_min_workers,
1345 1346 1347 1348 1349 1350 1351
                                   config->admin_max_workers,
                                   0,
                                   config->admin_max_clients,
                                   0,
                                   config->admin_keepalive_interval,
                                   config->admin_keepalive_count,
                                   NULL,
1352
                                   remoteAdmClientNew,
1353
                                   NULL,
1354
                                   remoteAdmClientFree,
1355 1356 1357 1358 1359
                                   dmn))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1360
    if (virNetDaemonAddServer(dmn, srvAdm) < 0) {
1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

    if (!(adminProgram = virNetServerProgramNew(ADMIN_PROGRAM,
                                                ADMIN_PROTOCOL_VERSION,
                                                adminProcs,
                                                adminNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srvAdm, adminProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1377 1378
    if (timeout != -1) {
        VIR_DEBUG("Registering shutdown timeout %d", timeout);
1379
        virNetDaemonAutoShutdown(dmn, timeout);
1380
    }
1381

1382
    if ((daemonSetupSignals(dmn)) < 0) {
1383 1384
        ret = VIR_DAEMON_ERR_SIGNAL;
        goto cleanup;
1385
    }
D
Daniel P. Berrange 已提交
1386

1387
    if (config->audit_level) {
1388
        VIR_DEBUG("Attempting to configure auditing subsystem");
1389
        if (virAuditOpen(config->audit_level) < 0) {
1390
            if (config->audit_level > 1) {
1391
                ret = VIR_DAEMON_ERR_AUDIT;
1392
                goto cleanup;
1393
            }
1394
            VIR_DEBUG("Proceeding without auditing");
1395 1396
        }
    }
E
Eric Blake 已提交
1397
    virAuditLog(config->audit_logging > 0);
1398

1399
    /* setup the hooks if any */
1400
    if (virHookInitialize() < 0) {
1401
        ret = VIR_DAEMON_ERR_HOOKS;
1402
        goto cleanup;
1403 1404
    }

1405
    /* Disable error func, now logging is setup */
1406
    virSetErrorFunc(NULL, daemonErrorHandler);
1407
    virSetErrorLogPriorityFunc(daemonErrorLogFilter);
1408

1409 1410 1411 1412 1413 1414
    /*
     * Call the daemon startup hook
     * TODO: should we abort the daemon startup if the script returned
     *       an error ?
     */
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_START,
1415
                0, "start", NULL, NULL);
1416

1417 1418 1419 1420 1421
    if (daemonSetupNetworking(srv, srvAdm,
                              config,
                              sock_file,
                              sock_file_ro,
                              sock_file_adm,
1422
                              ipsock, privileged) < 0) {
1423
        ret = VIR_DAEMON_ERR_NETWORK;
1424
        goto cleanup;
1425 1426
    }

1427 1428 1429 1430 1431 1432
    /* Tell parent of daemon that basic initialization is complete
     * In particular we're ready to accept net connections & have
     * written the pidfile
     */
    if (statuswrite != -1) {
        char status = 0;
1433
        ignore_value(safewrite(statuswrite, &status, 1));
1434
        VIR_FORCE_CLOSE(statuswrite);
1435 1436
    }

1437
    /* Initialize drivers & then start accepting new clients from network */
1438
    if (daemonStateInit(dmn) < 0) {
1439 1440
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1441
    }
D
Daniel P. Berrange 已提交
1442

1443
#if defined(__linux__) && defined(NETLINK_ROUTE)
1444 1445
    /* Register the netlink event service for NETLINK_ROUTE */
    if (virNetlinkEventServiceStart(NETLINK_ROUTE, 0) < 0) {
1446 1447 1448
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1449
#endif
1450

1451
#if defined(__linux__) && defined(NETLINK_KOBJECT_UEVENT)
T
Tang Chen 已提交
1452 1453 1454 1455 1456
    /* Register the netlink event service for NETLINK_KOBJECT_UEVENT */
    if (virNetlinkEventServiceStart(NETLINK_KOBJECT_UEVENT, 1) < 0) {
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1457
#endif
T
Tang Chen 已提交
1458

1459
    /* Run event loop. */
1460
    virNetDaemonRun(dmn);
1461

1462 1463
    ret = 0;

1464
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_SHUTDOWN,
1465
                0, "shutdown", NULL, NULL);
1466

1467
 cleanup:
1468 1469 1470
    /* Keep cleanup order in inverse order of startup */
    virNetDaemonClose(dmn);

1471
    virNetlinkEventServiceStopAll();
1472 1473 1474 1475 1476 1477 1478 1479

    if (driversInitialized) {
        /* NB: Possible issue with timing window between driversInitialized
         * setting if virNetlinkEventServerStart fails */
        driversInitialized = false;
        virStateCleanup();
    }

1480 1481
    virObjectUnref(adminProgram);
    virObjectUnref(srvAdm);
1482 1483 1484 1485 1486 1487
    virObjectUnref(qemuProgram);
    virObjectUnref(lxcProgram);
    virObjectUnref(remoteProgram);
    virObjectUnref(srv);
    virObjectUnref(dmn);

1488
    virNetlinkShutdown();
1489 1490 1491 1492 1493 1494

    if (pid_file_fd != -1)
        virPidFileReleasePath(pid_file, pid_file_fd);

    VIR_FREE(run_dir);

1495 1496 1497 1498
    if (statuswrite != -1) {
        if (ret != 0) {
            /* Tell parent of daemon what failed */
            char status = ret;
1499
            ignore_value(safewrite(statuswrite, &status, 1));
1500
        }
1501
        VIR_FORCE_CLOSE(statuswrite);
1502
    }
1503 1504 1505

    VIR_FREE(sock_file);
    VIR_FREE(sock_file_ro);
1506
    VIR_FREE(sock_file_adm);
1507

1508
    VIR_FREE(pid_file);
1509

1510
    VIR_FREE(remote_config_file);
1511 1512
    daemonConfigFree(config);

1513
    return ret;
D
Daniel P. Berrange 已提交
1514
}