lxc_controller.c 76.8 KB
Newer Older
1
/*
2
 * Copyright (C) 2010-2015 Red Hat, Inc.
3
 * Copyright IBM Corp. 2008
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
 *
 * lxc_controller.c: linux container process controller
 *
 * Authors:
 *  David L. Leskovec <dlesko at linux.vnet.ibm.com>
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
21
 * License along with this library.  If not, see
O
Osier Yang 已提交
22
 * <http://www.gnu.org/licenses/>.
23 24 25 26 27
 */

#include <config.h>

#include <sys/epoll.h>
28 29
#include <sys/wait.h>
#include <sys/socket.h>
30 31
#include <sys/types.h>
#include <sys/un.h>
32
#include <sys/personality.h>
33
#include <unistd.h>
34
#include <paths.h>
35
#include <errno.h>
36 37
#include <fcntl.h>
#include <signal.h>
38
#include <getopt.h>
39
#include <sys/mount.h>
E
Eric Blake 已提交
40
#include <locale.h>
41 42
#include <grp.h>
#include <sys/stat.h>
43
#include <time.h>
44

45
#if WITH_CAPNG
46
# include <cap-ng.h>
D
Daniel P. Berrange 已提交
47 48
#endif

49
#include "virerror.h"
50
#include "virlog.h"
51 52

#include "lxc_conf.h"
53
#include "lxc_container.h"
54
#include "lxc_cgroup.h"
55
#include "lxc_monitor_protocol.h"
G
Gao feng 已提交
56
#include "lxc_fuse.h"
57 58
#include "virnetdev.h"
#include "virnetdevveth.h"
59
#include "viralloc.h"
E
Eric Blake 已提交
60
#include "virfile.h"
61
#include "virpidfile.h"
62
#include "vircommand.h"
63
#include "nodeinfo.h"
64
#include "virrandom.h"
65
#include "virprocess.h"
66
#include "virnuma.h"
67
#include "virdbus.h"
68
#include "rpc/virnetdaemon.h"
69
#include "virstring.h"
70

71 72
#define VIR_FROM_THIS VIR_FROM_LXC

73 74
VIR_LOG_INIT("lxc.lxc_controller");

75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
typedef struct _virLXCControllerConsole virLXCControllerConsole;
typedef virLXCControllerConsole *virLXCControllerConsolePtr;
struct _virLXCControllerConsole {
    int hostWatch;
    int hostFd;  /* PTY FD in the host OS */
    bool hostClosed;
    int hostEpoll;

    int contWatch;
    int contFd;  /* PTY FD in the container */
    bool contClosed;
    int contEpoll;

    int epollWatch;
    int epollFd; /* epoll FD for dealing with EOF */

    size_t fromHostLen;
    char fromHostBuf[1024];
    size_t fromContLen;
    char fromContBuf[1024];
95

96
    virNetDaemonPtr daemon;
97 98
};

99 100 101 102
typedef struct _virLXCController virLXCController;
typedef virLXCController *virLXCControllerPtr;
struct _virLXCController {
    char *name;
103
    virDomainObjPtr vm;
104
    virDomainDefPtr def;
105

106 107
    int handshakeFd;

108 109
    pid_t initpid;

110 111 112
    size_t nnbdpids;
    pid_t *nbdpids;

113 114
    size_t nveths;
    char **veths;
115

116 117 118
    size_t nnicindexes;
    int *nicindexes;

119 120 121
    size_t npassFDs;
    int *passFDs;

122 123
    size_t nconsoles;
    virLXCControllerConsolePtr consoles;
124
    char *devptmx;
125 126 127

    size_t nloopDevs;
    int *loopDevFds;
128 129

    virSecurityManagerPtr securityManager;
130

131
    virNetDaemonPtr daemon;
132
    bool firstClient;
133 134 135 136
    virNetServerClientPtr client;
    virNetServerProgramPtr prog;
    bool inShutdown;
    int timerShutdown;
G
Gao feng 已提交
137

138 139
    virCgroupPtr cgroup;

G
Gao feng 已提交
140
    virLXCFusePtr fuse;
141 142
};

143 144
#include "lxc_controller_dispatch.h"

145
static void virLXCControllerFree(virLXCControllerPtr ctrl);
146 147
static int virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                                         pid_t initpid);
148

149 150 151 152 153
static void virLXCControllerQuitTimer(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    virLXCControllerPtr ctrl = opaque;

    VIR_DEBUG("Triggering event loop quit");
154
    virNetDaemonQuit(ctrl->daemon);
155 156 157
}


158 159 160 161
static virLXCControllerPtr virLXCControllerNew(const char *name)
{
    virLXCControllerPtr ctrl = NULL;
    virCapsPtr caps = NULL;
162
    virDomainXMLOptionPtr xmlopt = NULL;
163 164
    char *configFile = NULL;

165
    if (VIR_ALLOC(ctrl) < 0)
166
        goto error;
167

168
    ctrl->timerShutdown = -1;
169
    ctrl->firstClient = true;
170

171 172
    if (VIR_STRDUP(ctrl->name, name) < 0)
        goto error;
173

174
    if (!(caps = virLXCDriverCapsInit(NULL)))
175 176
        goto error;

177
    if (!(xmlopt = lxcDomainXMLConfInit()))
178 179
        goto error;

180 181 182 183
    if ((configFile = virDomainConfigFile(LXC_STATE_DIR,
                                          ctrl->name)) == NULL)
        goto error;

184 185 186
    if ((ctrl->vm = virDomainObjParseFile(configFile,
                                          caps, xmlopt,
                                          0)) == NULL)
187
        goto error;
188
    ctrl->def = ctrl->vm->def;
189

190 191 192 193 194
    if ((ctrl->timerShutdown = virEventAddTimeout(-1,
                                                  virLXCControllerQuitTimer, ctrl,
                                                  NULL)) < 0)
        goto error;

195
 cleanup:
196
    VIR_FREE(configFile);
197
    virObjectUnref(caps);
198
    virObjectUnref(xmlopt);
199 200
    return ctrl;

201
 error:
202 203 204 205 206
    virLXCControllerFree(ctrl);
    ctrl = NULL;
    goto cleanup;
}

207

208
static int virLXCControllerCloseLoopDevices(virLXCControllerPtr ctrl)
209 210 211
{
    size_t i;

212
    for (i = 0; i < ctrl->nloopDevs; i++)
213
        VIR_FORCE_CLOSE(ctrl->loopDevFds[i]);
214 215 216 217 218

    return 0;
}


219 220 221 222 223
static void virLXCControllerStopInit(virLXCControllerPtr ctrl)
{
    if (ctrl->initpid == 0)
        return;

224
    virLXCControllerCloseLoopDevices(ctrl);
225
    virProcessAbort(ctrl->initpid);
226 227 228 229
    ctrl->initpid = 0;
}


230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245
static void virLXCControllerConsoleClose(virLXCControllerConsolePtr console)
{
    if (console->hostWatch != -1)
        virEventRemoveHandle(console->hostWatch);
    VIR_FORCE_CLOSE(console->hostFd);

    if (console->contWatch != -1)
        virEventRemoveHandle(console->contWatch);
    VIR_FORCE_CLOSE(console->contFd);

    if (console->epollWatch != -1)
        virEventRemoveHandle(console->epollWatch);
    VIR_FORCE_CLOSE(console->epollFd);
}


G
Gao feng 已提交
246 247 248 249 250 251 252
static void
virLXCControllerFreeFuse(virLXCControllerPtr ctrl)
{
    return lxcFreeFuse(&ctrl->fuse);
}


253 254
static void virLXCControllerFree(virLXCControllerPtr ctrl)
{
255 256
    size_t i;

257 258 259
    if (!ctrl)
        return;

260 261
    virLXCControllerStopInit(ctrl);

262
    virObjectUnref(ctrl->securityManager);
263

264
    for (i = 0; i < ctrl->nveths; i++)
265 266
        VIR_FREE(ctrl->veths[i]);
    VIR_FREE(ctrl->veths);
267
    VIR_FREE(ctrl->nicindexes);
268

269 270 271 272
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);
    VIR_FREE(ctrl->passFDs);

273
    for (i = 0; i < ctrl->nconsoles; i++)
274 275 276
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
    VIR_FREE(ctrl->consoles);

277 278
    VIR_FREE(ctrl->devptmx);

279
    virObjectUnref(ctrl->vm);
280 281
    VIR_FREE(ctrl->name);

282 283 284
    if (ctrl->timerShutdown != -1)
        virEventRemoveTimeout(ctrl->timerShutdown);

285
    virObjectUnref(ctrl->daemon);
G
Gao feng 已提交
286
    virLXCControllerFreeFuse(ctrl);
287

288 289
    VIR_FREE(ctrl->nbdpids);

290 291
    virCgroupFree(&ctrl->cgroup);

292 293
    /* This must always be the last thing to be closed */
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
294 295 296
    VIR_FREE(ctrl);
}

297

298 299 300
static int virLXCControllerAddConsole(virLXCControllerPtr ctrl,
                                      int hostFd)
{
301
    if (VIR_EXPAND_N(ctrl->consoles, ctrl->nconsoles, 1) < 0)
302
        return -1;
303
    ctrl->consoles[ctrl->nconsoles-1].daemon = ctrl->daemon;
304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328
    ctrl->consoles[ctrl->nconsoles-1].hostFd = hostFd;
    ctrl->consoles[ctrl->nconsoles-1].hostWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].contFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].contWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].epollFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].epollWatch = -1;
    return 0;
}


static int virLXCControllerConsoleSetNonblocking(virLXCControllerConsolePtr console)
{
    if (virSetBlocking(console->hostFd, false) < 0 ||
        virSetBlocking(console->contFd, false) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to set console file descriptor non-blocking"));
        return -1;
    }

    return 0;
}


329 330 331 332 333 334 335 336 337 338 339 340
static int virLXCControllerDaemonHandshake(virLXCControllerPtr ctrl)
{
    if (lxcContainerSendContinue(ctrl->handshakeFd) < 0) {
        virReportSystemError(errno, "%s",
                             _("error sending continue signal to daemon"));
        return -1;
    }
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
    return 0;
}


341 342 343
static int virLXCControllerValidateNICs(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nnets != ctrl->nveths) {
344
        virReportError(VIR_ERR_INTERNAL_ERROR,
345
                       _("expecting %zu veths, but got %zu"),
346
                       ctrl->def->nnets, ctrl->nveths);
347 348 349 350 351 352 353
        return -1;
    }

    return 0;
}


354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398
static int virLXCControllerGetNICIndexes(virLXCControllerPtr ctrl)
{
    size_t i;
    int ret = -1;

    VIR_DEBUG("Getting nic indexes");
    for (i = 0; i < ctrl->def->nnets; i++) {
        int nicindex = -1;
        switch (ctrl->def->nets[i]->type) {
        case VIR_DOMAIN_NET_TYPE_BRIDGE:
        case VIR_DOMAIN_NET_TYPE_NETWORK:
            if (ctrl->def->nets[i]->ifname == NULL)
                continue;
            if (virNetDevGetIndex(ctrl->def->nets[i]->ifname,
                                  &nicindex) < 0)
                goto cleanup;
            if (VIR_EXPAND_N(ctrl->nicindexes,
                             ctrl->nnicindexes,
                             1) < 0)
                goto cleanup;
            VIR_DEBUG("Index %d for %s", nicindex,
                      ctrl->def->nets[i]->ifname);
            ctrl->nicindexes[ctrl->nnicindexes-1] = nicindex;
            break;

        case VIR_DOMAIN_NET_TYPE_USER:
        case VIR_DOMAIN_NET_TYPE_ETHERNET:
        case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
        case VIR_DOMAIN_NET_TYPE_SERVER:
        case VIR_DOMAIN_NET_TYPE_CLIENT:
        case VIR_DOMAIN_NET_TYPE_MCAST:
        case VIR_DOMAIN_NET_TYPE_INTERNAL:
        case VIR_DOMAIN_NET_TYPE_DIRECT:
        case VIR_DOMAIN_NET_TYPE_HOSTDEV:
        default:
            break;
        }
    }

    ret = 0;
 cleanup:
    return ret;
}


399 400 401
static int virLXCControllerValidateConsoles(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nconsoles != ctrl->nconsoles) {
402
        virReportError(VIR_ERR_INTERNAL_ERROR,
403
                       _("expecting %zu consoles, but got %zu tty file handlers"),
404
                       ctrl->def->nconsoles, ctrl->nconsoles);
405 406 407 408 409 410 411
        return -1;
    }

    return 0;
}


412
static int virLXCControllerSetupLoopDeviceFS(virDomainFSDefPtr fs)
413
{
414
    int lofd;
415 416
    char *loname = NULL;

417
    if ((lofd = virFileLoopDeviceAssociate(fs->src, &loname)) < 0)
418 419
        return -1;

420 421
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
              fs->src, loname);
422 423 424 425 426 427 428 429 430 431 432 433 434
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
    VIR_FREE(fs->src);
    fs->src = loname;
    loname = NULL;

    return lofd;
}


435 436 437 438
static int virLXCControllerSetupLoopDeviceDisk(virDomainDiskDefPtr disk)
{
    int lofd;
    char *loname = NULL;
439
    const char *src = virDomainDiskGetSource(disk);
J
John Ferlan 已提交
440
    int ret = -1;
441

442
    if ((lofd = virFileLoopDeviceAssociate(src, &loname)) < 0)
443 444
        return -1;

445
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
446
              src, loname);
447

448 449 450 451
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
452
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
J
John Ferlan 已提交
453 454 455 456 457 458
    if (virDomainDiskSetSource(disk, loname) < 0)
        goto cleanup;

    ret = 0;

 cleanup:
459
    VIR_FREE(loname);
J
John Ferlan 已提交
460
    if (ret < 0)
461
        VIR_FORCE_CLOSE(lofd);
462 463

    return lofd;
J
John Ferlan 已提交
464

465 466 467
}


468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483
static int virLXCControllerSetupNBDDeviceFS(virDomainFSDefPtr fs)
{
    char *dev;

    if (fs->format <= VIR_STORAGE_FILE_NONE) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

    if (virFileNBDDeviceAssociate(fs->src,
                                  fs->format,
                                  fs->readonly,
                                  &dev) < 0)
        return -1;

484 485
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
              fs->src, dev);
486 487 488 489
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
490
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
491 492 493 494 495 496 497 498 499 500
    VIR_FREE(fs->src);
    fs->src = dev;

    return 0;
}


static int virLXCControllerSetupNBDDeviceDisk(virDomainDiskDefPtr disk)
{
    char *dev;
501 502
    const char *src = virDomainDiskGetSource(disk);
    int format = virDomainDiskGetFormat(disk);
503

504
    if (format <= VIR_STORAGE_FILE_NONE) {
505 506 507 508 509
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

510 511
    if (virFileNBDDeviceAssociate(src,
                                  format,
512
                                  disk->src->readonly,
513 514 515
                                  &dev) < 0)
        return -1;

516
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
517
              src, dev);
518 519 520 521
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
522
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
523 524 525 526 527
    if (virDomainDiskSetSource(disk, dev) < 0) {
        VIR_FREE(dev);
        return -1;
    }
    VIR_FREE(dev);
528 529 530 531

    return 0;
}

532 533 534 535
static int virLXCControllerAppendNBDPids(virLXCControllerPtr ctrl,
                                         const char *dev)
{
    char *pidpath = NULL;
C
Cédric Bosdonnat 已提交
536 537
    pid_t *pids = NULL;
    size_t npids = 0;
538 539
    size_t i;
    int ret = -1;
540
    size_t loops = 0;
541 542 543 544 545 546
    pid_t pid;

    if (!STRPREFIX(dev, "/dev/") ||
        virAsprintf(&pidpath, "/sys/devices/virtual/block/%s/pid", dev + 5) < 0)
        goto cleanup;

547 548 549 550 551 552 553 554 555 556 557 558 559 560
    /* Wait for the pid file to appear */
    while (!virFileExists(pidpath)) {
        /* wait for 100ms before checking again, but don't do it for ever */
        if (errno == ENOENT && loops < 10) {
            usleep(100 * 1000);
            loops++;
        } else {
            virReportSystemError(errno,
                                 _("Cannot check NBD device %s pid"),
                                 dev + 5);
            goto cleanup;
        }
    }

561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
    if (virPidFileReadPath(pidpath, &pid) < 0)
        goto cleanup;

    if (virProcessGetPids(pid, &npids, &pids) < 0)
        goto cleanup;

    for (i = 0; i < npids; i++) {
        if (VIR_APPEND_ELEMENT(ctrl->nbdpids, ctrl->nnbdpids, pids[i]) < 0)
            goto cleanup;
    }

    ret = 0;

 cleanup:
    VIR_FREE(pids);
    VIR_FREE(pidpath);
    return ret;
}
579

580
static int virLXCControllerSetupLoopDevices(virLXCControllerPtr ctrl)
581 582 583 584
{
    size_t i;
    int ret = -1;

585 586
    VIR_DEBUG("Setting up loop devices for filesystems");

587
    for (i = 0; i < ctrl->def->nfss; i++) {
588
        virDomainFSDefPtr fs = ctrl->def->fss[i];
589 590
        int fd;

591
        if (fs->type != VIR_DOMAIN_FS_TYPE_FILE)
592 593
            continue;

594 595 596 597 598 599 600 601
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_DEFAULT) {
            if (fs->format == VIR_STORAGE_FILE_RAW ||
                fs->format == VIR_STORAGE_FILE_NONE)
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_LOOP;
            else
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_NBD;
        }

602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_LOOP) {
            if (fs->format != VIR_STORAGE_FILE_RAW &&
                fs->format != VIR_STORAGE_FILE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("fs format %s is not supported"),
                               virStorageFileFormatTypeToString(fs->format));
                goto cleanup;
            }

            fd = virLXCControllerSetupLoopDeviceFS(fs);
            if (fd < 0)
                goto cleanup;

            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
                goto cleanup;
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
621 622 623
        } else if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_NBD) {
            if (virLXCControllerSetupNBDDeviceFS(fs) < 0)
                goto cleanup;
624 625 626 627 628 629

            /* The NBD device will be cleaned up while the cgroup will end.
             * For this we need to remember the qemu-nbd pid and add it to
             * the cgroup*/
            if (virLXCControllerAppendNBDPids(ctrl, fs->src) < 0)
                goto cleanup;
630 631 632
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("fs driver %s is not supported"),
633
                           virDomainFSDriverTypeToString(fs->fsdriver));
634
            goto cleanup;
635 636 637
        }
    }

638 639
    VIR_DEBUG("Setting up loop devices for disks");

640
    for (i = 0; i < ctrl->def->ndisks; i++) {
641 642
        virDomainDiskDefPtr disk = ctrl->def->disks[i];
        int fd;
643 644
        const char *driver = virDomainDiskGetDriver(disk);
        int format = virDomainDiskGetFormat(disk);
645

E
Eric Blake 已提交
646
        if (virDomainDiskGetType(disk) != VIR_STORAGE_TYPE_FILE)
647 648
            continue;

649 650 651 652
        /* If no driverName is set, we prefer 'loop' for
         * dealing with raw or undefined formats, otherwise
         * we use 'nbd'.
         */
653 654 655 656 657 658
        if (STREQ_NULLABLE(driver, "loop") ||
            (!driver &&
             (format == VIR_STORAGE_FILE_RAW ||
              format == VIR_STORAGE_FILE_NONE))) {
            if (format != VIR_STORAGE_FILE_RAW &&
                format != VIR_STORAGE_FILE_NONE) {
659
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
660
                               _("disk format %s is not supported"),
661
                               virStorageFileFormatTypeToString(format));
662 663 664
                goto cleanup;
            }

665 666 667 668
            /* We treat 'none' as meaning 'raw' since we
             * don't want to go into the auto-probing
             * business for security reasons
             */
669 670 671 672
            fd = virLXCControllerSetupLoopDeviceDisk(disk);
            if (fd < 0)
                goto cleanup;

673 674 675 676 677 678
            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
                goto cleanup;
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
679
        } else if (!driver || STREQ(driver, "nbd")) {
680 681 682 683 684 685 686 687 688
            if (disk->cachemode != VIR_DOMAIN_DISK_CACHE_DEFAULT &&
                disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Disk cache mode %s is not supported"),
                               virDomainDiskCacheTypeToString(disk->cachemode));
                goto cleanup;
            }
            if (virLXCControllerSetupNBDDeviceDisk(disk) < 0)
                goto cleanup;
689 690 691 692 693 694

            /* The NBD device will be cleaned up while the cgroup will end.
             * For this we need to remember the qemu-nbd pid and add it to
             * the cgroup*/
            if (virLXCControllerAppendNBDPids(ctrl, virDomainDiskGetSource(disk)) < 0)
                goto cleanup;
695
        } else {
696
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
697
                           _("disk driver %s is not supported"),
698
                           driver);
699
            goto cleanup;
700 701 702
        }
    }

703 704 705
    VIR_DEBUG("Setup all loop devices");
    ret = 0;

706
 cleanup:
707 708 709
    return ret;
}

710 711 712 713

/*
 * To be run while still single threaded
 */
714
static int virLXCControllerSetupCpuAffinity(virLXCControllerPtr ctrl)
715
{
H
Hu Tao 已提交
716 717
    int hostcpus, maxcpu = CPU_SETSIZE;
    virBitmapPtr cpumap, cpumapToSet;
718 719 720 721 722

    VIR_DEBUG("Setting CPU affinity");

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
723
    if ((hostcpus = nodeGetCPUCount(NULL)) < 0)
724 725
        return -1;

726 727 728
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;

729 730
    cpumap = virBitmapNew(maxcpu);
    if (!cpumap)
731 732
        return -1;

H
Hu Tao 已提交
733 734
    cpumapToSet = cpumap;

735
    if (ctrl->def->cpumask) {
H
Hu Tao 已提交
736
        cpumapToSet = ctrl->def->cpumask;
737 738 739 740 741
    } else {
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned LXC instance to all pCPUs if no map is given in
         * its config file */
742
        virBitmapSetAll(cpumap);
743 744
    }

745
    /* We are presuming we are running between fork/exec of LXC
746 747 748
     * so use '0' to indicate our own process ID. No threads are
     * running at this point
     */
749
    if (virProcessSetAffinity(0 /* Self */, cpumapToSet) < 0) {
750
        virBitmapFree(cpumap);
751 752
        return -1;
    }
753
    virBitmapFree(cpumap);
754 755 756 757 758

    return 0;
}


759 760 761 762
static int virLXCControllerGetNumadAdvice(virLXCControllerPtr ctrl,
                                          virBitmapPtr *mask)
{
    virBitmapPtr nodemask = NULL;
763
    char *nodeset = NULL;
764 765 766 767 768
    int ret = -1;

    /* Get the advisory nodeset from numad if 'placement' of
     * either <vcpu> or <numatune> is 'auto'.
     */
769
    if (virDomainDefNeedsPlacementAdvice(ctrl->def)) {
770 771 772 773 774 775 776 777 778 779 780 781 782 783
        nodeset = virNumaGetAutoPlacementAdvice(ctrl->def->vcpus,
                                                ctrl->def->mem.cur_balloon);
        if (!nodeset)
            goto cleanup;

        VIR_DEBUG("Nodeset returned from numad: %s", nodeset);

        if (virBitmapParse(nodeset, 0, &nodemask, VIR_DOMAIN_CPUMASK_LEN) < 0)
            goto cleanup;
    }

    ret = 0;
    *mask = nodemask;

784
 cleanup:
785 786 787 788 789
    VIR_FREE(nodeset);
    return ret;
}


790
/**
791 792
 * virLXCControllerSetupResourceLimits
 * @ctrl: the controller state
793
 *
794 795 796
 * Sets up the non-cgroup based resource limits that need
 * to be inherited by the child process across clone()/exec().
 * The cgroup limits are setup later
797 798 799
 *
 * Returns 0 on success or -1 in case of error
 */
800
static int virLXCControllerSetupResourceLimits(virLXCControllerPtr ctrl)
801
{
802
    virBitmapPtr auto_nodeset = NULL;
803
    int ret = -1;
804 805 806
    virBitmapPtr nodeset = NULL;
    virDomainNumatuneMemMode mode;

807 808 809 810 811 812 813 814
    if (virDomainNumatuneGetMode(ctrl->def->numa, -1, &mode) == 0) {
        if (mode == VIR_DOMAIN_NUMATUNE_MEM_STRICT &&
            virCgroupControllerAvailable(VIR_CGROUP_CONTROLLER_CPUSET)) {
            /* Use virNuma* API iff necessary. Once set and child is exec()-ed,
             * there's no way for us to change it. Rely on cgroups (if available
             * and enabled in the config) rather than virNuma*. */
            VIR_DEBUG("Relying on CGroups for memory binding");
        } else {
815

816
            VIR_DEBUG("Setting up process resource limits");
817

818 819
            if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
                goto cleanup;
820

821
            nodeset = virDomainNumatuneGetNodeset(ctrl->def->numa, auto_nodeset, -1);
822

823 824 825
            if (virNumaSetupMemoryPolicy(mode, nodeset) < 0)
                goto cleanup;
        }
826
    }
827

828
    if (virLXCControllerSetupCpuAffinity(ctrl) < 0)
829
        goto cleanup;
830

831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846
    ret = 0;
 cleanup:
    virBitmapFree(auto_nodeset);
    return ret;
}


/*
 * Creates the cgroup and sets up the various limits associated
 * with it
 */
static int virLXCControllerSetupCgroupLimits(virLXCControllerPtr ctrl)
{
    virBitmapPtr auto_nodeset = NULL;
    int ret = -1;
    virBitmapPtr nodeset = NULL;
847
    size_t i;
848 849 850 851 852 853

    VIR_DEBUG("Setting up cgroup resource limits");

    if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
        goto cleanup;

854
    nodeset = virDomainNumatuneGetNodeset(ctrl->def->numa, auto_nodeset, -1);
855 856

    if (!(ctrl->cgroup = virLXCCgroupCreate(ctrl->def,
857 858 859
                                            ctrl->initpid,
                                            ctrl->nnicindexes,
                                            ctrl->nicindexes)))
860 861 862 863 864
        goto cleanup;

    if (virCgroupAddTask(ctrl->cgroup, getpid()) < 0)
        goto cleanup;

865 866 867 868 869 870
    /* Add all qemu-nbd tasks to the cgroup */
    for (i = 0; i < ctrl->nnbdpids; i++) {
        if (virCgroupAddTask(ctrl->cgroup, ctrl->nbdpids[i]) < 0)
            goto cleanup;
    }

871
    if (virLXCCgroupSetup(ctrl->def, ctrl->cgroup, nodeset) < 0)
872
        goto cleanup;
873

874
    ret = 0;
875
 cleanup:
876
    virBitmapFree(auto_nodeset);
877
    return ret;
D
Dan Smith 已提交
878 879
}

880

881 882 883 884 885 886 887 888 889 890 891 892 893
static void virLXCControllerClientCloseHook(virNetServerClientPtr client)
{
    virLXCControllerPtr ctrl = virNetServerClientGetPrivateData(client);

    VIR_DEBUG("Client %p has closed", client);
    if (ctrl->client == client)
        ctrl->client = NULL;
    if (ctrl->inShutdown) {
        VIR_DEBUG("Arm timer to quit event loop");
        virEventUpdateTimeout(ctrl->timerShutdown, 0);
    }
}

894 895
static void virLXCControllerClientPrivateFree(void *data)
{
896 897
    virLXCControllerPtr ctrl = data;
    VIR_DEBUG("Got private data free %p", ctrl);
898 899 900 901
}

static void *virLXCControllerClientPrivateNew(virNetServerClientPtr client,
                                              void *opaque)
902 903
{
    virLXCControllerPtr ctrl = opaque;
904

905 906 907
    virNetServerClientSetCloseHook(client, virLXCControllerClientCloseHook);
    VIR_DEBUG("Got new client %p", client);
    ctrl->client = client;
908 909 910 911 912

    if (ctrl->initpid && ctrl->firstClient)
        virLXCControllerEventSendInit(ctrl, ctrl->initpid);
    ctrl->firstClient = false;

913
    return ctrl;
914 915
}

916 917

static int virLXCControllerSetupServer(virLXCControllerPtr ctrl)
918
{
919
    virNetServerPtr srv = NULL;
920 921
    virNetServerServicePtr svc = NULL;
    char *sockpath;
922

923
    if (virAsprintf(&sockpath, "%s/%s.sock",
924
                    LXC_STATE_DIR, ctrl->name) < 0)
925
        return -1;
926

927 928 929 930 931 932 933
    if (!(srv = virNetServerNew(0, 0, 0, 1,
                                0, -1, 0, false,
                                NULL,
                                virLXCControllerClientPrivateNew,
                                NULL,
                                virLXCControllerClientPrivateFree,
                                ctrl)))
C
Chris Lalancette 已提交
934
        goto error;
935

936 937 938
    if (virSecurityManagerSetSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

939 940 941 942
    if (!(svc = virNetServerServiceNewUNIX(sockpath,
                                           0700,
                                           0,
                                           0,
943
#if WITH_GNUTLS
944 945
                                           NULL,
#endif
946
                                           false,
M
Michal Privoznik 已提交
947
                                           0,
948
                                           5)))
949
        goto error;
950

951 952 953
    if (virSecurityManagerClearSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

954
    if (virNetServerAddService(srv, svc, NULL) < 0)
955
        goto error;
956
    virObjectUnref(svc);
957
    svc = NULL;
958

959 960 961 962
    if (!(ctrl->prog = virNetServerProgramNew(VIR_LXC_MONITOR_PROGRAM,
                                              VIR_LXC_MONITOR_PROGRAM_VERSION,
                                              virLXCMonitorProcs,
                                              virLXCMonitorNProcs)))
963 964
        goto error;

965 966 967 968 969
    if (!(ctrl->daemon = virNetDaemonNew()) ||
        virNetDaemonAddServer(ctrl->daemon, srv) < 0)
        goto error;

    virNetDaemonUpdateServices(ctrl->daemon, true);
970 971
    VIR_FREE(sockpath);
    return 0;
972

973
 error:
974
    VIR_FREE(sockpath);
975 976 977
    virObjectUnref(srv);
    virObjectUnref(ctrl->daemon);
    ctrl->daemon = NULL;
978
    virObjectUnref(svc);
979 980
    return -1;
}
981

D
Daniel P. Berrange 已提交
982 983 984

static int lxcControllerClearCapabilities(void)
{
985
#if WITH_CAPNG
D
Daniel P. Berrange 已提交
986 987 988 989 990
    int ret;

    capng_clear(CAPNG_SELECT_BOTH);

    if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
991 992
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("failed to apply capabilities: %d"), ret);
D
Daniel P. Berrange 已提交
993 994 995
        return -1;
    }
#else
996
    VIR_WARN("libcap-ng support not compiled in, unable to clear capabilities");
D
Daniel P. Berrange 已提交
997 998 999 1000
#endif
    return 0;
}

1001
static bool wantReboot;
1002
static virMutex lock = VIR_MUTEX_INITIALIZER;
1003 1004


M
Martin Kletzander 已提交
1005
static void virLXCControllerSignalChildIO(virNetDaemonPtr dmn,
1006
                                          siginfo_t *info ATTRIBUTE_UNUSED,
1007
                                          void *opaque)
1008
{
1009
    virLXCControllerPtr ctrl = opaque;
1010
    int ret;
1011
    int status;
1012

1013
    ret = waitpid(-1, &status, WNOHANG);
1014
    VIR_DEBUG("Got sig child %d vs %lld", ret, (unsigned long long)ctrl->initpid);
1015
    if (ret == ctrl->initpid) {
M
Martin Kletzander 已提交
1016
        virNetDaemonQuit(dmn);
1017
        virMutexLock(&lock);
1018
        if (WIFSIGNALED(status) &&
1019 1020
            WTERMSIG(status) == SIGHUP) {
            VIR_DEBUG("Status indicates reboot");
1021
            wantReboot = true;
1022
        }
1023 1024
        virMutexUnlock(&lock);
    }
1025 1026 1027
}


1028
static void virLXCControllerConsoleUpdateWatch(virLXCControllerConsolePtr console)
1029 1030 1031 1032
{
    int hostEvents = 0;
    int contEvents = 0;

1033 1034
    /* If host console is open, then we can look to read/write */
    if (!console->hostClosed) {
1035 1036 1037 1038 1039
        if (console->fromHostLen < sizeof(console->fromHostBuf))
            hostEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromContLen)
            hostEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }
1040 1041 1042

    /* If cont console is open, then we can look to read/write */
    if (!console->contClosed) {
1043 1044 1045 1046 1047 1048
        if (console->fromContLen < sizeof(console->fromContBuf))
            contEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromHostLen)
            contEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }

1049 1050 1051
    VIR_DEBUG("Container watch=%d, events=%d closed=%d; host watch=%d events=%d closed=%d",
              console->contWatch, contEvents, console->contClosed,
              console->hostWatch, hostEvents, console->hostClosed);
1052 1053
    virEventUpdateHandle(console->contWatch, contEvents);
    virEventUpdateHandle(console->hostWatch, hostEvents);
1054

1055
    if (console->hostClosed) {
1056
        /* Must setup an epoll to detect when host becomes accessible again */
1057
        int events = EPOLLIN | EPOLLET;
1058
        if (console->fromContLen)
1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074
            events |= EPOLLOUT;

        if (events != console->hostEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->hostEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);

            event.events = events;
            event.data.fd = console->hostFd;
            if (epoll_ctl(console->epollFd, action, console->hostFd, &event) < 0) {
                VIR_DEBUG(":fail");
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
1075
                virNetDaemonQuit(console->daemon);
1076 1077 1078 1079 1080 1081 1082 1083 1084 1085
                goto cleanup;
            }
            console->hostEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);
        }
    } else if (console->hostEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->hostEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->hostFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
1086
            VIR_DEBUG(":fail");
1087
            virNetDaemonQuit(console->daemon);
1088 1089 1090 1091
            goto cleanup;
        }
        console->hostEpoll = 0;
    }
1092

1093
    if (console->contClosed) {
1094
        /* Must setup an epoll to detect when guest becomes accessible again */
1095
        int events = EPOLLIN | EPOLLET;
1096
        if (console->fromHostLen)
1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112
            events |= EPOLLOUT;

        if (events != console->contEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->contEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newContEvents=%x oldContEvents=%x", events, console->contEpoll);

            event.events = events;
            event.data.fd = console->contFd;
            if (epoll_ctl(console->epollFd, action, console->contFd, &event) < 0) {
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
                VIR_DEBUG(":fail");
1113
                virNetDaemonQuit(console->daemon);
1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
                goto cleanup;
            }
            console->contEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->contEpoll);
        }
    } else if (console->contEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->contEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->contFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
1124
            VIR_DEBUG(":fail");
1125
            virNetDaemonQuit(console->daemon);
1126 1127 1128 1129
            goto cleanup;
        }
        console->contEpoll = 0;
    }
1130
 cleanup:
1131 1132
    return;
}
1133 1134


1135
static void virLXCControllerConsoleEPoll(int watch, int fd, int events, void *opaque)
1136
{
1137
    virLXCControllerConsolePtr console = opaque;
1138

1139 1140 1141 1142 1143 1144 1145 1146 1147 1148
    virMutexLock(&lock);
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);

    while (1) {
        struct epoll_event event;
        int ret;
        ret = epoll_wait(console->epollFd, &event, 1, 0);
1149
        if (ret < 0) {
S
Stefan Berger 已提交
1150
            if (errno == EINTR)
1151 1152 1153
                continue;
            virReportSystemError(errno, "%s",
                                 _("Unable to wait on epoll"));
1154
            virNetDaemonQuit(console->daemon);
1155 1156 1157
            goto cleanup;
        }

1158 1159 1160 1161 1162 1163 1164
        if (ret == 0)
            break;

        VIR_DEBUG("fd=%d hostFd=%d contFd=%d hostEpoll=%x contEpoll=%x",
                  event.data.fd, console->hostFd, console->contFd,
                  console->hostEpoll, console->contEpoll);

1165 1166
        /* If we get HUP+dead PID, we just re-enable the main loop
         * which will see the PID has died and exit */
1167
        if ((event.events & (EPOLLIN|EPOLLOUT))) {
1168 1169
            if (event.data.fd == console->hostFd) {
                console->hostClosed = false;
1170
            } else {
1171
                console->contClosed = false;
1172
            }
1173
            virLXCControllerConsoleUpdateWatch(console);
1174 1175 1176 1177
            break;
        }
    }

1178
 cleanup:
1179
    virMutexUnlock(&lock);
1180 1181
}

1182
static void virLXCControllerConsoleIO(int watch, int fd, int events, void *opaque)
1183
{
1184
    virLXCControllerConsolePtr console = opaque;
1185 1186

    virMutexLock(&lock);
1187 1188 1189 1190
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);
1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204
    if (events & VIR_EVENT_HANDLE_READABLE) {
        char *buf;
        size_t *len;
        size_t avail;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
            avail = sizeof(console->fromHostBuf) - *len;
        } else {
            buf = console->fromContBuf;
            len = &console->fromContLen;
            avail = sizeof(console->fromContBuf) - *len;
        }
1205
     reread:
1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232
        done = read(fd, buf + *len, avail);
        if (done == -1 && errno == EINTR)
            goto reread;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to read container pty"));
            goto error;
        }
        if (done > 0) {
            *len += done;
        } else {
            VIR_DEBUG("Read fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_WRITABLE) {
        char *buf;
        size_t *len;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromContBuf;
            len = &console->fromContLen;
        } else {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
        }

1233
     rewrite:
1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258
        done = write(fd, buf, *len);
        if (done == -1 && errno == EINTR)
            goto rewrite;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to write to container pty"));
            goto error;
        }
        if (done > 0) {
            memmove(buf, buf + done, (*len - done));
            *len -= done;
        } else {
            VIR_DEBUG("Write fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_HANGUP) {
        if (watch == console->hostWatch) {
            console->hostClosed = true;
        } else {
            console->contClosed = true;
        }
        VIR_DEBUG("Got EOF on %d %d", watch, fd);
    }

1259
    virLXCControllerConsoleUpdateWatch(console);
1260 1261 1262
    virMutexUnlock(&lock);
    return;

1263
 error:
1264 1265 1266
    virEventRemoveHandle(console->contWatch);
    virEventRemoveHandle(console->hostWatch);
    console->contWatch = console->hostWatch = -1;
1267
    virNetDaemonQuit(console->daemon);
1268 1269 1270 1271
    virMutexUnlock(&lock);
}


1272
/**
1273
 * lxcControllerMain
1274 1275
 * @serverFd: server socket fd to accept client requests
 * @clientFd: initial client which is the libvirtd daemon
1276
 *
1277
 * Processes I/O on consoles and the monitor
1278 1279 1280
 *
 * Returns 0 on success or -1 in case of error
 */
1281
static int virLXCControllerMain(virLXCControllerPtr ctrl)
1282
{
1283
    virErrorPtr err;
1284
    int rc = -1;
1285
    size_t i;
1286

1287
    if (virNetDaemonAddSignalHandler(ctrl->daemon,
1288 1289 1290
                                     SIGCHLD,
                                     virLXCControllerSignalChildIO,
                                     ctrl) < 0)
1291 1292
        goto cleanup;

1293 1294
    virResetLastError();

1295
    for (i = 0; i < ctrl->nconsoles; i++) {
1296
        if ((ctrl->consoles[i].epollFd = epoll_create1(EPOLL_CLOEXEC)) < 0) {
1297 1298 1299 1300 1301
            virReportSystemError(errno, "%s",
                                 _("Unable to create epoll fd"));
            goto cleanup;
        }

1302 1303 1304 1305 1306
        if ((ctrl->consoles[i].epollWatch = virEventAddHandle(ctrl->consoles[i].epollFd,
                                                              VIR_EVENT_HANDLE_READABLE,
                                                              virLXCControllerConsoleEPoll,
                                                              &(ctrl->consoles[i]),
                                                              NULL)) < 0) {
1307 1308
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch epoll FD"));
1309 1310 1311
            goto cleanup;
        }

1312 1313 1314 1315 1316
        if ((ctrl->consoles[i].hostWatch = virEventAddHandle(ctrl->consoles[i].hostFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1317 1318
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1319 1320 1321
            goto cleanup;
        }

1322 1323 1324 1325 1326
        if ((ctrl->consoles[i].contWatch = virEventAddHandle(ctrl->consoles[i].contFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1327 1328
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1329 1330
            goto cleanup;
        }
1331
    }
1332

1333
    virNetDaemonRun(ctrl->daemon);
1334

1335 1336
    err = virGetLastError();
    if (!err || err->code == VIR_ERR_OK)
1337
        rc = wantReboot ? 1 : 0;
1338

1339
 cleanup:
1340
    for (i = 0; i < ctrl->nconsoles; i++)
1341
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
1342

1343 1344 1345
    return rc;
}

1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359
static unsigned int
virLXCControllerLookupUsernsMap(virDomainIdMapEntryPtr map,
                                int num,
                                unsigned int src)
{
    size_t i;

    for (i = 0; i < num; i++) {
        if (src > map[i].start && src < map[i].start + map[i].count)
            return map[i].target + (src - map[i].start);
    }

    return src;
}
1360

1361 1362 1363 1364 1365 1366
static int
virLXCControllerSetupUsernsMap(virDomainIdMapEntryPtr map,
                               int num,
                               char *path)
{
    virBuffer map_value = VIR_BUFFER_INITIALIZER;
1367 1368
    size_t i;
    int ret = -1;
1369 1370 1371 1372 1373

    for (i = 0; i < num; i++)
        virBufferAsprintf(&map_value, "%u %u %u\n",
                          map[i].start, map[i].target, map[i].count);

1374 1375
    if (virBufferCheckError(&map_value) < 0)
        goto cleanup;
1376

1377 1378
    VIR_DEBUG("Set '%s' to '%s'", path, virBufferCurrentContent(&map_value));

1379 1380 1381 1382 1383 1384
    if (virFileWriteStr(path, virBufferCurrentContent(&map_value), 0) < 0) {
        virReportSystemError(errno, _("unable write to %s"), path);
        goto cleanup;
    }

    ret = 0;
1385
 cleanup:
1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403
    virBufferFreeAndReset(&map_value);
    return ret;
}

/**
 * virLXCControllerSetupUserns
 *
 * Set proc files for user namespace
 *
 * Returns 0 on success or -1 in case of error
 */
static int virLXCControllerSetupUserns(virLXCControllerPtr ctrl)
{
    char *uid_map = NULL;
    char *gid_map = NULL;
    int ret = -1;

    /* User namespace is disabled for container */
1404 1405
    if (ctrl->def->idmap.nuidmap == 0) {
        VIR_DEBUG("No uid map, skipping userns setup");
1406
        return 0;
1407
    }
1408

1409
    VIR_DEBUG("Setting up userns maps");
1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426
    if (virAsprintf(&uid_map, "/proc/%d/uid_map", ctrl->initpid) < 0)
        goto cleanup;

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.uidmap,
                                       ctrl->def->idmap.nuidmap,
                                       uid_map) < 0)
        goto cleanup;

    if (virAsprintf(&gid_map, "/proc/%d/gid_map", ctrl->initpid) < 0)
        goto cleanup;

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.gidmap,
                                       ctrl->def->idmap.ngidmap,
                                       gid_map) < 0)
        goto cleanup;

    ret = 0;
1427
 cleanup:
1428 1429 1430 1431 1432
    VIR_FREE(uid_map);
    VIR_FREE(gid_map);
    return ret;
}

1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445
static int virLXCControllerSetupDev(virLXCControllerPtr ctrl)
{
    char *mount_options = NULL;
    char *opts = NULL;
    char *dev = NULL;
    int ret = -1;

    VIR_DEBUG("Setting up /dev/ for container");

    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);

    if (virAsprintf(&dev, "/%s/%s.dev",
1446
                    LXC_STATE_DIR, ctrl->def->name) < 0)
1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460
        goto cleanup;

    if (virFileMakePath(dev) < 0) {
        virReportSystemError(errno,
                             _("Failed to make path %s"), dev);
        goto cleanup;
    }

    /*
     * tmpfs is limited to 64kb, since we only have device nodes in there
     * and don't want to DOS the entire OS RAM usage
     */

    if (virAsprintf(&opts,
1461
                    "mode=755,size=65536%s", mount_options) < 0)
1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472
        goto cleanup;

    VIR_DEBUG("Mount devfs on %s type=tmpfs flags=%x, opts=%s",
              dev, MS_NOSUID, opts);
    if (mount("devfs", dev, "tmpfs", MS_NOSUID, opts) < 0) {
        virReportSystemError(errno,
                             _("Failed to mount devfs on %s type %s (%s)"),
                             dev, "tmpfs", opts);
        goto cleanup;
    }

1473
    if (lxcContainerChown(ctrl->def, dev) < 0)
1474 1475
        goto cleanup;

1476
    ret = 0;
1477
 cleanup:
1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499
    VIR_FREE(opts);
    VIR_FREE(mount_options);
    VIR_FREE(dev);
    return ret;
}

static int virLXCControllerPopulateDevices(virLXCControllerPtr ctrl)
{
    size_t i;
    int ret = -1;
    char *path = NULL;
    const struct {
        int maj;
        int min;
        mode_t mode;
        const char *path;
    } devs[] = {
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_NULL, 0666, "/null" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_ZERO, 0666, "/zero" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_FULL, 0666, "/full" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_RANDOM, 0666, "/random" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_URANDOM, 0666, "/urandom" },
1500
        { LXC_DEV_MAJ_TTY, LXC_DEV_MIN_TTY, 0666, "/tty" },
1501 1502 1503 1504 1505 1506 1507 1508
    };

    if (virLXCControllerSetupDev(ctrl) < 0)
        goto cleanup;

    /* Populate /dev/ with a few important bits */
    for (i = 0; i < ARRAY_CARDINALITY(devs); i++) {
        if (virAsprintf(&path, "/%s/%s.dev/%s",
1509
                        LXC_STATE_DIR, ctrl->def->name, devs[i].path) < 0)
1510 1511 1512 1513 1514 1515 1516 1517 1518 1519
            goto cleanup;

        dev_t dev = makedev(devs[i].maj, devs[i].min);
        if (mknod(path, S_IFCHR, dev) < 0 ||
            chmod(path, devs[i].mode)) {
            virReportSystemError(errno,
                                 _("Failed to make device %s"),
                                 path);
            goto cleanup;
        }
1520

1521
        if (lxcContainerChown(ctrl->def, path) < 0)
1522 1523
            goto cleanup;

1524 1525 1526 1527
        VIR_FREE(path);
    }

    ret = 0;
1528
 cleanup:
1529 1530 1531
    VIR_FREE(path);
    return ret;
}
1532

1533

1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545
static int
virLXCControllerSetupHostdevSubsysUSB(virDomainDefPtr vmDef,
                                      virDomainHostdevDefPtr def,
                                      virSecurityManagerPtr securityDriver)
{
    int ret = -1;
    char *src = NULL;
    char *dstdir = NULL;
    char *dstfile = NULL;
    char *vroot = NULL;
    struct stat sb;
    mode_t mode;
1546
    virDomainHostdevSubsysUSBPtr usbsrc = &def->source.subsys.u.usb;
1547 1548

    if (virAsprintf(&src, USB_DEVFS "/%03d/%03d",
1549
                    usbsrc->bus, usbsrc->device) < 0)
1550 1551 1552 1553 1554 1555
        goto cleanup;

    if (virAsprintf(&vroot, "/%s/%s.dev/bus/usb/",
                    LXC_STATE_DIR, vmDef->name) < 0)
        goto cleanup;

1556
    if (virAsprintf(&dstdir, "%s/%03d/", vroot, usbsrc->bus) < 0)
1557 1558
        goto cleanup;

1559
    if (virAsprintf(&dstfile, "%s/%03d", dstdir, usbsrc->device) < 0)
1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591
        goto cleanup;

    if (stat(src, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"), src);
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("USB source %s was not a character device"),
                       src);
        goto cleanup;
    }

    mode = 0700 | S_IFCHR;

    if (virFileMakePath(dstdir) < 0) {
        virReportSystemError(errno,
                             _("Unable to create %s"), dstdir);
        goto cleanup;
    }

    VIR_DEBUG("Creating dev %s (%d,%d)",
              dstfile, major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dstfile, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dstfile);
        goto cleanup;
    }

1592 1593 1594
    if (lxcContainerChown(vmDef, dstfile) < 0)
        goto cleanup;

1595 1596 1597 1598 1599 1600
    if (virSecurityManagerSetHostdevLabel(securityDriver,
                                          vmDef, def, vroot) < 0)
        goto cleanup;

    ret = 0;

1601
 cleanup:
1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671
    VIR_FREE(src);
    VIR_FREE(dstfile);
    VIR_FREE(dstdir);
    VIR_FREE(vroot);
    return ret;
}


static int
virLXCControllerSetupHostdevCapsStorage(virDomainDefPtr vmDef,
                                        virDomainHostdevDefPtr def,
                                        virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    char *path = NULL;
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.storage.block;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

    if (VIR_STRDUP(path, dev) < 0)
        goto cleanup;

    while (*(path + len) == '/')
        len++;

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, vmDef->name,
                    strchr(path + len, '/')) < 0)
        goto cleanup;

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a block device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dev);
        goto cleanup;
    }

    mode = 0700 | S_IFBLK;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1672 1673 1674
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1675 1676 1677 1678 1679 1680
    def->source.caps.u.storage.block = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1681
 cleanup:
1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750
    def->source.caps.u.storage.block = dev;
    VIR_FREE(dst);
    VIR_FREE(path);
    return ret;
}


static int
virLXCControllerSetupHostdevCapsMisc(virDomainDefPtr vmDef,
                                     virDomainHostdevDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    char *path = NULL;
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.misc.chardev;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

    if (VIR_STRDUP(path, dev) < 0)
        goto cleanup;

    while (*(path + len) == '/')
        len++;

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, vmDef->name,
                    strchr(path + len, '/')) < 0)
        goto cleanup;

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a character device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dst);
        goto cleanup;
    }

    mode = 0700 | S_IFCHR;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dev);
        goto cleanup;
    }

1751 1752 1753
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1754 1755 1756 1757 1758 1759
    def->source.caps.u.misc.chardev = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1760
 cleanup:
1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850
    def->source.caps.u.misc.chardev = dev;
    VIR_FREE(dst);
    VIR_FREE(path);
    return ret;
}

static int
virLXCControllerSetupHostdevSubsys(virDomainDefPtr vmDef,
                                   virDomainHostdevDefPtr def,
                                   virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        return virLXCControllerSetupHostdevSubsysUSB(vmDef,
                                                     def,
                                                     securityDriver);

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevSubsysTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupHostdevCaps(virDomainDefPtr vmDef,
                                 virDomainHostdevDefPtr def,
                                 virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_STORAGE:
        return virLXCControllerSetupHostdevCapsStorage(vmDef,
                                                       def,
                                                       securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_MISC:
        return virLXCControllerSetupHostdevCapsMisc(vmDef,
                                                    def,
                                                    securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET:
        return 0; // case is handled in virLXCControllerMoveInterfaces

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevCapsTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupAllHostdevs(virLXCControllerPtr ctrl)
{
    size_t i;
    virDomainDefPtr vmDef = ctrl->def;
    virSecurityManagerPtr securityDriver = ctrl->securityManager;
    VIR_DEBUG("Setting up hostdevs");

    for (i = 0; i < vmDef->nhostdevs; i++) {
        virDomainHostdevDefPtr def = vmDef->hostdevs[i];
        switch (def->mode) {
        case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
            if (virLXCControllerSetupHostdevSubsys(vmDef,
                                                   def,
                                                   securityDriver) < 0)
                return -1;
            break;
        case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
            if (virLXCControllerSetupHostdevCaps(vmDef,
                                                 def,
                                                 securityDriver) < 0)
                return -1;
            break;
        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported host device mode %s"),
                           virDomainHostdevModeTypeToString(def->mode));
            return -1;
        }
    }

    VIR_DEBUG("Setup all hostdevs");
    return 0;
}


1851 1852 1853 1854 1855 1856 1857 1858
static int virLXCControllerSetupDisk(virLXCControllerPtr ctrl,
                                     virDomainDiskDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
    char *dst = NULL;
    int ret = -1;
    struct stat sb;
    mode_t mode;
1859
    char *tmpsrc = def->src->path;
1860

E
Eric Blake 已提交
1861
    if (virDomainDiskGetType(def) != VIR_STORAGE_TYPE_BLOCK) {
1862 1863 1864 1865
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk for non-block device"));
        goto cleanup;
    }
1866
    if (!tmpsrc) {
1867 1868 1869 1870 1871 1872 1873 1874 1875
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk without media"));
        goto cleanup;
    }

    if (virAsprintf(&dst, "/%s/%s.dev/%s",
                    LXC_STATE_DIR, ctrl->def->name, def->dst) < 0)
        goto cleanup;

1876
    if (stat(def->src->path, &sb) < 0) {
1877
        virReportSystemError(errno,
1878
                             _("Unable to access %s"), tmpsrc);
1879 1880 1881 1882 1883 1884
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode) && !S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Disk source %s must be a character/block device"),
1885
                       tmpsrc);
1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902
        goto cleanup;
    }

    mode = 0700;
    if (S_ISCHR(sb.st_mode))
        mode |= S_IFCHR;
    else
        mode |= S_IFBLK;

    /* Yes, the device name we're creating may not
     * actually correspond to the major:minor number
     * we're using, but we've no other option at this
     * time. Just have to hope that containerized apps
     * don't get upset that the major:minor is different
     * to that normally implied by the device name
     */
    VIR_DEBUG("Creating dev %s (%d,%d) from %s",
1903
              dst, major(sb.st_rdev), minor(sb.st_rdev), tmpsrc);
1904 1905 1906 1907 1908 1909 1910
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1911
    if (lxcContainerChown(ctrl->def, dst) < 0)
1912 1913
        goto cleanup;

1914
    /* Labelling normally operates on src, but we need
E
Eric Blake 已提交
1915
     * to actually label the dst here, so hack the config */
1916
    def->src->path = dst;
1917
    if (virSecurityManagerSetDiskLabel(securityDriver, ctrl->def, def) < 0)
1918 1919 1920 1921
        goto cleanup;

    ret = 0;

1922
 cleanup:
1923
    def->src->path = tmpsrc;
1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944
    VIR_FREE(dst);
    return ret;
}

static int virLXCControllerSetupAllDisks(virLXCControllerPtr ctrl)
{
    size_t i;
    VIR_DEBUG("Setting up disks");

    for (i = 0; i < ctrl->def->ndisks; i++) {
        if (virLXCControllerSetupDisk(ctrl, ctrl->def->disks[i],
                                      ctrl->securityManager) < 0)
            return -1;
    }

    VIR_DEBUG("Setup all disks");
    return 0;
}



1945
/**
1946
 * virLXCControllerMoveInterfaces
1947 1948 1949 1950 1951 1952 1953 1954
 * @nveths: number of interfaces
 * @veths: interface names
 * @container: pid of container
 *
 * Moves network interfaces into a container's namespace
 *
 * Returns 0 on success or -1 in case of error
 */
1955
static int virLXCControllerMoveInterfaces(virLXCControllerPtr ctrl)
1956
{
1957
    size_t i;
1958
    virDomainDefPtr def = ctrl->def;
1959

1960
    for (i = 0; i < ctrl->nveths; i++) {
1961
        if (virNetDevSetNamespace(ctrl->veths[i], ctrl->initpid) < 0)
1962
            return -1;
1963
    }
1964

1965 1966 1967 1968 1969 1970 1971 1972 1973
    for (i = 0; i < def->nhostdevs; i ++) {
        virDomainHostdevDefPtr hdev = def->hostdevs[i];

        if (hdev->mode != VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES)
            continue;

        virDomainHostdevCaps hdcaps = hdev->source.caps;

        if (hdcaps.type != VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET)
1974
            continue;
1975 1976 1977 1978 1979

        if (virNetDevSetNamespace(hdcaps.u.net.iface, ctrl->initpid) < 0)
            return -1;
    }

1980 1981 1982 1983 1984
    return 0;
}


/**
1985 1986
 * virLXCControllerDeleteInterfaces:
 * @ctrl: the LXC controller
1987 1988 1989 1990 1991
 *
 * Cleans up the container interfaces by deleting the veth device pairs.
 *
 * Returns 0 on success or -1 in case of error
 */
1992
static int virLXCControllerDeleteInterfaces(virLXCControllerPtr ctrl)
1993
{
1994 1995
    size_t i;
    int ret = 0;
1996

1997
    for (i = 0; i < ctrl->nveths; i++) {
1998 1999 2000 2001 2002
        if (virNetDevVethDelete(ctrl->veths[i]) < 0)
            ret = -1;
    }

    return ret;
2003 2004
}

2005

2006 2007
static int lxcSetPersonality(virDomainDefPtr def)
{
2008
    virArch altArch;
2009

2010
    VIR_DEBUG("Checking for 32-bit personality");
2011
    altArch = lxcContainerGetAlt32bitArch(virArchFromHost());
2012
    if (altArch &&
2013
        (def->os.arch == altArch)) {
2014 2015
        VIR_DEBUG("Setting personality to %s",
                  virArchToString(altArch));
2016 2017
        if (personality(PER_LINUX32) < 0) {
            virReportSystemError(errno, _("Unable to request personality for %s on %s"),
2018 2019
                                 virArchToString(altArch),
                                 virArchToString(virArchFromHost()));
2020 2021 2022 2023 2024 2025
            return -1;
        }
    }
    return 0;
}

2026
#ifndef MS_REC
2027
# define MS_REC          16384
2028 2029 2030
#endif

#ifndef MS_SLAVE
2031
# define MS_SLAVE              (1<<19)
2032
#endif
2033

2034 2035 2036 2037 2038 2039
/* Create a private tty using the private devpts at PTMX, returning
 * the master in *TTYMASTER and the name of the slave, _from the
 * perspective of the guest after remounting file systems_, in
 * *TTYNAME.  Heavily borrowed from glibc, but doesn't require that
 * devpts == "/dev/pts" */
static int
2040 2041
lxcCreateTty(virLXCControllerPtr ctrl, int *ttymaster,
             char **ttyName, char **ttyHostPath)
2042 2043 2044 2045 2046
{
    int ret = -1;
    int ptyno;
    int unlock = 0;

2047
    if ((*ttymaster = open(ctrl->devptmx, O_RDWR|O_NOCTTY|O_NONBLOCK)) < 0)
2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061
        goto cleanup;

    if (ioctl(*ttymaster, TIOCSPTLCK, &unlock) < 0)
        goto cleanup;

    if (ioctl(*ttymaster, TIOCGPTN, &ptyno) < 0)
        goto cleanup;

    /* If mount() succeeded at honoring newinstance, then the kernel
     * was new enough to also honor the mode=0620,gid=5 options, which
     * guarantee that the new pty already has correct permissions; so
     * while glibc has to fstat(), fchmod(), and fchown() for older
     * kernels, we can skip those steps.  ptyno shouldn't currently be
     * anything other than 0, but let's play it safe.  */
2062 2063
    if ((virAsprintf(ttyName, "/dev/pts/%d", ptyno) < 0) ||
        (virAsprintf(ttyHostPath, "/%s/%s.devpts/%d", LXC_STATE_DIR,
2064
                     ctrl->def->name, ptyno) < 0)) {
2065 2066 2067 2068 2069 2070
        errno = ENOMEM;
        goto cleanup;
    }

    ret = 0;

2071
 cleanup:
2072 2073 2074 2075 2076 2077 2078 2079
    if (ret != 0) {
        VIR_FORCE_CLOSE(*ttymaster);
        VIR_FREE(*ttyName);
    }

    return ret;
}

2080

2081 2082 2083 2084 2085
static int
virLXCControllerSetupPrivateNS(void)
{
    int ret = -1;

2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106
    /*
     * If doing a chroot style setup, we need to prepare
     * a private /dev/pts for the child now, which they
     * will later move into position.
     *
     * This is complex because 'virsh console' needs to
     * use /dev/pts from the host OS, and the guest OS
     * needs to use /dev/pts from the guest.
     *
     * This means that we (libvirt_lxc) need to see and
     * use both /dev/pts instances. We're running in the
     * host OS context though and don't want to expose
     * the guest OS /dev/pts there.
     *
     * Thus we call unshare(CLONE_NS) so that we can see
     * the guest's new /dev/pts, without it becoming
     * visible to the host OS. We also put the root FS
     * into slave mode, just in case it was currently
     * marked as shared
     */

2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119
    if (unshare(CLONE_NEWNS) < 0) {
        virReportSystemError(errno, "%s",
                             _("Cannot unshare mount namespace"));
        goto cleanup;
    }

    if (mount("", "/", NULL, MS_SLAVE|MS_REC, NULL) < 0) {
        virReportSystemError(errno, "%s",
                             _("Failed to switch root mount into slave mode"));
        goto cleanup;
    }

    ret = 0;
2120
 cleanup:
2121 2122 2123 2124
    return ret;
}


2125
static int
2126
virLXCControllerSetupDevPTS(virLXCControllerPtr ctrl)
2127
{
2128
    char *mount_options = NULL;
2129
    char *opts = NULL;
2130 2131
    char *devpts = NULL;
    int ret = -1;
2132
    gid_t ptsgid = 5;
2133

2134
    VIR_DEBUG("Setting up private /dev/pts");
2135

2136 2137
    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);
2138

2139 2140 2141
    if (virAsprintf(&devpts, "%s/%s.devpts",
                    LXC_STATE_DIR, ctrl->def->name) < 0 ||
        virAsprintf(&ctrl->devptmx, "%s/%s.devpts/ptmx",
2142
                    LXC_STATE_DIR, ctrl->def->name) < 0)
2143
        goto cleanup;
2144

2145 2146 2147 2148 2149 2150
    if (virFileMakePath(devpts) < 0) {
        virReportSystemError(errno,
                             _("Failed to make path %s"),
                             devpts);
        goto cleanup;
    }
2151

2152 2153 2154 2155 2156
    if (ctrl->def->idmap.ngidmap)
        ptsgid = virLXCControllerLookupUsernsMap(ctrl->def->idmap.gidmap,
                                                 ctrl->def->idmap.ngidmap,
                                                 ptsgid);

2157 2158
    /* XXX should we support gid=X for X!=5 for distros which use
     * a different gid for tty?  */
2159 2160
    if (virAsprintf(&opts, "newinstance,ptmxmode=0666,mode=0620,gid=%u%s",
                    ptsgid, (mount_options ? mount_options : "")) < 0)
2161
        goto cleanup;
2162

2163 2164 2165 2166 2167 2168 2169 2170
    VIR_DEBUG("Mount devpts on %s type=tmpfs flags=%x, opts=%s",
              devpts, MS_NOSUID, opts);
    if (mount("devpts", devpts, "devpts", MS_NOSUID, opts) < 0) {
        virReportSystemError(errno,
                             _("Failed to mount devpts on %s"),
                             devpts);
        goto cleanup;
    }
2171

2172
    if (access(ctrl->devptmx, R_OK) < 0) {
2173 2174 2175
        virReportSystemError(ENOSYS, "%s",
                             _("Kernel does not support private devpts"));
        goto cleanup;
2176 2177
    }

2178 2179
    if ((lxcContainerChown(ctrl->def, ctrl->devptmx) < 0) ||
        (lxcContainerChown(ctrl->def, devpts) < 0))
2180
        goto cleanup;
2181

2182 2183
    ret = 0;

2184
 cleanup:
2185 2186
    VIR_FREE(opts);
    VIR_FREE(devpts);
2187
    VIR_FREE(mount_options);
2188 2189 2190 2191
    return ret;
}


G
Gao feng 已提交
2192 2193 2194 2195 2196 2197
static int
virLXCControllerSetupFuse(virLXCControllerPtr ctrl)
{
    return lxcSetupFuse(&ctrl->fuse, ctrl->def);
}

2198 2199 2200 2201 2202 2203
static int
virLXCControllerStartFuse(virLXCControllerPtr ctrl)
{
    return lxcStartFuse(ctrl->fuse);
}

2204 2205 2206 2207 2208
static int
virLXCControllerSetupConsoles(virLXCControllerPtr ctrl,
                              char **containerTTYPaths)
{
    size_t i;
2209 2210
    int ret = -1;
    char *ttyHostPath = NULL;
2211

2212
    for (i = 0; i < ctrl->nconsoles; i++) {
2213
        VIR_DEBUG("Opening tty on private %s", ctrl->devptmx);
2214
        if (lxcCreateTty(ctrl,
2215
                         &ctrl->consoles[i].contFd,
2216
                         &containerTTYPaths[i], &ttyHostPath) < 0) {
2217
            virReportSystemError(errno, "%s",
2218
                                 _("Failed to allocate tty"));
2219
            goto cleanup;
2220
        }
2221 2222

        /* Change the owner of tty device to the root user of container */
2223
        if (lxcContainerChown(ctrl->def, ttyHostPath) < 0)
2224 2225 2226
            goto cleanup;

        VIR_FREE(ttyHostPath);
2227
    }
2228 2229

    ret = 0;
2230
 cleanup:
2231 2232
    VIR_FREE(ttyHostPath);
    return ret;
2233 2234 2235
}


2236 2237 2238 2239 2240 2241 2242 2243
static void
virLXCControllerEventSend(virLXCControllerPtr ctrl,
                          int procnr,
                          xdrproc_t proc,
                          void *data)
{
    virNetMessagePtr msg;

2244
    if (!ctrl->client) {
2245
        VIR_WARN("Dropping event %d because libvirtd is not connected", procnr);
2246
        return;
2247
    }
2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271

    VIR_DEBUG("Send event %d client=%p", procnr, ctrl->client);
    if (!(msg = virNetMessageNew(false)))
        goto error;

    msg->header.prog = virNetServerProgramGetID(ctrl->prog);
    msg->header.vers = virNetServerProgramGetVersion(ctrl->prog);
    msg->header.proc = procnr;
    msg->header.type = VIR_NET_MESSAGE;
    msg->header.serial = 1;
    msg->header.status = VIR_NET_OK;

    if (virNetMessageEncodeHeader(msg) < 0)
        goto error;

    if (virNetMessageEncodePayload(msg, proc, data) < 0)
        goto error;

    VIR_DEBUG("Queue event %d %zu", procnr, msg->bufferLength);
    virNetServerClientSendMessage(ctrl->client, msg);

    xdr_free(proc, data);
    return;

2272
 error:
2273 2274 2275 2276 2277 2278 2279 2280 2281
    virNetMessageFree(msg);
    xdr_free(proc, data);
}


static int
virLXCControllerEventSendExit(virLXCControllerPtr ctrl,
                              int exitstatus)
{
2282
    virLXCMonitorExitEventMsg msg;
2283

2284
    VIR_DEBUG("Exit status %d (client=%p)", exitstatus, ctrl->client);
2285 2286 2287
    memset(&msg, 0, sizeof(msg));
    switch (exitstatus) {
    case 0:
2288
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_SHUTDOWN;
2289
        break;
2290
    case 1:
2291
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_REBOOT;
2292
        break;
2293
    default:
2294
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_ERROR;
2295 2296 2297 2298
        break;
    }

    virLXCControllerEventSend(ctrl,
2299 2300
                              VIR_LXC_MONITOR_PROC_EXIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorExitEventMsg,
2301 2302 2303 2304 2305 2306
                              (void*)&msg);

    if (ctrl->client) {
        VIR_DEBUG("Waiting for client to complete dispatch");
        ctrl->inShutdown = true;
        virNetServerClientDelayedClose(ctrl->client);
2307
        virNetDaemonRun(ctrl->daemon);
2308 2309 2310 2311 2312 2313
    }
    VIR_DEBUG("Client has gone away");
    return 0;
}


2314 2315 2316 2317
static int
virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                              pid_t initpid)
{
2318
    virLXCMonitorInitEventMsg msg;
2319 2320 2321 2322 2323 2324

    VIR_DEBUG("Init pid %llu", (unsigned long long)initpid);
    memset(&msg, 0, sizeof(msg));
    msg.initpid = initpid;

    virLXCControllerEventSend(ctrl,
2325 2326
                              VIR_LXC_MONITOR_PROC_INIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorInitEventMsg,
2327 2328 2329 2330 2331
                              (void*)&msg);
    return 0;
}


2332
static int
2333
virLXCControllerRun(virLXCControllerPtr ctrl)
2334 2335 2336 2337 2338 2339 2340
{
    int rc = -1;
    int control[2] = { -1, -1};
    int containerhandshake[2] = { -1, -1 };
    char **containerTTYPaths = NULL;
    size_t i;

2341
    if (VIR_ALLOC_N(containerTTYPaths, ctrl->nconsoles) < 0)
2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355
        goto cleanup;

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, control) < 0) {
        virReportSystemError(errno, "%s",
                             _("sockpair failed"));
        goto cleanup;
    }

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, containerhandshake) < 0) {
        virReportSystemError(errno, "%s",
                             _("socketpair failed"));
        goto cleanup;
    }

2356 2357 2358
    if (virLXCControllerSetupPrivateNS() < 0)
        goto cleanup;

2359 2360 2361
    if (virLXCControllerSetupLoopDevices(ctrl) < 0)
        goto cleanup;

2362
    if (virLXCControllerSetupResourceLimits(ctrl) < 0)
2363 2364 2365 2366 2367
        goto cleanup;

    if (virLXCControllerSetupDevPTS(ctrl) < 0)
        goto cleanup;

2368 2369 2370
    if (virLXCControllerPopulateDevices(ctrl) < 0)
        goto cleanup;

2371 2372 2373
    if (virLXCControllerSetupAllDisks(ctrl) < 0)
        goto cleanup;

2374 2375 2376
    if (virLXCControllerSetupAllHostdevs(ctrl) < 0)
        goto cleanup;

G
Gao feng 已提交
2377 2378 2379
    if (virLXCControllerSetupFuse(ctrl) < 0)
        goto cleanup;

2380 2381
    if (virLXCControllerSetupConsoles(ctrl, containerTTYPaths) < 0)
        goto cleanup;
2382

2383
    if (lxcSetPersonality(ctrl->def) < 0)
2384
        goto cleanup;
2385

2386
    if ((ctrl->initpid = lxcContainerStart(ctrl->def,
2387
                                           ctrl->securityManager,
2388 2389
                                           ctrl->nveths,
                                           ctrl->veths,
2390 2391
                                           ctrl->npassFDs,
                                           ctrl->passFDs,
2392 2393
                                           control[1],
                                           containerhandshake[1],
2394 2395
                                           ctrl->nconsoles,
                                           containerTTYPaths)) < 0)
2396
        goto cleanup;
2397
    VIR_FORCE_CLOSE(control[1]);
2398
    VIR_FORCE_CLOSE(containerhandshake[1]);
2399

2400 2401 2402
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);

2403 2404 2405
    if (virLXCControllerSetupCgroupLimits(ctrl) < 0)
        goto cleanup;

2406 2407 2408
    if (virLXCControllerSetupUserns(ctrl) < 0)
        goto cleanup;

2409
    if (virLXCControllerMoveInterfaces(ctrl) < 0)
2410 2411
        goto cleanup;

2412 2413 2414
    if (virLXCControllerStartFuse(ctrl) < 0)
        goto cleanup;

2415 2416 2417
    if (lxcContainerSendContinue(control[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to send container continue message"));
2418
        goto cleanup;
2419
    }
2420

2421 2422 2423 2424 2425 2426
    if (lxcContainerWaitForContinue(containerhandshake[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("error receiving signal from container"));
        goto cleanup;
    }

2427
    /* ...and reduce our privileges */
D
Daniel P. Berrange 已提交
2428 2429 2430
    if (lxcControllerClearCapabilities() < 0)
        goto cleanup;

2431
    if (virLXCControllerDaemonHandshake(ctrl) < 0)
2432 2433
        goto cleanup;

2434
    for (i = 0; i < ctrl->nconsoles; i++)
2435
        if (virLXCControllerConsoleSetNonblocking(&(ctrl->consoles[i])) < 0)
2436
            goto cleanup;
2437

2438 2439 2440 2441 2442 2443
    /* We must not hold open a dbus connection for life
     * of LXC instance, since dbus-daemon is limited to
     * only a few 100 connections by default
     */
    virDBusCloseSystemBus();

2444
    rc = virLXCControllerMain(ctrl);
2445

2446 2447
    virLXCControllerEventSendExit(ctrl, rc);

2448
 cleanup:
2449 2450
    VIR_FORCE_CLOSE(control[0]);
    VIR_FORCE_CLOSE(control[1]);
2451 2452
    VIR_FORCE_CLOSE(containerhandshake[0]);
    VIR_FORCE_CLOSE(containerhandshake[1]);
2453

2454
    for (i = 0; i < ctrl->nconsoles; i++)
2455 2456
        VIR_FREE(containerTTYPaths[i]);
    VIR_FREE(containerTTYPaths);
2457

2458
    virLXCControllerStopInit(ctrl);
2459

2460 2461 2462 2463
    return rc;
}


2464
int main(int argc, char *argv[])
2465 2466
{
    pid_t pid;
2467
    int rc = -1;
2468
    const char *name = NULL;
2469
    size_t nveths = 0;
2470
    char **veths = NULL;
2471
    int handshakeFd = -1;
2472
    bool bg = false;
2473
    const struct option options[] = {
2474 2475 2476 2477
        { "background", 0, NULL, 'b' },
        { "name",   1, NULL, 'n' },
        { "veth",   1, NULL, 'v' },
        { "console", 1, NULL, 'c' },
2478
        { "passfd", 1, NULL, 'p' },
2479
        { "handshakefd", 1, NULL, 's' },
2480
        { "security", 1, NULL, 'S' },
2481 2482 2483
        { "help", 0, NULL, 'h' },
        { 0, 0, 0, 0 },
    };
2484 2485
    int *ttyFDs = NULL;
    size_t nttyFDs = 0;
2486 2487
    int *passFDs = NULL;
    size_t npassFDs = 0;
2488
    virLXCControllerPtr ctrl = NULL;
2489
    size_t i;
2490
    const char *securityDriver = "none";
2491

E
Eric Blake 已提交
2492 2493
    if (setlocale(LC_ALL, "") == NULL ||
        bindtextdomain(PACKAGE, LOCALEDIR) == NULL ||
2494 2495 2496
        textdomain(PACKAGE) == NULL ||
        virThreadInitialize() < 0 ||
        virErrorInitialize() < 0) {
E
Eric Blake 已提交
2497 2498 2499 2500
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
        exit(EXIT_FAILURE);
    }

2501 2502 2503
    /* Initialize logging */
    virLogSetFromEnv();

2504 2505
    while (1) {
        int c;
2506

2507
        c = getopt_long(argc, argv, "dn:v:p:m:c:s:h:S:",
2508
                        options, NULL);
2509 2510 2511 2512 2513 2514

        if (c == -1)
            break;

        switch (c) {
        case 'b':
2515
            bg = true;
2516 2517 2518
            break;

        case 'n':
2519
            name = optarg;
2520 2521 2522
            break;

        case 'v':
2523
            if (VIR_REALLOC_N(veths, nveths+1) < 0)
2524
                goto cleanup;
2525
            if (VIR_STRDUP(veths[nveths++], optarg) < 0)
2526 2527 2528 2529
                goto cleanup;
            break;

        case 'c':
2530
            if (VIR_REALLOC_N(ttyFDs, nttyFDs + 1) < 0)
2531 2532
                goto cleanup;
            if (virStrToLong_i(optarg, NULL, 10, &ttyFDs[nttyFDs++]) < 0) {
2533 2534 2535 2536 2537
                fprintf(stderr, "malformed --console argument '%s'", optarg);
                goto cleanup;
            }
            break;

2538 2539 2540 2541 2542 2543 2544 2545 2546
        case 'p':
            if (VIR_REALLOC_N(passFDs, npassFDs + 1) < 0)
                goto cleanup;
            if (virStrToLong_i(optarg, NULL, 10, &passFDs[npassFDs++]) < 0) {
                fprintf(stderr, "malformed --passfd argument '%s'", optarg);
                goto cleanup;
            }
            break;

2547
        case 's':
2548
            if (virStrToLong_i(optarg, NULL, 10, &handshakeFd) < 0) {
2549 2550 2551 2552 2553 2554
                fprintf(stderr, "malformed --handshakefd argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

2555
        case 'S':
2556
            securityDriver = optarg;
2557 2558
            break;

2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569
        case 'h':
        case '?':
            fprintf(stderr, "\n");
            fprintf(stderr, "syntax: %s [OPTIONS]\n", argv[0]);
            fprintf(stderr, "\n");
            fprintf(stderr, "Options\n");
            fprintf(stderr, "\n");
            fprintf(stderr, "  -b, --background\n");
            fprintf(stderr, "  -n NAME, --name NAME\n");
            fprintf(stderr, "  -c FD, --console FD\n");
            fprintf(stderr, "  -v VETH, --veth VETH\n");
2570
            fprintf(stderr, "  -s FD, --handshakefd FD\n");
2571
            fprintf(stderr, "  -S NAME, --security NAME\n");
2572 2573 2574
            fprintf(stderr, "  -h, --help\n");
            fprintf(stderr, "\n");
            goto cleanup;
2575 2576 2577
        }
    }

2578 2579 2580 2581 2582
    if (name == NULL) {
        fprintf(stderr, "%s: missing --name argument for configuration\n", argv[0]);
        goto cleanup;
    }

2583
    if (handshakeFd < 0) {
2584
        fprintf(stderr, "%s: missing --handshakefd argument for container PTY\n",
2585 2586 2587 2588
                argv[0]);
        goto cleanup;
    }

2589
    if (geteuid() != 0) {
2590 2591 2592
        fprintf(stderr, "%s: must be run as the 'root' user\n", argv[0]);
        goto cleanup;
    }
2593

2594
    virEventRegisterDefaultImpl();
2595 2596

    virDBusSetSharedBus(false);
2597

2598
    if (!(ctrl = virLXCControllerNew(name)))
2599
        goto cleanup;
2600

2601 2602
    ctrl->handshakeFd = handshakeFd;

2603 2604 2605 2606 2607
    if (!(ctrl->securityManager = virSecurityManagerNew(securityDriver,
                                                        LXC_DRIVER_NAME,
                                                        false, false, false)))
        goto cleanup;

2608 2609 2610 2611 2612 2613 2614 2615 2616
    if (ctrl->def->seclabels) {
        VIR_DEBUG("Security model %s type %s label %s imagelabel %s",
                  NULLSTR(ctrl->def->seclabels[0]->model),
                  virDomainSeclabelTypeToString(ctrl->def->seclabels[0]->type),
                  NULLSTR(ctrl->def->seclabels[0]->label),
                  NULLSTR(ctrl->def->seclabels[0]->imagelabel));
    } else {
        VIR_DEBUG("Security model not initialized");
    }
2617

2618 2619 2620
    ctrl->veths = veths;
    ctrl->nveths = nveths;

2621 2622 2623
    ctrl->passFDs = passFDs;
    ctrl->npassFDs = npassFDs;

2624
    for (i = 0; i < nttyFDs; i++) {
2625 2626 2627 2628 2629
        if (virLXCControllerAddConsole(ctrl, ttyFDs[i]) < 0)
            goto cleanup;
        ttyFDs[i] = -1;
    }

2630
    if (virLXCControllerValidateNICs(ctrl) < 0)
2631
        goto cleanup;
2632

2633 2634 2635
    if (virLXCControllerGetNICIndexes(ctrl) < 0)
        goto cleanup;

2636 2637 2638
    if (virLXCControllerValidateConsoles(ctrl) < 0)
        goto cleanup;

2639
    if (virLXCControllerSetupServer(ctrl) < 0)
2640
        goto cleanup;
2641

2642 2643 2644
    if (bg) {
        if ((pid = fork()) < 0)
            goto cleanup;
2645

2646
        if (pid > 0) {
2647
            if ((rc = virPidFileWrite(LXC_STATE_DIR, name, pid)) < 0) {
2648
                virReportSystemError(-rc,
2649 2650
                                     _("Unable to write pid file '%s/%s.pid'"),
                                     LXC_STATE_DIR, name);
2651 2652
                _exit(1);
            }
2653

2654 2655 2656 2657
            /* First child now exits, allowing original caller
             * (ie libvirtd's LXC driver to complete their
             * waitpid & continue */
            _exit(0);
2658 2659
        }

E
Eric Blake 已提交
2660
        /* Don't hold on to any cwd we inherit from libvirtd either */
2661
        if (chdir("/") < 0) {
2662
            virReportSystemError(errno, "%s",
2663
                                 _("Unable to change to root dir"));
2664 2665 2666 2667
            goto cleanup;
        }

        if (setsid() < 0) {
2668
            virReportSystemError(errno, "%s",
2669
                                 _("Unable to become session leader"));
2670 2671 2672
            goto cleanup;
        }
    }
2673

2674
    rc = virLXCControllerRun(ctrl);
2675

2676
 cleanup:
2677 2678 2679 2680 2681 2682 2683 2684 2685
    if (rc < 0) {
        virErrorPtr err = virGetLastError();
        if (err && err->message)
            fprintf(stderr, "%s\n", err->message);
        else
            fprintf(stderr, "%s\n",
                    _("Unknown failure in libvirt_lxc startup"));
    }

2686
    virPidFileDelete(LXC_STATE_DIR, name);
2687 2688
    if (ctrl)
        virLXCControllerDeleteInterfaces(ctrl);
2689
    for (i = 0; i < nttyFDs; i++)
2690 2691
        VIR_FORCE_CLOSE(ttyFDs[i]);
    VIR_FREE(ttyFDs);
2692 2693 2694
    for (i = 0; i < npassFDs; i++)
        VIR_FORCE_CLOSE(passFDs[i]);
    VIR_FREE(passFDs);
2695

2696
    virLXCControllerFree(ctrl);
2697

2698
    return rc < 0? EXIT_FAILURE : EXIT_SUCCESS;
2699
}