2007-02-14 01:40:09 +00:00
/*
* qemud . c : daemon start of day , guest process & i / o management
*
* Copyright ( C ) 2006 , 2007 Red Hat , Inc .
* Copyright ( C ) 2006 Daniel P . Berrange
*
* This library is free software ; you can redistribute it and / or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation ; either
* version 2.1 of the License , or ( at your option ) any later version .
*
* This library is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* Lesser General Public License for more details .
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place , Suite 330 , Boston , MA 02111 - 1307 USA
*
* Author : Daniel P . Berrange < berrange @ redhat . com >
*/
2007-02-14 15:42:55 +00:00
# include <config.h>
2007-06-11 12:04:54 +00:00
# define _GNU_SOURCE /* for asprintf */
2007-02-14 01:40:09 +00:00
# include <sys/types.h>
# include <sys/wait.h>
# include <sys/stat.h>
# include <unistd.h>
# include <fcntl.h>
# include <paths.h>
# include <limits.h>
# include <sys/socket.h>
# include <sys/un.h>
# include <sys/poll.h>
# include <netinet/in.h>
2007-06-11 12:04:54 +00:00
# include <netinet/tcp.h>
2007-02-14 01:40:09 +00:00
# include <netdb.h>
# include <stdlib.h>
# include <pwd.h>
# include <stdio.h>
2007-02-16 18:30:55 +00:00
# include <stdarg.h>
# include <syslog.h>
2007-02-14 01:40:09 +00:00
# include <string.h>
# include <errno.h>
# include <getopt.h>
2007-06-11 12:04:54 +00:00
# include <assert.h>
# include <fnmatch.h>
2007-09-19 02:28:01 +00:00
# include <grp.h>
2007-04-10 23:17:46 +00:00
2007-02-14 01:40:09 +00:00
# include <libvirt/virterror.h>
# include "internal.h"
2007-06-26 22:56:14 +00:00
# include "../src/internal.h"
2007-06-11 12:04:54 +00:00
# include "../src/remote_internal.h"
# include "../src/conf.h"
2007-06-26 19:11:00 +00:00
# include "event.h"
2007-09-19 01:56:55 +00:00
# ifdef HAVE_AVAHI
# include "mdns.h"
# endif
2007-02-14 01:40:09 +00:00
2007-06-11 12:04:54 +00:00
static int godaemon = 0 ; /* -d: Be a daemon */
static int verbose = 0 ; /* -v: Verbose mode */
2007-06-26 23:48:46 +00:00
static int timeout = - 1 ; /* -t: Shutdown timeout */
2007-06-11 12:04:54 +00:00
static int sigwrite = - 1 ; /* Signal handler pipe */
2007-06-26 23:48:46 +00:00
static int ipsock = 0 ; /* -l Listen for TCP/IP */
2007-06-11 12:04:54 +00:00
2007-06-26 23:48:46 +00:00
/* Defaults for configuration file elements */
2007-06-11 12:04:54 +00:00
static int listen_tls = 1 ;
static int listen_tcp = 0 ;
static const char * tls_port = LIBVIRTD_TLS_PORT ;
static const char * tcp_port = LIBVIRTD_TCP_PORT ;
2007-09-19 02:28:01 +00:00
static gid_t unix_sock_gid = 0 ; /* Only root by default */
static int unix_sock_rw_perms = 0700 ; /* Allow user only */
static int unix_sock_ro_perms = 0777 ; /* Allow world */
2007-09-19 01:56:55 +00:00
# ifdef HAVE_AVAHI
static int mdns_adv = 1 ;
static const char * mdns_name = NULL ;
# endif
2007-06-11 12:04:54 +00:00
static int tls_no_verify_certificate = 0 ;
static int tls_no_verify_address = 0 ;
static const char * * tls_allowed_ip_list = 0 ;
static const char * * tls_allowed_dn_list = 0 ;
static const char * key_file = LIBVIRT_SERVERKEY ;
static const char * cert_file = LIBVIRT_SERVERCERT ;
static const char * ca_file = LIBVIRT_CACERT ;
static const char * crl_file = " " ;
static gnutls_certificate_credentials_t x509_cred ;
static gnutls_dh_params_t dh_params ;
# define DH_BITS 1024
2007-02-16 18:28:17 +00:00
2007-03-27 10:28:45 +00:00
static sig_atomic_t sig_errors = 0 ;
static int sig_lasterrno = 0 ;
2007-02-16 18:28:17 +00:00
static void sig_handler ( int sig ) {
unsigned char sigc = sig ;
int origerrno ;
2007-03-27 10:28:45 +00:00
int r ;
2007-02-16 18:28:17 +00:00
if ( sig = = SIGCHLD ) /* We explicitly waitpid the child later */
return ;
origerrno = errno ;
2007-03-27 10:28:45 +00:00
r = write ( sigwrite , & sigc , 1 ) ;
if ( r = = - 1 ) {
sig_errors + + ;
sig_lasterrno = errno ;
}
2007-02-16 18:28:17 +00:00
errno = origerrno ;
2007-02-14 01:40:09 +00:00
}
2007-02-16 18:28:17 +00:00
2007-06-26 19:11:00 +00:00
static void qemudDispatchClientEvent ( int fd , int events , void * opaque ) ;
static void qemudDispatchServerEvent ( int fd , int events , void * opaque ) ;
static int qemudRegisterClientEvent ( struct qemud_server * server ,
struct qemud_client * client ,
2007-08-07 13:02:35 +00:00
int removeFirst ) ;
2007-06-26 19:11:00 +00:00
2007-07-12 14:54:45 +00:00
static int
remoteCheckCertFile ( const char * type , const char * file )
{
struct stat sb ;
if ( stat ( file , & sb ) < 0 ) {
qemudLog ( QEMUD_ERR , " Cannot access %s '%s': %s (%d) " ,
type , file , strerror ( errno ) , errno ) ;
return - 1 ;
}
return 0 ;
}
2007-06-11 12:04:54 +00:00
static int
remoteInitializeGnuTLS ( void )
{
int err ;
/* Initialise GnuTLS. */
gnutls_global_init ( ) ;
err = gnutls_certificate_allocate_credentials ( & x509_cred ) ;
if ( err ) {
qemudLog ( QEMUD_ERR , " gnutls_certificate_allocate_credentials: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
if ( ca_file & & ca_file [ 0 ] ! = ' \0 ' ) {
2007-07-12 14:54:45 +00:00
if ( remoteCheckCertFile ( " CA certificate " , ca_file ) < 0 )
return - 1 ;
2007-06-11 12:04:54 +00:00
qemudDebug ( " loading CA cert from %s " , ca_file ) ;
err = gnutls_certificate_set_x509_trust_file ( x509_cred , ca_file ,
GNUTLS_X509_FMT_PEM ) ;
if ( err < 0 ) {
qemudLog ( QEMUD_ERR , " gnutls_certificate_set_x509_trust_file: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
}
if ( crl_file & & crl_file [ 0 ] ! = ' \0 ' ) {
2007-07-12 14:54:45 +00:00
if ( remoteCheckCertFile ( " CA revocation list " , ca_file ) < 0 )
return - 1 ;
2007-06-11 12:04:54 +00:00
qemudDebug ( " loading CRL from %s " , crl_file ) ;
err = gnutls_certificate_set_x509_crl_file ( x509_cred , crl_file ,
GNUTLS_X509_FMT_PEM ) ;
if ( err < 0 ) {
qemudLog ( QEMUD_ERR , " gnutls_certificate_set_x509_crl_file: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
}
if ( cert_file & & cert_file [ 0 ] ! = ' \0 ' & & key_file & & key_file [ 0 ] ! = ' \0 ' ) {
2007-07-12 14:54:45 +00:00
if ( remoteCheckCertFile ( " server certificate " , cert_file ) < 0 )
return - 1 ;
if ( remoteCheckCertFile ( " server key " , key_file ) < 0 )
return - 1 ;
2007-06-11 12:04:54 +00:00
qemudDebug ( " loading cert and key from %s and %s " ,
cert_file , key_file ) ;
err =
gnutls_certificate_set_x509_key_file ( x509_cred ,
cert_file , key_file ,
GNUTLS_X509_FMT_PEM ) ;
if ( err < 0 ) {
qemudLog ( QEMUD_ERR , " gnutls_certificate_set_x509_key_file: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
}
/* Generate Diffie Hellman parameters - for use with DHE
* kx algorithms . These should be discarded and regenerated
* once a day , once a week or once a month . Depending on the
* security requirements .
*/
err = gnutls_dh_params_init ( & dh_params ) ;
if ( err < 0 ) {
qemudLog ( QEMUD_ERR , " gnutls_dh_params_init: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
err = gnutls_dh_params_generate2 ( dh_params , DH_BITS ) ;
if ( err < 0 ) {
qemudLog ( QEMUD_ERR , " gnutls_dh_params_generate2: %s " ,
gnutls_strerror ( err ) ) ;
return - 1 ;
}
gnutls_certificate_set_dh_params ( x509_cred , dh_params ) ;
return 0 ;
}
2007-06-26 19:11:00 +00:00
static void qemudDispatchSignalEvent ( int fd ATTRIBUTE_UNUSED ,
int events ATTRIBUTE_UNUSED ,
void * opaque ) {
struct qemud_server * server = ( struct qemud_server * ) opaque ;
2007-02-16 18:28:17 +00:00
unsigned char sigc ;
int ret ;
2007-02-16 18:30:55 +00:00
if ( read ( server - > sigread , & sigc , 1 ) ! = 1 ) {
qemudLog ( QEMUD_ERR , " Failed to read from signal pipe: %s " ,
strerror ( errno ) ) ;
2007-06-26 19:11:00 +00:00
return ;
2007-02-16 18:30:55 +00:00
}
2007-02-16 18:28:17 +00:00
ret = 0 ;
switch ( sigc ) {
case SIGHUP :
2007-02-19 17:00:05 +00:00
qemudLog ( QEMUD_INFO , " Reloading configuration on SIGHUP " ) ;
2007-06-26 22:56:14 +00:00
if ( virStateReload ( ) < 0 )
qemudLog ( QEMUD_WARN , " Error while reloading drivers " ) ;
2007-02-16 18:28:17 +00:00
break ;
case SIGINT :
2007-02-19 16:59:15 +00:00
case SIGQUIT :
2007-02-16 18:28:17 +00:00
case SIGTERM :
2007-02-16 18:30:55 +00:00
qemudLog ( QEMUD_WARN , " Shutting down on signal %d " , sigc ) ;
2007-02-16 18:28:17 +00:00
server - > shutdown = 1 ;
break ;
default :
break ;
}
2007-06-26 19:11:00 +00:00
if ( ret ! = 0 )
server - > shutdown = 1 ;
2007-02-16 18:28:17 +00:00
}
2007-02-14 01:40:09 +00:00
static int qemudSetCloseExec ( int fd ) {
int flags ;
2007-02-16 18:30:55 +00:00
if ( ( flags = fcntl ( fd , F_GETFD ) ) < 0 )
goto error ;
2007-02-14 01:40:09 +00:00
flags | = FD_CLOEXEC ;
2007-02-16 18:30:55 +00:00
if ( ( fcntl ( fd , F_SETFD , flags ) ) < 0 )
goto error ;
2007-02-14 01:40:09 +00:00
return 0 ;
2007-02-16 18:30:55 +00:00
error :
qemudLog ( QEMUD_ERR , " Failed to set close-on-exec file descriptor flag " ) ;
return - 1 ;
2007-02-14 01:40:09 +00:00
}
static int qemudSetNonBlock ( int fd ) {
int flags ;
2007-02-16 18:30:55 +00:00
if ( ( flags = fcntl ( fd , F_GETFL ) ) < 0 )
goto error ;
2007-02-14 01:40:09 +00:00
flags | = O_NONBLOCK ;
2007-02-16 18:30:55 +00:00
if ( ( fcntl ( fd , F_SETFL , flags ) ) < 0 )
goto error ;
2007-02-14 01:40:09 +00:00
return 0 ;
2007-02-16 18:30:55 +00:00
error :
qemudLog ( QEMUD_ERR , " Failed to set non-blocking file descriptor flag " ) ;
return - 1 ;
}
void qemudLog ( int priority , const char * fmt , . . . )
{
va_list args ;
va_start ( args , fmt ) ;
if ( godaemon ) {
int sysprio = - 1 ;
switch ( priority ) {
case QEMUD_ERR :
sysprio = LOG_ERR ;
break ;
case QEMUD_WARN :
sysprio = LOG_WARNING ;
break ;
case QEMUD_INFO :
if ( verbose )
sysprio = LOG_INFO ;
break ;
# ifdef ENABLE_DEBUG
case QEMUD_DEBUG :
if ( verbose )
sysprio = LOG_DEBUG ;
break ;
# endif
default :
break ;
}
if ( sysprio ! = - 1 )
vsyslog ( sysprio , fmt , args ) ;
} else {
switch ( priority ) {
case QEMUD_ERR :
case QEMUD_WARN :
vfprintf ( stderr , fmt , args ) ;
fputc ( ' \n ' , stderr ) ;
break ;
case QEMUD_INFO :
if ( verbose ) {
vprintf ( fmt , args ) ;
fputc ( ' \n ' , stdout ) ;
}
break ;
# ifdef ENABLE_DEBUG
case QEMUD_DEBUG :
if ( verbose ) {
vprintf ( fmt , args ) ;
fputc ( ' \n ' , stdout ) ;
}
break ;
# endif
default :
break ;
}
}
va_end ( args ) ;
2007-02-14 01:40:09 +00:00
}
static int qemudGoDaemon ( void ) {
int pid = fork ( ) ;
switch ( pid ) {
case 0 :
{
int stdinfd = - 1 ;
int stdoutfd = - 1 ;
2007-02-16 18:26:18 +00:00
int nextpid ;
2007-02-14 01:40:09 +00:00
if ( ( stdinfd = open ( _PATH_DEVNULL , O_RDONLY ) ) < 0 )
goto cleanup ;
if ( ( stdoutfd = open ( _PATH_DEVNULL , O_WRONLY ) ) < 0 )
goto cleanup ;
if ( dup2 ( stdinfd , STDIN_FILENO ) ! = STDIN_FILENO )
goto cleanup ;
if ( dup2 ( stdoutfd , STDOUT_FILENO ) ! = STDOUT_FILENO )
goto cleanup ;
if ( dup2 ( stdoutfd , STDERR_FILENO ) ! = STDERR_FILENO )
goto cleanup ;
if ( close ( stdinfd ) < 0 )
goto cleanup ;
stdinfd = - 1 ;
if ( close ( stdoutfd ) < 0 )
goto cleanup ;
stdoutfd = - 1 ;
if ( setsid ( ) < 0 )
goto cleanup ;
nextpid = fork ( ) ;
switch ( nextpid ) {
case 0 :
return 0 ;
case - 1 :
return - 1 ;
default :
return nextpid ;
}
cleanup :
if ( stdoutfd ! = - 1 )
close ( stdoutfd ) ;
if ( stdinfd ! = - 1 )
close ( stdinfd ) ;
return - 1 ;
}
case - 1 :
return - 1 ;
default :
{
int got , status = 0 ;
/* We wait to make sure the next child forked
successfully */
if ( ( got = waitpid ( pid , & status , 0 ) ) < 0 | |
got ! = pid | |
status ! = 0 ) {
return - 1 ;
}
return pid ;
}
}
}
2007-02-23 12:48:36 +00:00
static int qemudWritePidFile ( const char * pidFile ) {
int fd ;
FILE * fh ;
if ( pidFile [ 0 ] = = ' \0 ' )
return 0 ;
if ( ( fd = open ( pidFile , O_WRONLY | O_CREAT | O_EXCL , 0644 ) ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to open pid file '%s' : %s " ,
pidFile , strerror ( errno ) ) ;
return - 1 ;
}
if ( ! ( fh = fdopen ( fd , " w " ) ) ) {
qemudLog ( QEMUD_ERR , " Failed to fdopen pid file '%s' : %s " ,
pidFile , strerror ( errno ) ) ;
close ( fd ) ;
return - 1 ;
}
if ( fprintf ( fh , " %lu \n " , ( unsigned long ) getpid ( ) ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to write to pid file '%s' : %s " ,
pidFile , strerror ( errno ) ) ;
close ( fd ) ;
return - 1 ;
}
if ( fclose ( fh ) = = EOF ) {
qemudLog ( QEMUD_ERR , " Failed to close pid file '%s' : %s " ,
pidFile , strerror ( errno ) ) ;
return - 1 ;
}
return 0 ;
}
2007-02-14 01:40:09 +00:00
static int qemudListenUnix ( struct qemud_server * server ,
const char * path , int readonly ) {
struct qemud_socket * sock = calloc ( 1 , sizeof ( struct qemud_socket ) ) ;
struct sockaddr_un addr ;
mode_t oldmask ;
2007-09-19 02:28:01 +00:00
gid_t oldgrp ;
2007-02-14 01:40:09 +00:00
2007-02-16 18:30:55 +00:00
if ( ! sock ) {
qemudLog ( QEMUD_ERR , " Failed to allocate memory for struct qemud_socket " ) ;
2007-02-14 01:40:09 +00:00
return - 1 ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
sock - > readonly = readonly ;
2007-09-19 01:56:55 +00:00
sock - > port = - 1 ;
2007-02-14 01:40:09 +00:00
2007-02-16 18:30:55 +00:00
if ( ( sock - > fd = socket ( PF_UNIX , SOCK_STREAM , 0 ) ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to create socket: %s " ,
strerror ( errno ) ) ;
2007-06-26 19:11:00 +00:00
goto cleanup ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
2007-02-16 18:30:55 +00:00
if ( qemudSetCloseExec ( sock - > fd ) < 0 | |
qemudSetNonBlock ( sock - > fd ) < 0 )
2007-06-26 19:11:00 +00:00
goto cleanup ;
2007-02-14 01:40:09 +00:00
memset ( & addr , 0 , sizeof ( addr ) ) ;
addr . sun_family = AF_UNIX ;
strncpy ( addr . sun_path , path , sizeof ( addr . sun_path ) - 1 ) ;
if ( addr . sun_path [ 0 ] = = ' @ ' )
addr . sun_path [ 0 ] = ' \0 ' ;
2007-09-19 02:28:01 +00:00
oldgrp = getgid ( ) ;
oldmask = umask ( readonly ? ~ unix_sock_ro_perms : ~ unix_sock_rw_perms ) ;
if ( getuid ( ) = = 0 )
setgid ( unix_sock_gid ) ;
2007-02-16 18:30:55 +00:00
if ( bind ( sock - > fd , ( struct sockaddr * ) & addr , sizeof ( addr ) ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to bind socket to '%s': %s " ,
path , strerror ( errno ) ) ;
2007-06-26 19:11:00 +00:00
goto cleanup ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
umask ( oldmask ) ;
2007-09-19 02:28:01 +00:00
if ( getuid ( ) = = 0 )
setgid ( oldgrp ) ;
2007-02-14 01:40:09 +00:00
2007-02-16 18:30:55 +00:00
if ( listen ( sock - > fd , 30 ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to listen for connections on '%s': %s " ,
path , strerror ( errno ) ) ;
2007-06-26 19:11:00 +00:00
goto cleanup ;
}
2007-06-26 22:51:01 +00:00
if ( virEventAddHandleImpl ( sock - > fd ,
POLLIN | POLLERR | POLLHUP ,
qemudDispatchServerEvent ,
server ) < 0 ) {
2007-06-26 19:11:00 +00:00
qemudLog ( QEMUD_ERR , " Failed to add server event callback " ) ;
goto cleanup ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
2007-06-26 19:11:00 +00:00
sock - > next = server - > sockets ;
server - > sockets = sock ;
server - > nsockets + + ;
2007-02-14 01:40:09 +00:00
return 0 ;
2007-06-26 19:11:00 +00:00
cleanup :
if ( sock - > fd )
close ( sock - > fd ) ;
free ( sock ) ;
return - 1 ;
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
// See: http://people.redhat.com/drepper/userapi-ipv6.html
static int
remoteMakeSockets ( int * fds , int max_fds , int * nfds_r , const char * service )
{
struct addrinfo * ai ;
struct addrinfo hints ;
memset ( & hints , 0 , sizeof hints ) ;
hints . ai_flags = AI_PASSIVE | AI_ADDRCONFIG ;
hints . ai_socktype = SOCK_STREAM ;
int e = getaddrinfo ( NULL , service , & hints , & ai ) ;
if ( e ! = 0 ) {
qemudLog ( QEMUD_ERR , " getaddrinfo: %s \n " , gai_strerror ( e ) ) ;
return - 1 ;
}
struct addrinfo * runp = ai ;
while ( runp & & * nfds_r < max_fds ) {
fds [ * nfds_r ] = socket ( runp - > ai_family , runp - > ai_socktype ,
runp - > ai_protocol ) ;
if ( fds [ * nfds_r ] = = - 1 ) {
qemudLog ( QEMUD_ERR , " socket: %s " , strerror ( errno ) ) ;
return - 1 ;
}
int opt = 1 ;
setsockopt ( fds [ * nfds_r ] , SOL_SOCKET , SO_REUSEADDR , & opt , sizeof opt ) ;
if ( bind ( fds [ * nfds_r ] , runp - > ai_addr , runp - > ai_addrlen ) = = - 1 ) {
if ( errno ! = EADDRINUSE ) {
qemudLog ( QEMUD_ERR , " bind: %s " , strerror ( errno ) ) ;
return - 1 ;
}
close ( fds [ * nfds_r ] ) ;
}
else {
if ( listen ( fds [ * nfds_r ] , SOMAXCONN ) = = - 1 ) {
qemudLog ( QEMUD_ERR , " listen: %s " , strerror ( errno ) ) ;
return - 1 ;
}
+ + * nfds_r ;
}
runp = runp - > ai_next ;
}
2007-02-23 09:10:28 +00:00
2007-06-11 12:04:54 +00:00
freeaddrinfo ( ai ) ;
return 0 ;
}
/* Listen on the named/numbered TCP port. On a machine with IPv4 and
* IPv6 interfaces this may generate several sockets .
*/
static int
remoteListenTCP ( struct qemud_server * server ,
const char * port ,
int tls )
{
int fds [ 2 ] ;
int nfds = 0 ;
2007-02-23 09:10:28 +00:00
int i ;
2007-06-11 12:04:54 +00:00
struct qemud_socket * sock ;
if ( remoteMakeSockets ( fds , 2 , & nfds , port ) = = - 1 )
return - 1 ;
for ( i = 0 ; i < nfds ; + + i ) {
2007-09-19 01:56:55 +00:00
struct sockaddr_storage sa ;
socklen_t salen = sizeof ( sa ) ;
2007-06-11 12:04:54 +00:00
sock = calloc ( 1 , sizeof * sock ) ;
2007-02-20 09:04:27 +00:00
2007-06-11 12:04:54 +00:00
if ( ! sock ) {
qemudLog ( QEMUD_ERR ,
" remoteListenTCP: calloc: %s " , strerror ( errno ) ) ;
return - 1 ;
}
sock - > readonly = 0 ;
sock - > next = server - > sockets ;
server - > sockets = sock ;
server - > nsockets + + ;
sock - > fd = fds [ i ] ;
sock - > tls = tls ;
2007-02-14 01:40:09 +00:00
2007-09-19 01:56:55 +00:00
if ( getsockname ( sock - > fd , ( struct sockaddr * ) ( & sa ) , & salen ) < 0 )
return - 1 ;
if ( sa . ss_family = = AF_INET )
sock - > port = htons ( ( ( struct sockaddr_in * ) & sa ) - > sin_port ) ;
else if ( sa . ss_family = = AF_INET6 )
sock - > port = htons ( ( ( struct sockaddr_in6 * ) & sa ) - > sin6_port ) ;
else
sock - > port = - 1 ;
2007-06-11 12:04:54 +00:00
if ( qemudSetCloseExec ( sock - > fd ) < 0 | |
qemudSetNonBlock ( sock - > fd ) < 0 )
return - 1 ;
if ( listen ( sock - > fd , 30 ) < 0 ) {
qemudLog ( QEMUD_ERR ,
" remoteListenTCP: listen: %s " , strerror ( errno ) ) ;
2007-02-20 09:04:27 +00:00
return - 1 ;
}
2007-06-26 19:11:00 +00:00
2007-06-26 22:51:01 +00:00
if ( virEventAddHandleImpl ( sock - > fd ,
POLLIN | POLLERR | POLLHUP ,
qemudDispatchServerEvent ,
server ) < 0 ) {
2007-06-26 19:11:00 +00:00
qemudLog ( QEMUD_ERR , " Failed to add server event callback " ) ;
return - 1 ;
}
2007-06-11 12:04:54 +00:00
}
return 0 ;
}
static int qemudInitPaths ( struct qemud_server * server ,
char * sockname ,
char * roSockname ,
int maxlen ) {
char * base = 0 ;
2007-06-26 23:48:46 +00:00
uid_t uid = geteuid ( ) ;
2007-06-11 12:04:54 +00:00
2007-06-26 23:48:46 +00:00
if ( ! uid ) {
2007-06-11 12:04:54 +00:00
if ( snprintf ( sockname , maxlen , " %s/run/libvirt/libvirt-sock " ,
LOCAL_STATE_DIR ) > = maxlen )
2007-02-16 18:30:55 +00:00
goto snprintf_error ;
2007-02-14 01:40:09 +00:00
unlink ( sockname ) ;
2007-06-11 12:04:54 +00:00
if ( snprintf ( roSockname , maxlen , " %s/run/libvirt/libvirt-sock-ro " ,
LOCAL_STATE_DIR ) > = maxlen )
2007-02-16 18:30:55 +00:00
goto snprintf_error ;
2007-02-14 01:40:09 +00:00
2007-03-06 16:51:48 +00:00
unlink ( roSockname ) ;
2007-05-18 18:36:24 +00:00
2007-06-26 23:48:46 +00:00
if ( snprintf ( server - > logDir , PATH_MAX , " %s/log/libvirt/ " , LOCAL_STATE_DIR ) > = PATH_MAX )
2007-05-18 18:36:24 +00:00
goto snprintf_error ;
2007-02-14 01:40:09 +00:00
} else {
2007-06-11 12:04:54 +00:00
struct passwd * pw ;
2007-06-26 23:48:46 +00:00
if ( ! ( pw = getpwuid ( uid ) ) ) {
qemudLog ( QEMUD_ERR , " Failed to find user record for uid '%d': %s " ,
uid , strerror ( errno ) ) ;
return - 1 ;
}
2007-06-11 12:04:54 +00:00
2007-06-26 23:48:46 +00:00
if ( snprintf ( sockname , maxlen , " @%s/.libvirt/libvirt-sock " , pw - > pw_dir ) > = maxlen )
goto snprintf_error ;
2007-06-11 12:04:54 +00:00
2007-06-26 23:48:46 +00:00
if ( snprintf ( server - > logDir , PATH_MAX , " %s/.libvirt/log " , pw - > pw_dir ) > = PATH_MAX )
goto snprintf_error ;
2007-06-26 22:13:21 +00:00
2007-06-26 23:48:46 +00:00
if ( asprintf ( & base , " %s/.libvirt " , pw - > pw_dir ) = = - 1 ) {
qemudLog ( QEMUD_ERR , " out of memory in asprintf " ) ;
return - 1 ;
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
} /* !remote */
if ( base ) free ( base ) ;
2007-02-20 09:04:27 +00:00
2007-02-14 01:40:09 +00:00
return 0 ;
2007-02-16 18:30:55 +00:00
snprintf_error :
2007-02-20 09:04:27 +00:00
qemudLog ( QEMUD_ERR , " Resulting path to long for buffer in qemudInitPaths() " ) ;
2007-02-16 18:30:55 +00:00
return - 1 ;
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
static struct qemud_server * qemudInitialize ( int sigread ) {
2007-02-14 01:40:09 +00:00
struct qemud_server * server ;
2007-09-19 01:56:55 +00:00
struct qemud_socket * sock ;
2007-02-20 09:04:27 +00:00
char sockname [ PATH_MAX ] ;
char roSockname [ PATH_MAX ] ;
2007-02-14 01:40:09 +00:00
2007-02-16 18:30:55 +00:00
if ( ! ( server = calloc ( 1 , sizeof ( struct qemud_server ) ) ) ) {
qemudLog ( QEMUD_ERR , " Failed to allocate struct qemud_server " ) ;
2007-02-14 01:40:09 +00:00
return NULL ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
/* We don't have a dom-0, so start from 1 */
2007-02-16 18:28:17 +00:00
server - > sigread = sigread ;
2007-02-14 01:40:09 +00:00
2007-02-20 09:04:27 +00:00
roSockname [ 0 ] = ' \0 ' ;
2007-02-14 22:01:40 +00:00
2007-06-11 12:04:54 +00:00
if ( qemudInitPaths ( server , sockname , roSockname , PATH_MAX ) < 0 )
2007-02-20 09:04:27 +00:00
goto cleanup ;
2007-02-14 01:40:09 +00:00
2007-02-20 09:04:27 +00:00
if ( qemudListenUnix ( server , sockname , 0 ) < 0 )
goto cleanup ;
2007-02-14 15:58:06 +00:00
2007-03-05 16:40:34 +00:00
if ( roSockname [ 0 ] ! = ' \0 ' & & qemudListenUnix ( server , roSockname , 1 ) < 0 )
2007-02-14 01:40:09 +00:00
goto cleanup ;
2007-06-26 23:48:46 +00:00
__virEventRegisterImpl ( virEventAddHandleImpl ,
2007-09-19 01:27:32 +00:00
virEventUpdateHandleImpl ,
2007-06-26 23:48:46 +00:00
virEventRemoveHandleImpl ,
virEventAddTimeoutImpl ,
2007-09-19 01:27:32 +00:00
virEventUpdateTimeoutImpl ,
2007-06-26 23:48:46 +00:00
virEventRemoveTimeoutImpl ) ;
2007-06-26 22:56:14 +00:00
virStateInitialize ( ) ;
2007-06-26 23:48:46 +00:00
if ( ipsock ) {
2007-06-11 12:04:54 +00:00
if ( listen_tcp & & remoteListenTCP ( server , tcp_port , 0 ) < 0 )
goto cleanup ;
if ( listen_tls ) {
if ( remoteInitializeGnuTLS ( ) < 0 )
goto cleanup ;
if ( remoteListenTCP ( server , tls_port , 1 ) < 0 )
goto cleanup ;
}
2007-02-14 01:40:09 +00:00
}
2007-09-19 01:56:55 +00:00
# ifdef HAVE_AVAHI
if ( getuid ( ) = = 0 & & mdns_adv ) {
struct libvirtd_mdns_group * group ;
int port = 0 ;
server - > mdns = libvirtd_mdns_new ( ) ;
if ( ! mdns_name ) {
char groupname [ 64 ] , localhost [ HOST_NAME_MAX + 1 ] , * tmp ;
/* Extract the host part of the potentially FQDN */
gethostname ( localhost , HOST_NAME_MAX ) ;
localhost [ HOST_NAME_MAX ] = ' \0 ' ;
if ( ( tmp = strchr ( localhost , ' . ' ) ) )
* tmp = ' \0 ' ;
snprintf ( groupname , sizeof ( groupname ) - 1 , " Virtualization Host %s " , localhost ) ;
groupname [ sizeof ( groupname ) - 1 ] = ' \0 ' ;
group = libvirtd_mdns_add_group ( server - > mdns , groupname ) ;
} else {
group = libvirtd_mdns_add_group ( server - > mdns , mdns_name ) ;
}
/*
* See if there ' s a TLS enabled port we can advertise . Cowardly
* don ' t bother to advertise TCP since we don ' t want people using
* them for real world apps
*/
sock = server - > sockets ;
while ( sock ) {
if ( sock - > port ! = - 1 & & sock - > tls ) {
port = sock - > port ;
break ;
}
sock = sock - > next ;
}
/*
* Add the primary entry - we choose SSH because its most likely to always
* be available
*/
libvirtd_mdns_add_entry ( group , " _libvirt._tcp " , port ) ;
libvirtd_mdns_start ( server - > mdns ) ;
}
# endif
2007-02-14 01:40:09 +00:00
return server ;
cleanup :
if ( server ) {
2007-09-19 01:56:55 +00:00
sock = server - > sockets ;
2007-02-14 01:40:09 +00:00
while ( sock ) {
close ( sock - > fd ) ;
sock = sock - > next ;
}
free ( server ) ;
}
return NULL ;
}
2007-06-11 12:04:54 +00:00
static gnutls_session_t
remoteInitializeTLSSession ( void )
{
gnutls_session_t session ;
int err ;
err = gnutls_init ( & session , GNUTLS_SERVER ) ;
if ( err ! = 0 ) goto failed ;
/* avoid calling all the priority functions, since the defaults
* are adequate .
*/
err = gnutls_set_default_priority ( session ) ;
if ( err ! = 0 ) goto failed ;
err = gnutls_credentials_set ( session , GNUTLS_CRD_CERTIFICATE , x509_cred ) ;
if ( err ! = 0 ) goto failed ;
/* request client certificate if any.
*/
gnutls_certificate_server_set_request ( session , GNUTLS_CERT_REQUEST ) ;
gnutls_dh_set_prime_bits ( session , DH_BITS ) ;
return session ;
failed :
qemudLog ( QEMUD_ERR , " remoteInitializeTLSSession: %s " ,
gnutls_strerror ( err ) ) ;
return NULL ;
}
/* Check DN is on tls_allowed_dn_list. */
static int
remoteCheckDN ( gnutls_x509_crt_t cert )
{
char name [ 256 ] ;
size_t namesize = sizeof name ;
const char * * wildcards ;
int err ;
err = gnutls_x509_crt_get_dn ( cert , name , & namesize ) ;
if ( err ! = 0 ) {
qemudLog ( QEMUD_ERR ,
" remoteCheckDN: gnutls_x509_cert_get_dn: %s " ,
gnutls_strerror ( err ) ) ;
return 0 ;
}
/* If the list is not set, allow any DN. */
wildcards = tls_allowed_dn_list ;
if ( ! wildcards )
return 1 ;
while ( * wildcards ) {
if ( fnmatch ( * wildcards , name , 0 ) = = 0 )
return 1 ;
wildcards + + ;
}
2007-06-11 13:24:45 +00:00
# ifdef ENABLE_DEBUG
2007-06-11 12:04:54 +00:00
/* Print the client's DN. */
qemudLog ( QEMUD_DEBUG ,
" remoteCheckDN: failed: client DN is %s " , name ) ;
2007-06-11 13:24:45 +00:00
# endif
2007-06-11 12:04:54 +00:00
return 0 ; // Not found.
}
static int
remoteCheckCertificate ( gnutls_session_t session )
{
int ret ;
unsigned int status ;
const gnutls_datum_t * certs ;
unsigned int nCerts , i ;
time_t now ;
if ( ( ret = gnutls_certificate_verify_peers2 ( session , & status ) ) < 0 ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: verify failed: %s " ,
gnutls_strerror ( ret ) ) ;
return - 1 ;
}
if ( status ! = 0 ) {
if ( status & GNUTLS_CERT_INVALID )
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate is not trusted. " ) ;
if ( status & GNUTLS_CERT_SIGNER_NOT_FOUND )
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate hasn't got a known issuer. " ) ;
if ( status & GNUTLS_CERT_REVOKED )
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate has been revoked. " ) ;
2007-08-07 13:02:35 +00:00
# ifndef GNUTLS_1_0_COMPAT
2007-06-11 12:04:54 +00:00
if ( status & GNUTLS_CERT_INSECURE_ALGORITHM )
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate uses an insecure algorithm. " ) ;
2007-08-07 13:02:35 +00:00
# endif
2007-06-11 12:04:54 +00:00
return - 1 ;
}
if ( gnutls_certificate_type_get ( session ) ! = GNUTLS_CRT_X509 ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: certificate is not X.509 " ) ;
return - 1 ;
}
if ( ! ( certs = gnutls_certificate_get_peers ( session , & nCerts ) ) ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: no peers " ) ;
return - 1 ;
}
now = time ( NULL ) ;
for ( i = 0 ; i < nCerts ; i + + ) {
gnutls_x509_crt_t cert ;
if ( gnutls_x509_crt_init ( & cert ) < 0 ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: gnutls_x509_crt_init failed " ) ;
return - 1 ;
}
if ( gnutls_x509_crt_import ( cert , & certs [ i ] , GNUTLS_X509_FMT_DER ) < 0 ) {
gnutls_x509_crt_deinit ( cert ) ;
return - 1 ;
}
if ( gnutls_x509_crt_get_expiration_time ( cert ) < now ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate has expired " ) ;
gnutls_x509_crt_deinit ( cert ) ;
return - 1 ;
}
if ( gnutls_x509_crt_get_activation_time ( cert ) > now ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: the client certificate is not yet activated " ) ;
gnutls_x509_crt_deinit ( cert ) ;
return - 1 ;
}
if ( i = = 0 ) {
if ( ! remoteCheckDN ( cert ) ) {
/* This is the most common error: make it informative. */
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: client's Distinguished Name is not on the list of allowed clients (tls_allowed_dn_list). Use 'openssl x509 -in clientcert.pem -text' to view the Distinguished Name field in the client certificate, or run this daemon with --verbose option. " ) ;
gnutls_x509_crt_deinit ( cert ) ;
return - 1 ;
}
}
}
return 0 ;
}
/* Check the client's access. */
static int
remoteCheckAccess ( struct qemud_client * client )
{
char addr [ NI_MAXHOST ] ;
const char * * wildcards ;
int found , err ;
/* Verify client certificate. */
if ( remoteCheckCertificate ( client - > session ) = = - 1 ) {
qemudLog ( QEMUD_ERR , " remoteCheckCertificate: failed to verify client's certificate " ) ;
if ( ! tls_no_verify_certificate ) return - 1 ;
else qemudLog ( QEMUD_INFO , " remoteCheckCertificate: tls_no_verify_certificate is set so the bad certificate is ignored " ) ;
}
/*----- IP address check, similar to tcp wrappers -----*/
/* Convert IP address to printable string (eg. "127.0.0.1" or "::1"). */
err = getnameinfo ( ( struct sockaddr * ) & client - > addr , client - > addrlen ,
addr , sizeof addr , NULL , 0 ,
NI_NUMERICHOST ) ;
if ( err ! = 0 ) {
qemudLog ( QEMUD_ERR , " getnameinfo: %s " , gai_strerror ( err ) ) ;
return - 1 ;
}
/* Verify the client is on the list of allowed clients.
*
* NB : No tls_allowed_ip_list in config file means anyone can access .
* If tls_allowed_ip_list is in the config file but empty , means no
* one can access ( not particularly useful , but it ' s what the sysadmin
* would expect ) .
*/
wildcards = tls_allowed_ip_list ;
if ( wildcards ) {
found = 0 ;
while ( * wildcards ) {
if ( fnmatch ( * wildcards , addr , 0 ) = = 0 ) {
found = 1 ;
break ;
}
wildcards + + ;
}
} else
found = 1 ;
if ( ! found ) {
qemudLog ( QEMUD_ERR , " remoteCheckAccess: client's IP address (%s) is not on the list of allowed clients (tls_allowed_ip_list) " , addr ) ;
if ( ! tls_no_verify_address ) return - 1 ;
else qemudLog ( QEMUD_INFO , " remoteCheckAccess: tls_no_verify_address is set so the client's IP address is ignored " ) ;
}
/* Checks have succeeded. Write a '\1' byte back to the client to
* indicate this ( otherwise the socket is abruptly closed ) .
* ( NB . The ' \1 ' byte is sent in an encrypted record ) .
*/
client - > bufferLength = 1 ;
client - > bufferOffset = 0 ;
client - > buffer [ 0 ] = ' \1 ' ;
client - > mode = QEMUD_MODE_TX_PACKET ;
client - > direction = QEMUD_TLS_DIRECTION_WRITE ;
return 0 ;
}
2007-02-14 01:40:09 +00:00
static int qemudDispatchServer ( struct qemud_server * server , struct qemud_socket * sock ) {
int fd ;
struct sockaddr_storage addr ;
2007-06-11 12:04:54 +00:00
socklen_t addrlen = ( socklen_t ) ( sizeof addr ) ;
2007-02-14 01:40:09 +00:00
struct qemud_client * client ;
2007-06-11 12:04:54 +00:00
int no_slow_start = 1 ;
2007-02-14 01:40:09 +00:00
if ( ( fd = accept ( sock - > fd , ( struct sockaddr * ) & addr , & addrlen ) ) < 0 ) {
if ( errno = = EAGAIN )
return 0 ;
2007-02-16 18:30:55 +00:00
qemudLog ( QEMUD_ERR , " Failed to accept connection: %s " , strerror ( errno ) ) ;
2007-02-14 01:40:09 +00:00
return - 1 ;
}
2007-06-11 12:04:54 +00:00
/* Disable Nagle. Unix sockets will ignore this. */
setsockopt ( fd , IPPROTO_TCP , TCP_NODELAY , ( void * ) & no_slow_start ,
sizeof no_slow_start ) ;
2007-02-16 18:30:55 +00:00
if ( qemudSetCloseExec ( fd ) < 0 | |
qemudSetNonBlock ( fd ) < 0 ) {
2007-02-14 01:40:09 +00:00
close ( fd ) ;
return - 1 ;
}
client = calloc ( 1 , sizeof ( struct qemud_client ) ) ;
2007-06-11 12:04:54 +00:00
client - > magic = QEMUD_CLIENT_MAGIC ;
2007-02-14 01:40:09 +00:00
client - > fd = fd ;
client - > readonly = sock - > readonly ;
2007-06-11 12:04:54 +00:00
client - > tls = sock - > tls ;
memcpy ( & client - > addr , & addr , sizeof addr ) ;
client - > addrlen = addrlen ;
if ( ! client - > tls ) {
client - > mode = QEMUD_MODE_RX_HEADER ;
client - > bufferLength = QEMUD_PKT_HEADER_XDR_LEN ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 0 ) < 0 )
goto cleanup ;
2007-06-11 12:04:54 +00:00
} else {
int ret ;
client - > session = remoteInitializeTLSSession ( ) ;
2007-06-26 19:11:00 +00:00
if ( client - > session = = NULL )
goto cleanup ;
2007-06-11 12:04:54 +00:00
gnutls_transport_set_ptr ( client - > session ,
( gnutls_transport_ptr_t ) ( long ) fd ) ;
/* Begin the TLS handshake. */
ret = gnutls_handshake ( client - > session ) ;
if ( ret = = 0 ) {
/* Unlikely, but ... Next step is to check the certificate. */
if ( remoteCheckAccess ( client ) = = - 1 )
2007-06-26 19:11:00 +00:00
goto cleanup ;
if ( qemudRegisterClientEvent ( server , client , 0 ) < 0 )
goto cleanup ;
2007-06-11 12:04:54 +00:00
} else if ( ret = = GNUTLS_E_INTERRUPTED | | ret = = GNUTLS_E_AGAIN ) {
/* Most likely. */
client - > mode = QEMUD_MODE_TLS_HANDSHAKE ;
client - > bufferLength = - 1 ;
client - > direction = gnutls_record_get_direction ( client - > session ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 0 ) < 0 )
goto cleanup ;
2007-06-11 12:04:54 +00:00
} else {
qemudLog ( QEMUD_ERR , " TLS handshake failed: %s " ,
gnutls_strerror ( ret ) ) ;
2007-06-26 19:11:00 +00:00
goto cleanup ;
2007-06-11 12:04:54 +00:00
}
}
2007-02-14 01:40:09 +00:00
client - > next = server - > clients ;
server - > clients = client ;
server - > nclients + + ;
return 0 ;
2007-06-11 12:04:54 +00:00
2007-06-26 19:11:00 +00:00
cleanup :
2007-06-11 12:04:54 +00:00
if ( client - > session ) gnutls_deinit ( client - > session ) ;
close ( fd ) ;
free ( client ) ;
return - 1 ;
2007-02-14 01:40:09 +00:00
}
static void qemudDispatchClientFailure ( struct qemud_server * server , struct qemud_client * client ) {
struct qemud_client * tmp = server - > clients ;
struct qemud_client * prev = NULL ;
while ( tmp ) {
if ( tmp = = client ) {
if ( prev = = NULL )
server - > clients = client - > next ;
else
prev - > next = client - > next ;
server - > nclients - - ;
break ;
}
prev = tmp ;
tmp = tmp - > next ;
}
2007-06-11 12:04:54 +00:00
2007-06-26 22:51:01 +00:00
virEventRemoveHandleImpl ( client - > fd ) ;
2007-06-26 19:11:00 +00:00
2007-07-12 15:04:05 +00:00
if ( client - > conn )
virConnectClose ( client - > conn ) ;
2007-06-11 12:04:54 +00:00
if ( client - > tls & & client - > session ) gnutls_deinit ( client - > session ) ;
2007-02-14 01:40:09 +00:00
close ( client - > fd ) ;
free ( client ) ;
}
static int qemudClientRead ( struct qemud_server * server ,
2007-06-11 12:04:54 +00:00
struct qemud_client * client ) {
int ret , len ;
char * data ;
data = client - > buffer + client - > bufferOffset ;
len = client - > bufferLength - client - > bufferOffset ;
/*qemudDebug ("qemudClientRead: len = %d", len);*/
if ( ! client - > tls ) {
if ( ( ret = read ( client - > fd , data , len ) ) < = 0 ) {
if ( ret = = 0 | | errno ! = EAGAIN ) {
if ( ret ! = 0 )
qemudLog ( QEMUD_ERR , " read: %s " , strerror ( errno ) ) ;
qemudDispatchClientFailure ( server , client ) ;
}
return - 1 ;
}
} else {
ret = gnutls_record_recv ( client - > session , data , len ) ;
client - > direction = gnutls_record_get_direction ( client - > session ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
qemudDispatchClientFailure ( server , client ) ;
2007-07-12 15:04:05 +00:00
else if ( ret < = 0 ) {
2007-06-11 12:04:54 +00:00
if ( ret = = 0 | | ( ret ! = GNUTLS_E_AGAIN & &
ret ! = GNUTLS_E_INTERRUPTED ) ) {
if ( ret ! = 0 )
qemudLog ( QEMUD_ERR , " gnutls_record_recv: %s " ,
gnutls_strerror ( ret ) ) ;
qemudDispatchClientFailure ( server , client ) ;
}
return - 1 ;
}
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
client - > bufferOffset + = ret ;
return 0 ;
2007-02-14 01:40:09 +00:00
}
static void qemudDispatchClientRead ( struct qemud_server * server , struct qemud_client * client ) {
2007-06-11 12:04:54 +00:00
/*qemudDebug ("qemudDispatchClientRead: mode = %d", client->mode);*/
2007-02-14 01:40:09 +00:00
2007-06-11 12:04:54 +00:00
switch ( client - > mode ) {
case QEMUD_MODE_RX_HEADER : {
XDR x ;
qemud_packet_header h ;
if ( qemudClientRead ( server , client ) < 0 )
return ; /* Error, or blocking */
if ( client - > bufferOffset < client - > bufferLength )
return ; /* Not read enough */
xdrmem_create ( & x , client - > buffer , client - > bufferLength , XDR_DECODE ) ;
if ( ! xdr_qemud_packet_header ( & x , & h ) ) {
qemudDebug ( " Failed to decode packet header " ) ;
2007-02-14 01:40:09 +00:00
qemudDispatchClientFailure ( server , client ) ;
return ;
}
2007-06-11 12:04:54 +00:00
2007-06-26 23:48:46 +00:00
if ( h . prog ! = REMOTE_PROGRAM ) {
2007-06-11 12:04:54 +00:00
qemudDebug ( " Header magic %x mismatch " , h . prog ) ;
qemudDispatchClientFailure ( server , client ) ;
return ;
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
/* NB: h.length is unsigned. */
if ( h . length > REMOTE_MESSAGE_MAX ) {
qemudDebug ( " Packet length %u too large " , h . length ) ;
qemudDispatchClientFailure ( server , client ) ;
return ;
}
client - > mode = QEMUD_MODE_RX_PAYLOAD ;
client - > bufferLength = h . length ;
if ( client - > tls ) client - > direction = QEMUD_TLS_DIRECTION_READ ;
/* Note that we don't reset bufferOffset here because we want
* to retain the whole message , including header .
*/
xdr_destroy ( & x ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 ) {
qemudDispatchClientFailure ( server , client ) ;
return ;
}
2007-06-11 12:04:54 +00:00
/* Fall through */
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
case QEMUD_MODE_RX_PAYLOAD : {
XDR x ;
qemud_packet_header h ;
if ( qemudClientRead ( server , client ) < 0 )
return ; /* Error, or blocking */
if ( client - > bufferOffset < client - > bufferLength )
return ; /* Not read enough */
/* Reparse the header to decide if this is for qemud or remote. */
xdrmem_create ( & x , client - > buffer , client - > bufferLength , XDR_DECODE ) ;
if ( ! xdr_qemud_packet_header ( & x , & h ) ) {
qemudDebug ( " Failed to decode packet header " ) ;
qemudDispatchClientFailure ( server , client ) ;
return ;
}
2007-06-26 23:48:46 +00:00
if ( h . prog = = REMOTE_PROGRAM ) {
2007-06-11 12:04:54 +00:00
remoteDispatchClientRequest ( server , client ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
qemudDispatchClientFailure ( server , client ) ;
2007-06-11 12:04:54 +00:00
} else {
/* An internal error. */
2007-06-26 23:48:46 +00:00
qemudDebug ( " Not REMOTE_PROGRAM " ) ;
2007-02-14 01:40:09 +00:00
qemudDispatchClientFailure ( server , client ) ;
2007-06-11 12:04:54 +00:00
}
xdr_destroy ( & x ) ;
break ;
}
case QEMUD_MODE_TLS_HANDSHAKE : {
int ret ;
/* Continue the handshake. */
ret = gnutls_handshake ( client - > session ) ;
if ( ret = = 0 ) {
/* Finished. Next step is to check the certificate. */
if ( remoteCheckAccess ( client ) = = - 1 )
qemudDispatchClientFailure ( server , client ) ;
2007-07-12 15:04:05 +00:00
else if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
2007-06-26 19:11:00 +00:00
qemudDispatchClientFailure ( server , client ) ;
2007-06-11 12:04:54 +00:00
} else if ( ret ! = GNUTLS_E_AGAIN & & ret ! = GNUTLS_E_INTERRUPTED ) {
qemudLog ( QEMUD_ERR , " TLS handshake failed: %s " ,
gnutls_strerror ( ret ) ) ;
qemudDispatchClientFailure ( server , client ) ;
2007-06-26 19:11:00 +00:00
} else {
2007-06-11 12:04:54 +00:00
client - > direction = gnutls_record_get_direction ( client - > session ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
qemudDispatchClientFailure ( server , client ) ;
}
2007-06-11 12:04:54 +00:00
break ;
}
default :
qemudDebug ( " Got unexpected data read while in %d mode " , client - > mode ) ;
qemudDispatchClientFailure ( server , client ) ;
2007-02-14 01:40:09 +00:00
}
}
static int qemudClientWrite ( struct qemud_server * server ,
2007-06-11 12:04:54 +00:00
struct qemud_client * client ) {
int ret , len ;
char * data ;
data = client - > buffer + client - > bufferOffset ;
len = client - > bufferLength - client - > bufferOffset ;
if ( ! client - > tls ) {
if ( ( ret = write ( client - > fd , data , len ) ) = = - 1 ) {
if ( errno ! = EAGAIN ) {
qemudLog ( QEMUD_ERR , " write: %s " , strerror ( errno ) ) ;
qemudDispatchClientFailure ( server , client ) ;
}
return - 1 ;
}
} else {
ret = gnutls_record_send ( client - > session , data , len ) ;
client - > direction = gnutls_record_get_direction ( client - > session ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
qemudDispatchClientFailure ( server , client ) ;
2007-07-12 15:04:05 +00:00
else if ( ret < 0 ) {
2007-06-11 12:04:54 +00:00
if ( ret ! = GNUTLS_E_INTERRUPTED & & ret ! = GNUTLS_E_AGAIN ) {
qemudLog ( QEMUD_ERR , " gnutls_record_send: %s " ,
gnutls_strerror ( ret ) ) ;
qemudDispatchClientFailure ( server , client ) ;
}
return - 1 ;
}
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
client - > bufferOffset + = ret ;
return 0 ;
2007-02-14 01:40:09 +00:00
}
static void qemudDispatchClientWrite ( struct qemud_server * server , struct qemud_client * client ) {
2007-06-11 12:04:54 +00:00
switch ( client - > mode ) {
case QEMUD_MODE_TX_PACKET : {
if ( qemudClientWrite ( server , client ) < 0 )
return ;
if ( client - > bufferOffset = = client - > bufferLength ) {
/* Done writing, switch back to receive */
client - > mode = QEMUD_MODE_RX_HEADER ;
client - > bufferLength = QEMUD_PKT_HEADER_XDR_LEN ;
client - > bufferOffset = 0 ;
if ( client - > tls ) client - > direction = QEMUD_TLS_DIRECTION_READ ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) < 0 )
qemudDispatchClientFailure ( server , client ) ;
2007-06-11 12:04:54 +00:00
}
/* Still writing */
break ;
}
case QEMUD_MODE_TLS_HANDSHAKE : {
int ret ;
/* Continue the handshake. */
ret = gnutls_handshake ( client - > session ) ;
if ( ret = = 0 ) {
/* Finished. Next step is to check the certificate. */
if ( remoteCheckAccess ( client ) = = - 1 )
qemudDispatchClientFailure ( server , client ) ;
2007-07-12 15:04:05 +00:00
else if ( qemudRegisterClientEvent ( server , client , 1 ) )
2007-06-26 19:11:00 +00:00
qemudDispatchClientFailure ( server , client ) ;
2007-06-11 12:04:54 +00:00
} else if ( ret ! = GNUTLS_E_AGAIN & & ret ! = GNUTLS_E_INTERRUPTED ) {
qemudLog ( QEMUD_ERR , " TLS handshake failed: %s " ,
gnutls_strerror ( ret ) ) ;
qemudDispatchClientFailure ( server , client ) ;
2007-06-26 19:11:00 +00:00
} else {
2007-06-11 12:04:54 +00:00
client - > direction = gnutls_record_get_direction ( client - > session ) ;
2007-06-26 19:11:00 +00:00
if ( qemudRegisterClientEvent ( server , client , 1 ) )
qemudDispatchClientFailure ( server , client ) ;
}
2007-06-11 12:04:54 +00:00
break ;
}
default :
qemudDebug ( " Got unexpected data write while in %d mode " , client - > mode ) ;
qemudDispatchClientFailure ( server , client ) ;
2007-02-14 01:40:09 +00:00
}
}
2007-06-26 19:11:00 +00:00
static void qemudDispatchClientEvent ( int fd , int events , void * opaque ) {
struct qemud_server * server = ( struct qemud_server * ) opaque ;
struct qemud_client * client = server - > clients ;
2007-02-23 08:39:49 +00:00
2007-03-05 17:15:20 +00:00
while ( client ) {
2007-06-26 19:11:00 +00:00
if ( client - > fd = = fd )
break ;
client = client - > next ;
}
2007-06-11 12:04:54 +00:00
2007-06-26 19:11:00 +00:00
if ( ! client )
return ;
2007-06-11 12:04:54 +00:00
2007-06-26 19:11:00 +00:00
if ( events = = POLLOUT )
qemudDispatchClientWrite ( server , client ) ;
else if ( events = = POLLIN )
qemudDispatchClientRead ( server , client ) ;
else
qemudDispatchClientFailure ( server , client ) ;
}
static int qemudRegisterClientEvent ( struct qemud_server * server ,
struct qemud_client * client ,
int removeFirst ) {
if ( removeFirst )
2007-06-26 22:51:01 +00:00
if ( virEventRemoveHandleImpl ( client - > fd ) < 0 )
2007-06-26 19:11:00 +00:00
return - 1 ;
if ( client - > tls ) {
2007-06-26 22:51:01 +00:00
if ( virEventAddHandleImpl ( client - > fd ,
( client - > direction ?
POLLOUT : POLLIN ) | POLLERR | POLLHUP ,
qemudDispatchClientEvent ,
server ) < 0 )
2007-06-26 19:11:00 +00:00
return - 1 ;
} else {
2007-06-26 22:51:01 +00:00
if ( virEventAddHandleImpl ( client - > fd ,
( client - > mode = = QEMUD_MODE_TX_PACKET ?
POLLOUT : POLLIN ) | POLLERR | POLLHUP ,
qemudDispatchClientEvent ,
server ) < 0 )
2007-06-26 19:11:00 +00:00
return - 1 ;
2007-03-05 17:15:20 +00:00
}
2007-06-26 19:11:00 +00:00
return 0 ;
}
static void qemudDispatchServerEvent ( int fd , int events , void * opaque ) {
struct qemud_server * server = ( struct qemud_server * ) opaque ;
struct qemud_socket * sock = server - > sockets ;
2007-03-05 17:15:20 +00:00
while ( sock ) {
2007-06-26 19:11:00 +00:00
if ( sock - > fd = = fd )
break ;
sock = sock - > next ;
2007-03-05 17:15:20 +00:00
}
2007-02-14 01:40:09 +00:00
2007-06-26 19:11:00 +00:00
if ( ! sock )
return ;
if ( events )
qemudDispatchServer ( server , sock ) ;
}
2007-06-26 20:51:00 +00:00
static int qemudOneLoop ( void ) {
2007-03-27 10:28:45 +00:00
sig_atomic_t errors ;
2007-02-14 01:40:09 +00:00
2007-06-26 19:11:00 +00:00
if ( virEventRunOnce ( ) < 0 )
2007-02-14 01:40:09 +00:00
return - 1 ;
2007-03-27 10:28:45 +00:00
/* Check for any signal handling errors and log them. */
errors = sig_errors ;
if ( errors ) {
sig_errors - = errors ;
qemudLog ( QEMUD_ERR ,
" Signal handler reported %d errors: last error: %s " ,
errors , strerror ( sig_lasterrno ) ) ;
return - 1 ;
}
2007-02-14 01:40:09 +00:00
return 0 ;
}
2007-06-26 22:56:14 +00:00
static void qemudInactiveTimer ( int timer ATTRIBUTE_UNUSED , void * data ) {
struct qemud_server * server = ( struct qemud_server * ) data ;
qemudDebug ( " Got inactive timer expiry " ) ;
if ( ! virStateActive ( ) ) {
qemudDebug ( " No state active, shutting down " ) ;
server - > shutdown = 1 ;
}
}
2007-06-11 12:04:54 +00:00
static int qemudRunLoop ( struct qemud_server * server ) {
2007-06-26 22:56:14 +00:00
int timerid = - 1 ;
for ( ; ; ) {
/* A shutdown timeout is specified, so check
* if any drivers have active state , if not
* shutdown after timeout seconds
*/
if ( timeout > 0 & & ! virStateActive ( ) & & ! server - > clients ) {
timerid = virEventAddTimeoutImpl ( timeout * 1000 , qemudInactiveTimer , server ) ;
qemudDebug ( " Scheduling shutdown timer %d " , timerid ) ;
}
if ( qemudOneLoop ( ) < 0 )
break ;
2007-02-14 01:40:09 +00:00
2007-06-26 22:56:14 +00:00
/* Unregister any timeout that's active, since we
* just had an event processed
*/
if ( timerid ! = - 1 ) {
qemudDebug ( " Removing shutdown timer %d " , timerid ) ;
virEventRemoveTimeoutImpl ( timerid ) ;
timerid = - 1 ;
}
2007-02-14 01:40:09 +00:00
2007-06-26 22:56:14 +00:00
if ( server - > shutdown )
return 0 ;
}
return - 1 ;
2007-02-14 01:40:09 +00:00
}
static void qemudCleanup ( struct qemud_server * server ) {
2007-02-20 17:51:41 +00:00
struct qemud_socket * sock ;
2007-02-16 18:28:17 +00:00
close ( server - > sigread ) ;
2007-02-20 17:51:41 +00:00
sock = server - > sockets ;
2007-02-14 01:40:09 +00:00
while ( sock ) {
2007-02-20 17:51:41 +00:00
struct qemud_socket * next = sock - > next ;
2007-02-14 01:40:09 +00:00
close ( sock - > fd ) ;
2007-02-20 17:51:41 +00:00
free ( sock ) ;
sock = next ;
2007-02-14 01:40:09 +00:00
}
2007-02-20 17:51:41 +00:00
2007-06-26 22:56:14 +00:00
virStateCleanup ( ) ;
2007-06-11 12:04:54 +00:00
2007-02-14 01:40:09 +00:00
free ( server ) ;
}
2007-06-11 12:04:54 +00:00
/* Read the config file if it exists.
* Only used in the remote case , hence the name .
*/
static int
remoteReadConfigFile ( const char * filename )
{
virConfPtr conf ;
/* Just check the file is readable before opening it, otherwise
* libvirt emits an error .
*/
if ( access ( filename , R_OK ) = = - 1 ) return 0 ;
conf = virConfReadFile ( filename ) ;
if ( ! conf ) return 0 ;
virConfValuePtr p ;
# define CHECK_TYPE(name,typ) if (p && p->type != (typ)) { \
qemudLog ( QEMUD_ERR , \
" remoteReadConfigFile: %s: %s: expected type " # typ " \n " , \
filename , ( name ) ) ; \
return - 1 ; \
}
p = virConfGetValue ( conf , " listen_tls " ) ;
CHECK_TYPE ( " listen_tls " , VIR_CONF_LONG ) ;
listen_tls = p ? p - > l : listen_tls ;
p = virConfGetValue ( conf , " listen_tcp " ) ;
CHECK_TYPE ( " listen_tcp " , VIR_CONF_LONG ) ;
listen_tcp = p ? p - > l : listen_tcp ;
p = virConfGetValue ( conf , " tls_port " ) ;
CHECK_TYPE ( " tls_port " , VIR_CONF_STRING ) ;
tls_port = p ? strdup ( p - > str ) : tls_port ;
p = virConfGetValue ( conf , " tcp_port " ) ;
CHECK_TYPE ( " tcp_port " , VIR_CONF_STRING ) ;
tcp_port = p ? strdup ( p - > str ) : tcp_port ;
2007-09-19 02:28:01 +00:00
p = virConfGetValue ( conf , " unix_sock_group " ) ;
CHECK_TYPE ( " unix_sock_group " , VIR_CONF_STRING ) ;
if ( p & & p - > str ) {
if ( getuid ( ) ! = 0 ) {
qemudLog ( QEMUD_WARN , " Cannot set group when not running as root " ) ;
} else {
struct group * grp = getgrnam ( p - > str ) ;
if ( ! grp ) {
qemudLog ( QEMUD_ERR , " Failed to lookup group '%s' " , p - > str ) ;
return - 1 ;
}
unix_sock_gid = grp - > gr_gid ;
}
}
p = virConfGetValue ( conf , " unix_sock_ro_perms " ) ;
CHECK_TYPE ( " unix_sock_ro_perms " , VIR_CONF_STRING ) ;
if ( p & & p - > str ) {
char * tmp = NULL ;
unix_sock_ro_perms = strtol ( p - > str , & tmp , 8 ) ;
if ( * tmp ) {
qemudLog ( QEMUD_ERR , " Failed to parse mode '%s' " , p - > str ) ;
return - 1 ;
}
}
p = virConfGetValue ( conf , " unix_sock_rw_perms " ) ;
CHECK_TYPE ( " unix_sock_rw_perms " , VIR_CONF_STRING ) ;
if ( p & & p - > str ) {
char * tmp = NULL ;
unix_sock_rw_perms = strtol ( p - > str , & tmp , 8 ) ;
if ( * tmp ) {
qemudLog ( QEMUD_ERR , " Failed to parse mode '%s' " , p - > str ) ;
return - 1 ;
}
}
2007-09-19 01:56:55 +00:00
# ifdef HAVE_AVAHI
p = virConfGetValue ( conf , " mdns_adv " ) ;
CHECK_TYPE ( " mdns_adv " , VIR_CONF_LONG ) ;
mdns_adv = p ? p - > l : mdns_adv ;
p = virConfGetValue ( conf , " mdns_name " ) ;
CHECK_TYPE ( " mdns_name " , VIR_CONF_STRING ) ;
mdns_name = p ? strdup ( p - > str ) : NULL ;
# endif
2007-06-11 12:04:54 +00:00
p = virConfGetValue ( conf , " tls_no_verify_certificate " ) ;
CHECK_TYPE ( " tls_no_verify_certificate " , VIR_CONF_LONG ) ;
tls_no_verify_certificate = p ? p - > l : tls_no_verify_certificate ;
p = virConfGetValue ( conf , " tls_no_verify_address " ) ;
CHECK_TYPE ( " tls_no_verify_address " , VIR_CONF_LONG ) ;
tls_no_verify_address = p ? p - > l : tls_no_verify_address ;
p = virConfGetValue ( conf , " key_file " ) ;
CHECK_TYPE ( " key_file " , VIR_CONF_STRING ) ;
key_file = p ? strdup ( p - > str ) : key_file ;
p = virConfGetValue ( conf , " cert_file " ) ;
CHECK_TYPE ( " cert_file " , VIR_CONF_STRING ) ;
cert_file = p ? strdup ( p - > str ) : cert_file ;
p = virConfGetValue ( conf , " ca_file " ) ;
CHECK_TYPE ( " ca_file " , VIR_CONF_STRING ) ;
ca_file = p ? strdup ( p - > str ) : ca_file ;
p = virConfGetValue ( conf , " crl_file " ) ;
CHECK_TYPE ( " crl_file " , VIR_CONF_STRING ) ;
crl_file = p ? strdup ( p - > str ) : crl_file ;
p = virConfGetValue ( conf , " tls_allowed_dn_list " ) ;
if ( p ) {
switch ( p - > type ) {
case VIR_CONF_STRING :
tls_allowed_dn_list = malloc ( 2 * sizeof ( char * ) ) ;
tls_allowed_dn_list [ 0 ] = strdup ( p - > str ) ;
tls_allowed_dn_list [ 1 ] = 0 ;
break ;
case VIR_CONF_LIST : {
int i , len = 0 ;
virConfValuePtr pp ;
for ( pp = p - > list ; pp ; pp = p - > next )
len + + ;
tls_allowed_dn_list =
malloc ( ( 1 + len ) * sizeof ( char * ) ) ;
for ( i = 0 , pp = p - > list ; pp ; + + i , pp = p - > next ) {
if ( pp - > type ! = VIR_CONF_STRING ) {
qemudLog ( QEMUD_ERR , " remoteReadConfigFile: %s: tls_allowed_dn_list: should be a string or list of strings \n " , filename ) ;
return - 1 ;
}
tls_allowed_dn_list [ i ] = strdup ( pp - > str ) ;
}
tls_allowed_dn_list [ i ] = 0 ;
break ;
}
default :
qemudLog ( QEMUD_ERR , " remoteReadConfigFile: %s: tls_allowed_dn_list: should be a string or list of strings \n " , filename ) ;
return - 1 ;
}
}
p = virConfGetValue ( conf , " tls_allowed_ip_list " ) ;
if ( p ) {
switch ( p - > type ) {
case VIR_CONF_STRING :
tls_allowed_ip_list = malloc ( 2 * sizeof ( char * ) ) ;
tls_allowed_ip_list [ 0 ] = strdup ( p - > str ) ;
tls_allowed_ip_list [ 1 ] = 0 ;
break ;
case VIR_CONF_LIST : {
int i , len = 0 ;
virConfValuePtr pp ;
for ( pp = p - > list ; pp ; pp = p - > next )
len + + ;
tls_allowed_ip_list =
malloc ( ( 1 + len ) * sizeof ( char * ) ) ;
for ( i = 0 , pp = p - > list ; pp ; + + i , pp = p - > next ) {
if ( pp - > type ! = VIR_CONF_STRING ) {
qemudLog ( QEMUD_ERR , " remoteReadConfigFile: %s: tls_allowed_ip_list: should be a string or list of strings \n " , filename ) ;
return - 1 ;
}
tls_allowed_ip_list [ i ] = strdup ( pp - > str ) ;
}
tls_allowed_ip_list [ i ] = 0 ;
break ;
}
default :
qemudLog ( QEMUD_ERR , " remoteReadConfigFile: %s: tls_allowed_ip_list: should be a string or list of strings \n " , filename ) ;
return - 1 ;
}
}
virConfFree ( conf ) ;
return 0 ;
}
2007-04-04 09:32:00 +00:00
/* Print command-line usage. */
static void
usage ( const char * argv0 )
{
fprintf ( stderr ,
2007-06-11 12:04:54 +00:00
" \n \
Usage : \ n \
% s [ options ] \ n \
\ n \
Options : \ n \
- v | - - verbose Verbose messages . \ n \
- d | - - daemon Run as a daemon & write PID file . \ n \
2007-06-26 23:48:46 +00:00
- l | - - listen Listen for TCP / IP connections . \ n \
- t | - - timeout < secs > Exit after timeout period . \ n \
2007-08-07 13:24:22 +00:00
- f | - - config < file > Configuration file . \ n \
2007-06-11 12:04:54 +00:00
- p | - - pid - file < file > Change name of PID file . \ n \
\ n \
2007-06-26 23:48:46 +00:00
libvirt management daemon : \ n \
2007-06-11 12:04:54 +00:00
\ n \
Default paths : \ n \
\ n \
2007-06-26 23:48:46 +00:00
Configuration file ( unless overridden by - c ) : \ n \
2007-06-11 12:04:54 +00:00
" SYSCONF_DIR " / libvirt / libvirtd . conf \ n \
\ n \
2007-06-26 23:48:46 +00:00
Sockets ( as root ) : \ n \
2007-06-11 12:04:54 +00:00
" LOCAL_STATE_DIR " / run / libvirt / libvirt - sock \ n \
" LOCAL_STATE_DIR " / run / libvirt / libvirt - sock - ro \ n \
2007-06-26 23:48:46 +00:00
\ n \
Sockets ( as non - root ) : \ n \
$ HOME / . libvirt / libvirt - sock ( in UNIX abstract namespace ) \ n \
2007-06-11 12:04:54 +00:00
\ n \
TLS : \ n \
CA certificate : " LIBVIRT_CACERT " \ n \
Server certificate : " LIBVIRT_SERVERCERT " \ n \
Server private key : " LIBVIRT_SERVERKEY " \ n \
\ n \
PID file ( unless overridden by - - pid - file ) : \ n \
% s \ n \
\ n " ,
argv0 ,
REMOTE_PID_FILE [ 0 ] ! = ' \0 '
? REMOTE_PID_FILE
: " (disabled in ./configure) " ) ;
2007-04-04 09:32:00 +00:00
}
2007-02-14 01:40:09 +00:00
# define MAX_LISTEN 5
int main ( int argc , char * * argv ) {
struct qemud_server * server ;
2007-02-16 18:28:17 +00:00
struct sigaction sig_action ;
int sigpipe [ 2 ] ;
2007-06-11 12:04:54 +00:00
const char * pid_file = NULL ;
const char * remote_config_file = SYSCONF_DIR " /libvirt/libvirtd.conf " ;
2007-02-23 12:48:36 +00:00
int ret = 1 ;
2007-02-14 01:40:09 +00:00
struct option opts [ ] = {
{ " verbose " , no_argument , & verbose , 1 } ,
{ " daemon " , no_argument , & godaemon , 1 } ,
2007-06-26 23:48:46 +00:00
{ " listen " , no_argument , & ipsock , 1 } ,
2007-08-07 13:24:22 +00:00
{ " config " , required_argument , NULL , ' f ' } ,
2007-04-04 09:32:00 +00:00
{ " timeout " , required_argument , NULL , ' t ' } ,
{ " pid-file " , required_argument , NULL , ' p ' } ,
{ " help " , no_argument , NULL , ' ? ' } ,
2007-02-14 01:40:09 +00:00
{ 0 , 0 , 0 , 0 }
} ;
while ( 1 ) {
int optidx = 0 ;
int c ;
char * tmp ;
2007-08-07 13:24:22 +00:00
c = getopt_long ( argc , argv , " ldf:p:t:v " , opts , & optidx ) ;
2007-02-14 01:40:09 +00:00
if ( c = = - 1 ) {
break ;
}
switch ( c ) {
case 0 :
/* Got one of the flags */
break ;
case ' v ' :
verbose = 1 ;
break ;
case ' d ' :
godaemon = 1 ;
break ;
2007-06-26 23:48:46 +00:00
case ' l ' :
ipsock = 1 ;
2007-02-14 01:40:09 +00:00
break ;
case ' t ' :
timeout = strtol ( optarg , & tmp , 10 ) ;
if ( ! tmp )
timeout = - 1 ;
if ( timeout < = 0 )
timeout = - 1 ;
break ;
2007-02-23 12:48:36 +00:00
case ' p ' :
2007-06-11 12:04:54 +00:00
pid_file = optarg ;
break ;
case ' f ' :
remote_config_file = optarg ;
2007-02-23 12:48:36 +00:00
break ;
2007-02-14 01:40:09 +00:00
case ' ? ' :
2007-04-04 09:32:00 +00:00
usage ( argv [ 0 ] ) ;
2007-02-14 01:40:09 +00:00
return 2 ;
default :
2007-08-07 13:24:22 +00:00
fprintf ( stderr , " libvirtd: internal error: unknown flag: %c \n " ,
c ) ;
exit ( 1 ) ;
2007-02-14 01:40:09 +00:00
}
}
2007-06-26 23:48:46 +00:00
/* Read the config file (if it exists). */
if ( remoteReadConfigFile ( remote_config_file ) < 0 )
goto error1 ;
2007-06-11 12:04:54 +00:00
2007-02-16 18:30:55 +00:00
if ( godaemon )
2007-06-26 23:48:46 +00:00
openlog ( " libvirtd " , 0 , 0 ) ;
2007-02-16 18:30:55 +00:00
2007-02-16 18:28:17 +00:00
if ( pipe ( sigpipe ) < 0 | |
qemudSetNonBlock ( sigpipe [ 0 ] ) < 0 | |
2007-02-16 18:30:55 +00:00
qemudSetNonBlock ( sigpipe [ 1 ] ) < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to create pipe: %s " ,
strerror ( errno ) ) ;
2007-02-23 12:48:36 +00:00
goto error1 ;
2007-02-16 18:30:55 +00:00
}
2007-02-16 18:28:17 +00:00
sigwrite = sigpipe [ 1 ] ;
sig_action . sa_handler = sig_handler ;
sig_action . sa_flags = 0 ;
sigemptyset ( & sig_action . sa_mask ) ;
sigaction ( SIGHUP , & sig_action , NULL ) ;
sigaction ( SIGINT , & sig_action , NULL ) ;
2007-02-19 16:59:15 +00:00
sigaction ( SIGQUIT , & sig_action , NULL ) ;
2007-02-16 18:28:17 +00:00
sigaction ( SIGTERM , & sig_action , NULL ) ;
sigaction ( SIGCHLD , & sig_action , NULL ) ;
sig_action . sa_handler = SIG_IGN ;
sigaction ( SIGPIPE , & sig_action , NULL ) ;
2007-02-14 01:40:09 +00:00
if ( godaemon ) {
int pid = qemudGoDaemon ( ) ;
2007-02-16 18:30:55 +00:00
if ( pid < 0 ) {
qemudLog ( QEMUD_ERR , " Failed to fork as daemon: %s " ,
strerror ( errno ) ) ;
2007-02-23 12:48:36 +00:00
goto error1 ;
2007-02-16 18:30:55 +00:00
}
2007-02-14 01:40:09 +00:00
if ( pid > 0 )
2007-02-23 12:48:36 +00:00
goto out ;
2007-06-11 12:04:54 +00:00
/* Choose the name of the PID file. */
if ( ! pid_file ) {
2007-06-26 23:48:46 +00:00
if ( REMOTE_PID_FILE [ 0 ] ! = ' \0 ' )
pid_file = REMOTE_PID_FILE ;
2007-06-11 12:04:54 +00:00
}
if ( pid_file & & qemudWritePidFile ( pid_file ) < 0 )
2007-02-23 12:48:36 +00:00
goto error1 ;
2007-02-14 01:40:09 +00:00
}
2007-06-11 12:04:54 +00:00
if ( ! ( server = qemudInitialize ( sigpipe [ 0 ] ) ) ) {
2007-02-23 12:48:36 +00:00
ret = 2 ;
goto error2 ;
}
2007-02-14 01:40:09 +00:00
2007-06-26 22:51:01 +00:00
if ( virEventAddHandleImpl ( sigpipe [ 0 ] ,
POLLIN ,
qemudDispatchSignalEvent ,
server ) < 0 ) {
2007-06-26 19:11:00 +00:00
qemudLog ( QEMUD_ERR , " Failed to register callback for signal pipe " ) ;
ret = 3 ;
goto error2 ;
}
2007-06-11 12:04:54 +00:00
qemudRunLoop ( server ) ;
2007-02-14 01:40:09 +00:00
qemudCleanup ( server ) ;
2007-02-16 18:28:17 +00:00
close ( sigwrite ) ;
2007-02-16 18:30:55 +00:00
if ( godaemon )
closelog ( ) ;
2007-02-23 12:48:36 +00:00
out :
ret = 0 ;
error2 :
2007-06-11 12:04:54 +00:00
if ( godaemon & & pid_file )
unlink ( pid_file ) ;
2007-02-23 12:48:36 +00:00
error1 :
return ret ;
2007-02-14 01:40:09 +00:00
}
/*
* Local variables :
* indent - tabs - mode : nil
* c - indent - level : 4
* c - basic - offset : 4
* tab - width : 4
* End :
*/