4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
7 * Permission is hereby granted, free of charge, to any person obtaining a copy
8 * of this software and associated documentation files (the "Software"), to deal
9 * in the Software without restriction, including without limitation the rights
10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 * copies of the Software, and to permit persons to whom the Software is
12 * furnished to do so, subject to the following conditions:
14 * The above copyright notice and this permission notice shall be included in
15 * all copies or substantial portions of the Software.
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
26 #include "qemu/osdep.h"
27 #include <sys/resource.h>
33 #include "qemu/error-report.h"
35 #include "sysemu/runstate.h"
36 #include "qemu/cutils.h"
39 #include <sys/prctl.h>
43 void os_setup_early_signal_handling(void)
46 sigfillset(&act
.sa_mask
);
48 act
.sa_handler
= SIG_IGN
;
49 sigaction(SIGPIPE
, &act
, NULL
);
52 static void termsig_handler(int signal
, siginfo_t
*info
, void *c
)
54 qemu_system_killed(info
->si_signo
, info
->si_pid
);
57 void os_setup_signal_handling(void)
61 memset(&act
, 0, sizeof(act
));
62 act
.sa_sigaction
= termsig_handler
;
63 act
.sa_flags
= SA_SIGINFO
;
64 sigaction(SIGINT
, &act
, NULL
);
65 sigaction(SIGHUP
, &act
, NULL
);
66 sigaction(SIGTERM
, &act
, NULL
);
69 void os_set_proc_name(const char *s
)
71 #if defined(PR_SET_NAME)
75 pstrcpy(name
, sizeof(name
), s
);
76 /* Could rewrite argv[0] too, but that's a bit more complicated.
77 This simple way is enough for `top'. */
78 if (prctl(PR_SET_NAME
, name
)) {
79 error_report("unable to change process name: %s", strerror(errno
));
83 error_report("Change of process name not supported by your OS");
90 * Must set all three of these at once.
91 * Legal combinations are unset by name by uid
93 static struct passwd
*user_pwd
; /* NULL non-NULL NULL */
94 static uid_t user_uid
= (uid_t
)-1; /* -1 -1 >=0 */
95 static gid_t user_gid
= (gid_t
)-1; /* -1 -1 >=0 */
98 * Prepare to change user ID. user_id can be one of 3 forms:
99 * - a username, in which case user ID will be changed to its uid,
100 * with primary and supplementary groups set up too;
101 * - a numeric uid, in which case only the uid will be set;
102 * - a pair of numeric uid:gid.
104 bool os_set_runas(const char *user_id
)
112 user_pwd
= getpwnam(user_id
);
119 rc
= qemu_strtoul(user_id
, &ep
, 0, &lv
);
120 got_uid
= lv
; /* overflow here is ID in C99 */
121 if (rc
|| *ep
!= ':' || got_uid
!= lv
|| got_uid
== (uid_t
)-1) {
125 rc
= qemu_strtoul(ep
+ 1, 0, 0, &lv
);
126 got_gid
= lv
; /* overflow here is ID in C99 */
127 if (rc
|| got_gid
!= lv
|| got_gid
== (gid_t
)-1) {
137 static void change_process_uid(void)
139 assert((user_uid
== (uid_t
)-1) || user_pwd
== NULL
);
140 assert((user_uid
== (uid_t
)-1) ==
141 (user_gid
== (gid_t
)-1));
143 if (user_pwd
|| user_uid
!= (uid_t
)-1) {
144 gid_t intended_gid
= user_pwd
? user_pwd
->pw_gid
: user_gid
;
145 uid_t intended_uid
= user_pwd
? user_pwd
->pw_uid
: user_uid
;
146 if (setgid(intended_gid
) < 0) {
147 error_report("Failed to setgid(%d)", intended_gid
);
151 if (initgroups(user_pwd
->pw_name
, user_pwd
->pw_gid
) < 0) {
152 error_report("Failed to initgroups(\"%s\", %d)",
153 user_pwd
->pw_name
, user_pwd
->pw_gid
);
157 if (setgroups(1, &user_gid
) < 0) {
158 error_report("Failed to setgroups(1, [%d])",
163 if (setuid(intended_uid
) < 0) {
164 error_report("Failed to setuid(%d)", intended_uid
);
167 if (setuid(0) != -1) {
168 error_report("Dropping privileges failed");
175 static const char *chroot_dir
;
177 void os_set_chroot(const char *path
)
182 static void change_root(void)
185 if (chroot(chroot_dir
) < 0) {
186 error_report("chroot failed");
190 error_report("not able to chdir to /: %s", strerror(errno
));
198 static int daemonize
;
199 static int daemon_pipe
;
201 bool is_daemonized(void)
206 int os_set_daemonize(bool d
)
212 void os_daemonize(void)
218 if (!g_unix_open_pipe(fds
, FD_CLOEXEC
, NULL
)) {
230 len
= read(fds
[0], &status
, 1);
231 } while (len
< 0 && errno
== EINTR
);
233 /* only exit successfully if our child actually wrote
234 * a one-byte zero to our pipe, upon successful init */
235 exit(len
== 1 && status
== 0 ? 0 : 1);
237 } else if (pid
< 0) {
242 daemon_pipe
= fds
[1];
249 } else if (pid
< 0) {
254 signal(SIGTSTP
, SIG_IGN
);
255 signal(SIGTTOU
, SIG_IGN
);
256 signal(SIGTTIN
, SIG_IGN
);
260 void os_setup_limits(void)
262 struct rlimit nofile
;
264 if (getrlimit(RLIMIT_NOFILE
, &nofile
) < 0) {
265 warn_report("unable to query NOFILE limit: %s", strerror(errno
));
269 if (nofile
.rlim_cur
== nofile
.rlim_max
) {
274 nofile
.rlim_cur
= OPEN_MAX
< nofile
.rlim_max
? OPEN_MAX
: nofile
.rlim_max
;
276 nofile
.rlim_cur
= nofile
.rlim_max
;
279 if (setrlimit(RLIMIT_NOFILE
, &nofile
) < 0) {
280 warn_report("unable to set NOFILE limit: %s", strerror(errno
));
285 void os_setup_post(void)
291 error_report("not able to chdir to /: %s", strerror(errno
));
294 fd
= RETRY_ON_EINTR(qemu_open_old("/dev/null", O_RDWR
));
301 change_process_uid();
309 /* In case -D is given do not redirect stderr to /dev/null */
310 if (!qemu_log_enabled()) {
317 len
= write(daemon_pipe
, &status
, 1);
318 } while (len
< 0 && errno
== EINTR
);
325 void os_set_line_buffering(void)
327 setvbuf(stdout
, NULL
, _IOLBF
, 0);
335 ret
= mlockall(MCL_CURRENT
| MCL_FUTURE
);
337 error_report("mlockall: %s", strerror(errno
));