4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
7 * Permission is hereby granted, free of charge, to any person obtaining a copy
8 * of this software and associated documentation files (the "Software"), to deal
9 * in the Software without restriction, including without limitation the rights
10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 * copies of the Software, and to permit persons to whom the Software is
12 * furnished to do so, subject to the following conditions:
14 * The above copyright notice and this permission notice shall be included in
15 * all copies or substantial portions of the Software.
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
29 #include <sys/types.h>
31 /*needed for MAP_POPULATE before including qemu-options.h */
37 /* Needed early for CONFIG_BSD etc. */
38 #include "config-host.h"
39 #include "sysemu/sysemu.h"
40 #include "net/slirp.h"
41 #include "qemu-options.h"
44 #include <sys/prctl.h>
48 #include <sys/sysctl.h>
51 static struct passwd
*user_pwd
;
52 static const char *chroot_dir
;
56 void os_setup_early_signal_handling(void)
59 sigfillset(&act
.sa_mask
);
61 act
.sa_handler
= SIG_IGN
;
62 sigaction(SIGPIPE
, &act
, NULL
);
65 static void termsig_handler(int signal
, siginfo_t
*info
, void *c
)
67 qemu_system_killed(info
->si_signo
, info
->si_pid
);
70 void os_setup_signal_handling(void)
74 memset(&act
, 0, sizeof(act
));
75 act
.sa_sigaction
= termsig_handler
;
76 act
.sa_flags
= SA_SIGINFO
;
77 sigaction(SIGINT
, &act
, NULL
);
78 sigaction(SIGHUP
, &act
, NULL
);
79 sigaction(SIGTERM
, &act
, NULL
);
82 /* Find a likely location for support files using the location of the binary.
83 For installed binaries this will be "$bindir/../share/qemu". When
84 running from the build tree this will be "$bindir/../pc-bios". */
85 #define SHARE_SUFFIX "/share/qemu"
86 #define BUILD_SUFFIX "/pc-bios"
87 char *os_find_datadir(const char *argv0
)
95 #if defined(__linux__)
98 len
= readlink("/proc/self/exe", buf
, sizeof(buf
) - 1);
104 #elif defined(__FreeBSD__)
106 static int mib
[4] = {CTL_KERN
, KERN_PROC
, KERN_PROC_PATHNAME
, -1};
107 size_t len
= sizeof(buf
) - 1;
110 if (!sysctl(mib
, ARRAY_SIZE(mib
), buf
, &len
, NULL
, 0) &&
112 buf
[sizeof(buf
) - 1] = '\0';
117 /* If we don't have any way of figuring out the actual executable
118 location then try argv[0]. */
120 p
= realpath(argv0
, buf
);
128 max_len
= strlen(dir
) +
129 MAX(strlen(SHARE_SUFFIX
), strlen(BUILD_SUFFIX
)) + 1;
130 res
= g_malloc0(max_len
);
131 snprintf(res
, max_len
, "%s%s", dir
, SHARE_SUFFIX
);
132 if (access(res
, R_OK
)) {
133 snprintf(res
, max_len
, "%s%s", dir
, BUILD_SUFFIX
);
134 if (access(res
, R_OK
)) {
145 void os_set_proc_name(const char *s
)
147 #if defined(PR_SET_NAME)
151 pstrcpy(name
, sizeof(name
), s
);
152 /* Could rewrite argv[0] too, but that's a bit more complicated.
153 This simple way is enough for `top'. */
154 if (prctl(PR_SET_NAME
, name
)) {
155 perror("unable to change process name");
159 fprintf(stderr
, "Change of process name not supported by your OS\n");
165 * Parse OS specific command line options.
166 * return 0 if option handled, -1 otherwise
168 void os_parse_cmd_args(int index
, const char *optarg
)
172 case QEMU_OPTION_smb
:
173 if (net_slirp_smb(optarg
) < 0)
177 case QEMU_OPTION_runas
:
178 user_pwd
= getpwnam(optarg
);
180 fprintf(stderr
, "User \"%s\" doesn't exist\n", optarg
);
184 case QEMU_OPTION_chroot
:
187 case QEMU_OPTION_daemonize
:
190 #if defined(CONFIG_LINUX)
191 case QEMU_OPTION_enablefips
:
192 fips_set_state(true);
198 static void change_process_uid(void)
201 if (setgid(user_pwd
->pw_gid
) < 0) {
202 fprintf(stderr
, "Failed to setgid(%d)\n", user_pwd
->pw_gid
);
205 if (initgroups(user_pwd
->pw_name
, user_pwd
->pw_gid
) < 0) {
206 fprintf(stderr
, "Failed to initgroups(\"%s\", %d)\n",
207 user_pwd
->pw_name
, user_pwd
->pw_gid
);
210 if (setuid(user_pwd
->pw_uid
) < 0) {
211 fprintf(stderr
, "Failed to setuid(%d)\n", user_pwd
->pw_uid
);
214 if (setuid(0) != -1) {
215 fprintf(stderr
, "Dropping privileges failed\n");
221 static void change_root(void)
224 if (chroot(chroot_dir
) < 0) {
225 fprintf(stderr
, "chroot failed\n");
229 perror("not able to chdir to /");
236 void os_daemonize(void)
252 len
= read(fds
[0], &status
, 1);
253 if (len
== -1 && (errno
== EINTR
))
258 else if (status
== 1) {
259 fprintf(stderr
, "Could not acquire pidfile: %s\n", strerror(errno
));
267 qemu_set_cloexec(fds
[1]);
279 signal(SIGTSTP
, SIG_IGN
);
280 signal(SIGTTOU
, SIG_IGN
);
281 signal(SIGTTIN
, SIG_IGN
);
285 void os_setup_post(void)
294 len
= write(fds
[1], &status
, 1);
295 if (len
== -1 && (errno
== EINTR
))
302 perror("not able to chdir to /");
305 TFR(fd
= qemu_open("/dev/null", O_RDWR
));
311 change_process_uid();
322 void os_pidfile_error(void)
326 if (write(fds
[1], &status
, 1) != 1) {
327 perror("daemonize. Writing to pipe\n");
330 fprintf(stderr
, "Could not acquire pid file: %s\n", strerror(errno
));
333 void os_set_line_buffering(void)
335 setvbuf(stdout
, NULL
, _IOLBF
, 0);
338 int qemu_create_pidfile(const char *filename
)
344 fd
= qemu_open(filename
, O_RDWR
| O_CREAT
, 0600);
348 if (lockf(fd
, F_TLOCK
, 0) == -1) {
352 len
= snprintf(buffer
, sizeof(buffer
), FMT_pid
"\n", getpid());
353 if (write(fd
, buffer
, len
) != len
) {
358 /* keep pidfile open & locked forever */
362 bool is_daemonized(void)