4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
7 * Permission is hereby granted, free of charge, to any person obtaining a copy
8 * of this software and associated documentation files (the "Software"), to deal
9 * in the Software without restriction, including without limitation the rights
10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 * copies of the Software, and to permit persons to whom the Software is
12 * furnished to do so, subject to the following conditions:
14 * The above copyright notice and this permission notice shall be included in
15 * all copies or substantial portions of the Software.
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
26 #include "qemu/osdep.h"
32 #include "qemu-common.h"
33 /* Needed early for CONFIG_BSD etc. */
34 #include "sysemu/sysemu.h"
35 #include "net/slirp.h"
36 #include "qemu-options.h"
37 #include "qemu/error-report.h"
39 #include "qemu/cutils.h"
42 #include <sys/prctl.h>
46 * Must set all three of these at once.
47 * Legal combinations are unset by name by uid
49 static struct passwd *user_pwd; /* NULL non-NULL NULL */
50 static uid_t user_uid = (uid_t)-1; /* -1 -1 >=0 */
51 static gid_t user_gid = (gid_t)-1; /* -1 -1 >=0 */
53 static const char *chroot_dir;
55 static int daemon_pipe;
57 void os_setup_early_signal_handling(void)
60 sigfillset(&act.sa_mask);
62 act.sa_handler = SIG_IGN;
63 sigaction(SIGPIPE, &act, NULL);
66 static void termsig_handler(int signal, siginfo_t *info, void *c)
68 qemu_system_killed(info->si_signo, info->si_pid);
71 void os_setup_signal_handling(void)
75 memset(&act, 0, sizeof(act));
76 act.sa_sigaction = termsig_handler;
77 act.sa_flags = SA_SIGINFO;
78 sigaction(SIGINT, &act, NULL);
79 sigaction(SIGHUP, &act, NULL);
80 sigaction(SIGTERM, &act, NULL);
83 /* Find a likely location for support files using the location of the binary.
84 For installed binaries this will be "$bindir/../share/qemu". When
85 running from the build tree this will be "$bindir/../pc-bios". */
86 #define SHARE_SUFFIX "/share/qemu"
87 #define BUILD_SUFFIX "/pc-bios"
88 char *os_find_datadir(void)
94 exec_dir = qemu_get_exec_dir();
95 if (exec_dir == NULL) {
98 dir = g_path_get_dirname(exec_dir);
100 max_len = strlen(dir) +
101 MAX(strlen(SHARE_SUFFIX), strlen(BUILD_SUFFIX)) + 1;
102 res = g_malloc0(max_len);
103 snprintf(res, max_len, "%s%s", dir, SHARE_SUFFIX);
104 if (access(res, R_OK)) {
105 snprintf(res, max_len, "%s%s", dir, BUILD_SUFFIX);
106 if (access(res, R_OK)) {
119 void os_set_proc_name(const char *s)
121 #if defined(PR_SET_NAME)
125 pstrcpy(name, sizeof(name), s);
126 /* Could rewrite argv[0] too, but that's a bit more complicated.
127 This simple way is enough for `top'. */
128 if (prctl(PR_SET_NAME, name)) {
129 error_report("unable to change process name: %s", strerror(errno));
133 error_report("Change of process name not supported by your OS");
139 static bool os_parse_runas_uid_gid(const char *optarg)
147 rc = qemu_strtoul(optarg, &ep, 0, &lv);
148 got_uid = lv; /* overflow here is ID in C99 */
149 if (rc || *ep != ':' || got_uid != lv || got_uid == (uid_t)-1) {
153 rc = qemu_strtoul(ep + 1, 0, 0, &lv);
154 got_gid = lv; /* overflow here is ID in C99 */
155 if (rc || got_gid != lv || got_gid == (gid_t)-1) {
166 * Parse OS specific command line options.
167 * return 0 if option handled, -1 otherwise
169 int os_parse_cmd_args(int index, const char *optarg)
172 case QEMU_OPTION_runas:
173 user_pwd = getpwnam(optarg);
177 } else if (!os_parse_runas_uid_gid(optarg)) {
178 error_report("User \"%s\" doesn't exist"
179 " (and is not <uid>:<gid>)",
184 case QEMU_OPTION_chroot:
187 case QEMU_OPTION_daemonize:
190 #if defined(CONFIG_LINUX)
191 case QEMU_OPTION_enablefips:
192 fips_set_state(true);
202 static void change_process_uid(void)
204 assert((user_uid == (uid_t)-1) || user_pwd == NULL);
205 assert((user_uid == (uid_t)-1) ==
206 (user_gid == (gid_t)-1));
208 if (user_pwd || user_uid != (uid_t)-1) {
209 gid_t intended_gid = user_pwd ? user_pwd->pw_gid : user_gid;
210 uid_t intended_uid = user_pwd ? user_pwd->pw_uid : user_uid;
211 if (setgid(intended_gid) < 0) {
212 error_report("Failed to setgid(%d)", intended_gid);
216 if (initgroups(user_pwd->pw_name, user_pwd->pw_gid) < 0) {
217 error_report("Failed to initgroups(\"%s\", %d)",
218 user_pwd->pw_name, user_pwd->pw_gid);
222 if (setgroups(1, &user_gid) < 0) {
223 error_report("Failed to setgroups(1, [%d])",
228 if (setuid(intended_uid) < 0) {
229 error_report("Failed to setuid(%d)", intended_uid);
232 if (setuid(0) != -1) {
233 error_report("Dropping privileges failed");
239 static void change_root(void)
242 if (chroot(chroot_dir) < 0) {
243 error_report("chroot failed");
247 error_report("not able to chdir to /: %s", strerror(errno));
254 void os_daemonize(void)
260 if (pipe(fds) == -1) {
272 len = read(fds[0], &status, 1);
273 } while (len < 0 && errno == EINTR);
275 /* only exit successfully if our child actually wrote
276 * a one-byte zero to our pipe, upon successful init */
277 exit(len == 1 && status == 0 ? 0 : 1);
279 } else if (pid < 0) {
284 daemon_pipe = fds[1];
285 qemu_set_cloexec(daemon_pipe);
292 } else if (pid < 0) {
297 signal(SIGTSTP, SIG_IGN);
298 signal(SIGTTOU, SIG_IGN);
299 signal(SIGTTIN, SIG_IGN);
303 void os_setup_post(void)
309 error_report("not able to chdir to /: %s", strerror(errno));
312 TFR(fd = qemu_open("/dev/null", O_RDWR));
319 change_process_uid();
327 /* In case -D is given do not redirect stderr to /dev/null */
335 len = write(daemon_pipe, &status, 1);
336 } while (len < 0 && errno == EINTR);
343 void os_set_line_buffering(void)
345 setvbuf(stdout, NULL, _IOLBF, 0);
348 bool is_daemonized(void)
357 ret = mlockall(MCL_CURRENT | MCL_FUTURE);
359 error_report("mlockall: %s", strerror(errno));