mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-27 08:05:24 +00:00
4343fee0a8
Update all LXC code to use virReportError instead of the custom lxcError macro Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
232 lines
7.2 KiB
C
232 lines
7.2 KiB
C
/*
|
|
* Copyright (C) 2010 Red Hat, Inc.
|
|
* Copyright IBM Corp. 2008
|
|
*
|
|
* lxc_conf.c: config functions for managing linux containers
|
|
*
|
|
* Authors:
|
|
* David L. Leskovec <dlesko at linux.vnet.ibm.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
/* includes */
|
|
#include <config.h>
|
|
|
|
#include <sys/utsname.h>
|
|
|
|
#include "lxc_conf.h"
|
|
#include "nodeinfo.h"
|
|
#include "virterror_internal.h"
|
|
#include "conf.h"
|
|
#include "memory.h"
|
|
#include "logging.h"
|
|
#include "uuid.h"
|
|
#include "configmake.h"
|
|
#include "lxc_container.h"
|
|
#include "virnodesuspend.h"
|
|
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_LXC
|
|
|
|
static int lxcDefaultConsoleType(const char *ostype ATTRIBUTE_UNUSED)
|
|
{
|
|
return VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_LXC;
|
|
}
|
|
|
|
|
|
/* Functions */
|
|
virCapsPtr lxcCapsInit(virLXCDriverPtr driver)
|
|
{
|
|
struct utsname utsname;
|
|
virCapsPtr caps;
|
|
virCapsGuestPtr guest;
|
|
const char *altArch;
|
|
|
|
uname(&utsname);
|
|
|
|
if ((caps = virCapabilitiesNew(utsname.machine,
|
|
0, 0)) == NULL)
|
|
goto error;
|
|
|
|
caps->defaultConsoleTargetType = lxcDefaultConsoleType;
|
|
|
|
/* Some machines have problematic NUMA toplogy causing
|
|
* unexpected failures. We don't want to break the QEMU
|
|
* driver in this scenario, so log errors & carry on
|
|
*/
|
|
if (nodeCapsInitNUMA(caps) < 0) {
|
|
virCapabilitiesFreeNUMAInfo(caps);
|
|
VIR_WARN("Failed to query host NUMA topology, disabling NUMA capabilities");
|
|
}
|
|
|
|
if (virNodeSuspendGetTargetMask(&caps->host.powerMgmt) < 0)
|
|
VIR_WARN("Failed to get host power management capabilities");
|
|
|
|
if (virGetHostUUID(caps->host.host_uuid)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
"%s", _("cannot get the host uuid"));
|
|
goto error;
|
|
}
|
|
|
|
/* XXX shouldn't 'borrow' KVM's prefix */
|
|
virCapabilitiesSetMacPrefix(caps, (unsigned char []){ 0x52, 0x54, 0x00 });
|
|
|
|
if ((guest = virCapabilitiesAddGuest(caps,
|
|
"exe",
|
|
utsname.machine,
|
|
sizeof(void*) == 4 ? 32 : 64,
|
|
LIBEXECDIR "/libvirt_lxc",
|
|
NULL,
|
|
0,
|
|
NULL)) == NULL)
|
|
goto error;
|
|
|
|
if (virCapabilitiesAddGuestDomain(guest,
|
|
"lxc",
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
NULL) == NULL)
|
|
goto error;
|
|
|
|
/* On 64-bit hosts, we can use personality() to request a 32bit process */
|
|
if ((altArch = lxcContainerGetAlt32bitArch(utsname.machine)) != NULL) {
|
|
if ((guest = virCapabilitiesAddGuest(caps,
|
|
"exe",
|
|
altArch,
|
|
32,
|
|
LIBEXECDIR "/libvirt_lxc",
|
|
NULL,
|
|
0,
|
|
NULL)) == NULL)
|
|
goto error;
|
|
|
|
if (virCapabilitiesAddGuestDomain(guest,
|
|
"lxc",
|
|
NULL,
|
|
NULL,
|
|
0,
|
|
NULL) == NULL)
|
|
goto error;
|
|
}
|
|
|
|
/* LXC Requires an emulator in the XML */
|
|
virCapabilitiesSetEmulatorRequired(caps);
|
|
|
|
if (driver) {
|
|
/* Security driver data */
|
|
const char *doi, *model;
|
|
|
|
doi = virSecurityManagerGetDOI(driver->securityManager);
|
|
model = virSecurityManagerGetModel(driver->securityManager);
|
|
if (STRNEQ(model, "none")) {
|
|
if (!(caps->host.secModel.model = strdup(model)))
|
|
goto no_memory;
|
|
if (!(caps->host.secModel.doi = strdup(doi)))
|
|
goto no_memory;
|
|
}
|
|
|
|
VIR_DEBUG("Initialized caps for security driver \"%s\" with "
|
|
"DOI \"%s\"", model, doi);
|
|
} else {
|
|
VIR_INFO("No driver, not initializing security driver");
|
|
}
|
|
|
|
return caps;
|
|
|
|
no_memory:
|
|
virReportOOMError();
|
|
|
|
error:
|
|
virCapabilitiesFree(caps);
|
|
return NULL;
|
|
}
|
|
|
|
int lxcLoadDriverConfig(virLXCDriverPtr driver)
|
|
{
|
|
char *filename;
|
|
virConfPtr conf;
|
|
virConfValuePtr p;
|
|
|
|
driver->securityDefaultConfined = false;
|
|
driver->securityRequireConfined = false;
|
|
|
|
/* Set the container configuration directory */
|
|
if ((driver->configDir = strdup(LXC_CONFIG_DIR)) == NULL)
|
|
goto no_memory;
|
|
if ((driver->stateDir = strdup(LXC_STATE_DIR)) == NULL)
|
|
goto no_memory;
|
|
if ((driver->logDir = strdup(LXC_LOG_DIR)) == NULL)
|
|
goto no_memory;
|
|
if ((driver->autostartDir = strdup(LXC_AUTOSTART_DIR)) == NULL)
|
|
goto no_memory;
|
|
|
|
|
|
if ((filename = strdup(SYSCONFDIR "/libvirt/lxc.conf")) == NULL)
|
|
goto no_memory;
|
|
|
|
/* Avoid error from non-existant or unreadable file. */
|
|
if (access (filename, R_OK) == -1)
|
|
goto done;
|
|
conf = virConfReadFile(filename, 0);
|
|
if (!conf)
|
|
goto done;
|
|
|
|
#define CHECK_TYPE(name,typ) if (p && p->type != (typ)) { \
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, \
|
|
"%s: %s: expected type " #typ, \
|
|
filename, (name)); \
|
|
virConfFree(conf); \
|
|
return -1; \
|
|
}
|
|
|
|
p = virConfGetValue(conf, "log_with_libvirtd");
|
|
CHECK_TYPE ("log_with_libvirtd", VIR_CONF_LONG);
|
|
if (p) driver->log_libvirtd = p->l;
|
|
|
|
p = virConfGetValue (conf, "security_driver");
|
|
CHECK_TYPE ("security_driver", VIR_CONF_STRING);
|
|
if (p && p->str) {
|
|
if (!(driver->securityDriverName = strdup(p->str))) {
|
|
virReportOOMError();
|
|
virConfFree(conf);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
p = virConfGetValue (conf, "security_default_confined");
|
|
CHECK_TYPE ("security_default_confined", VIR_CONF_LONG);
|
|
if (p) driver->securityDefaultConfined = p->l;
|
|
|
|
p = virConfGetValue (conf, "security_require_confined");
|
|
CHECK_TYPE ("security_require_confined", VIR_CONF_LONG);
|
|
if (p) driver->securityRequireConfined = p->l;
|
|
|
|
|
|
#undef CHECK_TYPE
|
|
|
|
virConfFree(conf);
|
|
|
|
done:
|
|
VIR_FREE(filename);
|
|
return 0;
|
|
|
|
no_memory:
|
|
virReportOOMError();
|
|
return -1;
|
|
}
|