mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-10-29 17:33:09 +00:00
2038 lines
57 KiB
C
2038 lines
57 KiB
C
/*
|
|
* qemud.c: daemon start of day, guest process & i/o management
|
|
*
|
|
* Copyright (C) 2006, 2007 Red Hat, Inc.
|
|
* Copyright (C) 2006 Daniel P. Berrange
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*
|
|
* Author: Daniel P. Berrange <berrange@redhat.com>
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <paths.h>
|
|
#include <limits.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/un.h>
|
|
#include <sys/poll.h>
|
|
#include <netinet/in.h>
|
|
#include <netdb.h>
|
|
#include <stdlib.h>
|
|
#include <pwd.h>
|
|
#include <stdio.h>
|
|
#include <stdarg.h>
|
|
#include <syslog.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <getopt.h>
|
|
#include <ctype.h>
|
|
|
|
|
|
#include <libvirt/virterror.h>
|
|
|
|
#include "internal.h"
|
|
#include "dispatch.h"
|
|
#include "driver.h"
|
|
#include "conf.h"
|
|
#include "iptables.h"
|
|
|
|
static int godaemon = 0;
|
|
static int verbose = 0;
|
|
static int sigwrite = -1;
|
|
|
|
static sig_atomic_t sig_errors = 0;
|
|
static int sig_lasterrno = 0;
|
|
|
|
static void sig_handler(int sig) {
|
|
unsigned char sigc = sig;
|
|
int origerrno;
|
|
int r;
|
|
|
|
if (sig == SIGCHLD) /* We explicitly waitpid the child later */
|
|
return;
|
|
|
|
origerrno = errno;
|
|
r = write(sigwrite, &sigc, 1);
|
|
if (r == -1) {
|
|
sig_errors++;
|
|
sig_lasterrno = errno;
|
|
}
|
|
errno = origerrno;
|
|
}
|
|
|
|
static int qemudDispatchSignal(struct qemud_server *server)
|
|
{
|
|
unsigned char sigc;
|
|
struct qemud_vm *vm;
|
|
struct qemud_network *network;
|
|
int ret;
|
|
|
|
if (read(server->sigread, &sigc, 1) != 1) {
|
|
qemudLog(QEMUD_ERR, "Failed to read from signal pipe: %s",
|
|
strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
switch (sigc) {
|
|
case SIGHUP:
|
|
qemudLog(QEMUD_INFO, "Reloading configuration on SIGHUP");
|
|
ret = qemudScanConfigs(server);
|
|
|
|
if (server->iptables) {
|
|
qemudLog(QEMUD_INFO, "Reloading iptables rules");
|
|
iptablesReloadRules(server->iptables);
|
|
}
|
|
break;
|
|
|
|
case SIGINT:
|
|
case SIGQUIT:
|
|
case SIGTERM:
|
|
qemudLog(QEMUD_WARN, "Shutting down on signal %d", sigc);
|
|
|
|
/* shutdown active VMs */
|
|
vm = server->vms;
|
|
while (vm) {
|
|
struct qemud_vm *next = vm->next;
|
|
if (qemudIsActiveVM(vm))
|
|
qemudShutdownVMDaemon(server, vm);
|
|
vm = next;
|
|
}
|
|
|
|
/* free inactive VMs */
|
|
vm = server->vms;
|
|
while (vm) {
|
|
struct qemud_vm *next = vm->next;
|
|
qemudFreeVM(vm);
|
|
vm = next;
|
|
}
|
|
server->vms = NULL;
|
|
server->nactivevms = 0;
|
|
server->ninactivevms = 0;
|
|
|
|
/* shutdown active networks */
|
|
network = server->networks;
|
|
while (network) {
|
|
struct qemud_network *next = network->next;
|
|
if (qemudIsActiveNetwork(network))
|
|
qemudShutdownNetworkDaemon(server, network);
|
|
network = next;
|
|
}
|
|
|
|
/* free inactive networks */
|
|
network = server->networks;
|
|
while (network) {
|
|
struct qemud_network *next = network->next;
|
|
qemudFreeNetwork(network);
|
|
network = next;
|
|
}
|
|
server->networks = NULL;
|
|
server->nactivenetworks = 0;
|
|
server->ninactivenetworks = 0;
|
|
|
|
server->shutdown = 1;
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int qemudSetCloseExec(int fd) {
|
|
int flags;
|
|
if ((flags = fcntl(fd, F_GETFD)) < 0)
|
|
goto error;
|
|
flags |= FD_CLOEXEC;
|
|
if ((fcntl(fd, F_SETFD, flags)) < 0)
|
|
goto error;
|
|
return 0;
|
|
error:
|
|
qemudLog(QEMUD_ERR, "Failed to set close-on-exec file descriptor flag");
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int qemudSetNonBlock(int fd) {
|
|
int flags;
|
|
if ((flags = fcntl(fd, F_GETFL)) < 0)
|
|
goto error;
|
|
flags |= O_NONBLOCK;
|
|
if ((fcntl(fd, F_SETFL, flags)) < 0)
|
|
goto error;
|
|
return 0;
|
|
error:
|
|
qemudLog(QEMUD_ERR, "Failed to set non-blocking file descriptor flag");
|
|
return -1;
|
|
}
|
|
|
|
void qemudLog(int priority, const char *fmt, ...)
|
|
{
|
|
va_list args;
|
|
|
|
va_start(args, fmt);
|
|
|
|
if (godaemon) {
|
|
int sysprio = -1;
|
|
|
|
switch(priority) {
|
|
case QEMUD_ERR:
|
|
sysprio = LOG_ERR;
|
|
break;
|
|
case QEMUD_WARN:
|
|
sysprio = LOG_WARNING;
|
|
break;
|
|
case QEMUD_INFO:
|
|
if (verbose)
|
|
sysprio = LOG_INFO;
|
|
break;
|
|
#ifdef ENABLE_DEBUG
|
|
case QEMUD_DEBUG:
|
|
if (verbose)
|
|
sysprio = LOG_DEBUG;
|
|
break;
|
|
#endif
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (sysprio != -1)
|
|
vsyslog(sysprio, fmt, args);
|
|
} else {
|
|
switch(priority) {
|
|
case QEMUD_ERR:
|
|
case QEMUD_WARN:
|
|
vfprintf(stderr, fmt, args);
|
|
fputc('\n', stderr);
|
|
break;
|
|
|
|
case QEMUD_INFO:
|
|
if (verbose) {
|
|
vprintf(fmt, args);
|
|
fputc('\n', stdout);
|
|
}
|
|
break;
|
|
|
|
#ifdef ENABLE_DEBUG
|
|
case QEMUD_DEBUG:
|
|
if (verbose) {
|
|
vprintf(fmt, args);
|
|
fputc('\n', stdout);
|
|
}
|
|
break;
|
|
#endif
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
va_end(args);
|
|
}
|
|
|
|
static int qemudGoDaemon(void) {
|
|
int pid = fork();
|
|
switch (pid) {
|
|
case 0:
|
|
{
|
|
int stdinfd = -1;
|
|
int stdoutfd = -1;
|
|
int nextpid;
|
|
|
|
if ((stdinfd = open(_PATH_DEVNULL, O_RDONLY)) < 0)
|
|
goto cleanup;
|
|
if ((stdoutfd = open(_PATH_DEVNULL, O_WRONLY)) < 0)
|
|
goto cleanup;
|
|
if (dup2(stdinfd, STDIN_FILENO) != STDIN_FILENO)
|
|
goto cleanup;
|
|
if (dup2(stdoutfd, STDOUT_FILENO) != STDOUT_FILENO)
|
|
goto cleanup;
|
|
if (dup2(stdoutfd, STDERR_FILENO) != STDERR_FILENO)
|
|
goto cleanup;
|
|
if (close(stdinfd) < 0)
|
|
goto cleanup;
|
|
stdinfd = -1;
|
|
if (close(stdoutfd) < 0)
|
|
goto cleanup;
|
|
stdoutfd = -1;
|
|
|
|
if (setsid() < 0)
|
|
goto cleanup;
|
|
|
|
nextpid = fork();
|
|
switch (nextpid) {
|
|
case 0:
|
|
return 0;
|
|
case -1:
|
|
return -1;
|
|
default:
|
|
return nextpid;
|
|
}
|
|
|
|
cleanup:
|
|
if (stdoutfd != -1)
|
|
close(stdoutfd);
|
|
if (stdinfd != -1)
|
|
close(stdinfd);
|
|
return -1;
|
|
|
|
}
|
|
|
|
case -1:
|
|
return -1;
|
|
|
|
default:
|
|
{
|
|
int got, status = 0;
|
|
/* We wait to make sure the next child forked
|
|
successfully */
|
|
if ((got = waitpid(pid, &status, 0)) < 0 ||
|
|
got != pid ||
|
|
status != 0) {
|
|
return -1;
|
|
}
|
|
|
|
return pid;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int qemudWritePidFile(const char *pidFile) {
|
|
int fd;
|
|
FILE *fh;
|
|
|
|
if (pidFile[0] == '\0')
|
|
return 0;
|
|
|
|
if ((fd = open(pidFile, O_WRONLY|O_CREAT|O_EXCL, 0644)) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to open pid file '%s' : %s",
|
|
pidFile, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (!(fh = fdopen(fd, "w"))) {
|
|
qemudLog(QEMUD_ERR, "Failed to fdopen pid file '%s' : %s",
|
|
pidFile, strerror(errno));
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
if (fprintf(fh, "%lu\n", (unsigned long)getpid()) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to write to pid file '%s' : %s",
|
|
pidFile, strerror(errno));
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
if (fclose(fh) == EOF) {
|
|
qemudLog(QEMUD_ERR, "Failed to close pid file '%s' : %s",
|
|
pidFile, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudListenUnix(struct qemud_server *server,
|
|
const char *path, int readonly) {
|
|
struct qemud_socket *sock = calloc(1, sizeof(struct qemud_socket));
|
|
struct sockaddr_un addr;
|
|
mode_t oldmask;
|
|
|
|
if (!sock) {
|
|
qemudLog(QEMUD_ERR, "Failed to allocate memory for struct qemud_socket");
|
|
return -1;
|
|
}
|
|
|
|
sock->readonly = readonly;
|
|
sock->next = server->sockets;
|
|
server->sockets = sock;
|
|
server->nsockets++;
|
|
|
|
if ((sock->fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to create socket: %s",
|
|
strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (qemudSetCloseExec(sock->fd) < 0 ||
|
|
qemudSetNonBlock(sock->fd) < 0)
|
|
return -1;
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sun_family = AF_UNIX;
|
|
strncpy(addr.sun_path, path, sizeof(addr.sun_path)-1);
|
|
if (addr.sun_path[0] == '@')
|
|
addr.sun_path[0] = '\0';
|
|
|
|
|
|
if (readonly)
|
|
oldmask = umask(~(S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH));
|
|
else
|
|
oldmask = umask(~(S_IRUSR | S_IWUSR));
|
|
if (bind(sock->fd, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to bind socket to '%s': %s",
|
|
path, strerror(errno));
|
|
return -1;
|
|
}
|
|
umask(oldmask);
|
|
|
|
if (listen(sock->fd, 30) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to listen for connections on '%s': %s",
|
|
path, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudInitPaths(struct qemud_server *server,
|
|
int sys,
|
|
char *sockname,
|
|
char *roSockname,
|
|
int maxlen) {
|
|
const char *paths[] = {
|
|
"libvirt/qemu", /* QEMUD_DIR_DOMAINS */
|
|
"libvirt/qemu/autostart", /* QEMUD_DIR_AUTO_DOMAINS */
|
|
"libvirt/qemu/networks", /* QEMUD_DIR_NETWORKS */
|
|
"libvirt/qemu/networks/autostart", /* QEMUD_DIR_AUTO_NETWORKS */
|
|
};
|
|
|
|
uid_t uid;
|
|
struct passwd *pw;
|
|
char base[PATH_MAX] = SYSCONF_DIR "/";
|
|
int i;
|
|
|
|
uid = geteuid();
|
|
|
|
if (sys) {
|
|
if (uid != 0) {
|
|
qemudLog(QEMUD_ERR, "You must run the daemon as root to use system mode");
|
|
return -1;
|
|
}
|
|
|
|
if (snprintf(sockname, maxlen, "%s/run/libvirt/qemud-sock", LOCAL_STATE_DIR) >= maxlen)
|
|
goto snprintf_error;
|
|
|
|
unlink(sockname);
|
|
|
|
if (snprintf(roSockname, maxlen, "%s/run/libvirt/qemud-sock-ro", LOCAL_STATE_DIR) >= maxlen)
|
|
goto snprintf_error;
|
|
|
|
unlink(roSockname);
|
|
|
|
if (snprintf(server->logDir, PATH_MAX, "%s/log/libvirt/qemu", LOCAL_STATE_DIR) >= PATH_MAX)
|
|
goto snprintf_error;
|
|
} else {
|
|
if (!(pw = getpwuid(uid))) {
|
|
qemudLog(QEMUD_ERR, "Failed to find user record for uid '%d': %s",
|
|
uid, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (snprintf(sockname, maxlen, "@%s/.libvirt/qemud-sock", pw->pw_dir) >= maxlen)
|
|
goto snprintf_error;
|
|
|
|
if (snprintf(base, PATH_MAX, "%s/.", pw->pw_dir) >= PATH_MAX)
|
|
goto snprintf_error;
|
|
|
|
if (snprintf(server->logDir, PATH_MAX, "%s/.libvirt/qemu/log", pw->pw_dir) >= PATH_MAX)
|
|
goto snprintf_error;
|
|
}
|
|
|
|
for (i = 0; i < QEMUD_N_CONFIG_DIRS; i++)
|
|
if (snprintf(server->configDirs[i], PATH_MAX, "%s%s", base, paths[i]) >= PATH_MAX)
|
|
goto snprintf_error;
|
|
|
|
return 0;
|
|
|
|
snprintf_error:
|
|
qemudLog(QEMUD_ERR, "Resulting path to long for buffer in qemudInitPaths()");
|
|
return -1;
|
|
}
|
|
|
|
static struct qemud_server *qemudInitialize(int sys, int sigread) {
|
|
struct qemud_server *server;
|
|
char sockname[PATH_MAX];
|
|
char roSockname[PATH_MAX];
|
|
|
|
if (!(server = calloc(1, sizeof(struct qemud_server)))) {
|
|
qemudLog(QEMUD_ERR, "Failed to allocate struct qemud_server");
|
|
return NULL;
|
|
}
|
|
|
|
/* We don't have a dom-0, so start from 1 */
|
|
server->nextvmid = 1;
|
|
server->sigread = sigread;
|
|
|
|
roSockname[0] = '\0';
|
|
|
|
if (qemudInitPaths(server, sys, sockname, roSockname, PATH_MAX) < 0)
|
|
goto cleanup;
|
|
|
|
server->configDir = server->configDirs[QEMUD_DIR_CONFIG];
|
|
server->autostartDir = server->configDirs[QEMUD_DIR_AUTOSTART];
|
|
server->networkConfigDir = server->configDirs[QEMUD_DIR_NETWORK_CONFIG];
|
|
server->networkAutostartDir = server->configDirs[QEMUD_DIR_NETWORK_AUTOSTART];
|
|
|
|
if (qemudListenUnix(server, sockname, 0) < 0)
|
|
goto cleanup;
|
|
|
|
if (roSockname[0] != '\0' && qemudListenUnix(server, roSockname, 1) < 0)
|
|
goto cleanup;
|
|
|
|
if (qemudScanConfigs(server) < 0) {
|
|
goto cleanup;
|
|
}
|
|
|
|
return server;
|
|
|
|
cleanup:
|
|
if (server) {
|
|
struct qemud_socket *sock = server->sockets;
|
|
while (sock) {
|
|
close(sock->fd);
|
|
sock = sock->next;
|
|
}
|
|
|
|
free(server);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static int qemudDispatchServer(struct qemud_server *server, struct qemud_socket *sock) {
|
|
int fd;
|
|
struct sockaddr_storage addr;
|
|
unsigned int addrlen = sizeof(addr);
|
|
struct qemud_client *client;
|
|
|
|
if ((fd = accept(sock->fd, (struct sockaddr *)&addr, &addrlen)) < 0) {
|
|
if (errno == EAGAIN)
|
|
return 0;
|
|
qemudLog(QEMUD_ERR, "Failed to accept connection: %s", strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (qemudSetCloseExec(fd) < 0 ||
|
|
qemudSetNonBlock(fd) < 0) {
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
client = calloc(1, sizeof(struct qemud_client));
|
|
client->fd = fd;
|
|
client->readonly = sock->readonly;
|
|
|
|
client->next = server->clients;
|
|
server->clients = client;
|
|
server->nclients++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
qemudExec(struct qemud_server *server, char **argv,
|
|
int *retpid, int *outfd, int *errfd) {
|
|
int pid, null;
|
|
int pipeout[2] = {-1,-1};
|
|
int pipeerr[2] = {-1,-1};
|
|
|
|
if ((null = open(_PATH_DEVNULL, O_RDONLY)) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR, "cannot open %s : %s",
|
|
_PATH_DEVNULL, strerror(errno));
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((outfd != NULL && pipe(pipeout) < 0) ||
|
|
(errfd != NULL && pipe(pipeerr) < 0)) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR, "cannot create pipe : %s",
|
|
strerror(errno));
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((pid = fork()) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR, "cannot fork child process : %s",
|
|
strerror(errno));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (pid) { /* parent */
|
|
close(null);
|
|
if (outfd) {
|
|
close(pipeout[1]);
|
|
qemudSetNonBlock(pipeout[0]);
|
|
qemudSetCloseExec(pipeout[0]);
|
|
*outfd = pipeout[0];
|
|
}
|
|
if (errfd) {
|
|
close(pipeerr[1]);
|
|
qemudSetNonBlock(pipeerr[0]);
|
|
qemudSetCloseExec(pipeerr[0]);
|
|
*errfd = pipeerr[0];
|
|
}
|
|
*retpid = pid;
|
|
return 0;
|
|
}
|
|
|
|
/* child */
|
|
|
|
if (pipeout[0] > 0 && close(pipeout[0]) < 0)
|
|
_exit(1);
|
|
if (pipeerr[0] > 0 && close(pipeerr[0]) < 0)
|
|
_exit(1);
|
|
|
|
if (dup2(null, STDIN_FILENO) < 0)
|
|
_exit(1);
|
|
if (dup2(pipeout[1] > 0 ? pipeout[1] : null, STDOUT_FILENO) < 0)
|
|
_exit(1);
|
|
if (dup2(pipeerr[1] > 0 ? pipeerr[1] : null, STDERR_FILENO) < 0)
|
|
_exit(1);
|
|
|
|
close(null);
|
|
if (pipeout[1] > 0)
|
|
close(pipeout[1]);
|
|
if (pipeerr[1] > 0)
|
|
close(pipeerr[1]);
|
|
|
|
execvp(argv[0], argv);
|
|
|
|
_exit(1);
|
|
|
|
return 0;
|
|
|
|
cleanup:
|
|
if (pipeerr[0] > 0)
|
|
close(pipeerr[0]);
|
|
if (pipeerr[1] > 0)
|
|
close(pipeerr[1]);
|
|
if (pipeout[0] > 0)
|
|
close(pipeout[0]);
|
|
if (pipeout[1] > 0)
|
|
close(pipeout[1]);
|
|
if (null > 0)
|
|
close(null);
|
|
return -1;
|
|
}
|
|
|
|
/* Return -1 for error, 1 to continue reading and 0 for success */
|
|
typedef int qemudHandlerMonitorOutput(struct qemud_server *server,
|
|
struct qemud_vm *vm,
|
|
const char *output,
|
|
int fd);
|
|
|
|
static int
|
|
qemudReadMonitorOutput(struct qemud_server *server,
|
|
struct qemud_vm *vm,
|
|
int fd,
|
|
char *buffer,
|
|
int buflen,
|
|
qemudHandlerMonitorOutput func,
|
|
const char *what)
|
|
{
|
|
#define MONITOR_TIMEOUT 3000
|
|
|
|
int got = 0;
|
|
buffer[0] = '\0';
|
|
|
|
/* Consume & discard the initial greeting */
|
|
while (got < (buflen-1)) {
|
|
int ret;
|
|
|
|
ret = read(fd, buffer+got, buflen-got-1);
|
|
if (ret == 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"QEMU quit during %s startup\n%s", what, buffer);
|
|
return -1;
|
|
}
|
|
if (ret < 0) {
|
|
struct pollfd pfd = { .fd = fd, .events = POLLIN };
|
|
if (errno == EINTR)
|
|
continue;
|
|
|
|
if (errno != EAGAIN) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Failure while reading %s startup output: %s",
|
|
what, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
ret = poll(&pfd, 1, MONITOR_TIMEOUT);
|
|
if (ret == 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Timed out while reading %s startup output", what);
|
|
return -1;
|
|
} else if (ret == -1) {
|
|
if (errno != EINTR) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Failure while reading %s startup output: %s",
|
|
what, strerror(errno));
|
|
return -1;
|
|
}
|
|
} else {
|
|
/* Make sure we continue loop & read any further data
|
|
available before dealing with EOF */
|
|
if (pfd.revents & (POLLIN | POLLHUP))
|
|
continue;
|
|
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Failure while reading %s startup output", what);
|
|
return -1;
|
|
}
|
|
} else {
|
|
got += ret;
|
|
buffer[got] = '\0';
|
|
if ((ret = func(server, vm, buffer, fd)) != 1)
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Out of space while reading %s startup output", what);
|
|
return -1;
|
|
|
|
#undef MONITOR_TIMEOUT
|
|
}
|
|
|
|
static int
|
|
qemudCheckMonitorPrompt(struct qemud_server *server ATTRIBUTE_UNUSED,
|
|
struct qemud_vm *vm,
|
|
const char *output,
|
|
int fd)
|
|
{
|
|
if (strstr(output, "(qemu) ") == NULL)
|
|
return 1; /* keep reading */
|
|
|
|
vm->monitor = fd;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudOpenMonitor(struct qemud_server *server, struct qemud_vm *vm, const char *monitor) {
|
|
int monfd;
|
|
char buffer[1024];
|
|
int ret = -1;
|
|
|
|
if (!(monfd = open(monitor, O_RDWR))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Unable to open monitor path %s", monitor);
|
|
return -1;
|
|
}
|
|
if (qemudSetCloseExec(monfd) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Unable to set monitor close-on-exec flag");
|
|
goto error;
|
|
}
|
|
if (qemudSetNonBlock(monfd) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Unable to put monitor into non-blocking mode");
|
|
goto error;
|
|
}
|
|
|
|
ret = qemudReadMonitorOutput(server, vm, monfd,
|
|
buffer, sizeof(buffer),
|
|
qemudCheckMonitorPrompt,
|
|
"monitor");
|
|
error:
|
|
close(monfd);
|
|
return ret;
|
|
}
|
|
|
|
static int qemudExtractMonitorPath(const char *haystack, char *path, int pathmax) {
|
|
static const char needle[] = "char device redirected to";
|
|
char *tmp;
|
|
|
|
if (!(tmp = strstr(haystack, needle)))
|
|
return -1;
|
|
|
|
strncpy(path, tmp+sizeof(needle), pathmax-1);
|
|
path[pathmax-1] = '\0';
|
|
|
|
while (*path) {
|
|
/*
|
|
* The monitor path ends at first whitespace char
|
|
* so lets search for it & NULL terminate it there
|
|
*/
|
|
if (isspace(*path)) {
|
|
*path = '\0';
|
|
return 0;
|
|
}
|
|
path++;
|
|
}
|
|
|
|
/*
|
|
* We found a path, but didn't find any whitespace,
|
|
* so it must be still incomplete - we should at
|
|
* least see a \n
|
|
*/
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
qemudOpenMonitorPath(struct qemud_server *server,
|
|
struct qemud_vm *vm,
|
|
const char *output,
|
|
int fd ATTRIBUTE_UNUSED)
|
|
{
|
|
char monitor[PATH_MAX];
|
|
|
|
if (qemudExtractMonitorPath(output, monitor, sizeof(monitor)) < 0)
|
|
return 1; /* keep reading */
|
|
|
|
return qemudOpenMonitor(server, vm, monitor);
|
|
}
|
|
|
|
static int qemudWaitForMonitor(struct qemud_server *server, struct qemud_vm *vm) {
|
|
char buffer[1024]; /* Plenty of space to get startup greeting */
|
|
int ret = qemudReadMonitorOutput(server, vm, vm->stderr,
|
|
buffer, sizeof(buffer),
|
|
qemudOpenMonitorPath,
|
|
"console");
|
|
|
|
buffer[sizeof(buffer)-1] = '\0';
|
|
retry:
|
|
if (write(vm->logfile, buffer, strlen(buffer)) < 0) {
|
|
/* Log, but ignore failures to write logfile for VM */
|
|
if (errno == EINTR)
|
|
goto retry;
|
|
qemudLog(QEMUD_WARN, "Unable to log VM console data: %s",
|
|
strerror(errno));
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int qemudNextFreeVNCPort(struct qemud_server *server ATTRIBUTE_UNUSED) {
|
|
int i;
|
|
|
|
for (i = 5900 ; i < 6000 ; i++) {
|
|
int fd;
|
|
int reuse = 1;
|
|
struct sockaddr_in addr;
|
|
addr.sin_family = AF_INET;
|
|
addr.sin_port = htons(i);
|
|
addr.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
fd = socket(PF_INET, SOCK_STREAM, 0);
|
|
if (fd < 0)
|
|
return -1;
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&reuse, sizeof(reuse)) < 0) {
|
|
close(fd);
|
|
break;
|
|
}
|
|
|
|
if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) == 0) {
|
|
/* Not in use, lets grab it */
|
|
close(fd);
|
|
return i;
|
|
}
|
|
close(fd);
|
|
|
|
if (errno == EADDRINUSE) {
|
|
/* In use, try next */
|
|
continue;
|
|
}
|
|
/* Some other bad failure, get out.. */
|
|
break;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int qemudStartVMDaemon(struct qemud_server *server,
|
|
struct qemud_vm *vm) {
|
|
char **argv = NULL, **tmp;
|
|
int i, ret = -1;
|
|
char logfile[PATH_MAX];
|
|
|
|
if (qemudIsActiveVM(vm)) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"VM is already active");
|
|
return -1;
|
|
}
|
|
|
|
if (vm->def->vncPort < 0) {
|
|
int port = qemudNextFreeVNCPort(server);
|
|
if (port < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"Unable to find an unused VNC port");
|
|
return -1;
|
|
}
|
|
vm->def->vncActivePort = port;
|
|
} else
|
|
vm->def->vncActivePort = vm->def->vncPort;
|
|
|
|
if ((strlen(server->logDir) + /* path */
|
|
1 + /* Separator */
|
|
strlen(vm->def->name) + /* basename */
|
|
4 + /* suffix .log */
|
|
1 /* NULL */) > PATH_MAX) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"config file path too long: %s/%s.log",
|
|
server->logDir, vm->def->name);
|
|
return -1;
|
|
}
|
|
strcpy(logfile, server->logDir);
|
|
strcat(logfile, "/");
|
|
strcat(logfile, vm->def->name);
|
|
strcat(logfile, ".log");
|
|
|
|
if (qemudEnsureDir(server->logDir) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot create log directory %s: %s",
|
|
server->logDir, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if ((vm->logfile = open(logfile, O_CREAT | O_TRUNC | O_WRONLY,
|
|
S_IRUSR | S_IWUSR)) < 0) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to create logfile %s: %s",
|
|
logfile, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (qemudBuildCommandLine(server, vm, &argv) < 0) {
|
|
close(vm->logfile);
|
|
vm->logfile = -1;
|
|
return -1;
|
|
}
|
|
|
|
tmp = argv;
|
|
while (*tmp) {
|
|
if (write(vm->logfile, *tmp, strlen(*tmp)) < 0)
|
|
qemudLog(QEMUD_WARN, "Unable to write argv to logfile %d: %s",
|
|
errno, strerror(errno));
|
|
if (write(vm->logfile, " ", 1) < 0)
|
|
qemudLog(QEMUD_WARN, "Unable to write argv to logfile %d: %s",
|
|
errno, strerror(errno));
|
|
tmp++;
|
|
}
|
|
if (write(vm->logfile, "\n", 1) < 0)
|
|
qemudLog(QEMUD_WARN, "Unable to write argv to logfile %d: %s",
|
|
errno, strerror(errno));
|
|
|
|
if (qemudExec(server, argv, &vm->pid, &vm->stdout, &vm->stderr) == 0) {
|
|
vm->id = server->nextvmid++;
|
|
vm->state = QEMUD_STATE_RUNNING;
|
|
|
|
server->ninactivevms--;
|
|
server->nactivevms++;
|
|
server->nvmfds += 2;
|
|
|
|
ret = 0;
|
|
|
|
if (qemudWaitForMonitor(server, vm) < 0) {
|
|
qemudShutdownVMDaemon(server, vm);
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (vm->tapfds) {
|
|
for (i = 0; vm->tapfds[i] != -1; i++) {
|
|
close(vm->tapfds[i]);
|
|
vm->tapfds[i] = -1;
|
|
}
|
|
free(vm->tapfds);
|
|
vm->tapfds = NULL;
|
|
vm->ntapfds = 0;
|
|
}
|
|
|
|
for (i = 0 ; argv[i] ; i++)
|
|
free(argv[i]);
|
|
free(argv);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static void qemudDispatchClientFailure(struct qemud_server *server, struct qemud_client *client) {
|
|
struct qemud_client *tmp = server->clients;
|
|
struct qemud_client *prev = NULL;
|
|
while (tmp) {
|
|
if (tmp == client) {
|
|
if (prev == NULL)
|
|
server->clients = client->next;
|
|
else
|
|
prev->next = client->next;
|
|
server->nclients--;
|
|
break;
|
|
}
|
|
prev = tmp;
|
|
tmp = tmp->next;
|
|
}
|
|
close(client->fd);
|
|
free(client);
|
|
}
|
|
|
|
|
|
static int qemudDispatchClientRequest(struct qemud_server *server, struct qemud_client *client) {
|
|
if (qemudDispatch(server,
|
|
client,
|
|
&client->incoming,
|
|
&client->outgoing) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
client->outgoingSent = 0;
|
|
client->tx = 1;
|
|
client->incomingReceived = 0;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudClientRead(struct qemud_server *server,
|
|
struct qemud_client *client,
|
|
char *buf, size_t want) {
|
|
int ret;
|
|
if ((ret = read(client->fd, buf, want)) <= 0) {
|
|
qemudDebug("Plain read error %d", ret);
|
|
if (!ret || errno != EAGAIN)
|
|
qemudDispatchClientFailure(server, client);
|
|
return -1;
|
|
}
|
|
qemudDebug("Plain data read %d", ret);
|
|
return ret;
|
|
}
|
|
|
|
static void qemudDispatchClientRead(struct qemud_server *server, struct qemud_client *client) {
|
|
char *data = (char *)&client->incoming;
|
|
unsigned int got = client->incomingReceived;
|
|
int want;
|
|
int ret;
|
|
|
|
restart:
|
|
if (got >= sizeof(struct qemud_packet_header)) {
|
|
want = sizeof(struct qemud_packet_header) + client->incoming.header.dataSize - got;
|
|
} else {
|
|
want = sizeof(struct qemud_packet_header) - got;
|
|
}
|
|
|
|
if ((ret = qemudClientRead(server, client, data+got, want)) < 0) {
|
|
return;
|
|
}
|
|
got += ret;
|
|
client->incomingReceived += ret;
|
|
|
|
/* If we've finished header, move onto body */
|
|
if (client->incomingReceived == sizeof(struct qemud_packet_header)) {
|
|
qemudDebug("Type %d, data %d",
|
|
client->incoming.header.type,
|
|
client->incoming.header.dataSize);
|
|
/* Client lied about dataSize */
|
|
if (client->incoming.header.dataSize > sizeof(union qemud_packet_data)) {
|
|
qemudDebug("Bogus data size %u", client->incoming.header.dataSize);
|
|
qemudDispatchClientFailure(server, client);
|
|
return;
|
|
}
|
|
if (client->incoming.header.dataSize) {
|
|
qemudDebug("- Restarting recv to process body (%d bytes)",
|
|
client->incoming.header.dataSize);
|
|
goto restart;
|
|
}
|
|
}
|
|
|
|
/* If we've finished body, dispatch the request */
|
|
if (ret == want) {
|
|
if (qemudDispatchClientRequest(server, client) < 0)
|
|
qemudDispatchClientFailure(server, client);
|
|
qemudDebug("Dispatch");
|
|
}
|
|
}
|
|
|
|
|
|
static int qemudClientWrite(struct qemud_server *server,
|
|
struct qemud_client *client,
|
|
char *buf, size_t want) {
|
|
int ret;
|
|
if ((ret = write(client->fd, buf, want)) < 0) {
|
|
qemudDebug("Plain write error %d", ret);
|
|
if (errno != EAGAIN)
|
|
qemudDispatchClientFailure(server, client);
|
|
return -1;
|
|
}
|
|
qemudDebug("Plain data write %d", ret);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static void qemudDispatchClientWrite(struct qemud_server *server, struct qemud_client *client) {
|
|
char *data = (char *)&client->outgoing;
|
|
int sent = client->outgoingSent;
|
|
int todo = sizeof(struct qemud_packet_header) + client->outgoing.header.dataSize - sent;
|
|
int ret;
|
|
if ((ret = qemudClientWrite(server, client, data+sent, todo)) < 0) {
|
|
return;
|
|
}
|
|
client->outgoingSent += ret;
|
|
qemudDebug("Done %d %d", todo, ret);
|
|
if (todo == ret)
|
|
client->tx = 0;
|
|
}
|
|
|
|
static int qemudVMData(struct qemud_server *server ATTRIBUTE_UNUSED,
|
|
struct qemud_vm *vm, int fd) {
|
|
char buf[4096];
|
|
if (vm->pid < 0)
|
|
return 0;
|
|
|
|
for (;;) {
|
|
int ret = read(fd, buf, sizeof(buf)-1);
|
|
if (ret < 0) {
|
|
if (errno == EAGAIN)
|
|
return 0;
|
|
return -1;
|
|
}
|
|
if (ret == 0) {
|
|
return 0;
|
|
}
|
|
buf[ret] = '\0';
|
|
|
|
retry:
|
|
if (write(vm->logfile, buf, ret) < 0) {
|
|
/* Log, but ignore failures to write logfile for VM */
|
|
if (errno == EINTR)
|
|
goto retry;
|
|
qemudLog(QEMUD_WARN, "Unable to log VM console data: %s",
|
|
strerror(errno));
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
int qemudShutdownVMDaemon(struct qemud_server *server, struct qemud_vm *vm) {
|
|
if (!qemudIsActiveVM(vm))
|
|
return 0;
|
|
|
|
qemudLog(QEMUD_INFO, "Shutting down VM '%s'", vm->def->name);
|
|
|
|
kill(vm->pid, SIGTERM);
|
|
|
|
qemudVMData(server, vm, vm->stdout);
|
|
qemudVMData(server, vm, vm->stderr);
|
|
if (close(vm->logfile) < 0)
|
|
qemudLog(QEMUD_WARN, "Unable to close logfile %d: %s", errno, strerror(errno));
|
|
close(vm->stdout);
|
|
close(vm->stderr);
|
|
if (vm->monitor != -1)
|
|
close(vm->monitor);
|
|
vm->logfile = -1;
|
|
vm->stdout = -1;
|
|
vm->stderr = -1;
|
|
vm->monitor = -1;
|
|
server->nvmfds -= 2;
|
|
|
|
if (waitpid(vm->pid, NULL, WNOHANG) != vm->pid) {
|
|
kill(vm->pid, SIGKILL);
|
|
if (waitpid(vm->pid, NULL, 0) != vm->pid) {
|
|
qemudLog(QEMUD_WARN, "Got unexpected pid, damn");
|
|
}
|
|
}
|
|
|
|
vm->pid = -1;
|
|
vm->id = -1;
|
|
vm->state = QEMUD_STATE_STOPPED;
|
|
|
|
if (vm->newDef) {
|
|
qemudFreeVMDef(vm->def);
|
|
vm->def = vm->newDef;
|
|
vm->newDef = NULL;
|
|
}
|
|
|
|
server->nactivevms--;
|
|
server->ninactivevms++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudDispatchVMLog(struct qemud_server *server, struct qemud_vm *vm, int fd) {
|
|
if (qemudVMData(server, vm, fd) < 0)
|
|
if (qemudShutdownVMDaemon(server, vm) < 0)
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
static int qemudDispatchVMFailure(struct qemud_server *server, struct qemud_vm *vm,
|
|
int fd ATTRIBUTE_UNUSED) {
|
|
if (qemudShutdownVMDaemon(server, vm) < 0)
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
qemudBuildDnsmasqArgv(struct qemud_server *server,
|
|
struct qemud_network *network,
|
|
char ***argv) {
|
|
int i, len;
|
|
char buf[PATH_MAX];
|
|
struct qemud_dhcp_range_def *range;
|
|
|
|
len =
|
|
1 + /* dnsmasq */
|
|
1 + /* --keep-in-foreground */
|
|
1 + /* --strict-order */
|
|
1 + /* --bind-interfaces */
|
|
2 + /* --pid-file "" */
|
|
2 + /* --conf-file "" */
|
|
/*2 + *//* --interface virbr0 */
|
|
2 + /* --except-interface lo */
|
|
2 + /* --listen-address 10.0.0.1 */
|
|
1 + /* --dhcp-leasefile=path */
|
|
(2 * network->def->nranges) + /* --dhcp-range 10.0.0.2,10.0.0.254 */
|
|
1; /* NULL */
|
|
|
|
if (!(*argv = calloc(len, sizeof(char *))))
|
|
goto no_memory;
|
|
|
|
#define APPEND_ARG(v, n, s) do { \
|
|
if (!((v)[(n)] = strdup(s))) \
|
|
goto no_memory; \
|
|
} while (0)
|
|
|
|
i = 0;
|
|
|
|
APPEND_ARG(*argv, i++, "dnsmasq");
|
|
|
|
APPEND_ARG(*argv, i++, "--keep-in-foreground");
|
|
/*
|
|
* Needed to ensure dnsmasq uses same algorithm for processing
|
|
* multiple nameserver entries in /etc/resolv.conf as GLibC.
|
|
*/
|
|
APPEND_ARG(*argv, i++, "--strict-order");
|
|
APPEND_ARG(*argv, i++, "--bind-interfaces");
|
|
|
|
APPEND_ARG(*argv, i++, "--pid-file");
|
|
APPEND_ARG(*argv, i++, "");
|
|
|
|
APPEND_ARG(*argv, i++, "--conf-file");
|
|
APPEND_ARG(*argv, i++, "");
|
|
|
|
/*
|
|
* XXX does not actually work, due to some kind of
|
|
* race condition setting up ipv6 addresses on the
|
|
* interface. A sleep(10) makes it work, but that's
|
|
* clearly not practical
|
|
*
|
|
* APPEND_ARG(*argv, i++, "--interface");
|
|
* APPEND_ARG(*argv, i++, network->def->bridge);
|
|
*/
|
|
APPEND_ARG(*argv, i++, "--listen-address");
|
|
APPEND_ARG(*argv, i++, network->def->ipAddress);
|
|
|
|
APPEND_ARG(*argv, i++, "--except-interface");
|
|
APPEND_ARG(*argv, i++, "lo");
|
|
|
|
/*
|
|
* NB, dnsmasq command line arg bug means we need to
|
|
* use a single arg '--dhcp-leasefile=path' rather than
|
|
* two separate args in '--dhcp-leasefile path' style
|
|
*/
|
|
snprintf(buf, sizeof(buf), "--dhcp-leasefile=%s/lib/libvirt/dhcp-%s.leases",
|
|
LOCAL_STATE_DIR, network->def->name);
|
|
APPEND_ARG(*argv, i++, buf);
|
|
|
|
range = network->def->ranges;
|
|
while (range) {
|
|
snprintf(buf, sizeof(buf), "%s,%s",
|
|
range->start, range->end);
|
|
|
|
APPEND_ARG(*argv, i++, "--dhcp-range");
|
|
APPEND_ARG(*argv, i++, buf);
|
|
|
|
range = range->next;
|
|
}
|
|
|
|
#undef APPEND_ARG
|
|
|
|
return 0;
|
|
|
|
no_memory:
|
|
if (argv) {
|
|
for (i = 0; (*argv)[i]; i++)
|
|
free((*argv)[i]);
|
|
free(*argv);
|
|
}
|
|
qemudReportError(server, VIR_ERR_NO_MEMORY, "dnsmasq argv");
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int
|
|
dhcpStartDhcpDaemon(struct qemud_server *server,
|
|
struct qemud_network *network)
|
|
{
|
|
char **argv;
|
|
int ret, i;
|
|
|
|
if (network->def->ipAddress[0] == '\0') {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot start dhcp daemon without IP address for server");
|
|
return -1;
|
|
}
|
|
|
|
argv = NULL;
|
|
if (qemudBuildDnsmasqArgv(server, network, &argv) < 0)
|
|
return -1;
|
|
|
|
ret = qemudExec(server, argv, &network->dnsmasqPid, NULL, NULL);
|
|
|
|
for (i = 0; argv[i]; i++)
|
|
free(argv[i]);
|
|
free(argv);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
qemudAddIptablesRules(struct qemud_server *server,
|
|
struct qemud_network *network) {
|
|
int err;
|
|
|
|
if (!server->iptables && !(server->iptables = iptablesContextNew())) {
|
|
qemudReportError(server, VIR_ERR_NO_MEMORY, "iptables support");
|
|
return 1;
|
|
}
|
|
|
|
|
|
/* allow DHCP requests through to dnsmasq */
|
|
if ((err = iptablesAddTcpInput(server->iptables, network->bridge, 67))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow DHCP requests from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err1;
|
|
}
|
|
|
|
if ((err = iptablesAddUdpInput(server->iptables, network->bridge, 67))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow DHCP requests from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err2;
|
|
}
|
|
|
|
/* allow DNS requests through to dnsmasq */
|
|
if ((err = iptablesAddTcpInput(server->iptables, network->bridge, 53))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow DNS requests from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err3;
|
|
}
|
|
|
|
if ((err = iptablesAddUdpInput(server->iptables, network->bridge, 53))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow DNS requests from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err4;
|
|
}
|
|
|
|
|
|
/* Catch all rules to block forwarding to/from bridges */
|
|
|
|
if ((err = iptablesAddForwardRejectOut(server->iptables, network->bridge))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to block outbound traffic from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err5;
|
|
}
|
|
|
|
if ((err = iptablesAddForwardRejectIn(server->iptables, network->bridge))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to block inbound traffic to '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err6;
|
|
}
|
|
|
|
/* Allow traffic between guests on the same bridge */
|
|
if ((err = iptablesAddForwardAllowCross(server->iptables, network->bridge))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow cross bridge traffic on '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err7;
|
|
}
|
|
|
|
|
|
/* The remaining rules are only needed for IP forwarding */
|
|
if (!network->def->forward)
|
|
return 1;
|
|
|
|
/* allow forwarding packets from the bridge interface */
|
|
if ((err = iptablesAddForwardAllowOut(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow forwarding from '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err8;
|
|
}
|
|
|
|
/* allow forwarding packets to the bridge interface if they are part of an existing connection */
|
|
if ((err = iptablesAddForwardAllowIn(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to allow forwarding to '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err9;
|
|
}
|
|
|
|
/* enable masquerading */
|
|
if ((err = iptablesAddForwardMasquerade(server->iptables,
|
|
network->def->network,
|
|
network->def->forwardDev))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to add iptables rule to enable masquerading : %s\n",
|
|
strerror(err));
|
|
goto err10;
|
|
}
|
|
|
|
return 1;
|
|
|
|
err10:
|
|
iptablesRemoveForwardAllowIn(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev);
|
|
err9:
|
|
iptablesRemoveForwardAllowOut(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev);
|
|
err8:
|
|
iptablesRemoveForwardAllowCross(server->iptables,
|
|
network->bridge);
|
|
err7:
|
|
iptablesRemoveForwardRejectIn(server->iptables,
|
|
network->bridge);
|
|
err6:
|
|
iptablesRemoveForwardRejectOut(server->iptables,
|
|
network->bridge);
|
|
err5:
|
|
iptablesRemoveUdpInput(server->iptables, network->bridge, 53);
|
|
err4:
|
|
iptablesRemoveTcpInput(server->iptables, network->bridge, 53);
|
|
err3:
|
|
iptablesRemoveUdpInput(server->iptables, network->bridge, 67);
|
|
err2:
|
|
iptablesRemoveTcpInput(server->iptables, network->bridge, 67);
|
|
err1:
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
qemudRemoveIptablesRules(struct qemud_server *server,
|
|
struct qemud_network *network) {
|
|
if (network->def->forward) {
|
|
iptablesRemoveForwardMasquerade(server->iptables,
|
|
network->def->network,
|
|
network->def->forwardDev);
|
|
iptablesRemoveForwardAllowIn(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev);
|
|
iptablesRemoveForwardAllowOut(server->iptables,
|
|
network->def->network,
|
|
network->bridge,
|
|
network->def->forwardDev);
|
|
}
|
|
iptablesRemoveForwardAllowCross(server->iptables, network->bridge);
|
|
iptablesRemoveForwardRejectIn(server->iptables, network->bridge);
|
|
iptablesRemoveForwardRejectOut(server->iptables, network->bridge);
|
|
iptablesRemoveUdpInput(server->iptables, network->bridge, 53);
|
|
iptablesRemoveTcpInput(server->iptables, network->bridge, 53);
|
|
iptablesRemoveUdpInput(server->iptables, network->bridge, 67);
|
|
iptablesRemoveTcpInput(server->iptables, network->bridge, 67);
|
|
}
|
|
|
|
static int
|
|
qemudEnableIpForwarding(void)
|
|
{
|
|
#define PROC_IP_FORWARD "/proc/sys/net/ipv4/ip_forward"
|
|
|
|
int fd, ret;
|
|
|
|
if ((fd = open(PROC_IP_FORWARD, O_WRONLY|O_TRUNC)) == -1)
|
|
return 0;
|
|
|
|
if (write(fd, "1\n", 2) < 0)
|
|
ret = 0;
|
|
|
|
close (fd);
|
|
|
|
return 1;
|
|
|
|
#undef PROC_IP_FORWARD
|
|
}
|
|
|
|
int qemudStartNetworkDaemon(struct qemud_server *server,
|
|
struct qemud_network *network) {
|
|
const char *name;
|
|
int err;
|
|
|
|
if (qemudIsActiveNetwork(network)) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"network is already active");
|
|
return -1;
|
|
}
|
|
|
|
if (!server->brctl && (err = brInit(&server->brctl))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot initialize bridge support: %s", strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
if (network->def->bridge[0] == '\0' ||
|
|
strchr(network->def->bridge, '%')) {
|
|
name = "vnet%d";
|
|
} else {
|
|
name = network->def->bridge;
|
|
}
|
|
|
|
if ((err = brAddBridge(server->brctl, name, network->bridge, sizeof(network->bridge)))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot create bridge '%s' : %s", name, strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
if (network->def->ipAddress[0] &&
|
|
(err = brSetInetAddress(server->brctl, network->bridge, network->def->ipAddress))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot set IP address on bridge '%s' to '%s' : %s\n",
|
|
network->bridge, network->def->ipAddress, strerror(err));
|
|
goto err_delbr;
|
|
}
|
|
|
|
if (network->def->netmask[0] &&
|
|
(err = brSetInetNetmask(server->brctl, network->bridge, network->def->netmask))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"cannot set netmask on bridge '%s' to '%s' : %s\n",
|
|
network->bridge, network->def->netmask, strerror(err));
|
|
goto err_delbr;
|
|
}
|
|
|
|
if (network->def->ipAddress[0] &&
|
|
(err = brSetInterfaceUp(server->brctl, network->bridge, 1))) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to bring the bridge '%s' up : %s\n",
|
|
network->bridge, strerror(err));
|
|
goto err_delbr;
|
|
}
|
|
|
|
if (!qemudAddIptablesRules(server, network))
|
|
goto err_delbr1;
|
|
|
|
if (network->def->forward &&
|
|
!qemudEnableIpForwarding()) {
|
|
qemudReportError(server, VIR_ERR_INTERNAL_ERROR,
|
|
"failed to enable IP forwarding : %s\n", strerror(err));
|
|
goto err_delbr2;
|
|
}
|
|
|
|
if (network->def->ranges &&
|
|
dhcpStartDhcpDaemon(server, network) < 0)
|
|
goto err_delbr2;
|
|
|
|
network->active = 1;
|
|
|
|
server->ninactivenetworks--;
|
|
server->nactivenetworks++;
|
|
|
|
return 0;
|
|
|
|
err_delbr2:
|
|
qemudRemoveIptablesRules(server, network);
|
|
|
|
err_delbr1:
|
|
if (network->def->ipAddress[0] &&
|
|
(err = brSetInterfaceUp(server->brctl, network->bridge, 0))) {
|
|
qemudLog(QEMUD_WARN, "Failed to bring down bridge '%s' : %s",
|
|
network->bridge, strerror(err));
|
|
}
|
|
|
|
err_delbr:
|
|
if ((err = brDeleteBridge(server->brctl, network->bridge))) {
|
|
qemudLog(QEMUD_WARN, "Failed to delete bridge '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
|
|
int qemudShutdownNetworkDaemon(struct qemud_server *server,
|
|
struct qemud_network *network) {
|
|
int err;
|
|
|
|
qemudLog(QEMUD_INFO, "Shutting down network '%s'", network->def->name);
|
|
|
|
if (!qemudIsActiveNetwork(network))
|
|
return 0;
|
|
|
|
if (network->dnsmasqPid > 0)
|
|
kill(network->dnsmasqPid, SIGTERM);
|
|
|
|
qemudRemoveIptablesRules(server, network);
|
|
|
|
if (network->def->ipAddress[0] &&
|
|
(err = brSetInterfaceUp(server->brctl, network->bridge, 0))) {
|
|
qemudLog(QEMUD_WARN, "Failed to bring down bridge '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
}
|
|
|
|
if ((err = brDeleteBridge(server->brctl, network->bridge))) {
|
|
qemudLog(QEMUD_WARN, "Failed to delete bridge '%s' : %s\n",
|
|
network->bridge, strerror(err));
|
|
}
|
|
|
|
if (network->dnsmasqPid > 0 &&
|
|
waitpid(network->dnsmasqPid, NULL, WNOHANG) != network->dnsmasqPid) {
|
|
kill(network->dnsmasqPid, SIGKILL);
|
|
if (waitpid(network->dnsmasqPid, NULL, 0) != network->dnsmasqPid)
|
|
qemudLog(QEMUD_WARN, "Got unexpected pid for dnsmasq\n");
|
|
}
|
|
|
|
network->bridge[0] = '\0';
|
|
network->dnsmasqPid = -1;
|
|
network->active = 0;
|
|
|
|
if (network->newDef) {
|
|
qemudFreeNetworkDef(network->def);
|
|
network->def = network->newDef;
|
|
network->newDef = NULL;
|
|
}
|
|
|
|
server->nactivenetworks--;
|
|
server->ninactivenetworks++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int qemudDispatchPoll(struct qemud_server *server, struct pollfd *fds) {
|
|
struct qemud_socket *sock = server->sockets;
|
|
struct qemud_client *client = server->clients;
|
|
struct qemud_vm *vm;
|
|
struct qemud_network *network;
|
|
int ret = 0;
|
|
int fd = 0;
|
|
|
|
if (fds[fd++].revents && qemudDispatchSignal(server) < 0)
|
|
return -1;
|
|
|
|
if (server->shutdown)
|
|
return 0;
|
|
|
|
vm = server->vms;
|
|
while (vm) {
|
|
struct qemud_vm *next = vm->next;
|
|
int failed = 0,
|
|
stdoutfd = vm->stdout,
|
|
stderrfd = vm->stderr;
|
|
|
|
if (!qemudIsActiveVM(vm)) {
|
|
vm = next;
|
|
continue;
|
|
}
|
|
|
|
if (stdoutfd != -1) {
|
|
if (fds[fd].revents) {
|
|
if (fds[fd].revents == POLLIN) {
|
|
if (qemudDispatchVMLog(server, vm, fds[fd].fd) < 0)
|
|
failed = 1;
|
|
} else {
|
|
if (qemudDispatchVMFailure(server, vm, fds[fd].fd) < 0)
|
|
failed = 1;
|
|
}
|
|
}
|
|
fd++;
|
|
}
|
|
if (stderrfd != -1) {
|
|
if (!failed) {
|
|
if (fds[fd].revents) {
|
|
if (fds[fd].revents == POLLIN) {
|
|
if (qemudDispatchVMLog(server, vm, fds[fd].fd) < 0)
|
|
failed = 1;
|
|
} else {
|
|
if (qemudDispatchVMFailure(server, vm, fds[fd].fd) < 0)
|
|
failed = 1;
|
|
}
|
|
}
|
|
}
|
|
fd++;
|
|
}
|
|
vm = next;
|
|
if (failed)
|
|
ret = -1; /* FIXME: the daemon shouldn't exit on failure here */
|
|
}
|
|
while (client) {
|
|
struct qemud_client *next = client->next;
|
|
if (fds[fd].revents) {
|
|
qemudDebug("Poll data normal");
|
|
if (fds[fd].revents == POLLOUT)
|
|
qemudDispatchClientWrite(server, client);
|
|
else if (fds[fd].revents == POLLIN)
|
|
qemudDispatchClientRead(server, client);
|
|
else
|
|
qemudDispatchClientFailure(server, client);
|
|
}
|
|
fd++;
|
|
client = next;
|
|
}
|
|
while (sock) {
|
|
struct qemud_socket *next = sock->next;
|
|
/* FIXME: the daemon shouldn't exit on error here */
|
|
if (fds[fd].revents)
|
|
if (qemudDispatchServer(server, sock) < 0)
|
|
return -1;
|
|
fd++;
|
|
sock = next;
|
|
}
|
|
|
|
/* Cleanup any VMs which shutdown & dont have an associated
|
|
config file */
|
|
vm = server->vms;
|
|
while (vm) {
|
|
struct qemud_vm *next = vm->next;
|
|
|
|
if (!qemudIsActiveVM(vm) && !vm->configFile[0])
|
|
qemudRemoveInactiveVM(server, vm);
|
|
|
|
vm = next;
|
|
}
|
|
|
|
/* Cleanup any networks too */
|
|
network = server->networks;
|
|
while (network) {
|
|
struct qemud_network *next = network->next;
|
|
|
|
if (!qemudIsActiveNetwork(network) && !network->configFile[0])
|
|
qemudRemoveInactiveNetwork(server, network);
|
|
|
|
network = next;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void qemudPreparePoll(struct qemud_server *server, struct pollfd *fds) {
|
|
int fd = 0;
|
|
struct qemud_socket *sock;
|
|
struct qemud_client *client;
|
|
struct qemud_vm *vm;
|
|
|
|
fds[fd].fd = server->sigread;
|
|
fds[fd].events = POLLIN;
|
|
fd++;
|
|
|
|
for (vm = server->vms ; vm ; vm = vm->next) {
|
|
if (!qemudIsActiveVM(vm))
|
|
continue;
|
|
if (vm->stdout != -1) {
|
|
fds[fd].fd = vm->stdout;
|
|
fds[fd].events = POLLIN | POLLERR | POLLHUP;
|
|
fd++;
|
|
}
|
|
if (vm->stderr != -1) {
|
|
fds[fd].fd = vm->stderr;
|
|
fds[fd].events = POLLIN | POLLERR | POLLHUP;
|
|
fd++;
|
|
}
|
|
}
|
|
for (client = server->clients ; client ; client = client->next) {
|
|
fds[fd].fd = client->fd;
|
|
/* Refuse to read more from client if tx is pending to
|
|
rate limit */
|
|
if (client->tx)
|
|
fds[fd].events = POLLOUT | POLLERR | POLLHUP;
|
|
else
|
|
fds[fd].events = POLLIN | POLLERR | POLLHUP;
|
|
fd++;
|
|
}
|
|
for (sock = server->sockets ; sock ; sock = sock->next) {
|
|
fds[fd].fd = sock->fd;
|
|
fds[fd].events = POLLIN;
|
|
fd++;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
static int qemudOneLoop(struct qemud_server *server, int timeout) {
|
|
int nfds = server->nsockets + server->nclients + server->nvmfds + 1; /* server->sigread */
|
|
struct pollfd fds[nfds];
|
|
int thistimeout = -1;
|
|
int ret;
|
|
sig_atomic_t errors;
|
|
|
|
/* If we have no clients or vms, then timeout after
|
|
30 seconds, letting daemon exit */
|
|
if (timeout > 0 &&
|
|
!server->nclients &&
|
|
!server->nactivevms)
|
|
thistimeout = timeout;
|
|
|
|
qemudPreparePoll(server, fds);
|
|
|
|
retry:
|
|
|
|
if ((ret = poll(fds, nfds, thistimeout * 1000)) < 0) {
|
|
if (errno == EINTR) {
|
|
goto retry;
|
|
}
|
|
qemudLog(QEMUD_ERR, "Error polling on file descriptors: %s",
|
|
strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
/* Must have timed out */
|
|
if (ret == 0) {
|
|
qemudLog(QEMUD_INFO, "Timed out while polling on file descriptors");
|
|
return -1;
|
|
}
|
|
|
|
/* Check for any signal handling errors and log them. */
|
|
errors = sig_errors;
|
|
if (errors) {
|
|
sig_errors -= errors;
|
|
qemudLog (QEMUD_ERR,
|
|
"Signal handler reported %d errors: last error: %s",
|
|
errors, strerror (sig_lasterrno));
|
|
return -1;
|
|
}
|
|
|
|
if (qemudDispatchPoll(server, fds) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int qemudRunLoop(struct qemud_server *server, int timeout) {
|
|
int ret;
|
|
|
|
while ((ret = qemudOneLoop(server, timeout)) == 0 && !server->shutdown)
|
|
;
|
|
|
|
return ret == -1 ? -1 : 0;
|
|
}
|
|
|
|
static void qemudCleanup(struct qemud_server *server) {
|
|
struct qemud_socket *sock;
|
|
|
|
close(server->sigread);
|
|
|
|
sock = server->sockets;
|
|
while (sock) {
|
|
struct qemud_socket *next = sock->next;
|
|
close(sock->fd);
|
|
free(sock);
|
|
sock = next;
|
|
}
|
|
|
|
if (server->brctl)
|
|
brShutdown(server->brctl);
|
|
if (server->iptables)
|
|
iptablesContextFree(server->iptables);
|
|
|
|
free(server);
|
|
}
|
|
|
|
/* Print command-line usage. */
|
|
static void
|
|
usage (const char *argv0)
|
|
{
|
|
fprintf (stderr,
|
|
"\n"
|
|
"Usage:\n"
|
|
" %s [options]\n"
|
|
"\n"
|
|
"Options:\n"
|
|
" -v | --verbose Verbose messages.\n"
|
|
" -d | --daemon Run as a daemon & write PID file.\n"
|
|
" -s | --system Run as system daemon.\n"
|
|
" -t | --timeout <secs> Exit after timeout period.\n"
|
|
" -p | --pid-file <file> Change name of PID file.\n"
|
|
"\n"
|
|
"Notes:\n"
|
|
"\n"
|
|
"For '--system' option you must be running this daemon as root.\n"
|
|
"\n"
|
|
"The '--timeout' applies only when the daemon is not servicing\n"
|
|
"clients.\n"
|
|
"\n"
|
|
"Default paths:\n"
|
|
"\n"
|
|
" Sockets (in system mode):\n"
|
|
" " LOCAL_STATE_DIR "/run/libvirt/qemud-sock\n"
|
|
" " LOCAL_STATE_DIR "/run/libvirt/qemud-sock-ro\n"
|
|
"\n"
|
|
" Sockets (not in system mode):\n"
|
|
" $HOME/.libvirt/qemud-sock (in Unix abstract namespace)\n"
|
|
"\n"
|
|
" PID file (unless overridden by --pid-file):\n"
|
|
" " QEMUD_PID_FILE "\n"
|
|
"\n",
|
|
argv0);
|
|
}
|
|
|
|
#define MAX_LISTEN 5
|
|
int main(int argc, char **argv) {
|
|
int sys = 0;
|
|
int timeout = -1;
|
|
struct qemud_server *server;
|
|
struct sigaction sig_action;
|
|
int sigpipe[2];
|
|
char *pid_file = NULL;
|
|
int ret = 1;
|
|
|
|
struct option opts[] = {
|
|
{ "verbose", no_argument, &verbose, 1},
|
|
{ "daemon", no_argument, &godaemon, 1},
|
|
{ "system", no_argument, &sys, 1},
|
|
{ "timeout", required_argument, NULL, 't'},
|
|
{ "pid-file", required_argument, NULL, 'p'},
|
|
{ "help", no_argument, NULL, '?' },
|
|
{0, 0, 0, 0}
|
|
};
|
|
|
|
while (1) {
|
|
int optidx = 0;
|
|
int c;
|
|
char *tmp;
|
|
|
|
c = getopt_long(argc, argv, "vsdt:p:", opts, &optidx);
|
|
|
|
if (c == -1) {
|
|
break;
|
|
}
|
|
|
|
switch (c) {
|
|
case 0:
|
|
/* Got one of the flags */
|
|
break;
|
|
case 'v':
|
|
verbose = 1;
|
|
break;
|
|
case 'd':
|
|
godaemon = 1;
|
|
break;
|
|
case 's':
|
|
sys = 1;
|
|
break;
|
|
|
|
case 't':
|
|
timeout = strtol(optarg, &tmp, 10);
|
|
if (!tmp)
|
|
timeout = -1;
|
|
if (timeout <= 0)
|
|
timeout = -1;
|
|
break;
|
|
|
|
case 'p':
|
|
pid_file = strdup(optarg);
|
|
break;
|
|
|
|
case '?':
|
|
usage (argv[0]);
|
|
return 2;
|
|
|
|
default:
|
|
abort();
|
|
}
|
|
}
|
|
|
|
if (godaemon)
|
|
openlog("libvirt-qemud", 0, 0);
|
|
|
|
if (pipe(sigpipe) < 0 ||
|
|
qemudSetNonBlock(sigpipe[0]) < 0 ||
|
|
qemudSetNonBlock(sigpipe[1]) < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to create pipe: %s",
|
|
strerror(errno));
|
|
goto error1;
|
|
}
|
|
|
|
sigwrite = sigpipe[1];
|
|
|
|
sig_action.sa_handler = sig_handler;
|
|
sig_action.sa_flags = 0;
|
|
sigemptyset(&sig_action.sa_mask);
|
|
|
|
sigaction(SIGHUP, &sig_action, NULL);
|
|
sigaction(SIGINT, &sig_action, NULL);
|
|
sigaction(SIGQUIT, &sig_action, NULL);
|
|
sigaction(SIGTERM, &sig_action, NULL);
|
|
sigaction(SIGCHLD, &sig_action, NULL);
|
|
|
|
sig_action.sa_handler = SIG_IGN;
|
|
sigaction(SIGPIPE, &sig_action, NULL);
|
|
|
|
if (godaemon) {
|
|
int pid = qemudGoDaemon();
|
|
if (pid < 0) {
|
|
qemudLog(QEMUD_ERR, "Failed to fork as daemon: %s",
|
|
strerror(errno));
|
|
goto error1;
|
|
}
|
|
if (pid > 0)
|
|
goto out;
|
|
|
|
if (qemudWritePidFile(pid_file ? pid_file : QEMUD_PID_FILE) < 0)
|
|
goto error1;
|
|
}
|
|
|
|
if (!(server = qemudInitialize(sys, sigpipe[0]))) {
|
|
ret = 2;
|
|
goto error2;
|
|
}
|
|
|
|
qemudRunLoop(server, timeout);
|
|
|
|
qemudCleanup(server);
|
|
|
|
close(sigwrite);
|
|
|
|
if (godaemon)
|
|
closelog();
|
|
|
|
out:
|
|
ret = 0;
|
|
|
|
error2:
|
|
if (godaemon)
|
|
unlink(pid_file ? pid_file : QEMUD_PID_FILE);
|
|
|
|
error1:
|
|
if (pid_file)
|
|
free(pid_file);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Local variables:
|
|
* indent-tabs-mode: nil
|
|
* c-indent-level: 4
|
|
* c-basic-offset: 4
|
|
* tab-width: 4
|
|
* End:
|
|
*/
|