4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
7 * Permission is hereby granted, free of charge, to any person obtaining a copy
8 * of this software and associated documentation files (the "Software"), to deal
9 * in the Software without restriction, including without limitation the rights
10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 * copies of the Software, and to permit persons to whom the Software is
12 * furnished to do so, subject to the following conditions:
14 * The above copyright notice and this permission notice shall be included in
15 * all copies or substantial portions of the Software.
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
26 #include "qemu/osdep.h"
32 /* Needed early for CONFIG_BSD etc. */
33 #include "sysemu/sysemu.h"
34 #include "net/slirp.h"
35 #include "qemu-options.h"
36 #include "qemu/error-report.h"
38 #include "qemu/cutils.h"
41 #include <sys/prctl.h>
45 * Must set all three of these at once.
46 * Legal combinations are unset by name by uid
48 static struct passwd
*user_pwd
; /* NULL non-NULL NULL */
49 static uid_t user_uid
= (uid_t
)-1; /* -1 -1 >=0 */
50 static gid_t user_gid
= (gid_t
)-1; /* -1 -1 >=0 */
52 static const char *chroot_dir
;
54 static int daemon_pipe
;
56 void os_setup_early_signal_handling(void)
59 sigfillset(&act
.sa_mask
);
61 act
.sa_handler
= SIG_IGN
;
62 sigaction(SIGPIPE
, &act
, NULL
);
65 static void termsig_handler(int signal
, siginfo_t
*info
, void *c
)
67 qemu_system_killed(info
->si_signo
, info
->si_pid
);
70 void os_setup_signal_handling(void)
74 memset(&act
, 0, sizeof(act
));
75 act
.sa_sigaction
= termsig_handler
;
76 act
.sa_flags
= SA_SIGINFO
;
77 sigaction(SIGINT
, &act
, NULL
);
78 sigaction(SIGHUP
, &act
, NULL
);
79 sigaction(SIGTERM
, &act
, NULL
);
82 /* Find a likely location for support files using the location of the binary.
83 For installed binaries this will be "$bindir/../share/qemu". When
84 running from the build tree this will be "$bindir/../pc-bios". */
85 #define SHARE_SUFFIX "/share/qemu"
86 #define BUILD_SUFFIX "/pc-bios"
87 char *os_find_datadir(void)
93 exec_dir
= qemu_get_exec_dir();
94 if (exec_dir
== NULL
) {
97 dir
= g_path_get_dirname(exec_dir
);
99 max_len
= strlen(dir
) +
100 MAX(strlen(SHARE_SUFFIX
), strlen(BUILD_SUFFIX
)) + 1;
101 res
= g_malloc0(max_len
);
102 snprintf(res
, max_len
, "%s%s", dir
, SHARE_SUFFIX
);
103 if (access(res
, R_OK
)) {
104 snprintf(res
, max_len
, "%s%s", dir
, BUILD_SUFFIX
);
105 if (access(res
, R_OK
)) {
118 void os_set_proc_name(const char *s
)
120 #if defined(PR_SET_NAME)
124 pstrcpy(name
, sizeof(name
), s
);
125 /* Could rewrite argv[0] too, but that's a bit more complicated.
126 This simple way is enough for `top'. */
127 if (prctl(PR_SET_NAME
, name
)) {
128 error_report("unable to change process name: %s", strerror(errno
));
132 error_report("Change of process name not supported by your OS");
138 static bool os_parse_runas_uid_gid(const char *optarg
)
146 rc
= qemu_strtoul(optarg
, &ep
, 0, &lv
);
147 got_uid
= lv
; /* overflow here is ID in C99 */
148 if (rc
|| *ep
!= ':' || got_uid
!= lv
|| got_uid
== (uid_t
)-1) {
152 rc
= qemu_strtoul(ep
+ 1, 0, 0, &lv
);
153 got_gid
= lv
; /* overflow here is ID in C99 */
154 if (rc
|| got_gid
!= lv
|| got_gid
== (gid_t
)-1) {
165 * Parse OS specific command line options.
166 * return 0 if option handled, -1 otherwise
168 int os_parse_cmd_args(int index
, const char *optarg
)
171 case QEMU_OPTION_runas
:
172 user_pwd
= getpwnam(optarg
);
176 } else if (!os_parse_runas_uid_gid(optarg
)) {
177 error_report("User \"%s\" doesn't exist"
178 " (and is not <uid>:<gid>)",
183 case QEMU_OPTION_chroot
:
186 case QEMU_OPTION_daemonize
:
189 #if defined(CONFIG_LINUX)
190 case QEMU_OPTION_enablefips
:
191 fips_set_state(true);
201 static void change_process_uid(void)
203 assert((user_uid
== (uid_t
)-1) || user_pwd
== NULL
);
204 assert((user_uid
== (uid_t
)-1) ==
205 (user_gid
== (gid_t
)-1));
207 if (user_pwd
|| user_uid
!= (uid_t
)-1) {
208 gid_t intended_gid
= user_pwd
? user_pwd
->pw_gid
: user_gid
;
209 uid_t intended_uid
= user_pwd
? user_pwd
->pw_uid
: user_uid
;
210 if (setgid(intended_gid
) < 0) {
211 error_report("Failed to setgid(%d)", intended_gid
);
215 if (initgroups(user_pwd
->pw_name
, user_pwd
->pw_gid
) < 0) {
216 error_report("Failed to initgroups(\"%s\", %d)",
217 user_pwd
->pw_name
, user_pwd
->pw_gid
);
221 if (setgroups(1, &user_gid
) < 0) {
222 error_report("Failed to setgroups(1, [%d])",
227 if (setuid(intended_uid
) < 0) {
228 error_report("Failed to setuid(%d)", intended_uid
);
231 if (setuid(0) != -1) {
232 error_report("Dropping privileges failed");
238 static void change_root(void)
241 if (chroot(chroot_dir
) < 0) {
242 error_report("chroot failed");
246 error_report("not able to chdir to /: %s", strerror(errno
));
253 void os_daemonize(void)
259 if (pipe(fds
) == -1) {
271 len
= read(fds
[0], &status
, 1);
272 } while (len
< 0 && errno
== EINTR
);
274 /* only exit successfully if our child actually wrote
275 * a one-byte zero to our pipe, upon successful init */
276 exit(len
== 1 && status
== 0 ? 0 : 1);
278 } else if (pid
< 0) {
283 daemon_pipe
= fds
[1];
284 qemu_set_cloexec(daemon_pipe
);
291 } else if (pid
< 0) {
296 signal(SIGTSTP
, SIG_IGN
);
297 signal(SIGTTOU
, SIG_IGN
);
298 signal(SIGTTIN
, SIG_IGN
);
302 void os_setup_post(void)
308 error_report("not able to chdir to /: %s", strerror(errno
));
311 TFR(fd
= qemu_open("/dev/null", O_RDWR
));
318 change_process_uid();
326 /* In case -D is given do not redirect stderr to /dev/null */
334 len
= write(daemon_pipe
, &status
, 1);
335 } while (len
< 0 && errno
== EINTR
);
342 void os_set_line_buffering(void)
344 setvbuf(stdout
, NULL
, _IOLBF
, 0);
347 bool is_daemonized(void)
356 ret
= mlockall(MCL_CURRENT
| MCL_FUTURE
);
358 error_report("mlockall: %s", strerror(errno
));