lxc_controller.c 79.5 KB
Newer Older
1
/*
2
 * Copyright (C) 2010-2016 Red Hat, Inc.
3
 * Copyright IBM Corp. 2008
4 5 6 7 8 9 10 11 12 13 14 15 16 17
 *
 * lxc_controller.c: linux container process controller
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24
 */

#include <config.h>

#include <sys/epoll.h>
25
#include <sys/wait.h>
26

27
#ifdef __linux__
28 29 30
# include <sys/sysmacros.h>
#endif

31
#include <sys/personality.h>
32
#include <unistd.h>
33 34
#include <fcntl.h>
#include <signal.h>
35
#include <getopt.h>
36
#include <sys/mount.h>
37 38
#include <grp.h>
#include <sys/stat.h>
39
#include <time.h>
40

41
#if WITH_CAPNG
42
# include <cap-ng.h>
D
Daniel P. Berrange 已提交
43 44
#endif

45
#include "virerror.h"
46
#include "virlog.h"
47 48

#include "lxc_conf.h"
49
#include "lxc_container.h"
50
#include "lxc_cgroup.h"
51
#include "lxc_monitor_protocol.h"
G
Gao feng 已提交
52
#include "lxc_fuse.h"
53 54
#include "virnetdev.h"
#include "virnetdevveth.h"
55
#include "viralloc.h"
E
Eric Blake 已提交
56
#include "virfile.h"
57
#include "virpidfile.h"
58
#include "vircommand.h"
59
#include "virhostcpu.h"
60
#include "virrandom.h"
61
#include "virprocess.h"
62
#include "virnuma.h"
63
#include "virdbus.h"
64
#include "rpc/virnetdaemon.h"
65
#include "virstring.h"
66
#include "virgettext.h"
67
#include "virsocket.h"
J
Ján Tomko 已提交
68
#include "virutil.h"
69

70 71
#define VIR_FROM_THIS VIR_FROM_LXC

72 73
VIR_LOG_INIT("lxc.lxc_controller");

74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
typedef struct _virLXCControllerConsole virLXCControllerConsole;
typedef virLXCControllerConsole *virLXCControllerConsolePtr;
struct _virLXCControllerConsole {
    int hostWatch;
    int hostFd;  /* PTY FD in the host OS */
    bool hostClosed;
    int hostEpoll;

    int contWatch;
    int contFd;  /* PTY FD in the container */
    bool contClosed;
    int contEpoll;

    int epollWatch;
    int epollFd; /* epoll FD for dealing with EOF */

    size_t fromHostLen;
    char fromHostBuf[1024];
    size_t fromContLen;
    char fromContBuf[1024];
94

95
    virNetDaemonPtr daemon;
96 97
};

98 99 100 101
typedef struct _virLXCController virLXCController;
typedef virLXCController *virLXCControllerPtr;
struct _virLXCController {
    char *name;
102
    virDomainObjPtr vm;
103
    virDomainDefPtr def;
104

105 106
    int handshakeFd;

107 108
    pid_t initpid;

109 110 111
    size_t nnbdpids;
    pid_t *nbdpids;

112 113
    size_t nveths;
    char **veths;
114

115 116 117
    size_t nnicindexes;
    int *nicindexes;

118 119 120
    size_t npassFDs;
    int *passFDs;

I
ik.nitk 已提交
121 122
    int *nsFDs;

123 124
    size_t nconsoles;
    virLXCControllerConsolePtr consoles;
125
    char *devptmx;
126 127 128

    size_t nloopDevs;
    int *loopDevFds;
129 130

    virSecurityManagerPtr securityManager;
131

132
    virNetDaemonPtr daemon;
133
    bool firstClient;
134 135 136 137
    virNetServerClientPtr client;
    virNetServerProgramPtr prog;
    bool inShutdown;
    int timerShutdown;
G
Gao feng 已提交
138

139 140
    virCgroupPtr cgroup;

G
Gao feng 已提交
141
    virLXCFusePtr fuse;
142 143
};

144 145
#include "lxc_controller_dispatch.h"

146
static void virLXCControllerFree(virLXCControllerPtr ctrl);
147 148
static int virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                                         pid_t initpid);
149

J
Ján Tomko 已提交
150
static void virLXCControllerQuitTimer(int timer G_GNUC_UNUSED, void *opaque)
151 152 153 154
{
    virLXCControllerPtr ctrl = opaque;

    VIR_DEBUG("Triggering event loop quit");
155
    virNetDaemonQuit(ctrl->daemon);
156 157 158
}


159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189
static virLXCDriverPtr
virLXCControllerDriverNew(void)
{
    virLXCDriverPtr driver = g_new0(virLXCDriver, 1);

    if (virMutexInit(&driver->lock) < 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("cannot initialize mutex"));
        g_free(driver);
        return NULL;
    }

    driver->caps = virLXCDriverCapsInit(NULL);
    driver->xmlopt = lxcDomainXMLConfInit(driver);

    return driver;
}


static void
virLXCControllerDriverFree(virLXCDriverPtr driver)
{
    if (!driver)
        return;
    virObjectUnref(driver->xmlopt);
    virObjectUnref(driver->caps);
    virMutexDestroy(&driver->lock);
    g_free(driver);
}


190 191
static virLXCControllerPtr virLXCControllerNew(const char *name)
{
192
    virLXCControllerPtr ctrl = g_new0(virLXCController, 1);
193
    virLXCDriverPtr driver = NULL;
194
    g_autofree char *configFile = NULL;
195

196
    ctrl->timerShutdown = -1;
197
    ctrl->firstClient = true;
198

199
    ctrl->name = g_strdup(name);
200

201
    if (!(driver = virLXCControllerDriverNew()))
202 203
        goto error;

204 205 206 207
    if ((configFile = virDomainConfigFile(LXC_STATE_DIR,
                                          ctrl->name)) == NULL)
        goto error;

208
    if ((ctrl->vm = virDomainObjParseFile(configFile,
209
                                          driver->xmlopt,
210
                                          0)) == NULL)
211
        goto error;
212
    ctrl->def = ctrl->vm->def;
213

214 215 216 217 218
    if ((ctrl->timerShutdown = virEventAddTimeout(-1,
                                                  virLXCControllerQuitTimer, ctrl,
                                                  NULL)) < 0)
        goto error;

219
 cleanup:
220
    virLXCControllerDriverFree(driver);
221 222
    return ctrl;

223
 error:
224 225 226 227 228
    virLXCControllerFree(ctrl);
    ctrl = NULL;
    goto cleanup;
}

229

230
static int virLXCControllerCloseLoopDevices(virLXCControllerPtr ctrl)
231 232 233
{
    size_t i;

234
    for (i = 0; i < ctrl->nloopDevs; i++)
235
        VIR_FORCE_CLOSE(ctrl->loopDevFds[i]);
236 237 238 239 240

    return 0;
}


241 242 243 244 245
static void virLXCControllerStopInit(virLXCControllerPtr ctrl)
{
    if (ctrl->initpid == 0)
        return;

246
    virLXCControllerCloseLoopDevices(ctrl);
247
    virProcessAbort(ctrl->initpid);
248 249 250 251
    ctrl->initpid = 0;
}


252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267
static void virLXCControllerConsoleClose(virLXCControllerConsolePtr console)
{
    if (console->hostWatch != -1)
        virEventRemoveHandle(console->hostWatch);
    VIR_FORCE_CLOSE(console->hostFd);

    if (console->contWatch != -1)
        virEventRemoveHandle(console->contWatch);
    VIR_FORCE_CLOSE(console->contFd);

    if (console->epollWatch != -1)
        virEventRemoveHandle(console->epollWatch);
    VIR_FORCE_CLOSE(console->epollFd);
}


G
Gao feng 已提交
268 269 270 271 272 273 274
static void
virLXCControllerFreeFuse(virLXCControllerPtr ctrl)
{
    return lxcFreeFuse(&ctrl->fuse);
}


275 276
static void virLXCControllerFree(virLXCControllerPtr ctrl)
{
277 278
    size_t i;

279 280 281
    if (!ctrl)
        return;

282 283
    virLXCControllerStopInit(ctrl);

284
    virObjectUnref(ctrl->securityManager);
285

286
    for (i = 0; i < ctrl->nveths; i++)
287 288 289
        g_free(ctrl->veths[i]);
    g_free(ctrl->veths);
    g_free(ctrl->nicindexes);
290

291 292
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);
293
    g_free(ctrl->passFDs);
294

295
    for (i = 0; i < ctrl->nconsoles; i++)
296
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
297
    g_free(ctrl->consoles);
298

299
    g_free(ctrl->devptmx);
300

301
    virDomainObjEndAPI(&ctrl->vm);
302
    g_free(ctrl->name);
303

304 305 306
    if (ctrl->timerShutdown != -1)
        virEventRemoveTimeout(ctrl->timerShutdown);

307
    virObjectUnref(ctrl->daemon);
G
Gao feng 已提交
308
    virLXCControllerFreeFuse(ctrl);
309

310
    g_free(ctrl->nbdpids);
311

312
    g_free(ctrl->nsFDs);
313
    virCgroupFree(&ctrl->cgroup);
314

315 316
    /* This must always be the last thing to be closed */
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
317
    g_free(ctrl);
318 319
}

320

321 322 323
static int virLXCControllerAddConsole(virLXCControllerPtr ctrl,
                                      int hostFd)
{
324
    if (VIR_EXPAND_N(ctrl->consoles, ctrl->nconsoles, 1) < 0)
325
        return -1;
326
    ctrl->consoles[ctrl->nconsoles-1].daemon = ctrl->daemon;
327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351
    ctrl->consoles[ctrl->nconsoles-1].hostFd = hostFd;
    ctrl->consoles[ctrl->nconsoles-1].hostWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].contFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].contWatch = -1;

    ctrl->consoles[ctrl->nconsoles-1].epollFd = -1;
    ctrl->consoles[ctrl->nconsoles-1].epollWatch = -1;
    return 0;
}


static int virLXCControllerConsoleSetNonblocking(virLXCControllerConsolePtr console)
{
    if (virSetBlocking(console->hostFd, false) < 0 ||
        virSetBlocking(console->contFd, false) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to set console file descriptor non-blocking"));
        return -1;
    }

    return 0;
}


352 353 354 355 356 357 358 359 360 361 362 363
static int virLXCControllerDaemonHandshake(virLXCControllerPtr ctrl)
{
    if (lxcContainerSendContinue(ctrl->handshakeFd) < 0) {
        virReportSystemError(errno, "%s",
                             _("error sending continue signal to daemon"));
        return -1;
    }
    VIR_FORCE_CLOSE(ctrl->handshakeFd);
    return 0;
}


364 365 366
static int virLXCControllerValidateNICs(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nnets != ctrl->nveths) {
367
        virReportError(VIR_ERR_INTERNAL_ERROR,
368
                       _("expecting %zu veths, but got %zu"),
369
                       ctrl->def->nnets, ctrl->nveths);
370 371 372 373 374 375 376
        return -1;
    }

    return 0;
}


377 378 379 380
static int virLXCControllerGetNICIndexes(virLXCControllerPtr ctrl)
{
    size_t i;

381 382 383 384 385 386 387 388 389 390
    /* Gather the ifindexes of the "parent" veths for all interfaces
     * implemented with a veth pair. These will be used when calling
     * virCgroupNewMachine (and eventually the dbus method
     * CreateMachineWithNetwork). ifindexes for the child veths, and
     * for macvlan interfaces, *should not* be in this list, as they
     * will be moved into the container. Only the interfaces that will
     * remain outside the container, but are used for communication
     * with the container, should be added to the list.
     */

391 392 393
    VIR_DEBUG("Getting nic indexes");
    for (i = 0; i < ctrl->def->nnets; i++) {
        int nicindex = -1;
394 395 396
        virDomainNetType actualType = virDomainNetGetActualType(ctrl->def->nets[i]);

        switch (actualType) {
397 398
        case VIR_DOMAIN_NET_TYPE_BRIDGE:
        case VIR_DOMAIN_NET_TYPE_NETWORK:
399
        case VIR_DOMAIN_NET_TYPE_ETHERNET:
400 401 402 403
            if (ctrl->def->nets[i]->ifname == NULL)
                continue;
            if (virNetDevGetIndex(ctrl->def->nets[i]->ifname,
                                  &nicindex) < 0)
404
                return -1;
405 406 407
            if (VIR_EXPAND_N(ctrl->nicindexes,
                             ctrl->nnicindexes,
                             1) < 0)
408
                return -1;
409 410 411 412 413
            VIR_DEBUG("Index %d for %s", nicindex,
                      ctrl->def->nets[i]->ifname);
            ctrl->nicindexes[ctrl->nnicindexes-1] = nicindex;
            break;

414 415 416
        case VIR_DOMAIN_NET_TYPE_DIRECT:
           break;

417 418 419 420 421
        case VIR_DOMAIN_NET_TYPE_USER:
        case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
        case VIR_DOMAIN_NET_TYPE_SERVER:
        case VIR_DOMAIN_NET_TYPE_CLIENT:
        case VIR_DOMAIN_NET_TYPE_MCAST:
422
        case VIR_DOMAIN_NET_TYPE_UDP:
423 424
        case VIR_DOMAIN_NET_TYPE_INTERNAL:
        case VIR_DOMAIN_NET_TYPE_HOSTDEV:
425 426
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported net type %s"),
427
                           virDomainNetTypeToString(actualType));
428
            return -1;
429
        case VIR_DOMAIN_NET_TYPE_LAST:
430
        default:
431
            virReportEnumRangeError(virDomainNetType, actualType);
432
            return -1;
433 434 435
        }
    }

436
    return 0;
437 438 439
}


440 441 442
static int virLXCControllerValidateConsoles(virLXCControllerPtr ctrl)
{
    if (ctrl->def->nconsoles != ctrl->nconsoles) {
443
        virReportError(VIR_ERR_INTERNAL_ERROR,
444
                       _("expecting %zu consoles, but got %zu tty file handlers"),
445
                       ctrl->def->nconsoles, ctrl->nconsoles);
446 447 448 449 450 451 452
        return -1;
    }

    return 0;
}


453
static int virLXCControllerSetupLoopDeviceFS(virDomainFSDefPtr fs)
454
{
455
    int lofd;
456 457
    char *loname = NULL;

458
    if ((lofd = virFileLoopDeviceAssociate(fs->src->path, &loname)) < 0)
459 460
        return -1;

461
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
462
              fs->src->path, loname);
463 464 465 466 467
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
468
    g_free(fs->src->path);
469
    fs->src->path = loname;
470 471 472 473 474 475
    loname = NULL;

    return lofd;
}


476 477 478
static int virLXCControllerSetupLoopDeviceDisk(virDomainDiskDefPtr disk)
{
    int lofd;
479
    g_autofree char *loname = NULL;
480
    const char *src = virDomainDiskGetSource(disk);
J
John Ferlan 已提交
481
    int ret = -1;
482

483
    if ((lofd = virFileLoopDeviceAssociate(src, &loname)) < 0)
484 485
        return -1;

486
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
487
              src, loname);
488

489 490 491 492
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
493
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
J
John Ferlan 已提交
494 495 496 497 498 499 500
    if (virDomainDiskSetSource(disk, loname) < 0)
        goto cleanup;

    ret = 0;

 cleanup:
    if (ret < 0)
501
        VIR_FORCE_CLOSE(lofd);
502 503

    return lofd;
J
John Ferlan 已提交
504

505 506 507
}


508 509 510 511 512 513 514 515 516 517
static int virLXCControllerSetupNBDDeviceFS(virDomainFSDefPtr fs)
{
    char *dev;

    if (fs->format <= VIR_STORAGE_FILE_NONE) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

518
    if (virFileNBDDeviceAssociate(fs->src->path,
519 520 521 522 523
                                  fs->format,
                                  fs->readonly,
                                  &dev) < 0)
        return -1;

524
    VIR_DEBUG("Changing fs %s to use type=block for dev %s",
525
              fs->src->path, dev);
526 527 528 529
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
530
    fs->type = VIR_DOMAIN_FS_TYPE_BLOCK;
531
    g_free(fs->src->path);
532
    fs->src->path = dev;
533 534 535 536 537 538 539

    return 0;
}


static int virLXCControllerSetupNBDDeviceDisk(virDomainDiskDefPtr disk)
{
540
    g_autofree char *dev = NULL;
541 542
    const char *src = virDomainDiskGetSource(disk);
    int format = virDomainDiskGetFormat(disk);
543

544
    if (format <= VIR_STORAGE_FILE_NONE) {
545 546 547 548 549
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("An explicit disk format must be specified"));
        return -1;
    }

550 551
    if (virFileNBDDeviceAssociate(src,
                                  format,
552
                                  disk->src->readonly,
553 554 555
                                  &dev) < 0)
        return -1;

556
    VIR_DEBUG("Changing disk %s to use type=block for dev %s",
557
              src, dev);
558 559 560 561
    /*
     * We now change it into a block device type, so that
     * the rest of container setup 'just works'
     */
E
Eric Blake 已提交
562
    virDomainDiskSetType(disk, VIR_STORAGE_TYPE_BLOCK);
563
    if (virDomainDiskSetSource(disk, dev) < 0)
564
        return -1;
565 566 567 568

    return 0;
}

569 570 571
static int virLXCControllerAppendNBDPids(virLXCControllerPtr ctrl,
                                         const char *dev)
{
572 573
    g_autofree char *pidpath = NULL;
    g_autofree pid_t *pids = NULL;
C
Cédric Bosdonnat 已提交
574
    size_t npids = 0;
575
    size_t i;
576
    size_t loops = 0;
577 578
    pid_t pid;

579
    if (!STRPREFIX(dev, "/dev/"))
580
        return -1;
581

582 583
    pidpath = g_strdup_printf("/sys/devices/virtual/block/%s/pid", dev + 5);

584 585 586 587
    /* Wait for the pid file to appear */
    while (!virFileExists(pidpath)) {
        /* wait for 100ms before checking again, but don't do it for ever */
        if (errno == ENOENT && loops < 10) {
588
            g_usleep(100 * 1000);
589 590 591 592 593
            loops++;
        } else {
            virReportSystemError(errno,
                                 _("Cannot check NBD device %s pid"),
                                 dev + 5);
594
            return -1;
595 596 597
        }
    }

598
    if (virPidFileReadPath(pidpath, &pid) < 0)
599
        return -1;
600 601

    if (virProcessGetPids(pid, &npids, &pids) < 0)
602
        return -1;
603 604 605

    for (i = 0; i < npids; i++) {
        if (VIR_APPEND_ELEMENT(ctrl->nbdpids, ctrl->nnbdpids, pids[i]) < 0)
606
            return -1;
607 608
    }

609
    return 0;
610
}
611

612
static int virLXCControllerSetupLoopDevices(virLXCControllerPtr ctrl)
613 614 615
{
    size_t i;

616 617
    VIR_DEBUG("Setting up loop devices for filesystems");

618
    for (i = 0; i < ctrl->def->nfss; i++) {
619
        virDomainFSDefPtr fs = ctrl->def->fss[i];
620 621
        int fd;

622
        if (fs->type != VIR_DOMAIN_FS_TYPE_FILE)
623 624
            continue;

625 626 627 628 629 630 631 632
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_DEFAULT) {
            if (fs->format == VIR_STORAGE_FILE_RAW ||
                fs->format == VIR_STORAGE_FILE_NONE)
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_LOOP;
            else
                fs->fsdriver = VIR_DOMAIN_FS_DRIVER_TYPE_NBD;
        }

633 634 635 636 637 638
        if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_LOOP) {
            if (fs->format != VIR_STORAGE_FILE_RAW &&
                fs->format != VIR_STORAGE_FILE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("fs format %s is not supported"),
                               virStorageFileFormatTypeToString(fs->format));
639
                return -1;
640 641 642 643
            }

            fd = virLXCControllerSetupLoopDeviceFS(fs);
            if (fd < 0)
644
                return -1;
645 646 647 648

            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
649
                return -1;
650 651
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
652 653
        } else if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_NBD) {
            if (virLXCControllerSetupNBDDeviceFS(fs) < 0)
654
                return -1;
655 656 657

            /* The NBD device will be cleaned up while the cgroup will end.
             * For this we need to remember the qemu-nbd pid and add it to
J
Ján Tomko 已提交
658
             * the cgroup */
659
            if (virLXCControllerAppendNBDPids(ctrl, fs->src->path) < 0)
660
                return -1;
661 662 663
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("fs driver %s is not supported"),
664
                           virDomainFSDriverTypeToString(fs->fsdriver));
665
            return -1;
666 667 668
        }
    }

669 670
    VIR_DEBUG("Setting up loop devices for disks");

671
    for (i = 0; i < ctrl->def->ndisks; i++) {
672 673
        virDomainDiskDefPtr disk = ctrl->def->disks[i];
        int fd;
674 675
        const char *driver = virDomainDiskGetDriver(disk);
        int format = virDomainDiskGetFormat(disk);
676

E
Eric Blake 已提交
677
        if (virDomainDiskGetType(disk) != VIR_STORAGE_TYPE_FILE)
678 679
            continue;

680 681 682 683
        /* If no driverName is set, we prefer 'loop' for
         * dealing with raw or undefined formats, otherwise
         * we use 'nbd'.
         */
684 685 686 687 688 689
        if (STREQ_NULLABLE(driver, "loop") ||
            (!driver &&
             (format == VIR_STORAGE_FILE_RAW ||
              format == VIR_STORAGE_FILE_NONE))) {
            if (format != VIR_STORAGE_FILE_RAW &&
                format != VIR_STORAGE_FILE_NONE) {
690
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
691
                               _("disk format %s is not supported"),
692
                               virStorageFileFormatTypeToString(format));
693
                return -1;
694 695
            }

696 697 698 699
            /* We treat 'none' as meaning 'raw' since we
             * don't want to go into the auto-probing
             * business for security reasons
             */
700 701
            fd = virLXCControllerSetupLoopDeviceDisk(disk);
            if (fd < 0)
702
                return -1;
703

704 705 706
            VIR_DEBUG("Saving loop fd %d", fd);
            if (VIR_EXPAND_N(ctrl->loopDevFds, ctrl->nloopDevs, 1) < 0) {
                VIR_FORCE_CLOSE(fd);
707
                return -1;
708 709
            }
            ctrl->loopDevFds[ctrl->nloopDevs - 1] = fd;
710
        } else if (!driver || STREQ(driver, "nbd")) {
711 712 713 714 715
            if (disk->cachemode != VIR_DOMAIN_DISK_CACHE_DEFAULT &&
                disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Disk cache mode %s is not supported"),
                               virDomainDiskCacheTypeToString(disk->cachemode));
716
                return -1;
717 718
            }
            if (virLXCControllerSetupNBDDeviceDisk(disk) < 0)
719
                return -1;
720 721 722

            /* The NBD device will be cleaned up while the cgroup will end.
             * For this we need to remember the qemu-nbd pid and add it to
J
Ján Tomko 已提交
723
             * the cgroup */
724
            if (virLXCControllerAppendNBDPids(ctrl, virDomainDiskGetSource(disk)) < 0)
725
                return -1;
726
        } else {
727
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
728
                           _("disk driver %s is not supported"),
729
                           driver);
730
            return -1;
731 732 733
        }
    }

734 735
    VIR_DEBUG("Setup all loop devices");

736
    return 0;
737 738
}

739 740 741 742

/*
 * To be run while still single threaded
 */
743
static int virLXCControllerSetupCpuAffinity(virLXCControllerPtr ctrl)
744
{
H
Hu Tao 已提交
745 746
    int hostcpus, maxcpu = CPU_SETSIZE;
    virBitmapPtr cpumap, cpumapToSet;
747 748 749 750 751

    VIR_DEBUG("Setting CPU affinity");

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
752
    if ((hostcpus = virHostCPUGetCount()) < 0)
753 754
        return -1;

755 756 757
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;

758 759
    cpumap = virBitmapNew(maxcpu);
    if (!cpumap)
760 761
        return -1;

H
Hu Tao 已提交
762 763
    cpumapToSet = cpumap;

764
    if (ctrl->def->cpumask) {
H
Hu Tao 已提交
765
        cpumapToSet = ctrl->def->cpumask;
766 767 768 769 770
    } else {
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned LXC instance to all pCPUs if no map is given in
         * its config file */
771
        virBitmapSetAll(cpumap);
772 773
    }

774
    /* We are presuming we are running between fork/exec of LXC
775 776 777
     * so use '0' to indicate our own process ID. No threads are
     * running at this point
     */
778
    if (virProcessSetAffinity(0 /* Self */, cpumapToSet) < 0) {
779
        virBitmapFree(cpumap);
780 781
        return -1;
    }
782
    virBitmapFree(cpumap);
783 784 785 786 787

    return 0;
}


788 789 790 791
static int virLXCControllerGetNumadAdvice(virLXCControllerPtr ctrl,
                                          virBitmapPtr *mask)
{
    virBitmapPtr nodemask = NULL;
792
    g_autofree char *nodeset = NULL;
793 794 795 796

    /* Get the advisory nodeset from numad if 'placement' of
     * either <vcpu> or <numatune> is 'auto'.
     */
797
    if (virDomainDefNeedsPlacementAdvice(ctrl->def)) {
798
        nodeset = virNumaGetAutoPlacementAdvice(virDomainDefGetVcpus(ctrl->def),
799 800
                                                ctrl->def->mem.cur_balloon);
        if (!nodeset)
801
            return -1;
802 803 804

        VIR_DEBUG("Nodeset returned from numad: %s", nodeset);

805
        if (virBitmapParse(nodeset, &nodemask, VIR_DOMAIN_CPUMASK_LEN) < 0)
806
            return -1;
807 808 809 810
    }

    *mask = nodemask;

811
    return 0;
812 813 814
}


815
/**
816 817
 * virLXCControllerSetupResourceLimits
 * @ctrl: the controller state
818
 *
819 820 821
 * Sets up the non-cgroup based resource limits that need
 * to be inherited by the child process across clone()/exec().
 * The cgroup limits are setup later
822 823 824
 *
 * Returns 0 on success or -1 in case of error
 */
825
static int virLXCControllerSetupResourceLimits(virLXCControllerPtr ctrl)
826
{
827
    virBitmapPtr auto_nodeset = NULL;
828
    int ret = -1;
829 830 831
    virBitmapPtr nodeset = NULL;
    virDomainNumatuneMemMode mode;

832 833 834 835 836 837 838 839
    if (virDomainNumatuneGetMode(ctrl->def->numa, -1, &mode) == 0) {
        if (mode == VIR_DOMAIN_NUMATUNE_MEM_STRICT &&
            virCgroupControllerAvailable(VIR_CGROUP_CONTROLLER_CPUSET)) {
            /* Use virNuma* API iff necessary. Once set and child is exec()-ed,
             * there's no way for us to change it. Rely on cgroups (if available
             * and enabled in the config) rather than virNuma*. */
            VIR_DEBUG("Relying on CGroups for memory binding");
        } else {
840

841
            VIR_DEBUG("Setting up process resource limits");
842

843 844
            if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
                goto cleanup;
845

846
            nodeset = virDomainNumatuneGetNodeset(ctrl->def->numa, auto_nodeset, -1);
847

848 849 850
            if (virNumaSetupMemoryPolicy(mode, nodeset) < 0)
                goto cleanup;
        }
851
    }
852

853
    if (virLXCControllerSetupCpuAffinity(ctrl) < 0)
854
        goto cleanup;
855

856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871
    ret = 0;
 cleanup:
    virBitmapFree(auto_nodeset);
    return ret;
}


/*
 * Creates the cgroup and sets up the various limits associated
 * with it
 */
static int virLXCControllerSetupCgroupLimits(virLXCControllerPtr ctrl)
{
    virBitmapPtr auto_nodeset = NULL;
    int ret = -1;
    virBitmapPtr nodeset = NULL;
872
    size_t i;
873 874 875 876 877 878

    VIR_DEBUG("Setting up cgroup resource limits");

    if (virLXCControllerGetNumadAdvice(ctrl, &auto_nodeset) < 0)
        goto cleanup;

879
    nodeset = virDomainNumatuneGetNodeset(ctrl->def->numa, auto_nodeset, -1);
880 881

    if (!(ctrl->cgroup = virLXCCgroupCreate(ctrl->def,
882 883 884
                                            ctrl->initpid,
                                            ctrl->nnicindexes,
                                            ctrl->nicindexes)))
885 886
        goto cleanup;

887
    if (virCgroupAddMachineProcess(ctrl->cgroup, getpid()) < 0)
888 889
        goto cleanup;

890 891
    /* Add all qemu-nbd tasks to the cgroup */
    for (i = 0; i < ctrl->nnbdpids; i++) {
892
        if (virCgroupAddMachineProcess(ctrl->cgroup, ctrl->nbdpids[i]) < 0)
893 894 895
            goto cleanup;
    }

896
    if (virLXCCgroupSetup(ctrl->def, ctrl->cgroup, nodeset) < 0)
897
        goto cleanup;
898

899
    ret = 0;
900
 cleanup:
901
    virBitmapFree(auto_nodeset);
902
    return ret;
D
Dan Smith 已提交
903 904
}

905

906 907 908 909 910 911 912 913 914 915 916 917 918
static void virLXCControllerClientCloseHook(virNetServerClientPtr client)
{
    virLXCControllerPtr ctrl = virNetServerClientGetPrivateData(client);

    VIR_DEBUG("Client %p has closed", client);
    if (ctrl->client == client)
        ctrl->client = NULL;
    if (ctrl->inShutdown) {
        VIR_DEBUG("Arm timer to quit event loop");
        virEventUpdateTimeout(ctrl->timerShutdown, 0);
    }
}

919 920
static void virLXCControllerClientPrivateFree(void *data)
{
921 922
    virLXCControllerPtr ctrl = data;
    VIR_DEBUG("Got private data free %p", ctrl);
923 924 925 926
}

static void *virLXCControllerClientPrivateNew(virNetServerClientPtr client,
                                              void *opaque)
927 928
{
    virLXCControllerPtr ctrl = opaque;
929

930 931 932
    virNetServerClientSetCloseHook(client, virLXCControllerClientCloseHook);
    VIR_DEBUG("Got new client %p", client);
    ctrl->client = client;
933 934 935 936 937

    if (ctrl->initpid && ctrl->firstClient)
        virLXCControllerEventSendInit(ctrl, ctrl->initpid);
    ctrl->firstClient = false;

938
    return ctrl;
939 940
}

941 942

static int virLXCControllerSetupServer(virLXCControllerPtr ctrl)
943
{
944
    virNetServerPtr srv = NULL;
945
    virNetServerServicePtr svc = NULL;
946
    g_autofree char *sockpath = NULL;
947

948
    sockpath = g_strdup_printf("%s/%s.sock", LXC_STATE_DIR, ctrl->name);
949

950
    if (!(srv = virNetServerNew("LXC", 1,
951
                                0, 0, 0, 1,
952
                                0, -1, 0,
953 954 955 956
                                virLXCControllerClientPrivateNew,
                                NULL,
                                virLXCControllerClientPrivateFree,
                                ctrl)))
C
Chris Lalancette 已提交
957
        goto error;
958

959 960 961
    if (virSecurityManagerSetSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

962 963 964 965
    if (!(svc = virNetServerServiceNewUNIX(sockpath,
                                           0700,
                                           0,
                                           0,
966
                                           NULL,
967
                                           false,
M
Michal Privoznik 已提交
968
                                           0,
969
                                           5)))
970
        goto error;
971

972 973 974
    if (virSecurityManagerClearSocketLabel(ctrl->securityManager, ctrl->def) < 0)
        goto error;

975
    if (virNetServerAddService(srv, svc) < 0)
976
        goto error;
977
    virObjectUnref(svc);
978
    svc = NULL;
979

980 981 982 983
    if (!(ctrl->prog = virNetServerProgramNew(VIR_LXC_MONITOR_PROGRAM,
                                              VIR_LXC_MONITOR_PROGRAM_VERSION,
                                              virLXCMonitorProcs,
                                              virLXCMonitorNProcs)))
984 985
        goto error;

986
    if (!(ctrl->daemon = virNetDaemonNew()) ||
987
        virNetDaemonAddServer(ctrl->daemon, srv) < 0)
988 989 990
        goto error;

    virNetDaemonUpdateServices(ctrl->daemon, true);
991
    return 0;
992

993
 error:
994 995 996
    virObjectUnref(srv);
    virObjectUnref(ctrl->daemon);
    ctrl->daemon = NULL;
997
    virObjectUnref(svc);
998 999
    return -1;
}
1000

D
Daniel P. Berrange 已提交
1001 1002 1003

static int lxcControllerClearCapabilities(void)
{
1004
#if WITH_CAPNG
D
Daniel P. Berrange 已提交
1005 1006 1007 1008 1009
    int ret;

    capng_clear(CAPNG_SELECT_BOTH);

    if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
1010 1011
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("failed to apply capabilities: %d"), ret);
D
Daniel P. Berrange 已提交
1012 1013 1014
        return -1;
    }
#else
1015
    VIR_WARN("libcap-ng support not compiled in, unable to clear capabilities");
D
Daniel P. Berrange 已提交
1016 1017 1018 1019
#endif
    return 0;
}

1020
static bool wantReboot;
1021
static virMutex lock = VIR_MUTEX_INITIALIZER;
1022 1023


M
Martin Kletzander 已提交
1024
static void virLXCControllerSignalChildIO(virNetDaemonPtr dmn,
J
Ján Tomko 已提交
1025
                                          siginfo_t *info G_GNUC_UNUSED,
1026
                                          void *opaque)
1027
{
1028
    virLXCControllerPtr ctrl = opaque;
1029
    int ret;
1030
    int status;
1031

1032
    ret = waitpid(-1, &status, WNOHANG);
1033
    VIR_DEBUG("Got sig child %d vs %lld", ret, (long long)ctrl->initpid);
1034
    if (ret == ctrl->initpid) {
M
Martin Kletzander 已提交
1035
        virNetDaemonQuit(dmn);
1036
        virMutexLock(&lock);
1037
        if (WIFSIGNALED(status) &&
1038 1039
            WTERMSIG(status) == SIGHUP) {
            VIR_DEBUG("Status indicates reboot");
1040
            wantReboot = true;
1041
        }
1042 1043
        virMutexUnlock(&lock);
    }
1044 1045 1046
}


1047
static void virLXCControllerConsoleUpdateWatch(virLXCControllerConsolePtr console)
1048 1049 1050 1051
{
    int hostEvents = 0;
    int contEvents = 0;

1052 1053
    /* If host console is open, then we can look to read/write */
    if (!console->hostClosed) {
1054 1055 1056 1057 1058
        if (console->fromHostLen < sizeof(console->fromHostBuf))
            hostEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromContLen)
            hostEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }
1059 1060 1061

    /* If cont console is open, then we can look to read/write */
    if (!console->contClosed) {
1062 1063 1064 1065 1066 1067
        if (console->fromContLen < sizeof(console->fromContBuf))
            contEvents |= VIR_EVENT_HANDLE_READABLE;
        if (console->fromHostLen)
            contEvents |= VIR_EVENT_HANDLE_WRITABLE;
    }

1068 1069 1070
    VIR_DEBUG("Container watch=%d, events=%d closed=%d; host watch=%d events=%d closed=%d",
              console->contWatch, contEvents, console->contClosed,
              console->hostWatch, hostEvents, console->hostClosed);
1071 1072
    virEventUpdateHandle(console->contWatch, contEvents);
    virEventUpdateHandle(console->hostWatch, hostEvents);
1073

1074
    if (console->hostClosed) {
1075
        /* Must setup an epoll to detect when host becomes accessible again */
1076
        int events = EPOLLIN | EPOLLET;
1077
        if (console->fromContLen)
1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093
            events |= EPOLLOUT;

        if (events != console->hostEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->hostEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);

            event.events = events;
            event.data.fd = console->hostFd;
            if (epoll_ctl(console->epollFd, action, console->hostFd, &event) < 0) {
                VIR_DEBUG(":fail");
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
1094
                virNetDaemonQuit(console->daemon);
1095
                return;
1096 1097 1098 1099 1100 1101 1102 1103 1104
            }
            console->hostEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->hostEpoll);
        }
    } else if (console->hostEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->hostEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->hostFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
1105
            VIR_DEBUG(":fail");
1106
            virNetDaemonQuit(console->daemon);
1107
            return;
1108 1109 1110
        }
        console->hostEpoll = 0;
    }
1111

1112
    if (console->contClosed) {
1113
        /* Must setup an epoll to detect when guest becomes accessible again */
1114
        int events = EPOLLIN | EPOLLET;
1115
        if (console->fromHostLen)
1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131
            events |= EPOLLOUT;

        if (events != console->contEpoll) {
            struct epoll_event event;
            int action = EPOLL_CTL_ADD;
            if (console->contEpoll)
                action = EPOLL_CTL_MOD;

            VIR_DEBUG("newContEvents=%x oldContEvents=%x", events, console->contEpoll);

            event.events = events;
            event.data.fd = console->contFd;
            if (epoll_ctl(console->epollFd, action, console->contFd, &event) < 0) {
                virReportSystemError(errno, "%s",
                                     _("Unable to add epoll fd"));
                VIR_DEBUG(":fail");
1132
                virNetDaemonQuit(console->daemon);
1133
                return;
1134 1135 1136 1137 1138 1139 1140 1141 1142
            }
            console->contEpoll = events;
            VIR_DEBUG("newHostEvents=%x oldHostEvents=%x", events, console->contEpoll);
        }
    } else if (console->contEpoll) {
        VIR_DEBUG("Stop epoll oldContEvents=%x", console->contEpoll);
        if (epoll_ctl(console->epollFd, EPOLL_CTL_DEL, console->contFd, NULL) < 0) {
            virReportSystemError(errno, "%s",
                                 _("Unable to remove epoll fd"));
1143
            VIR_DEBUG(":fail");
1144
            virNetDaemonQuit(console->daemon);
1145
            return;
1146 1147 1148 1149
        }
        console->contEpoll = 0;
    }
}
1150 1151


1152
static void virLXCControllerConsoleEPoll(int watch, int fd, int events, void *opaque)
1153
{
1154
    virLXCControllerConsolePtr console = opaque;
1155

1156 1157 1158 1159 1160 1161 1162 1163 1164 1165
    virMutexLock(&lock);
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);

    while (1) {
        struct epoll_event event;
        int ret;
        ret = epoll_wait(console->epollFd, &event, 1, 0);
1166
        if (ret < 0) {
S
Stefan Berger 已提交
1167
            if (errno == EINTR)
1168 1169 1170
                continue;
            virReportSystemError(errno, "%s",
                                 _("Unable to wait on epoll"));
1171
            virNetDaemonQuit(console->daemon);
1172 1173 1174
            goto cleanup;
        }

1175 1176 1177 1178 1179 1180 1181
        if (ret == 0)
            break;

        VIR_DEBUG("fd=%d hostFd=%d contFd=%d hostEpoll=%x contEpoll=%x",
                  event.data.fd, console->hostFd, console->contFd,
                  console->hostEpoll, console->contEpoll);

1182 1183
        /* If we get HUP+dead PID, we just re-enable the main loop
         * which will see the PID has died and exit */
1184
        if ((event.events & (EPOLLIN|EPOLLOUT))) {
1185 1186
            if (event.data.fd == console->hostFd) {
                console->hostClosed = false;
1187
            } else {
1188
                console->contClosed = false;
1189
            }
1190
            virLXCControllerConsoleUpdateWatch(console);
1191 1192 1193 1194
            break;
        }
    }

1195
 cleanup:
1196
    virMutexUnlock(&lock);
1197 1198
}

1199
static void virLXCControllerConsoleIO(int watch, int fd, int events, void *opaque)
1200
{
1201
    virLXCControllerConsolePtr console = opaque;
1202 1203

    virMutexLock(&lock);
1204 1205 1206 1207
    VIR_DEBUG("IO event watch=%d fd=%d events=%d fromHost=%zu fromcont=%zu",
              watch, fd, events,
              console->fromHostLen,
              console->fromContLen);
1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221
    if (events & VIR_EVENT_HANDLE_READABLE) {
        char *buf;
        size_t *len;
        size_t avail;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
            avail = sizeof(console->fromHostBuf) - *len;
        } else {
            buf = console->fromContBuf;
            len = &console->fromContLen;
            avail = sizeof(console->fromContBuf) - *len;
        }
1222
     reread:
1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249
        done = read(fd, buf + *len, avail);
        if (done == -1 && errno == EINTR)
            goto reread;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to read container pty"));
            goto error;
        }
        if (done > 0) {
            *len += done;
        } else {
            VIR_DEBUG("Read fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_WRITABLE) {
        char *buf;
        size_t *len;
        ssize_t done;
        if (watch == console->hostWatch) {
            buf = console->fromContBuf;
            len = &console->fromContLen;
        } else {
            buf = console->fromHostBuf;
            len = &console->fromHostLen;
        }

1250
     rewrite:
1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275
        done = write(fd, buf, *len);
        if (done == -1 && errno == EINTR)
            goto rewrite;
        if (done == -1 && errno != EAGAIN) {
            virReportSystemError(errno, "%s",
                                 _("Unable to write to container pty"));
            goto error;
        }
        if (done > 0) {
            memmove(buf, buf + done, (*len - done));
            *len -= done;
        } else {
            VIR_DEBUG("Write fd %d done %d errno %d", fd, (int)done, errno);
        }
    }

    if (events & VIR_EVENT_HANDLE_HANGUP) {
        if (watch == console->hostWatch) {
            console->hostClosed = true;
        } else {
            console->contClosed = true;
        }
        VIR_DEBUG("Got EOF on %d %d", watch, fd);
    }

1276
    virLXCControllerConsoleUpdateWatch(console);
1277 1278 1279
    virMutexUnlock(&lock);
    return;

1280
 error:
1281 1282 1283
    virEventRemoveHandle(console->contWatch);
    virEventRemoveHandle(console->hostWatch);
    console->contWatch = console->hostWatch = -1;
1284
    virNetDaemonQuit(console->daemon);
1285 1286 1287 1288
    virMutexUnlock(&lock);
}


1289
/**
1290
 * lxcControllerMain
1291 1292
 * @serverFd: server socket fd to accept client requests
 * @clientFd: initial client which is the libvirtd daemon
1293
 *
1294
 * Processes I/O on consoles and the monitor
1295 1296 1297
 *
 * Returns 0 on success or -1 in case of error
 */
1298
static int virLXCControllerMain(virLXCControllerPtr ctrl)
1299 1300
{
    int rc = -1;
1301
    size_t i;
1302

1303
    if (virNetDaemonAddSignalHandler(ctrl->daemon,
1304 1305 1306
                                     SIGCHLD,
                                     virLXCControllerSignalChildIO,
                                     ctrl) < 0)
1307 1308
        goto cleanup;

1309 1310
    virResetLastError();

1311
    for (i = 0; i < ctrl->nconsoles; i++) {
1312
        if ((ctrl->consoles[i].epollFd = epoll_create1(EPOLL_CLOEXEC)) < 0) {
1313 1314 1315 1316 1317
            virReportSystemError(errno, "%s",
                                 _("Unable to create epoll fd"));
            goto cleanup;
        }

1318 1319 1320 1321 1322
        if ((ctrl->consoles[i].epollWatch = virEventAddHandle(ctrl->consoles[i].epollFd,
                                                              VIR_EVENT_HANDLE_READABLE,
                                                              virLXCControllerConsoleEPoll,
                                                              &(ctrl->consoles[i]),
                                                              NULL)) < 0) {
1323 1324
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch epoll FD"));
1325 1326 1327
            goto cleanup;
        }

1328 1329 1330 1331 1332
        if ((ctrl->consoles[i].hostWatch = virEventAddHandle(ctrl->consoles[i].hostFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1333 1334
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1335 1336 1337
            goto cleanup;
        }

1338 1339 1340 1341 1342
        if ((ctrl->consoles[i].contWatch = virEventAddHandle(ctrl->consoles[i].contFd,
                                                             VIR_EVENT_HANDLE_READABLE,
                                                             virLXCControllerConsoleIO,
                                                             &(ctrl->consoles[i]),
                                                             NULL)) < 0) {
1343 1344
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to watch host console PTY"));
1345 1346
            goto cleanup;
        }
1347
    }
1348

1349
    virNetDaemonRun(ctrl->daemon);
1350

1351
    if (virGetLastErrorCode() == VIR_ERR_OK)
1352
        rc = wantReboot ? 1 : 0;
1353

1354
 cleanup:
1355
    for (i = 0; i < ctrl->nconsoles; i++)
1356
        virLXCControllerConsoleClose(&(ctrl->consoles[i]));
1357

1358 1359 1360
    return rc;
}

1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374
static unsigned int
virLXCControllerLookupUsernsMap(virDomainIdMapEntryPtr map,
                                int num,
                                unsigned int src)
{
    size_t i;

    for (i = 0; i < num; i++) {
        if (src > map[i].start && src < map[i].start + map[i].count)
            return map[i].target + (src - map[i].start);
    }

    return src;
}
1375

1376 1377 1378 1379 1380 1381
static int
virLXCControllerSetupUsernsMap(virDomainIdMapEntryPtr map,
                               int num,
                               char *path)
{
    virBuffer map_value = VIR_BUFFER_INITIALIZER;
1382 1383
    size_t i;
    int ret = -1;
1384

1385 1386 1387 1388 1389 1390 1391
    /* The kernel supports up to 340 lines in /proc/<pid>/{g,u}id_map */
    if (num > 340) {
        virReportError(VIR_ERR_INVALID_ARG, "%s",
                       _("Too many id mappings defined."));
        goto cleanup;
    }

1392 1393 1394 1395
    for (i = 0; i < num; i++)
        virBufferAsprintf(&map_value, "%u %u %u\n",
                          map[i].start, map[i].target, map[i].count);

1396 1397
    VIR_DEBUG("Set '%s' to '%s'", path, virBufferCurrentContent(&map_value));

1398 1399 1400 1401 1402 1403
    if (virFileWriteStr(path, virBufferCurrentContent(&map_value), 0) < 0) {
        virReportSystemError(errno, _("unable write to %s"), path);
        goto cleanup;
    }

    ret = 0;
1404
 cleanup:
1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417
    virBufferFreeAndReset(&map_value);
    return ret;
}

/**
 * virLXCControllerSetupUserns
 *
 * Set proc files for user namespace
 *
 * Returns 0 on success or -1 in case of error
 */
static int virLXCControllerSetupUserns(virLXCControllerPtr ctrl)
{
1418 1419
    g_autofree char *uid_map = NULL;
    g_autofree char *gid_map = NULL;
1420 1421

    /* User namespace is disabled for container */
1422 1423
    if (ctrl->def->idmap.nuidmap == 0) {
        VIR_DEBUG("No uid map, skipping userns setup");
1424
        return 0;
1425
    }
1426

1427
    VIR_DEBUG("Setting up userns maps");
1428
    uid_map = g_strdup_printf("/proc/%d/uid_map", ctrl->initpid);
1429 1430 1431 1432

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.uidmap,
                                       ctrl->def->idmap.nuidmap,
                                       uid_map) < 0)
1433
        return -1;
1434

1435
    gid_map = g_strdup_printf("/proc/%d/gid_map", ctrl->initpid);
1436 1437 1438 1439

    if (virLXCControllerSetupUsernsMap(ctrl->def->idmap.gidmap,
                                       ctrl->def->idmap.ngidmap,
                                       gid_map) < 0)
1440
        return -1;
1441

1442
    return 0;
1443 1444
}

1445 1446
static int virLXCControllerSetupDev(virLXCControllerPtr ctrl)
{
1447 1448 1449
    g_autofree char *mount_options = NULL;
    g_autofree char *opts = NULL;
    g_autofree char *dev = NULL;
1450 1451 1452 1453 1454 1455

    VIR_DEBUG("Setting up /dev/ for container");

    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);

1456
    dev = g_strdup_printf("/%s/%s.dev", LXC_STATE_DIR, ctrl->def->name);
1457 1458 1459 1460 1461 1462

    /*
     * tmpfs is limited to 64kb, since we only have device nodes in there
     * and don't want to DOS the entire OS RAM usage
     */

1463
    opts = g_strdup_printf("mode=755,size=65536%s", mount_options);
1464

1465
    if (virFileSetupDev(dev, opts) < 0)
1466
        return -1;
1467

1468
    if (lxcContainerChown(ctrl->def, dev) < 0)
1469
        return -1;
1470

1471
    return 0;
1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487
}

static int virLXCControllerPopulateDevices(virLXCControllerPtr ctrl)
{
    size_t i;
    const struct {
        int maj;
        int min;
        mode_t mode;
        const char *path;
    } devs[] = {
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_NULL, 0666, "/null" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_ZERO, 0666, "/zero" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_FULL, 0666, "/full" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_RANDOM, 0666, "/random" },
        { LXC_DEV_MAJ_MEMORY, LXC_DEV_MIN_URANDOM, 0666, "/urandom" },
1488
        { LXC_DEV_MAJ_TTY, LXC_DEV_MIN_TTY, 0666, "/tty" },
1489 1490 1491
    };

    if (virLXCControllerSetupDev(ctrl) < 0)
1492
        return -1;
1493 1494

    /* Populate /dev/ with a few important bits */
1495
    for (i = 0; i < G_N_ELEMENTS(devs); i++) {
1496 1497
        g_autofree char *path = NULL;

1498 1499
        path = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR, ctrl->def->name,
                               devs[i].path);
1500 1501 1502 1503 1504 1505 1506

        dev_t dev = makedev(devs[i].maj, devs[i].min);
        if (mknod(path, S_IFCHR, dev) < 0 ||
            chmod(path, devs[i].mode)) {
            virReportSystemError(errno,
                                 _("Failed to make device %s"),
                                 path);
1507
            return -1;
1508
        }
1509

1510
        if (lxcContainerChown(ctrl->def, path) < 0)
1511
            return -1;
1512 1513
    }

1514
    return 0;
1515
}
1516

1517

1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555
static int
virLXCControllerSetupTimers(virLXCControllerPtr ctrl)
{
    virDomainDefPtr def = ctrl->def;
    size_t i;

    /* Not sync'ed with Host clock */
    if (def->clock.offset != VIR_DOMAIN_CLOCK_OFFSET_LOCALTIME)
        return 0;

    for (i = 0; i < def->clock.ntimers; i++) {
        virDomainTimerDefPtr timer = def->clock.timers[i];
        g_autofree char *path = NULL;
        const char *timer_dev = NULL;
        struct stat sb;
        dev_t dev;

        /* Check if "present" is set to "no" otherwise enable it. */
        if (!timer->present)
            continue;

        switch ((virDomainTimerNameType)timer->name) {
        case VIR_DOMAIN_TIMER_NAME_PLATFORM:
        case VIR_DOMAIN_TIMER_NAME_TSC:
        case VIR_DOMAIN_TIMER_NAME_KVMCLOCK:
        case VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK:
        case VIR_DOMAIN_TIMER_NAME_PIT:
        case VIR_DOMAIN_TIMER_NAME_ARMVTIMER:
        case VIR_DOMAIN_TIMER_NAME_LAST:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported timer type (name) '%s'"),
                           virDomainTimerNameTypeToString(timer->name));
            return -1;
        case VIR_DOMAIN_TIMER_NAME_RTC:
            timer_dev = "/dev/rtc0";
            path = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR,
                                   def->name, "/rtc");
            break;
1556 1557 1558 1559 1560
        case VIR_DOMAIN_TIMER_NAME_HPET:
            timer_dev = "/dev/hpet";
            path = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR,
                                   ctrl->def->name, "/hpet");
            break;
1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588
        }

        if (!timer_dev)
            continue;

        if (stat(timer_dev, &sb) < 0) {
            virReportSystemError(errno, _("Unable to access %s"),
                                 timer_dev);
            return -1;
        }

        dev = makedev(major(sb.st_rdev), minor(sb.st_rdev));
        if (mknod(path, S_IFCHR, dev) < 0 ||
            chmod(path, sb.st_mode)) {
            virReportSystemError(errno,
                                 _("Failed to make device %s"),
                                 path);
            return -1;
        }

        if (lxcContainerChown(def, path) < 0)
            return -1;
    }

    return 0;
}


1589 1590 1591 1592 1593
static int
virLXCControllerSetupHostdevSubsysUSB(virDomainDefPtr vmDef,
                                      virDomainHostdevDefPtr def,
                                      virSecurityManagerPtr securityDriver)
{
1594 1595 1596 1597
    g_autofree char *src = NULL;
    g_autofree char *dstdir = NULL;
    g_autofree char *dstfile = NULL;
    g_autofree char *vroot = NULL;
1598 1599
    struct stat sb;
    mode_t mode;
1600
    virDomainHostdevSubsysUSBPtr usbsrc = &def->source.subsys.u.usb;
1601

1602
    src = g_strdup_printf(USB_DEVFS "/%03d/%03d", usbsrc->bus, usbsrc->device);
1603

1604
    vroot = g_strdup_printf("/%s/%s.dev/bus/usb/", LXC_STATE_DIR, vmDef->name);
1605

1606
    dstdir = g_strdup_printf("%s/%03d/", vroot, usbsrc->bus);
1607

1608
    dstfile = g_strdup_printf("%s/%03d", dstdir, usbsrc->device);
1609 1610 1611 1612

    if (stat(src, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"), src);
1613
        return -1;
1614 1615 1616 1617 1618 1619
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("USB source %s was not a character device"),
                       src);
1620
        return -1;
1621 1622 1623 1624 1625 1626 1627
    }

    mode = 0700 | S_IFCHR;

    if (virFileMakePath(dstdir) < 0) {
        virReportSystemError(errno,
                             _("Unable to create %s"), dstdir);
1628
        return -1;
1629 1630 1631 1632 1633 1634 1635 1636
    }

    VIR_DEBUG("Creating dev %s (%d,%d)",
              dstfile, major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dstfile, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dstfile);
1637
        return -1;
1638 1639
    }

1640
    if (lxcContainerChown(vmDef, dstfile) < 0)
1641
        return -1;
1642

1643 1644
    if (virSecurityManagerSetHostdevLabel(securityDriver,
                                          vmDef, def, vroot) < 0)
1645
        return -1;
1646

1647
    return 0;
1648 1649 1650 1651 1652 1653 1654 1655
}


static int
virLXCControllerSetupHostdevCapsStorage(virDomainDefPtr vmDef,
                                        virDomainHostdevDefPtr def,
                                        virSecurityManagerPtr securityDriver)
{
1656 1657
    g_autofree char *dst = NULL;
    g_autofree char *path = NULL;
1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.storage.block;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

1670
    path = g_strdup(dev);
1671 1672 1673 1674

    while (*(path + len) == '/')
        len++;

1675 1676
    dst = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR, vmDef->name,
                          strchr(path + len, '/'));
1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a block device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dev);
        goto cleanup;
    }

    mode = 0700 | S_IFBLK;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1710 1711 1712
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1713 1714 1715 1716 1717 1718
    def->source.caps.u.storage.block = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1719
 cleanup:
1720 1721 1722 1723 1724 1725 1726 1727 1728 1729
    def->source.caps.u.storage.block = dev;
    return ret;
}


static int
virLXCControllerSetupHostdevCapsMisc(virDomainDefPtr vmDef,
                                     virDomainHostdevDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
1730 1731
    g_autofree char *dst = NULL;
    g_autofree char *path = NULL;
1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743
    int len = 0;
    int ret = -1;
    struct stat sb;
    mode_t mode;
    char *dev = def->source.caps.u.misc.chardev;

    if (dev == NULL) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Missing storage host block path"));
        goto cleanup;
    }

1744
    path = g_strdup(dev);
1745 1746 1747 1748

    while (*(path + len) == '/')
        len++;

1749 1750
    dst = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR, vmDef->name,
                          strchr(path + len, '/'));
1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783

    if (stat(dev, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access %s"),
                             dev);
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Storage source %s must be a character device"),
                       dev);
        goto cleanup;
    }

    if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
        virReportError(errno,
                       _("Failed to create directory for device %s"),
                       dst);
        goto cleanup;
    }

    mode = 0700 | S_IFCHR;

    VIR_DEBUG("Creating dev %s (%d,%d)", dst,
              major(sb.st_rdev), minor(sb.st_rdev));
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dev);
        goto cleanup;
    }

1784 1785 1786
    if (lxcContainerChown(vmDef, dst) < 0)
        goto cleanup;

1787 1788 1789 1790 1791 1792
    def->source.caps.u.misc.chardev = dst;
    if (virSecurityManagerSetHostdevLabel(securityDriver, vmDef, def, NULL) < 0)
        goto cleanup;

    ret = 0;

1793
 cleanup:
1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834
    def->source.caps.u.misc.chardev = dev;
    return ret;
}

static int
virLXCControllerSetupHostdevSubsys(virDomainDefPtr vmDef,
                                   virDomainHostdevDefPtr def,
                                   virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        return virLXCControllerSetupHostdevSubsysUSB(vmDef,
                                                     def,
                                                     securityDriver);

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevSubsysTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupHostdevCaps(virDomainDefPtr vmDef,
                                 virDomainHostdevDefPtr def,
                                 virSecurityManagerPtr securityDriver)
{
    switch (def->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_STORAGE:
        return virLXCControllerSetupHostdevCapsStorage(vmDef,
                                                       def,
                                                       securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_MISC:
        return virLXCControllerSetupHostdevCapsMisc(vmDef,
                                                    def,
                                                    securityDriver);

    case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET:
M
Michal Privoznik 已提交
1835
        return 0; /* case is handled in virLXCControllerMoveInterfaces */
1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881

    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported host device mode %s"),
                       virDomainHostdevCapsTypeToString(def->source.subsys.type));
        return -1;
    }
}


static int
virLXCControllerSetupAllHostdevs(virLXCControllerPtr ctrl)
{
    size_t i;
    virDomainDefPtr vmDef = ctrl->def;
    virSecurityManagerPtr securityDriver = ctrl->securityManager;
    VIR_DEBUG("Setting up hostdevs");

    for (i = 0; i < vmDef->nhostdevs; i++) {
        virDomainHostdevDefPtr def = vmDef->hostdevs[i];
        switch (def->mode) {
        case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
            if (virLXCControllerSetupHostdevSubsys(vmDef,
                                                   def,
                                                   securityDriver) < 0)
                return -1;
            break;
        case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
            if (virLXCControllerSetupHostdevCaps(vmDef,
                                                 def,
                                                 securityDriver) < 0)
                return -1;
            break;
        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported host device mode %s"),
                           virDomainHostdevModeTypeToString(def->mode));
            return -1;
        }
    }

    VIR_DEBUG("Setup all hostdevs");
    return 0;
}


1882 1883 1884 1885
static int virLXCControllerSetupDisk(virLXCControllerPtr ctrl,
                                     virDomainDiskDefPtr def,
                                     virSecurityManagerPtr securityDriver)
{
1886
    g_autofree char *dst = NULL;
1887 1888 1889
    int ret = -1;
    struct stat sb;
    mode_t mode;
1890
    char *tmpsrc = def->src->path;
1891

E
Eric Blake 已提交
1892
    if (virDomainDiskGetType(def) != VIR_STORAGE_TYPE_BLOCK) {
1893 1894 1895 1896
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk for non-block device"));
        goto cleanup;
    }
1897
    if (!tmpsrc) {
1898 1899 1900 1901 1902
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Can't setup disk without media"));
        goto cleanup;
    }

1903 1904
    dst = g_strdup_printf("/%s/%s.dev/%s", LXC_STATE_DIR, ctrl->def->name,
                          def->dst);
1905

1906
    if (stat(def->src->path, &sb) < 0) {
1907
        virReportSystemError(errno,
1908
                             _("Unable to access %s"), tmpsrc);
1909 1910 1911 1912 1913 1914
        goto cleanup;
    }

    if (!S_ISCHR(sb.st_mode) && !S_ISBLK(sb.st_mode)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Disk source %s must be a character/block device"),
1915
                       tmpsrc);
1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932
        goto cleanup;
    }

    mode = 0700;
    if (S_ISCHR(sb.st_mode))
        mode |= S_IFCHR;
    else
        mode |= S_IFBLK;

    /* Yes, the device name we're creating may not
     * actually correspond to the major:minor number
     * we're using, but we've no other option at this
     * time. Just have to hope that containerized apps
     * don't get upset that the major:minor is different
     * to that normally implied by the device name
     */
    VIR_DEBUG("Creating dev %s (%d,%d) from %s",
1933
              dst, major(sb.st_rdev), minor(sb.st_rdev), tmpsrc);
1934 1935 1936 1937 1938 1939 1940
    if (mknod(dst, mode, sb.st_rdev) < 0) {
        virReportSystemError(errno,
                             _("Unable to create device %s"),
                             dst);
        goto cleanup;
    }

1941
    if (lxcContainerChown(ctrl->def, dst) < 0)
1942 1943
        goto cleanup;

1944
    /* Labelling normally operates on src, but we need
E
Eric Blake 已提交
1945
     * to actually label the dst here, so hack the config */
1946
    def->src->path = dst;
1947 1948
    if (virSecurityManagerSetImageLabel(securityDriver, ctrl->def, def->src,
                                        VIR_SECURITY_DOMAIN_IMAGE_LABEL_BACKING_CHAIN) < 0)
1949 1950 1951 1952
        goto cleanup;

    ret = 0;

1953
 cleanup:
1954
    def->src->path = tmpsrc;
1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974
    return ret;
}

static int virLXCControllerSetupAllDisks(virLXCControllerPtr ctrl)
{
    size_t i;
    VIR_DEBUG("Setting up disks");

    for (i = 0; i < ctrl->def->ndisks; i++) {
        if (virLXCControllerSetupDisk(ctrl, ctrl->def->disks[i],
                                      ctrl->securityManager) < 0)
            return -1;
    }

    VIR_DEBUG("Setup all disks");
    return 0;
}



1975
/**
1976
 * virLXCControllerMoveInterfaces
1977 1978 1979 1980 1981 1982 1983 1984
 * @nveths: number of interfaces
 * @veths: interface names
 * @container: pid of container
 *
 * Moves network interfaces into a container's namespace
 *
 * Returns 0 on success or -1 in case of error
 */
1985
static int virLXCControllerMoveInterfaces(virLXCControllerPtr ctrl)
1986
{
1987
    size_t i;
1988
    virDomainDefPtr def = ctrl->def;
1989

1990
    for (i = 0; i < ctrl->nveths; i++) {
1991
        if (virNetDevSetNamespace(ctrl->veths[i], ctrl->initpid) < 0)
1992
            return -1;
1993
    }
1994

1995 1996 1997 1998 1999 2000 2001 2002 2003
    for (i = 0; i < def->nhostdevs; i ++) {
        virDomainHostdevDefPtr hdev = def->hostdevs[i];

        if (hdev->mode != VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES)
            continue;

        virDomainHostdevCaps hdcaps = hdev->source.caps;

        if (hdcaps.type != VIR_DOMAIN_HOSTDEV_CAPS_TYPE_NET)
2004
            continue;
2005

2006
        if (virNetDevSetNamespace(hdcaps.u.net.ifname, ctrl->initpid) < 0)
2007 2008 2009
            return -1;
    }

2010 2011 2012 2013 2014
    return 0;
}


/**
2015 2016
 * virLXCControllerDeleteInterfaces:
 * @ctrl: the LXC controller
2017 2018 2019 2020 2021
 *
 * Cleans up the container interfaces by deleting the veth device pairs.
 *
 * Returns 0 on success or -1 in case of error
 */
2022
static int virLXCControllerDeleteInterfaces(virLXCControllerPtr ctrl)
2023
{
2024 2025
    size_t i;
    int ret = 0;
2026

2027
    for (i = 0; i < ctrl->nveths; i++) {
2028 2029 2030 2031 2032
        if (virNetDevVethDelete(ctrl->veths[i]) < 0)
            ret = -1;
    }

    return ret;
2033 2034
}

2035

2036 2037
static int lxcSetPersonality(virDomainDefPtr def)
{
2038
    virArch altArch;
2039

2040
    VIR_DEBUG("Checking for 32-bit personality");
2041
    altArch = lxcContainerGetAlt32bitArch(virArchFromHost());
2042
    if (altArch &&
2043
        (def->os.arch == altArch)) {
2044 2045
        VIR_DEBUG("Setting personality to %s",
                  virArchToString(altArch));
2046 2047
        if (personality(PER_LINUX32) < 0) {
            virReportSystemError(errno, _("Unable to request personality for %s on %s"),
2048 2049
                                 virArchToString(altArch),
                                 virArchToString(virArchFromHost()));
2050 2051 2052 2053 2054 2055
            return -1;
        }
    }
    return 0;
}

2056
/* Create a private tty using the private devpts at PTMX, returning
2057
 * the primary in @ttyprimary and the name of the secondary, _from the
2058
 * perspective of the guest after remounting file systems_, in
2059
 * @ttyName.  Heavily borrowed from glibc, but doesn't require that
2060 2061
 * devpts == "/dev/pts" */
static int
2062
lxcCreateTty(virLXCControllerPtr ctrl, int *ttyprimary,
2063
             char **ttyName, char **ttyHostPath)
2064 2065 2066 2067 2068
{
    int ret = -1;
    int ptyno;
    int unlock = 0;

2069
    if ((*ttyprimary = open(ctrl->devptmx, O_RDWR|O_NOCTTY|O_NONBLOCK)) < 0)
2070 2071
        goto cleanup;

2072
    if (ioctl(*ttyprimary, TIOCSPTLCK, &unlock) < 0)
2073 2074
        goto cleanup;

2075
    if (ioctl(*ttyprimary, TIOCGPTN, &ptyno) < 0)
2076 2077 2078 2079 2080 2081 2082 2083
        goto cleanup;

    /* If mount() succeeded at honoring newinstance, then the kernel
     * was new enough to also honor the mode=0620,gid=5 options, which
     * guarantee that the new pty already has correct permissions; so
     * while glibc has to fstat(), fchmod(), and fchown() for older
     * kernels, we can skip those steps.  ptyno shouldn't currently be
     * anything other than 0, but let's play it safe.  */
2084 2085
    *ttyName = g_strdup_printf("/dev/pts/%d", ptyno);
    *ttyHostPath = g_strdup_printf("/%s/%s.devpts/%d", LXC_STATE_DIR, ctrl->def->name, ptyno);
2086 2087 2088

    ret = 0;

2089
 cleanup:
2090
    if (ret != 0) {
2091
        VIR_FORCE_CLOSE(*ttyprimary);
2092 2093
        g_free(*ttyName);
        *ttyName = NULL;
2094 2095 2096 2097 2098
    }

    return ret;
}

2099

2100 2101 2102
static int
virLXCControllerSetupPrivateNS(void)
{
2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118
    /*
     * If doing a chroot style setup, we need to prepare
     * a private /dev/pts for the child now, which they
     * will later move into position.
     *
     * This is complex because 'virsh console' needs to
     * use /dev/pts from the host OS, and the guest OS
     * needs to use /dev/pts from the guest.
     *
     * This means that we (libvirt_lxc) need to see and
     * use both /dev/pts instances. We're running in the
     * host OS context though and don't want to expose
     * the guest OS /dev/pts there.
     *
     * Thus we call unshare(CLONE_NS) so that we can see
     * the guest's new /dev/pts, without it becoming
2119 2120 2121
     * visible to the host OS. We also disable mount
     * propagation out of the root FS, in case it was
     * currently allowing bi-directional propagation.
2122 2123
     */

2124
    return virProcessSetupPrivateMountNS();
2125 2126 2127
}


2128
static int
2129
virLXCControllerSetupDevPTS(virLXCControllerPtr ctrl)
2130
{
2131 2132 2133
    g_autofree char *mount_options = NULL;
    g_autofree char *opts = NULL;
    g_autofree char *devpts = NULL;
2134
    gid_t ptsgid = 5;
2135

2136
    VIR_DEBUG("Setting up private /dev/pts");
2137

2138 2139
    mount_options = virSecurityManagerGetMountOptions(ctrl->securityManager,
                                                      ctrl->def);
2140

2141 2142
    devpts = g_strdup_printf("%s/%s.devpts", LXC_STATE_DIR, ctrl->def->name);
    ctrl->devptmx = g_strdup_printf("%s/%s.devpts/ptmx", LXC_STATE_DIR, ctrl->def->name);
2143

2144 2145 2146 2147
    if (virFileMakePath(devpts) < 0) {
        virReportSystemError(errno,
                             _("Failed to make path %s"),
                             devpts);
2148
        return -1;
2149
    }
2150

2151 2152 2153 2154 2155
    if (ctrl->def->idmap.ngidmap)
        ptsgid = virLXCControllerLookupUsernsMap(ctrl->def->idmap.gidmap,
                                                 ctrl->def->idmap.ngidmap,
                                                 ptsgid);

2156 2157
    /* XXX should we support gid=X for X!=5 for distros which use
     * a different gid for tty?  */
2158 2159
    opts = g_strdup_printf("newinstance,ptmxmode=0666,mode=0620,gid=%u%s", ptsgid,
                           NULLSTR_EMPTY(mount_options));
2160

2161
    VIR_DEBUG("Mount devpts on %s type=tmpfs flags=0x%x, opts=%s",
2162 2163 2164 2165 2166
              devpts, MS_NOSUID, opts);
    if (mount("devpts", devpts, "devpts", MS_NOSUID, opts) < 0) {
        virReportSystemError(errno,
                             _("Failed to mount devpts on %s"),
                             devpts);
2167
        return -1;
2168
    }
2169

2170
    if (access(ctrl->devptmx, R_OK) < 0) {
2171 2172
        virReportSystemError(ENOSYS, "%s",
                             _("Kernel does not support private devpts"));
2173
        return -1;
2174 2175
    }

2176 2177
    if ((lxcContainerChown(ctrl->def, ctrl->devptmx) < 0) ||
        (lxcContainerChown(ctrl->def, devpts) < 0))
2178
        return -1;
2179

2180
    return 0;
2181 2182 2183
}


G
Gao feng 已提交
2184 2185 2186 2187 2188 2189
static int
virLXCControllerSetupFuse(virLXCControllerPtr ctrl)
{
    return lxcSetupFuse(&ctrl->fuse, ctrl->def);
}

2190 2191 2192 2193 2194 2195
static int
virLXCControllerStartFuse(virLXCControllerPtr ctrl)
{
    return lxcStartFuse(ctrl->fuse);
}

2196 2197 2198 2199 2200 2201
static int
virLXCControllerSetupConsoles(virLXCControllerPtr ctrl,
                              char **containerTTYPaths)
{
    size_t i;

2202
    for (i = 0; i < ctrl->nconsoles; i++) {
2203 2204
        g_autofree char *ttyHostPath = NULL;

2205
        VIR_DEBUG("Opening tty on private %s", ctrl->devptmx);
2206
        if (lxcCreateTty(ctrl,
2207
                         &ctrl->consoles[i].contFd,
2208
                         &containerTTYPaths[i], &ttyHostPath) < 0) {
2209
            virReportSystemError(errno, "%s",
2210
                                 _("Failed to allocate tty"));
2211
            return -1;
2212
        }
2213 2214

        /* Change the owner of tty device to the root user of container */
2215
        if (lxcContainerChown(ctrl->def, ttyHostPath) < 0)
2216
            return -1;
2217
    }
2218

2219
    return 0;
2220 2221 2222
}


2223 2224 2225 2226 2227 2228 2229 2230
static void
virLXCControllerEventSend(virLXCControllerPtr ctrl,
                          int procnr,
                          xdrproc_t proc,
                          void *data)
{
    virNetMessagePtr msg;

2231
    if (!ctrl->client) {
2232
        VIR_WARN("Dropping event %d because libvirtd is not connected", procnr);
2233
        return;
2234
    }
2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253

    VIR_DEBUG("Send event %d client=%p", procnr, ctrl->client);
    if (!(msg = virNetMessageNew(false)))
        goto error;

    msg->header.prog = virNetServerProgramGetID(ctrl->prog);
    msg->header.vers = virNetServerProgramGetVersion(ctrl->prog);
    msg->header.proc = procnr;
    msg->header.type = VIR_NET_MESSAGE;
    msg->header.serial = 1;
    msg->header.status = VIR_NET_OK;

    if (virNetMessageEncodeHeader(msg) < 0)
        goto error;

    if (virNetMessageEncodePayload(msg, proc, data) < 0)
        goto error;

    VIR_DEBUG("Queue event %d %zu", procnr, msg->bufferLength);
2254 2255
    if (virNetServerClientSendMessage(ctrl->client, msg) < 0)
        goto error;
2256 2257 2258 2259

    xdr_free(proc, data);
    return;

2260
 error:
2261 2262 2263 2264 2265 2266 2267 2268 2269
    virNetMessageFree(msg);
    xdr_free(proc, data);
}


static int
virLXCControllerEventSendExit(virLXCControllerPtr ctrl,
                              int exitstatus)
{
2270
    virLXCMonitorExitEventMsg msg;
2271

2272
    VIR_DEBUG("Exit status %d (client=%p)", exitstatus, ctrl->client);
2273 2274 2275
    memset(&msg, 0, sizeof(msg));
    switch (exitstatus) {
    case 0:
2276
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_SHUTDOWN;
2277
        break;
2278
    case 1:
2279
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_REBOOT;
2280
        break;
2281
    default:
2282
        msg.status = VIR_LXC_MONITOR_EXIT_STATUS_ERROR;
2283 2284 2285 2286
        break;
    }

    virLXCControllerEventSend(ctrl,
2287 2288
                              VIR_LXC_MONITOR_PROC_EXIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorExitEventMsg,
2289 2290 2291 2292 2293 2294
                              (void*)&msg);

    if (ctrl->client) {
        VIR_DEBUG("Waiting for client to complete dispatch");
        ctrl->inShutdown = true;
        virNetServerClientDelayedClose(ctrl->client);
2295
        virNetDaemonRun(ctrl->daemon);
2296 2297 2298 2299 2300 2301
    }
    VIR_DEBUG("Client has gone away");
    return 0;
}


2302 2303 2304 2305
static int
virLXCControllerEventSendInit(virLXCControllerPtr ctrl,
                              pid_t initpid)
{
2306
    virLXCMonitorInitEventMsg msg;
2307

2308
    VIR_DEBUG("Init pid %lld", (long long)initpid);
2309 2310 2311 2312
    memset(&msg, 0, sizeof(msg));
    msg.initpid = initpid;

    virLXCControllerEventSend(ctrl,
2313 2314
                              VIR_LXC_MONITOR_PROC_INIT_EVENT,
                              (xdrproc_t)xdr_virLXCMonitorInitEventMsg,
2315 2316 2317 2318 2319
                              (void*)&msg);
    return 0;
}


2320
static int
2321
virLXCControllerRun(virLXCControllerPtr ctrl)
2322 2323 2324 2325
{
    int rc = -1;
    int control[2] = { -1, -1};
    int containerhandshake[2] = { -1, -1 };
2326
    char **containerTTYPaths = g_new0(char *, ctrl->nconsoles);
2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340
    size_t i;

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, control) < 0) {
        virReportSystemError(errno, "%s",
                             _("sockpair failed"));
        goto cleanup;
    }

    if (socketpair(PF_UNIX, SOCK_STREAM, 0, containerhandshake) < 0) {
        virReportSystemError(errno, "%s",
                             _("socketpair failed"));
        goto cleanup;
    }

2341 2342 2343
    if (virLXCControllerSetupPrivateNS() < 0)
        goto cleanup;

2344 2345 2346
    if (virLXCControllerSetupLoopDevices(ctrl) < 0)
        goto cleanup;

2347
    if (virLXCControllerSetupResourceLimits(ctrl) < 0)
2348 2349 2350 2351 2352
        goto cleanup;

    if (virLXCControllerSetupDevPTS(ctrl) < 0)
        goto cleanup;

2353 2354 2355
    if (virLXCControllerPopulateDevices(ctrl) < 0)
        goto cleanup;

2356 2357 2358
    if (virLXCControllerSetupTimers(ctrl) < 0)
        goto cleanup;

2359 2360 2361
    if (virLXCControllerSetupAllDisks(ctrl) < 0)
        goto cleanup;

2362 2363 2364
    if (virLXCControllerSetupAllHostdevs(ctrl) < 0)
        goto cleanup;

G
Gao feng 已提交
2365 2366 2367
    if (virLXCControllerSetupFuse(ctrl) < 0)
        goto cleanup;

2368 2369
    if (virLXCControllerSetupConsoles(ctrl, containerTTYPaths) < 0)
        goto cleanup;
2370

2371
    if (lxcSetPersonality(ctrl->def) < 0)
2372
        goto cleanup;
2373

2374
    if ((ctrl->initpid = lxcContainerStart(ctrl->def,
2375
                                           ctrl->securityManager,
2376 2377
                                           ctrl->nveths,
                                           ctrl->veths,
2378 2379
                                           ctrl->npassFDs,
                                           ctrl->passFDs,
2380 2381
                                           control[1],
                                           containerhandshake[1],
I
ik.nitk 已提交
2382
                                           ctrl->nsFDs,
2383 2384
                                           ctrl->nconsoles,
                                           containerTTYPaths)) < 0)
2385
        goto cleanup;
2386
    VIR_FORCE_CLOSE(control[1]);
2387
    VIR_FORCE_CLOSE(containerhandshake[1]);
2388

2389 2390 2391
    for (i = 0; i < ctrl->npassFDs; i++)
        VIR_FORCE_CLOSE(ctrl->passFDs[i]);

I
ik.nitk 已提交
2392 2393 2394 2395
    if (ctrl->nsFDs)
        for (i = 0; i < VIR_LXC_DOMAIN_NAMESPACE_LAST; i++)
            VIR_FORCE_CLOSE(ctrl->nsFDs[i]);

2396 2397 2398
    if (virLXCControllerSetupCgroupLimits(ctrl) < 0)
        goto cleanup;

2399 2400 2401
    if (virLXCControllerSetupUserns(ctrl) < 0)
        goto cleanup;

2402
    if (virLXCControllerMoveInterfaces(ctrl) < 0)
2403 2404
        goto cleanup;

2405 2406 2407
    if (virLXCControllerStartFuse(ctrl) < 0)
        goto cleanup;

2408 2409 2410
    if (lxcContainerSendContinue(control[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to send container continue message"));
2411
        goto cleanup;
2412
    }
2413

2414 2415 2416 2417 2418 2419
    if (lxcContainerWaitForContinue(containerhandshake[0]) < 0) {
        virReportSystemError(errno, "%s",
                             _("error receiving signal from container"));
        goto cleanup;
    }

2420
    /* ...and reduce our privileges */
D
Daniel P. Berrange 已提交
2421 2422 2423
    if (lxcControllerClearCapabilities() < 0)
        goto cleanup;

2424
    for (i = 0; i < ctrl->nconsoles; i++)
2425
        if (virLXCControllerConsoleSetNonblocking(&(ctrl->consoles[i])) < 0)
2426
            goto cleanup;
2427

2428 2429 2430
    if (virLXCControllerDaemonHandshake(ctrl) < 0)
        goto cleanup;

2431 2432 2433 2434 2435 2436
    /* We must not hold open a dbus connection for life
     * of LXC instance, since dbus-daemon is limited to
     * only a few 100 connections by default
     */
    virDBusCloseSystemBus();

2437
    rc = virLXCControllerMain(ctrl);
2438

2439 2440
    virLXCControllerEventSendExit(ctrl, rc);

2441
 cleanup:
2442 2443
    VIR_FORCE_CLOSE(control[0]);
    VIR_FORCE_CLOSE(control[1]);
2444 2445
    VIR_FORCE_CLOSE(containerhandshake[0]);
    VIR_FORCE_CLOSE(containerhandshake[1]);
2446

2447
    for (i = 0; i < ctrl->nconsoles; i++)
2448 2449
        g_free(containerTTYPaths[i]);
    g_free(containerTTYPaths);
2450

2451
    virLXCControllerStopInit(ctrl);
2452

2453 2454 2455 2456
    return rc;
}


2457
int main(int argc, char *argv[])
2458 2459
{
    pid_t pid;
2460
    int rc = -1;
2461
    const char *name = NULL;
2462
    size_t nveths = 0;
2463
    char **veths = NULL;
I
ik.nitk 已提交
2464
    int ns_fd[VIR_LXC_DOMAIN_NAMESPACE_LAST];
2465
    int handshakeFd = -1;
2466
    bool bg = false;
2467
    const struct option options[] = {
2468 2469 2470 2471
        { "background", 0, NULL, 'b' },
        { "name",   1, NULL, 'n' },
        { "veth",   1, NULL, 'v' },
        { "console", 1, NULL, 'c' },
2472
        { "passfd", 1, NULL, 'p' },
2473
        { "handshakefd", 1, NULL, 's' },
2474
        { "security", 1, NULL, 'S' },
I
ik.nitk 已提交
2475 2476 2477
        { "share-net", 1, NULL, 'N' },
        { "share-ipc", 1, NULL, 'I' },
        { "share-uts", 1, NULL, 'U' },
2478 2479 2480
        { "help", 0, NULL, 'h' },
        { 0, 0, 0, 0 },
    };
2481
    g_autofree int *ttyFDs = NULL;
2482
    size_t nttyFDs = 0;
2483
    g_autofree int *passFDs = NULL;
2484
    size_t npassFDs = 0;
2485
    virLXCControllerPtr ctrl = NULL;
2486
    size_t i;
2487
    const char *securityDriver = "none";
2488

I
ik.nitk 已提交
2489 2490 2491
    for (i = 0; i < VIR_LXC_DOMAIN_NAMESPACE_LAST; i++)
        ns_fd[i] = -1;

2492
    if (virGettextInitialize() < 0 ||
2493
        virErrorInitialize() < 0) {
E
Eric Blake 已提交
2494 2495 2496 2497
        fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
        exit(EXIT_FAILURE);
    }

2498 2499 2500
    /* Initialize logging */
    virLogSetFromEnv();

2501 2502
    while (1) {
        int c;
2503

I
ik.nitk 已提交
2504
        c = getopt_long(argc, argv, "dn:v:p:m:c:s:h:S:N:I:U:",
2505
                        options, NULL);
2506 2507 2508 2509 2510 2511

        if (c == -1)
            break;

        switch (c) {
        case 'b':
2512
            bg = true;
2513 2514 2515
            break;

        case 'n':
2516
            name = optarg;
2517 2518 2519
            break;

        case 'v':
2520
            veths = g_renew(char *, veths, nveths+1);
2521
            veths[nveths++] = g_strdup(optarg);
2522 2523 2524
            break;

        case 'c':
2525
            ttyFDs = g_renew(int, ttyFDs, nttyFDs + 1);
2526
            if (virStrToLong_i(optarg, NULL, 10, &ttyFDs[nttyFDs++]) < 0) {
2527 2528 2529 2530 2531
                fprintf(stderr, "malformed --console argument '%s'", optarg);
                goto cleanup;
            }
            break;

2532
        case 'p':
2533
            passFDs = g_renew(int, passFDs, npassFDs + 1);
2534 2535 2536 2537 2538 2539
            if (virStrToLong_i(optarg, NULL, 10, &passFDs[npassFDs++]) < 0) {
                fprintf(stderr, "malformed --passfd argument '%s'", optarg);
                goto cleanup;
            }
            break;

2540
        case 's':
2541
            if (virStrToLong_i(optarg, NULL, 10, &handshakeFd) < 0) {
2542 2543 2544 2545 2546 2547
                fprintf(stderr, "malformed --handshakefd argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

I
ik.nitk 已提交
2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571
        case 'N':
            if (virStrToLong_i(optarg, NULL, 10, &ns_fd[VIR_LXC_DOMAIN_NAMESPACE_SHARENET]) < 0) {
                fprintf(stderr, "malformed --share-net argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

        case 'I':
            if (virStrToLong_i(optarg, NULL, 10, &ns_fd[VIR_LXC_DOMAIN_NAMESPACE_SHAREIPC]) < 0) {
                fprintf(stderr, "malformed --share-ipc argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

        case 'U':
            if (virStrToLong_i(optarg, NULL, 10, &ns_fd[VIR_LXC_DOMAIN_NAMESPACE_SHAREUTS]) < 0) {
                fprintf(stderr, "malformed --share-uts argument '%s'",
                        optarg);
                goto cleanup;
            }
            break;

2572
        case 'S':
2573
            securityDriver = optarg;
2574 2575
            break;

2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586
        case 'h':
        case '?':
            fprintf(stderr, "\n");
            fprintf(stderr, "syntax: %s [OPTIONS]\n", argv[0]);
            fprintf(stderr, "\n");
            fprintf(stderr, "Options\n");
            fprintf(stderr, "\n");
            fprintf(stderr, "  -b, --background\n");
            fprintf(stderr, "  -n NAME, --name NAME\n");
            fprintf(stderr, "  -c FD, --console FD\n");
            fprintf(stderr, "  -v VETH, --veth VETH\n");
2587
            fprintf(stderr, "  -s FD, --handshakefd FD\n");
2588
            fprintf(stderr, "  -S NAME, --security NAME\n");
I
ik.nitk 已提交
2589 2590 2591
            fprintf(stderr, "  -N FD, --share-net FD\n");
            fprintf(stderr, "  -I FD, --share-ipc FD\n");
            fprintf(stderr, "  -U FD, --share-uts FD\n");
2592 2593
            fprintf(stderr, "  -h, --help\n");
            fprintf(stderr, "\n");
2594
            rc = 0;
2595
            goto cleanup;
2596 2597 2598
        }
    }

2599 2600 2601 2602 2603
    if (name == NULL) {
        fprintf(stderr, "%s: missing --name argument for configuration\n", argv[0]);
        goto cleanup;
    }

2604
    if (handshakeFd < 0) {
2605
        fprintf(stderr, "%s: missing --handshakefd argument for container PTY\n",
2606 2607 2608 2609
                argv[0]);
        goto cleanup;
    }

2610
    if (geteuid() != 0) {
2611 2612 2613
        fprintf(stderr, "%s: must be run as the 'root' user\n", argv[0]);
        goto cleanup;
    }
2614

2615
    virEventRegisterDefaultImpl();
2616 2617

    virDBusSetSharedBus(false);
2618

2619
    if (!(ctrl = virLXCControllerNew(name)))
2620
        goto cleanup;
2621

2622 2623
    ctrl->handshakeFd = handshakeFd;

2624
    if (!(ctrl->securityManager = virSecurityManagerNew(securityDriver,
2625
                                                        LXC_DRIVER_NAME, 0)))
2626 2627
        goto cleanup;

2628 2629 2630 2631 2632 2633 2634 2635 2636
    if (ctrl->def->seclabels) {
        VIR_DEBUG("Security model %s type %s label %s imagelabel %s",
                  NULLSTR(ctrl->def->seclabels[0]->model),
                  virDomainSeclabelTypeToString(ctrl->def->seclabels[0]->type),
                  NULLSTR(ctrl->def->seclabels[0]->label),
                  NULLSTR(ctrl->def->seclabels[0]->imagelabel));
    } else {
        VIR_DEBUG("Security model not initialized");
    }
2637

2638 2639 2640
    ctrl->veths = veths;
    ctrl->nveths = nveths;

2641 2642 2643
    ctrl->passFDs = passFDs;
    ctrl->npassFDs = npassFDs;

I
ik.nitk 已提交
2644 2645 2646 2647
    for (i = 0; i < VIR_LXC_DOMAIN_NAMESPACE_LAST; i++) {
        if (ns_fd[i] != -1) {
            if (!ctrl->nsFDs) {/*allocate only once */
                size_t j = 0;
2648
                ctrl->nsFDs = g_new0(int, VIR_LXC_DOMAIN_NAMESPACE_LAST);
I
ik.nitk 已提交
2649 2650 2651 2652 2653 2654 2655
                for (j = 0; j < VIR_LXC_DOMAIN_NAMESPACE_LAST; j++)
                    ctrl->nsFDs[j] = -1;
            }
            ctrl->nsFDs[i] = ns_fd[i];
        }
    }

2656
    for (i = 0; i < nttyFDs; i++) {
2657 2658 2659 2660 2661
        if (virLXCControllerAddConsole(ctrl, ttyFDs[i]) < 0)
            goto cleanup;
        ttyFDs[i] = -1;
    }

2662
    if (virLXCControllerValidateNICs(ctrl) < 0)
2663
        goto cleanup;
2664

2665 2666 2667
    if (virLXCControllerGetNICIndexes(ctrl) < 0)
        goto cleanup;

2668 2669 2670
    if (virLXCControllerValidateConsoles(ctrl) < 0)
        goto cleanup;

2671
    if (virLXCControllerSetupServer(ctrl) < 0)
2672
        goto cleanup;
2673

2674 2675 2676
    if (bg) {
        if ((pid = fork()) < 0)
            goto cleanup;
2677

2678
        if (pid > 0) {
2679
            if ((rc = virPidFileWrite(LXC_STATE_DIR, name, pid)) < 0) {
2680
                virReportSystemError(-rc,
2681 2682
                                     _("Unable to write pid file '%s/%s.pid'"),
                                     LXC_STATE_DIR, name);
2683 2684
                _exit(1);
            }
2685

2686 2687 2688 2689
            /* First child now exits, allowing original caller
             * (ie libvirtd's LXC driver to complete their
             * waitpid & continue */
            _exit(0);
2690 2691
        }

E
Eric Blake 已提交
2692
        /* Don't hold on to any cwd we inherit from libvirtd either */
2693
        if (chdir("/") < 0) {
2694
            virReportSystemError(errno, "%s",
2695
                                 _("Unable to change to root dir"));
2696 2697 2698 2699
            goto cleanup;
        }

        if (setsid() < 0) {
2700
            virReportSystemError(errno, "%s",
2701
                                 _("Unable to become session leader"));
2702 2703 2704
            goto cleanup;
        }
    }
2705

2706
    rc = virLXCControllerRun(ctrl);
2707

2708
 cleanup:
2709
    if (rc < 0) {
2710 2711 2712
        fprintf(stderr,
                _("Failure in libvirt_lxc startup: %s\n"),
                virGetLastErrorMessage());
2713 2714
    }

2715
    virPidFileDelete(LXC_STATE_DIR, name);
2716 2717
    if (ctrl)
        virLXCControllerDeleteInterfaces(ctrl);
2718
    for (i = 0; i < nttyFDs; i++)
2719
        VIR_FORCE_CLOSE(ttyFDs[i]);
2720 2721
    for (i = 0; i < npassFDs; i++)
        VIR_FORCE_CLOSE(passFDs[i]);
2722

2723
    virLXCControllerFree(ctrl);
2724

2725
    return rc < 0? EXIT_FAILURE : EXIT_SUCCESS;
2726
}