You need to sign in or sign up before continuing.
libvirtd.c 46.0 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
D
Daniel P. Berrange 已提交
2
 * libvirtd.c: daemon start of day, guest process & i/o management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2012 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21 22 23
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <unistd.h>
#include <fcntl.h>
28 29
#include <sys/wait.h>
#include <sys/stat.h>
D
Daniel P. Berrange 已提交
30
#include <getopt.h>
31
#include <stdlib.h>
32
#include <grp.h>
E
Eric Blake 已提交
33
#include <locale.h>
34

35
#include "libvirt_internal.h"
36
#include "virerror.h"
E
Eric Blake 已提交
37
#include "virfile.h"
38
#include "virpidfile.h"
39
#include "virprocess.h"
40

41 42
#define VIR_FROM_THIS VIR_FROM_QEMU

D
Daniel P. Berrange 已提交
43
#include "libvirtd.h"
44
#include "libvirtd-config.h"
45

46
#include "viruuid.h"
47
#include "remote_driver.h"
48
#include "viralloc.h"
49
#include "virconf.h"
50
#include "virnetlink.h"
51 52
#include "virnetserver.h"
#include "remote.h"
53
#include "virhook.h"
54
#include "viraudit.h"
55
#include "virstring.h"
56 57
#include "locking/lock_manager.h"
#include "viraccessmanager.h"
D
Daniel P. Berrange 已提交
58

59
#ifdef WITH_DRIVER_MODULES
60
# include "driver.h"
61
#else
62 63 64 65 66 67
# ifdef WITH_QEMU
#  include "qemu/qemu_driver.h"
# endif
# ifdef WITH_LXC
#  include "lxc/lxc_driver.h"
# endif
68 69 70
# ifdef WITH_XEN
#  include "xen/xen_driver.h"
# endif
J
Jim Fehlig 已提交
71 72 73
# ifdef WITH_LIBXL
#  include "libxl/libxl_driver.h"
# endif
74 75 76
# ifdef WITH_UML
#  include "uml/uml_driver.h"
# endif
77 78 79
# ifdef WITH_VBOX
#  include "vbox/vbox_driver.h"
# endif
R
Roman Bogorodskiy 已提交
80 81 82
# ifdef WITH_BHYVE
#  include "bhyve/bhyve_driver.h"
# endif
83 84 85
# ifdef WITH_NETWORK
#  include "network/bridge_driver.h"
# endif
86 87
# ifdef WITH_INTERFACE
#  include "interface/interface_driver.h"
88
# endif
89
# ifdef WITH_STORAGE
90 91 92 93 94 95 96 97
#  include "storage/storage_driver.h"
# endif
# ifdef WITH_NODE_DEVICES
#  include "node_device/node_device_driver.h"
# endif
# ifdef WITH_SECRETS
#  include "secret/secret_driver.h"
# endif
98 99 100
# ifdef WITH_NWFILTER
#  include "nwfilter/nwfilter_driver.h"
# endif
101
#endif
102

103 104
#include "configmake.h"

105 106
#include "virdbus.h"

107
#if WITH_SASL
108
virNetSASLContextPtr saslCtxt = NULL;
109
#endif
110 111
virNetServerProgramPtr remoteProgram = NULL;
virNetServerProgramPtr qemuProgram = NULL;
112
virNetServerProgramPtr lxcProgram = NULL;
113

114 115
volatile bool driversInitialized = false;

116 117 118 119 120 121 122 123 124
enum {
    VIR_DAEMON_ERR_NONE = 0,
    VIR_DAEMON_ERR_PIDFILE,
    VIR_DAEMON_ERR_RUNDIR,
    VIR_DAEMON_ERR_INIT,
    VIR_DAEMON_ERR_SIGNAL,
    VIR_DAEMON_ERR_PRIVS,
    VIR_DAEMON_ERR_NETWORK,
    VIR_DAEMON_ERR_CONFIG,
125
    VIR_DAEMON_ERR_HOOKS,
126
    VIR_DAEMON_ERR_AUDIT,
127 128 129 130 131 132 133 134 135 136 137 138 139

    VIR_DAEMON_ERR_LAST
};

VIR_ENUM_DECL(virDaemonErr)
VIR_ENUM_IMPL(virDaemonErr, VIR_DAEMON_ERR_LAST,
              "Initialization successful",
              "Unable to obtain pidfile",
              "Unable to create rundir",
              "Unable to initialize libvirt",
              "Unable to setup signal handlers",
              "Unable to drop privileges",
              "Unable to initialize network sockets",
140
              "Unable to load configuration file",
141 142
              "Unable to look for hook scripts",
              "Unable to initialize audit system")
143

144
static int daemonForkIntoBackground(const char *argv0)
145
{
146 147 148 149
    int statuspipe[2];
    if (pipe(statuspipe) < 0)
        return -1;

150
    pid_t pid = fork();
D
Daniel P. Berrange 已提交
151 152 153
    switch (pid) {
    case 0:
        {
E
Eric Blake 已提交
154
            /* intermediate child */
D
Daniel P. Berrange 已提交
155 156
            int stdinfd = -1;
            int stdoutfd = -1;
157
            int nextpid;
D
Daniel P. Berrange 已提交
158

159
            VIR_FORCE_CLOSE(statuspipe[0]);
160

161
            if ((stdinfd = open("/dev/null", O_RDONLY)) < 0)
D
Daniel P. Berrange 已提交
162
                goto cleanup;
163
            if ((stdoutfd = open("/dev/null", O_WRONLY)) < 0)
D
Daniel P. Berrange 已提交
164 165 166 167 168 169 170
                goto cleanup;
            if (dup2(stdinfd, STDIN_FILENO) != STDIN_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDOUT_FILENO) != STDOUT_FILENO)
                goto cleanup;
            if (dup2(stdoutfd, STDERR_FILENO) != STDERR_FILENO)
                goto cleanup;
E
Eric Blake 已提交
171
            if (stdinfd > STDERR_FILENO && VIR_CLOSE(stdinfd) < 0)
D
Daniel P. Berrange 已提交
172
                goto cleanup;
E
Eric Blake 已提交
173
            if (stdoutfd > STDERR_FILENO && VIR_CLOSE(stdoutfd) < 0)
D
Daniel P. Berrange 已提交
174 175 176 177 178 179 180
                goto cleanup;

            if (setsid() < 0)
                goto cleanup;

            nextpid = fork();
            switch (nextpid) {
E
Eric Blake 已提交
181
            case 0: /* grandchild */
182
                return statuspipe[1];
E
Eric Blake 已提交
183 184 185 186
            case -1: /* error */
                goto cleanup;
            default: /* intermediate child succeeded */
                _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
187 188 189
            }

        cleanup:
190 191
            VIR_FORCE_CLOSE(stdoutfd);
            VIR_FORCE_CLOSE(stdinfd);
E
Eric Blake 已提交
192 193
            VIR_FORCE_CLOSE(statuspipe[1]);
            _exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
194 195 196

        }

E
Eric Blake 已提交
197 198
    case -1: /* error in parent */
        goto error;
D
Daniel P. Berrange 已提交
199 200 201

    default:
        {
E
Eric Blake 已提交
202
            /* parent */
203 204 205
            int ret;
            char status;

206
            VIR_FORCE_CLOSE(statuspipe[1]);
207 208

            /* We wait to make sure the first child forked successfully */
209
            if (virProcessWait(pid, NULL) < 0)
E
Eric Blake 已提交
210
                goto error;
211

E
Eric Blake 已提交
212 213 214
            /* If we get here, then the grandchild was spawned, so we
             * must exit.  Block until the second child initializes
             * successfully */
215 216 217 218 219
        again:
            ret = read(statuspipe[0], &status, 1);
            if (ret == -1 && errno == EINTR)
                goto again;

E
Eric Blake 已提交
220 221 222 223 224
            VIR_FORCE_CLOSE(statuspipe[0]);

            if (ret != 1) {
                char ebuf[1024];

225
                fprintf(stderr,
E
Eric Blake 已提交
226 227 228 229 230 231 232 233
                        _("%s: error: unable to determine if daemon is "
                          "running: %s\n"), argv0,
                        virStrerror(errno, ebuf, sizeof(ebuf)));
                exit(EXIT_FAILURE);
            } else if (status != 0) {
                fprintf(stderr,
                        _("%s: error: %s. Check /var/log/messages or run "
                          "without --daemon for more info.\n"), argv0,
234
                        virDaemonErrTypeToString(status));
E
Eric Blake 已提交
235
                exit(EXIT_FAILURE);
236
            }
E
Eric Blake 已提交
237
            _exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
238 239
        }
    }
E
Eric Blake 已提交
240 241 242 243 244

error:
    VIR_FORCE_CLOSE(statuspipe[0]);
    VIR_FORCE_CLOSE(statuspipe[1]);
    return -1;
D
Daniel P. Berrange 已提交
245 246
}

247 248

static int
249 250
daemonPidFilePath(bool privileged,
                  char **pidfile)
251
{
252
    if (privileged) {
253 254
        if (VIR_STRDUP(*pidfile, LOCALSTATEDIR "/run/libvirtd.pid") < 0)
            goto error;
255
    } else {
256 257
        char *rundir = NULL;
        mode_t old_umask;
258

259
        if (!(rundir = virGetUserRuntimeDirectory()))
260
            goto error;
261

262 263 264 265 266 267 268 269 270
        old_umask = umask(077);
        if (virFileMakePath(rundir) < 0) {
            umask(old_umask);
            goto error;
        }
        umask(old_umask);

        if (virAsprintf(pidfile, "%s/libvirtd.pid", rundir) < 0) {
            VIR_FREE(rundir);
271
            goto error;
E
Eric Blake 已提交
272
        }
273

274
        VIR_FREE(rundir);
275 276 277
    }

    return 0;
278

279
error:
280
    return -1;
281 282
}

283 284 285 286 287
static int
daemonUnixSocketPaths(struct daemonConfig *config,
                      bool privileged,
                      char **sockfile,
                      char **rosockfile)
J
John Levon 已提交
288
{
289 290
    if (config->unix_sock_dir) {
        if (virAsprintf(sockfile, "%s/libvirt-sock", config->unix_sock_dir) < 0)
291
            goto error;
292 293
        if (privileged &&
            virAsprintf(rosockfile, "%s/libvirt-sock-ro", config->unix_sock_dir) < 0)
294
            goto error;
D
Daniel P. Berrange 已提交
295
    } else {
296
        if (privileged) {
297 298 299
            if (VIR_STRDUP(*sockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock") < 0 ||
                VIR_STRDUP(*rosockfile, LOCALSTATEDIR "/run/libvirt/libvirt-sock-ro") < 0)
                goto error;
300
        } else {
301 302
            char *rundir = NULL;
            mode_t old_umask;
303

304
            if (!(rundir = virGetUserRuntimeDirectory()))
305
                goto error;
306

307 308 309 310 311 312 313
            old_umask = umask(077);
            if (virFileMakePath(rundir) < 0) {
                umask(old_umask);
                goto error;
            }
            umask(old_umask);

314
            if (virAsprintf(sockfile, "%s/libvirt-sock", rundir) < 0) {
315
                VIR_FREE(rundir);
316
                goto error;
317
            }
318

319
            VIR_FREE(rundir);
320 321 322
        }
    }
    return 0;
323

324 325
error:
    return -1;
D
Daniel P. Berrange 已提交
326 327
}

328 329 330

static void daemonErrorHandler(void *opaque ATTRIBUTE_UNUSED,
                               virErrorPtr err ATTRIBUTE_UNUSED)
331 332 333 334 335
{
    /* Don't do anything, since logging infrastructure already
     * took care of reporting the error */
}

336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352
static int daemonErrorLogFilter(virErrorPtr err, int priority)
{
    /* These error codes don't really reflect real errors. They
     * are expected events that occur when an app tries to check
     * whether a particular guest already exists. This filters
     * them to a lower log level to prevent pollution of syslog
     */
    switch (err->code) {
    case VIR_ERR_NO_DOMAIN:
    case VIR_ERR_NO_NETWORK:
    case VIR_ERR_NO_STORAGE_POOL:
    case VIR_ERR_NO_STORAGE_VOL:
    case VIR_ERR_NO_NODE_DEVICE:
    case VIR_ERR_NO_INTERFACE:
    case VIR_ERR_NO_NWFILTER:
    case VIR_ERR_NO_SECRET:
    case VIR_ERR_NO_DOMAIN_SNAPSHOT:
353
    case VIR_ERR_OPERATION_INVALID:
354 355 356 357 358 359
        return VIR_LOG_DEBUG;
    }

    return priority;
}

360 361
static void daemonInitialize(void)
{
362 363 364 365 366 367 368
    /*
     * Note that the order is important: the first ones have a higher
     * priority when calling virStateInitialize. We must register
     * the network, storage and nodedev drivers before any domain
     * drivers, since their resources must be auto-started before
     * any domains can be auto-started.
     */
369 370 371
#ifdef WITH_DRIVER_MODULES
    /* We don't care if any of these fail, because the whole point
     * is to allow users to only install modules they want to use.
D
Dan Kenigsberg 已提交
372
     * If they try to open a connection for a module that
373 374
     * is not loaded they'll get a suitable error at that point
     */
375
# ifdef WITH_NETWORK
376
    virDriverLoadModule("network");
377 378
# endif
# ifdef WITH_STORAGE
379
    virDriverLoadModule("storage");
380 381
# endif
# ifdef WITH_NODE_DEVICES
382
    virDriverLoadModule("nodedev");
383 384
# endif
# ifdef WITH_SECRETS
385
    virDriverLoadModule("secret");
386 387 388 389
# endif
# ifdef WITH_NWFILTER
    virDriverLoadModule("nwfilter");
# endif
390
# ifdef WITH_INTERFACE
391 392
    virDriverLoadModule("interface");
# endif
393 394 395 396 397 398
# ifdef WITH_XEN
    virDriverLoadModule("xen");
# endif
# ifdef WITH_LIBXL
    virDriverLoadModule("libxl");
# endif
399
# ifdef WITH_QEMU
400
    virDriverLoadModule("qemu");
401 402
# endif
# ifdef WITH_LXC
403
    virDriverLoadModule("lxc");
404 405
# endif
# ifdef WITH_UML
406
    virDriverLoadModule("uml");
407
# endif
408 409 410
# ifdef WITH_VBOX
    virDriverLoadModule("vbox");
# endif
R
Roman Bogorodskiy 已提交
411 412 413
# ifdef WITH_BHYVE
    virDriverLoadModule("bhyve");
# endif
414
#else
415
# ifdef WITH_NETWORK
416
    networkRegister();
417
# endif
418
# ifdef WITH_INTERFACE
419
    interfaceRegister();
420
# endif
421
# ifdef WITH_STORAGE
422
    storageRegister();
423
# endif
424
# ifdef WITH_NODE_DEVICES
425
    nodedevRegister();
426 427
# endif
# ifdef WITH_SECRETS
428
    secretRegister();
429
# endif
430 431 432
# ifdef WITH_NWFILTER
    nwfilterRegister();
# endif
433 434 435
# ifdef WITH_XEN
    xenRegister();
# endif
J
Jim Fehlig 已提交
436 437 438
# ifdef WITH_LIBXL
    libxlRegister();
# endif
439
# ifdef WITH_QEMU
440
    qemuRegister();
441 442
# endif
# ifdef WITH_LXC
443
    lxcRegister();
444 445
# endif
# ifdef WITH_UML
446
    umlRegister();
447
# endif
448 449 450
# ifdef WITH_VBOX
    vboxRegister();
# endif
R
Roman Bogorodskiy 已提交
451 452 453
# ifdef WITH_BHYVE
    bhyveRegister();
# endif
454
#endif
455 456 457
}


458 459 460 461 462 463 464 465 466 467
static int daemonSetupNetworking(virNetServerPtr srv,
                                 struct daemonConfig *config,
                                 const char *sock_path,
                                 const char *sock_path_ro,
                                 bool ipsock,
                                 bool privileged)
{
    virNetServerServicePtr svc = NULL;
    virNetServerServicePtr svcRO = NULL;
    virNetServerServicePtr svcTCP = NULL;
468
#if WITH_GNUTLS
469
    virNetServerServicePtr svcTLS = NULL;
470
#endif
471 472 473 474 475 476 477 478
    gid_t unix_sock_gid = 0;
    int unix_sock_ro_mask = 0;
    int unix_sock_rw_mask = 0;

    if (config->unix_sock_group) {
        if (virGetGroupID(config->unix_sock_group, &unix_sock_gid) < 0)
            return -1;
    }
479

480 481 482 483
    if (virStrToLong_i(config->unix_sock_ro_perms, NULL, 8, &unix_sock_ro_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_ro_perms);
        goto error;
    }
484

485 486 487 488
    if (virStrToLong_i(config->unix_sock_rw_perms, NULL, 8, &unix_sock_rw_mask) != 0) {
        VIR_ERROR(_("Failed to parse mode '%s'"), config->unix_sock_rw_perms);
        goto error;
    }
489

490
    VIR_DEBUG("Registering unix socket %s", sock_path);
491 492 493 494
    if (!(svc = virNetServerServiceNewUNIX(sock_path,
                                           unix_sock_rw_mask,
                                           unix_sock_gid,
                                           config->auth_unix_rw,
495
#if WITH_GNUTLS
496 497
                                           NULL,
#endif
498
                                           false,
M
Michal Privoznik 已提交
499
                                           config->max_queued_clients,
500
                                           config->max_client_requests)))
501
        goto error;
502 503 504 505 506 507
    if (sock_path_ro) {
        VIR_DEBUG("Registering unix socket %s", sock_path_ro);
        if (!(svcRO = virNetServerServiceNewUNIX(sock_path_ro,
                                                 unix_sock_ro_mask,
                                                 unix_sock_gid,
                                                 config->auth_unix_ro,
508
#if WITH_GNUTLS
509 510
                                                 NULL,
#endif
511
                                                 true,
M
Michal Privoznik 已提交
512
                                                 config->max_queued_clients,
513
                                                 config->max_client_requests)))
514 515
            goto error;
    }
516

517 518 519 520
    if (virNetServerAddService(srv, svc,
                               config->mdns_adv && !ipsock ?
                               "_libvirt._tcp" :
                               NULL) < 0)
521
        goto error;
522

523 524 525
    if (svcRO &&
        virNetServerAddService(srv, svcRO, NULL) < 0)
        goto error;
526

527
    if (ipsock) {
528
        if (config->listen_tcp) {
529 530
            VIR_DEBUG("Registering TCP socket %s:%s",
                      config->listen_addr, config->tcp_port);
531 532 533
            if (!(svcTCP = virNetServerServiceNewTCP(config->listen_addr,
                                                     config->tcp_port,
                                                     config->auth_tcp,
534
#if WITH_GNUTLS
535 536
                                                     NULL,
#endif
537
                                                     false,
M
Michal Privoznik 已提交
538
                                                     config->max_queued_clients,
539
                                                     config->max_client_requests)))
540
                goto error;
541

542 543 544
            if (virNetServerAddService(srv, svcTCP,
                                       config->mdns_adv ? "_libvirt._tcp" : NULL) < 0)
                goto error;
545 546
        }

547
#if WITH_GNUTLS
548 549
        if (config->listen_tls) {
            virNetTLSContextPtr ctxt = NULL;
550

551 552 553 554 555 556 557 558
            if (config->ca_file ||
                config->cert_file ||
                config->key_file) {
                if (!(ctxt = virNetTLSContextNewServer(config->ca_file,
                                                       config->crl_file,
                                                       config->cert_file,
                                                       config->key_file,
                                                       (const char *const*)config->tls_allowed_dn_list,
559
                                                       config->tls_no_sanity_certificate ? false : true,
560 561 562 563 564 565
                                                       config->tls_no_verify_certificate ? false : true)))
                    goto error;
            } else {
                if (!(ctxt = virNetTLSContextNewServerPath(NULL,
                                                           !privileged,
                                                           (const char *const*)config->tls_allowed_dn_list,
566
                                                           config->tls_no_sanity_certificate ? false : true,
567 568
                                                           config->tls_no_verify_certificate ? false : true)))
                    goto error;
569 570
            }

571 572
            VIR_DEBUG("Registering TLS socket %s:%s",
                      config->listen_addr, config->tls_port);
573 574 575 576
            if (!(svcTLS =
                  virNetServerServiceNewTCP(config->listen_addr,
                                            config->tls_port,
                                            config->auth_tls,
577
                                            ctxt,
578
                                            false,
M
Michal Privoznik 已提交
579
                                            config->max_queued_clients,
580
                                            config->max_client_requests))) {
581
                virObjectUnref(ctxt);
582
                goto error;
583
            }
584 585 586 587
            if (virNetServerAddService(srv, svcTLS,
                                       config->mdns_adv &&
                                       !config->listen_tcp ? "_libvirt._tcp" : NULL) < 0)
                goto error;
588

589
            virObjectUnref(ctxt);
590
        }
591 592 593 594 595 596 597 598
#else
        (void)privileged;
        if (config->listen_tls) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This libvirtd build does not support TLS"));
            goto error;
        }
#endif
599 600
    }

601
#if WITH_SASL
602 603
    if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
        config->auth_unix_ro == REMOTE_AUTH_SASL ||
604
# if WITH_GNUTLS
605 606 607
        config->auth_tls == REMOTE_AUTH_SASL ||
# endif
        config->auth_tcp == REMOTE_AUTH_SASL) {
608 609 610
        saslCtxt = virNetSASLContextNewServer(
            (const char *const*)config->sasl_allowed_username_list);
        if (!saslCtxt)
611
            goto error;
D
Daniel P. Berrange 已提交
612
    }
613
#endif
D
Daniel P. Berrange 已提交
614 615

    return 0;
616

617
error:
618
#if WITH_GNUTLS
619
    virObjectUnref(svcTLS);
620
#endif
621 622 623
    virObjectUnref(svcTCP);
    virObjectUnref(svc);
    virObjectUnref(svcRO);
624
    return -1;
D
Daniel P. Berrange 已提交
625 626 627
}


628 629
/*
 * Set up the logging environment
630 631
 * By default if daemonized all errors go to the logfile libvirtd.log,
 * but if verbose or error debugging is asked for then also output
632
 * informational and debug messages. Default size if 64 kB.
633
 */
634
static int
635 636 637 638
daemonSetupLogging(struct daemonConfig *config,
                   bool privileged,
                   bool verbose,
                   bool godaemon)
639
{
640 641
    virLogReset();

642
    /*
643 644 645 646 647 648 649 650 651 652 653 654
     * Libvirtd's order of precedence is:
     * cmdline > environment > config
     *
     * In order to achieve this, we must process configuration in
     * different order for the log level versus the filters and
     * outputs. Because filters and outputs append, we have to look at
     * the environment first and then only check the config file if
     * there was no result from the environment. The default output is
     * then applied only if there was no setting from either of the
     * first two. Because we don't have a way to determine if the log
     * level has been set, we must process variables in the opposite
     * order, each one overriding the previous.
655
     */
656 657
    if (config->log_level != 0)
        virLogSetDefaultPriority(config->log_level);
658

659
    virLogSetFromEnv();
660

661
    virLogSetBufferSize(config->log_buffer_size);
662

663 664 665 666 667
    if (virLogGetNbFilters() == 0)
        virLogParseFilters(config->log_filters);

    if (virLogGetNbOutputs() == 0)
        virLogParseOutputs(config->log_outputs);
668 669

    /*
670 671 672 673
     * If no defined outputs, and either running
     * as daemon or not on a tty, then first try
     * to direct it to the systemd journal
     * (if it exists)....
674
     */
675 676
    if (virLogGetNbOutputs() == 0 &&
        (godaemon || !isatty(STDIN_FILENO))) {
677 678 679
        char *tmp;
        if (access("/run/systemd/journal/socket", W_OK) >= 0) {
            if (virAsprintf(&tmp, "%d:journald", virLogGetDefaultPriority()) < 0)
680
                goto error;
681 682 683 684 685 686 687
            virLogParseOutputs(tmp);
            VIR_FREE(tmp);
        }
    }

    /*
     * otherwise direct to libvirtd.log when running
688
     * as daemon. Otherwise the default output is stderr.
689
     */
690
    if (virLogGetNbOutputs() == 0) {
691
        char *tmp = NULL;
692

693
        if (godaemon) {
694
            if (privileged) {
695 696 697
                if (virAsprintf(&tmp, "%d:file:%s/log/libvirt/libvirtd.log",
                                virLogGetDefaultPriority(),
                                LOCALSTATEDIR) == -1)
698
                    goto error;
699
            } else {
700
                char *logdir = virGetUserCacheDirectory();
701 702 703 704 705 706 707 708
                mode_t old_umask;

                if (!logdir)
                    goto error;

                old_umask = umask(077);
                if (virFileMakePath(logdir) < 0) {
                    umask(old_umask);
709
                    goto error;
710 711
                }
                umask(old_umask);
712

713 714 715
                if (virAsprintf(&tmp, "%d:file:%s/libvirtd.log",
                                virLogGetDefaultPriority(), logdir) == -1) {
                    VIR_FREE(logdir);
716
                    goto error;
E
Eric Blake 已提交
717
                }
718
                VIR_FREE(logdir);
719
            }
720
        } else {
721
            if (virAsprintf(&tmp, "%d:stderr", virLogGetDefaultPriority()) < 0)
722
                goto error;
723
        }
724 725
        virLogParseOutputs(tmp);
        VIR_FREE(tmp);
726
    }
727 728 729 730 731 732 733

    /*
     * Command line override for --verbose
     */
    if ((verbose) && (virLogGetDefaultPriority() > VIR_LOG_INFO))
        virLogSetDefaultPriority(VIR_LOG_INFO);

734 735 736 737 738 739
    return 0;

error:
    return -1;
}

740

741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760
static int
daemonSetupAccessManager(struct daemonConfig *config)
{
    virAccessManagerPtr mgr;
    const char *none[] = { "none", NULL };
    const char **driver = (const char **)config->access_drivers;

    if (!driver ||
        !driver[0])
        driver = none;

    if (!(mgr = virAccessManagerNewStack(driver)))
        return -1;

    virAccessManagerSetDefault(mgr);
    virObjectUnref(mgr);
    return 0;
}


761 762
/* Display version information. */
static void
763
daemonVersion(const char *argv0)
764
{
765
    printf("%s (%s) %s\n", argv0, PACKAGE_NAME, PACKAGE_VERSION);
766 767
}

J
John Levon 已提交
768 769
#ifdef __sun
static int
770
daemonSetupPrivs(void)
J
John Levon 已提交
771
{
772
    chown("/var/run/libvirt", SYSTEM_UID, SYSTEM_UID);
J
John Levon 已提交
773

774 775
    if (__init_daemon_priv(PU_RESETGROUPS | PU_CLEARLIMITSET,
                           SYSTEM_UID, SYSTEM_UID, PRIV_XVM_CONTROL, NULL)) {
776
        VIR_ERROR(_("additional privileges are required"));
J
John Levon 已提交
777 778 779
        return -1;
    }

780 781
    if (priv_set(PRIV_OFF, PRIV_ALLSETS, PRIV_FILE_LINK_ANY, PRIV_PROC_INFO,
                 PRIV_PROC_SESSION, PRIV_PROC_EXEC, PRIV_PROC_FORK, NULL)) {
782
        VIR_ERROR(_("failed to set reduced privileges"));
J
John Levon 已提交
783 784 785 786 787 788
        return -1;
    }

    return 0;
}
#else
789
# define daemonSetupPrivs() 0
J
John Levon 已提交
790 791
#endif

792

793 794 795
static void daemonShutdownHandler(virNetServerPtr srv,
                                  siginfo_t *sig ATTRIBUTE_UNUSED,
                                  void *opaque ATTRIBUTE_UNUSED)
796
{
797 798
    virNetServerQuit(srv);
}
799

800 801 802 803 804 805
static void daemonReloadHandler(virNetServerPtr srv ATTRIBUTE_UNUSED,
                                siginfo_t *sig ATTRIBUTE_UNUSED,
                                void *opaque ATTRIBUTE_UNUSED)
{
        VIR_INFO("Reloading configuration on SIGHUP");
        virHookCall(VIR_HOOK_DRIVER_DAEMON, "-",
806
                    VIR_HOOK_DAEMON_OP_RELOAD, SIGHUP, "SIGHUP", NULL, NULL);
807 808 809 810
        if (virStateReload() < 0)
            VIR_WARN("Error while reloading drivers");
}

811 812 813
static int daemonSetupSignals(virNetServerPtr srv)
{
    if (virNetServerAddSignalHandler(srv, SIGINT, daemonShutdownHandler, NULL) < 0)
814
        return -1;
815 816 817 818
    if (virNetServerAddSignalHandler(srv, SIGQUIT, daemonShutdownHandler, NULL) < 0)
        return -1;
    if (virNetServerAddSignalHandler(srv, SIGTERM, daemonShutdownHandler, NULL) < 0)
        return -1;
819 820
    if (virNetServerAddSignalHandler(srv, SIGHUP, daemonReloadHandler, NULL) < 0)
        return -1;
821 822
    return 0;
}
823

824 825 826 827 828 829 830 831 832 833 834 835

static void daemonInhibitCallback(bool inhibit, void *opaque)
{
    virNetServerPtr srv = opaque;

    if (inhibit)
        virNetServerAddShutdownInhibition(srv);
    else
        virNetServerRemoveShutdownInhibition(srv);
}


836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901
#ifdef HAVE_DBUS
static DBusConnection *sessionBus;
static DBusConnection *systemBus;

static void daemonStopWorker(void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("Begin stop srv=%p", srv);

    ignore_value(virStateStop());

    VIR_DEBUG("Completed stop srv=%p", srv);

    /* Exit libvirtd cleanly */
    virNetServerQuit(srv);
}


/* We do this in a thread to not block the main loop */
static void daemonStop(virNetServerPtr srv)
{
    virThread thr;
    virObjectRef(srv);
    if (virThreadCreate(&thr, false, daemonStopWorker, srv) < 0)
        virObjectUnref(srv);
}


static DBusHandlerResult
handleSessionMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                         DBusMessage *message,
                         void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("srv=%p", srv);

    if (dbus_message_is_signal(message,
                               DBUS_INTERFACE_LOCAL,
                               "Disconnected"))
        daemonStop(srv);

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}


static DBusHandlerResult
handleSystemMessageFunc(DBusConnection *connection ATTRIBUTE_UNUSED,
                        DBusMessage *message,
                        void *opaque)
{
    virNetServerPtr srv = opaque;

    VIR_DEBUG("srv=%p", srv);

    if (dbus_message_is_signal(message,
                               "org.freedesktop.login1.Manager",
                               "PrepareForShutdown"))
        daemonStop(srv);

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
#endif


902 903 904
static void daemonRunStateInit(void *opaque)
{
    virNetServerPtr srv = opaque;
905 906 907
    virIdentityPtr sysident = virIdentityGetSystem();

    virIdentitySetCurrent(sysident);
908

909 910 911 912
    /* Since driver initialization can take time inhibit daemon shutdown until
       we're done so clients get a chance to connect */
    daemonInhibitCallback(true, srv);

913
    /* Start the stateful HV drivers
E
Eric Blake 已提交
914
     * This is deliberately done after telling the parent process
915 916
     * we're ready, since it can take a long time and this will
     * seriously delay OS bootup process */
917 918 919
    if (virStateInitialize(virNetServerIsPrivileged(srv),
                           daemonInhibitCallback,
                           srv) < 0) {
920
        VIR_ERROR(_("Driver state initialization failed"));
921 922
        /* Ensure the main event loop quits */
        kill(getpid(), SIGTERM);
923
        goto cleanup;
924 925
    }

926 927
    driversInitialized = true;

928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946
#ifdef HAVE_DBUS
    /* Tie the non-priviledged libvirtd to the session/shutdown lifecycle */
    if (!virNetServerIsPrivileged(srv)) {

        sessionBus = virDBusGetSessionBus();
        if (sessionBus != NULL)
            dbus_connection_add_filter(sessionBus,
                                       handleSessionMessageFunc, srv, NULL);

        systemBus = virDBusGetSystemBus();
        if (systemBus != NULL) {
            dbus_connection_add_filter(systemBus,
                                       handleSystemMessageFunc, srv, NULL);
            dbus_bus_add_match(systemBus,
                               "type='signal',sender='org.freedesktop.login1', interface='org.freedesktop.login1.Manager'",
                               NULL);
        }
    }
#endif
947 948
    /* Only now accept clients from network */
    virNetServerUpdateServices(srv, true);
949 950
cleanup:
    daemonInhibitCallback(false, srv);
951
    virObjectUnref(srv);
952 953
    virObjectUnref(sysident);
    virIdentitySetCurrent(NULL);
954
}
955

956 957 958
static int daemonStateInit(virNetServerPtr srv)
{
    virThread thr;
959
    virObjectRef(srv);
960
    if (virThreadCreate(&thr, false, daemonRunStateInit, srv) < 0) {
961
        virObjectUnref(srv);
962 963
        return -1;
    }
964 965 966
    return 0;
}

967 968 969 970 971 972 973 974 975 976 977
static int migrateProfile(void)
{
    char *old_base = NULL;
    char *updated = NULL;
    char *home = NULL;
    char *xdg_dir = NULL;
    char *config_dir = NULL;
    const char *config_home;
    int ret = -1;
    mode_t old_umask;

978 979
    VIR_DEBUG("Checking if user profile needs migrating");

980
    if (!(home = virGetUserDirectory()))
981 982 983 984 985 986 987
        goto cleanup;

    if (virAsprintf(&old_base, "%s/.libvirt", home) < 0) {
        goto cleanup;
    }

    /* if the new directory is there or the old one is not: do nothing */
988
    if (!(config_dir = virGetUserConfigDirectory()))
989 990 991
        goto cleanup;

    if (!virFileIsDir(old_base) || virFileExists(config_dir)) {
992 993 994
        VIR_DEBUG("No old profile in '%s' / "
                  "new profile directory already present '%s'",
                  old_base, config_dir);
995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006
        ret = 0;
        goto cleanup;
    }

    /* test if we already attempted to migrate first */
    if (virAsprintf(&updated, "%s/DEPRECATED-DIRECTORY", old_base) < 0) {
        goto cleanup;
    }
    if (virFileExists(updated)) {
        goto cleanup;
    }

1007
    config_home = virGetEnvBlockSUID("XDG_CONFIG_HOME");
1008
    if (config_home && config_home[0] != '\0') {
1009 1010
        if (VIR_STRDUP(xdg_dir, config_home) < 0)
            goto cleanup;
1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030
    } else {
        if (virAsprintf(&xdg_dir, "%s/.config", home) < 0) {
            goto cleanup;
        }
    }

    old_umask = umask(077);
    if (virFileMakePath(xdg_dir) < 0) {
        umask(old_umask);
        goto cleanup;
    }
    umask(old_umask);

    if (rename(old_base, config_dir) < 0) {
        int fd = creat(updated, 0600);
        VIR_FORCE_CLOSE(fd);
        VIR_ERROR(_("Unable to migrate %s to %s"), old_base, config_dir);
        goto cleanup;
    }

1031
    VIR_DEBUG("Profile migrated from %s to %s", old_base, config_dir);
1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043
    ret = 0;

 cleanup:
    VIR_FREE(home);
    VIR_FREE(old_base);
    VIR_FREE(xdg_dir);
    VIR_FREE(config_dir);
    VIR_FREE(updated);

    return ret;
}

1044 1045
/* Print command-line usage. */
static void
1046
daemonUsage(const char *argv0, bool privileged)
1047
{
1048 1049 1050 1051 1052 1053
    fprintf(stderr,
            _("\n"
              "Usage:\n"
              "  %s [options]\n"
              "\n"
              "Options:\n"
1054
              "  -h | --help            Display program help:\n"
1055 1056 1057 1058 1059
              "  -v | --verbose         Verbose messages.\n"
              "  -d | --daemon          Run as a daemon & write PID file.\n"
              "  -l | --listen          Listen for TCP/IP connections.\n"
              "  -t | --timeout <secs>  Exit after timeout period.\n"
              "  -f | --config <file>   Configuration file.\n"
1060
              "  -V | --version         Display version information.\n"
1061 1062 1063 1064
              "  -p | --pid-file <file> Change name of PID file.\n"
              "\n"
              "libvirt management daemon:\n"),
            argv0);
1065 1066 1067

    if (privileged) {
        fprintf(stderr,
1068 1069 1070 1071
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
1072
                  "      %s\n"
1073 1074
                  "\n"
                  "    Sockets:\n"
1075 1076
                  "      %s\n"
                  "      %s\n"
1077 1078
                  "\n"
                  "    TLS:\n"
1079 1080 1081
                  "      CA certificate:     %s\n"
                  "      Server certificate: %s\n"
                  "      Server private key: %s\n"
1082 1083 1084 1085
                  "\n"
                  "    PID file (unless overridden by -p):\n"
                  "      %s/run/libvirtd.pid\n"
                  "\n"),
1086 1087 1088
                LIBVIRTD_CONFIGURATION_FILE,
                LIBVIRTD_PRIV_UNIX_SOCKET,
                LIBVIRTD_PRIV_UNIX_SOCKET_RO,
1089 1090 1091
                LIBVIRT_CACERT,
                LIBVIRT_SERVERCERT,
                LIBVIRT_SERVERKEY,
1092 1093
                LOCALSTATEDIR);
    } else {
1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111
        fprintf(stderr, "%s",
                _("\n"
                  "  Default paths:\n"
                  "\n"
                  "    Configuration file (unless overridden by -f):\n"
                  "      $XDG_CONFIG_HOME/libvirt/libvirtd.conf\n"
                  "\n"
                  "    Sockets:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirt-sock\n"
                  "\n"
                  "    TLS:\n"
                  "      CA certificate:     $HOME/.pki/libvirt/cacert.pem\n"
                  "      Server certificate: $HOME/.pki/libvirt/servercert.pem\n"
                  "      Server private key: $HOME/.pki/libvirt/serverkey.pem\n"
                  "\n"
                  "    PID file:\n"
                  "      $XDG_RUNTIME_DIR/libvirt/libvirtd.pid\n"
                  "\n"));
1112
    }
1113 1114
}

D
Daniel P. Berrange 已提交
1115 1116
#define MAX_LISTEN 5
int main(int argc, char **argv) {
1117 1118
    virNetServerPtr srv = NULL;
    char *remote_config_file = NULL;
1119
    int statuswrite = -1;
1120
    int ret = 1;
1121
    int pid_file_fd = -1;
1122 1123 1124 1125 1126 1127 1128 1129 1130
    char *pid_file = NULL;
    char *sock_file = NULL;
    char *sock_file_ro = NULL;
    int timeout = -1;        /* -t: Shutdown timeout */
    int verbose = 0;
    int godaemon = 0;
    int ipsock = 0;
    struct daemonConfig *config;
    bool privileged = geteuid() == 0 ? true : false;
1131
    bool implicit_conf = false;
1132 1133
    char *run_dir = NULL;
    mode_t old_umask;
D
Daniel P. Berrange 已提交
1134 1135

    struct option opts[] = {
1136 1137 1138
        { "verbose", no_argument, &verbose, 'v'},
        { "daemon", no_argument, &godaemon, 'd'},
        { "listen", no_argument, &ipsock, 'l'},
1139
        { "config", required_argument, NULL, 'f'},
1140 1141
        { "timeout", required_argument, NULL, 't'},
        { "pid-file", required_argument, NULL, 'p'},
1142 1143
        { "version", no_argument, NULL, 'V' },
        { "help", no_argument, NULL, 'h' },
D
Daniel P. Berrange 已提交
1144 1145 1146
        {0, 0, 0, 0}
    };

1147 1148
    if (setlocale(LC_ALL, "") == NULL ||
        bindtextdomain(PACKAGE, LOCALEDIR) == NULL ||
E
Eric Blake 已提交
1149 1150
        textdomain(PACKAGE) == NULL ||
        virInitialize() < 0) {
1151
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
E
Eric Blake 已提交
1152
        exit(EXIT_FAILURE);
1153
    }
D
Daniel P. Berrange 已提交
1154

1155 1156
    if (strstr(argv[0], "lt-libvirtd") ||
        strstr(argv[0], "/daemon/.libs/libvirtd")) {
1157 1158 1159 1160 1161 1162 1163
        char *tmp = strrchr(argv[0], '/');
        if (!tmp) {
            fprintf(stderr, _("%s: cannot identify driver directory\n"), argv[0]);
            exit(EXIT_FAILURE);
        }
        *tmp = '\0';
        char *driverdir;
1164
        if (virAsprintfQuiet(&driverdir, "%s/../../src/.libs", argv[0]) < 0) {
1165 1166 1167 1168 1169 1170 1171 1172
            fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
            exit(EXIT_FAILURE);
        }
        if (access(driverdir, R_OK) < 0) {
            fprintf(stderr, _("%s: expected driver directory '%s' is missing\n"),
                    argv[0], driverdir);
            exit(EXIT_FAILURE);
        }
1173 1174
        virLockManagerSetPluginDir(driverdir);
#ifdef WITH_DRIVER_MODULES
1175
        virDriverModuleInitialize(driverdir);
1176
#endif
1177 1178 1179
        *tmp = '/';
        /* Must not free 'driverdir' - it is still used */
    }
1180

D
Daniel P. Berrange 已提交
1181 1182 1183 1184 1185
    while (1) {
        int optidx = 0;
        int c;
        char *tmp;

1186
        c = getopt_long(argc, argv, "ldf:p:t:vVh", opts, &optidx);
D
Daniel P. Berrange 已提交
1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201

        if (c == -1) {
            break;
        }

        switch (c) {
        case 0:
            /* Got one of the flags */
            break;
        case 'v':
            verbose = 1;
            break;
        case 'd':
            godaemon = 1;
            break;
1202 1203
        case 'l':
            ipsock = 1;
D
Daniel P. Berrange 已提交
1204 1205 1206
            break;

        case 't':
1207
            if (virStrToLong_i(optarg, &tmp, 10, &timeout) != 0
1208 1209
                || timeout <= 0
                /* Ensure that we can multiply by 1000 without overflowing.  */
1210 1211 1212 1213
                || timeout > INT_MAX / 1000) {
                VIR_ERROR(_("Invalid value for timeout"));
                exit(EXIT_FAILURE);
            }
D
Daniel P. Berrange 已提交
1214
            break;
1215 1216

        case 'p':
1217
            VIR_FREE(pid_file);
1218
            if (VIR_STRDUP_QUIET(pid_file, optarg) < 0) {
1219
                VIR_ERROR(_("Can't allocate memory"));
1220
                exit(EXIT_FAILURE);
1221
            }
1222 1223 1224
            break;

        case 'f':
1225
            VIR_FREE(remote_config_file);
1226
            if (VIR_STRDUP_QUIET(remote_config_file, optarg) < 0) {
1227
                VIR_ERROR(_("Can't allocate memory"));
1228
                exit(EXIT_FAILURE);
1229
            }
1230 1231
            break;

1232
        case 'V':
1233
            daemonVersion(argv[0]);
1234
            exit(EXIT_SUCCESS);
1235

1236
        case 'h':
1237
            daemonUsage(argv[0], privileged);
1238
            exit(EXIT_SUCCESS);
D
Daniel P. Berrange 已提交
1239

1240
        case '?':
D
Daniel P. Berrange 已提交
1241
        default:
1242
            daemonUsage(argv[0], privileged);
1243
            exit(EXIT_FAILURE);
D
Daniel P. Berrange 已提交
1244 1245 1246
        }
    }

1247 1248 1249 1250 1251 1252
    if (optind != argc) {
        fprintf(stderr, "%s: unexpected, non-option, command line arguments\n",
                argv[0]);
        exit(EXIT_FAILURE);
    }

1253 1254
    if (!(config = daemonConfigNew(privileged))) {
        VIR_ERROR(_("Can't create initial configuration"));
1255
        exit(EXIT_FAILURE);
1256
    }
1257 1258

    /* No explicit config, so try and find a default one */
1259 1260 1261
    if (remote_config_file == NULL) {
        implicit_conf = true;
        if (daemonConfigFilePath(privileged,
1262 1263
                                 &remote_config_file) < 0) {
            VIR_ERROR(_("Can't determine config path"));
1264
            exit(EXIT_FAILURE);
1265
        }
1266
    }
1267 1268 1269

    /* Read the config file if it exists*/
    if (remote_config_file &&
1270
        daemonConfigLoadFile(config, remote_config_file, implicit_conf) < 0) {
1271 1272 1273 1274 1275 1276
        virErrorPtr err = virGetLastError();
        if (err && err->message)
            VIR_ERROR(_("Can't load config file: %s: %s"),
                      err->message, remote_config_file);
        else
            VIR_ERROR(_("Can't load config file: %s"), remote_config_file);
1277
        exit(EXIT_FAILURE);
1278
    }
1279

1280
    if (!privileged &&
1281 1282
        migrateProfile() < 0) {
        VIR_ERROR(_("Exiting due to failure to migrate profile"));
1283
        exit(EXIT_FAILURE);
1284
    }
1285

1286 1287 1288 1289
    if (config->host_uuid &&
        virSetHostUUIDStr(config->host_uuid) < 0) {
        VIR_ERROR(_("invalid host UUID: %s"), config->host_uuid);
        exit(EXIT_FAILURE);
1290 1291
    }

1292 1293
    if (daemonSetupLogging(config, privileged, verbose, godaemon) < 0) {
        VIR_ERROR(_("Can't initialize logging"));
1294
        exit(EXIT_FAILURE);
1295
    }
1296

1297 1298 1299 1300 1301
    if (daemonSetupAccessManager(config) < 0) {
        VIR_ERROR(_("Can't initialize access manager"));
        exit(EXIT_FAILURE);
    }

1302
    if (!pid_file &&
1303
        daemonPidFilePath(privileged,
1304 1305
                          &pid_file) < 0) {
        VIR_ERROR(_("Can't determine pid file path."));
1306
        exit(EXIT_FAILURE);
1307
    }
1308
    VIR_DEBUG("Decided on pid file path '%s'", NULLSTR(pid_file));
1309 1310 1311 1312

    if (daemonUnixSocketPaths(config,
                              privileged,
                              &sock_file,
1313 1314
                              &sock_file_ro) < 0) {
        VIR_ERROR(_("Can't determine socket paths"));
1315
        exit(EXIT_FAILURE);
1316
    }
1317 1318
    VIR_DEBUG("Decided on socket paths '%s' and '%s'",
              sock_file, NULLSTR(sock_file_ro));
1319

1320
    if (godaemon) {
1321
        char ebuf[1024];
1322 1323 1324 1325

        if (chdir("/") < 0) {
            VIR_ERROR(_("cannot change to root directory: %s"),
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1326
            goto cleanup;
1327 1328
        }

1329
        if ((statuswrite = daemonForkIntoBackground(argv[0])) < 0) {
1330
            VIR_ERROR(_("Failed to fork as daemon: %s"),
1331
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1332
            goto cleanup;
1333 1334 1335
        }
    }

J
John Levon 已提交
1336
    /* Ensure the rundir exists (on tmpfs on some systems) */
1337
    if (privileged) {
1338 1339 1340 1341
        if (VIR_STRDUP_QUIET(run_dir, LOCALSTATEDIR "/run/libvirt") < 0) {
            VIR_ERROR(_("Can't allocate memory"));
            goto cleanup;
        }
1342
    } else {
1343
        run_dir = virGetUserRuntimeDirectory();
1344

1345
        if (!run_dir) {
1346 1347
            VIR_ERROR(_("Can't determine user directory"));
            goto cleanup;
J
John Levon 已提交
1348 1349
        }
    }
1350 1351 1352 1353
    if (privileged)
        old_umask = umask(022);
    else
        old_umask = umask(077);
1354
    VIR_DEBUG("Ensuring run dir '%s' exists", run_dir);
1355 1356 1357 1358 1359 1360 1361 1362
    if (virFileMakePath(run_dir) < 0) {
        char ebuf[1024];
        VIR_ERROR(_("unable to create rundir %s: %s"), run_dir,
                  virStrerror(errno, ebuf, sizeof(ebuf)));
        ret = VIR_DAEMON_ERR_RUNDIR;
        goto cleanup;
    }
    umask(old_umask);
J
John Levon 已提交
1363

1364 1365 1366 1367 1368 1369
    /* Try to claim the pidfile, exiting if we can't */
    if ((pid_file_fd = virPidFileAcquirePath(pid_file, getpid())) < 0) {
        ret = VIR_DAEMON_ERR_PIDFILE;
        goto cleanup;
    }

1370 1371 1372 1373 1374
    if (virNetlinkStartup() < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1375 1376
    if (!(srv = virNetServerNew(config->min_workers,
                                config->max_workers,
1377
                                config->prio_workers,
1378
                                config->max_clients,
1379 1380 1381
                                config->keepalive_interval,
                                config->keepalive_count,
                                !!config->keepalive_required,
1382
                                config->mdns_adv ? config->mdns_name : NULL,
1383
                                remoteClientInitHook,
1384
                                NULL,
1385
                                remoteClientFreeFunc,
1386
                                NULL))) {
1387 1388 1389 1390
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1391 1392 1393
    /* Beyond this point, nothing should rely on using
     * getuid/geteuid() == 0, for privilege level checks.
     */
1394
    VIR_DEBUG("Dropping privileges (if required)");
1395
    if (daemonSetupPrivs() < 0) {
1396
        ret = VIR_DAEMON_ERR_PRIVS;
1397
        goto cleanup;
1398
    }
J
John Levon 已提交
1399

1400
    daemonInitialize();
1401

1402 1403 1404 1405 1406 1407 1408 1409 1410
    remoteProcs[REMOTE_PROC_AUTH_LIST].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_INIT].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_STEP].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_SASL_START].needAuth = false;
    remoteProcs[REMOTE_PROC_AUTH_POLKIT].needAuth = false;
    if (!(remoteProgram = virNetServerProgramNew(REMOTE_PROGRAM,
                                                 REMOTE_PROTOCOL_VERSION,
                                                 remoteProcs,
                                                 remoteNProcs))) {
1411
        ret = VIR_DAEMON_ERR_INIT;
1412 1413 1414 1415 1416
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, remoteProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1417
    }
1418

1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430
    if (!(lxcProgram = virNetServerProgramNew(LXC_PROGRAM,
                                              LXC_PROTOCOL_VERSION,
                                              lxcProcs,
                                              lxcNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, lxcProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }

1431 1432 1433 1434 1435 1436 1437 1438 1439 1440
    if (!(qemuProgram = virNetServerProgramNew(QEMU_PROGRAM,
                                               QEMU_PROTOCOL_VERSION,
                                               qemuProcs,
                                               qemuNProcs))) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
    }
    if (virNetServerAddProgram(srv, qemuProgram) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1441
    }
1442

1443 1444
    if (timeout != -1) {
        VIR_DEBUG("Registering shutdown timeout %d", timeout);
1445
        virNetServerAutoShutdown(srv,
1446
                                 timeout);
1447
    }
1448 1449 1450 1451

    if ((daemonSetupSignals(srv)) < 0) {
        ret = VIR_DAEMON_ERR_SIGNAL;
        goto cleanup;
1452
    }
D
Daniel P. Berrange 已提交
1453

1454
    if (config->audit_level) {
1455
        VIR_DEBUG("Attempting to configure auditing subsystem");
1456
        if (virAuditOpen() < 0) {
1457
            if (config->audit_level > 1) {
1458
                ret = VIR_DAEMON_ERR_AUDIT;
1459
                goto cleanup;
1460
            }
1461
            VIR_DEBUG("Proceeding without auditing");
1462 1463
        }
    }
1464
    virAuditLog(config->audit_logging);
1465

1466
    /* setup the hooks if any */
1467
    if (virHookInitialize() < 0) {
1468
        ret = VIR_DAEMON_ERR_HOOKS;
1469
        goto cleanup;
1470 1471
    }

1472
    /* Disable error func, now logging is setup */
1473
    virSetErrorFunc(NULL, daemonErrorHandler);
1474
    virSetErrorLogPriorityFunc(daemonErrorLogFilter);
1475

1476 1477 1478 1479 1480 1481
    /*
     * Call the daemon startup hook
     * TODO: should we abort the daemon startup if the script returned
     *       an error ?
     */
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_START,
1482
                0, "start", NULL, NULL);
1483

1484 1485 1486
    if (daemonSetupNetworking(srv, config,
                              sock_file, sock_file_ro,
                              ipsock, privileged) < 0) {
1487
        ret = VIR_DAEMON_ERR_NETWORK;
1488
        goto cleanup;
1489 1490
    }

1491 1492 1493 1494 1495 1496 1497 1498 1499
    /* Tell parent of daemon that basic initialization is complete
     * In particular we're ready to accept net connections & have
     * written the pidfile
     */
    if (statuswrite != -1) {
        char status = 0;
        while (write(statuswrite, &status, 1) == -1 &&
               errno == EINTR)
            ;
1500
        VIR_FORCE_CLOSE(statuswrite);
1501 1502
    }

1503 1504 1505 1506
    /* Initialize drivers & then start accepting new clients from network */
    if (daemonStateInit(srv) < 0) {
        ret = VIR_DAEMON_ERR_INIT;
        goto cleanup;
1507
    }
D
Daniel P. Berrange 已提交
1508

1509
#if defined(__linux__) && defined(NETLINK_ROUTE)
1510 1511
    /* Register the netlink event service for NETLINK_ROUTE */
    if (virNetlinkEventServiceStart(NETLINK_ROUTE, 0) < 0) {
1512 1513 1514
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1515
#endif
1516

1517
#if defined(__linux__) && defined(NETLINK_KOBJECT_UEVENT)
T
Tang Chen 已提交
1518 1519 1520 1521 1522
    /* Register the netlink event service for NETLINK_KOBJECT_UEVENT */
    if (virNetlinkEventServiceStart(NETLINK_KOBJECT_UEVENT, 1) < 0) {
        ret = VIR_DAEMON_ERR_NETWORK;
        goto cleanup;
    }
1523
#endif
T
Tang Chen 已提交
1524

1525 1526
    /* Run event loop. */
    virNetServerRun(srv);
1527

1528 1529
    ret = 0;

1530
    virHookCall(VIR_HOOK_DRIVER_DAEMON, "-", VIR_HOOK_DAEMON_OP_SHUTDOWN,
1531
                0, "shutdown", NULL, NULL);
1532

1533
cleanup:
1534
    virNetlinkEventServiceStopAll();
1535
    virObjectUnref(remoteProgram);
1536
    virObjectUnref(lxcProgram);
1537
    virObjectUnref(qemuProgram);
1538
    virNetServerClose(srv);
1539
    virObjectUnref(srv);
1540
    virNetlinkShutdown();
1541 1542 1543 1544 1545 1546 1547 1548
    if (statuswrite != -1) {
        if (ret != 0) {
            /* Tell parent of daemon what failed */
            char status = ret;
            while (write(statuswrite, &status, 1) == -1 &&
                   errno == EINTR)
                ;
        }
1549
        VIR_FORCE_CLOSE(statuswrite);
1550
    }
1551 1552
    if (pid_file_fd != -1)
        virPidFileReleasePath(pid_file, pid_file_fd);
1553 1554 1555 1556 1557

    VIR_FREE(sock_file);
    VIR_FREE(sock_file_ro);
    VIR_FREE(pid_file);
    VIR_FREE(remote_config_file);
1558 1559
    VIR_FREE(run_dir);

1560 1561
    daemonConfigFree(config);

1562 1563
    if (driversInitialized)
        virStateCleanup();
1564

1565
    return ret;
D
Daniel P. Berrange 已提交
1566
}