blob: 90ea71725fb026e8dec8384267441ec427734fa3 [file] [log] [blame]
Jes Sorensen86b645e2010-06-10 11:42:19 +02001/*
2 * os-posix.c
3 *
4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
6 *
7 * Permission is hereby granted, free of charge, to any person obtaining a copy
8 * of this software and associated documentation files (the "Software"), to deal
9 * in the Software without restriction, including without limitation the rights
10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 * copies of the Software, and to permit persons to whom the Software is
12 * furnished to do so, subject to the following conditions:
13 *
14 * The above copyright notice and this permission notice shall be included in
15 * all copies or substantial portions of the Software.
16 *
17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
23 * THE SOFTWARE.
24 */
25
Peter Maydelld38ea872016-01-29 17:50:05 +000026#include "qemu/osdep.h"
Jes Sorensen8d963e62010-06-10 11:42:22 +020027#include <sys/wait.h>
Jes Sorensen8847cfe2010-06-10 11:42:26 +020028#include <pwd.h>
Stefan Hajnoczicc4662f2011-07-09 10:22:07 +010029#include <grp.h>
Jes Sorensen61705402010-06-10 11:42:23 +020030#include <libgen.h>
Jes Sorensen86b645e2010-06-10 11:42:19 +020031
32/* Needed early for CONFIG_BSD etc. */
Jes Sorensen59a52642010-06-10 11:42:25 +020033#include "net/slirp.h"
Paolo Bonzinifd5fc4b2021-05-17 07:34:21 -040034#include "qemu/qemu-options.h"
Thomas Huthf853ac62016-01-13 09:05:32 +010035#include "qemu/error-report.h"
Dimitris Aragiorgis96c33a42016-02-18 13:38:38 +020036#include "qemu/log.h"
Markus Armbruster54d31232019-08-12 07:23:59 +020037#include "sysemu/runstate.h"
Veronia Bahaaf348b6d2016-03-20 19:16:19 +020038#include "qemu/cutils.h"
Claudio Imbrenda80bd81c2023-05-05 14:00:51 +020039#include "qemu/config-file.h"
40#include "qemu/option.h"
Jes Sorensen86b645e2010-06-10 11:42:19 +020041
Jes Sorensence798cf2010-06-10 11:42:31 +020042#ifdef CONFIG_LINUX
43#include <sys/prctl.h>
Claudio Imbrendac891c242022-08-12 15:34:53 +020044#include "qemu/async-teardown.h"
Jes Sorensen949d31e2010-10-26 10:39:22 +020045#endif
46
Ian Jackson2c42f1e2017-09-15 18:10:44 +010047/*
48 * Must set all three of these at once.
49 * Legal combinations are unset by name by uid
50 */
51static struct passwd *user_pwd; /* NULL non-NULL NULL */
52static uid_t user_uid = (uid_t)-1; /* -1 -1 >=0 */
53static gid_t user_gid = (gid_t)-1; /* -1 -1 >=0 */
54
Jes Sorensen07663792010-06-10 11:42:27 +020055static const char *chroot_dir;
Jes Sorenseneb505be2010-06-10 11:42:28 +020056static int daemonize;
Michael Tokarev0be5e432014-10-30 17:30:51 +030057static int daemon_pipe;
Jes Sorensen8847cfe2010-06-10 11:42:26 +020058
Jes Sorensenfe98ac12010-06-10 11:42:21 +020059void os_setup_early_signal_handling(void)
Jes Sorensen86b645e2010-06-10 11:42:19 +020060{
61 struct sigaction act;
62 sigfillset(&act.sa_mask);
63 act.sa_flags = 0;
64 act.sa_handler = SIG_IGN;
65 sigaction(SIGPIPE, &act, NULL);
66}
Jes Sorensen8d963e62010-06-10 11:42:22 +020067
Gleb Natapovf64622c2011-03-15 13:56:04 +020068static void termsig_handler(int signal, siginfo_t *info, void *c)
Jes Sorensen8d963e62010-06-10 11:42:22 +020069{
Gleb Natapovf64622c2011-03-15 13:56:04 +020070 qemu_system_killed(info->si_signo, info->si_pid);
Jes Sorensen8d963e62010-06-10 11:42:22 +020071}
72
Jes Sorensen8d963e62010-06-10 11:42:22 +020073void os_setup_signal_handling(void)
74{
75 struct sigaction act;
76
77 memset(&act, 0, sizeof(act));
Gleb Natapovf64622c2011-03-15 13:56:04 +020078 act.sa_sigaction = termsig_handler;
79 act.sa_flags = SA_SIGINFO;
Jes Sorensen8d963e62010-06-10 11:42:22 +020080 sigaction(SIGINT, &act, NULL);
81 sigaction(SIGHUP, &act, NULL);
82 sigaction(SIGTERM, &act, NULL);
Jes Sorensen8d963e62010-06-10 11:42:22 +020083}
Jes Sorensen61705402010-06-10 11:42:23 +020084
Jes Sorensence798cf2010-06-10 11:42:31 +020085void os_set_proc_name(const char *s)
86{
87#if defined(PR_SET_NAME)
88 char name[16];
89 if (!s)
90 return;
Jim Meyering3eadc682012-10-04 13:09:51 +020091 pstrcpy(name, sizeof(name), s);
Jes Sorensence798cf2010-06-10 11:42:31 +020092 /* Could rewrite argv[0] too, but that's a bit more complicated.
93 This simple way is enough for `top'. */
94 if (prctl(PR_SET_NAME, name)) {
Ian Jacksona7aaec12018-04-16 15:16:23 +010095 error_report("unable to change process name: %s", strerror(errno));
Jes Sorensence798cf2010-06-10 11:42:31 +020096 exit(1);
97 }
98#else
Ian Jackson22cd4f42018-04-16 15:15:51 +010099 error_report("Change of process name not supported by your OS");
Jes Sorensence798cf2010-06-10 11:42:31 +0200100 exit(1);
101#endif
102}
103
Ian Jackson2c42f1e2017-09-15 18:10:44 +0100104
105static bool os_parse_runas_uid_gid(const char *optarg)
106{
107 unsigned long lv;
108 const char *ep;
109 uid_t got_uid;
110 gid_t got_gid;
111 int rc;
112
113 rc = qemu_strtoul(optarg, &ep, 0, &lv);
114 got_uid = lv; /* overflow here is ID in C99 */
115 if (rc || *ep != ':' || got_uid != lv || got_uid == (uid_t)-1) {
116 return false;
117 }
118
119 rc = qemu_strtoul(ep + 1, 0, 0, &lv);
120 got_gid = lv; /* overflow here is ID in C99 */
121 if (rc || got_gid != lv || got_gid == (gid_t)-1) {
122 return false;
123 }
124
125 user_pwd = NULL;
126 user_uid = got_uid;
127 user_gid = got_gid;
128 return true;
129}
130
Jes Sorensen59a52642010-06-10 11:42:25 +0200131/*
132 * Parse OS specific command line options.
133 * return 0 if option handled, -1 otherwise
134 */
Thomas Huth1217d6ca2018-05-04 19:01:07 +0200135int os_parse_cmd_args(int index, const char *optarg)
Jes Sorensen59a52642010-06-10 11:42:25 +0200136{
137 switch (index) {
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200138 case QEMU_OPTION_runas:
139 user_pwd = getpwnam(optarg);
Ian Jackson2c42f1e2017-09-15 18:10:44 +0100140 if (user_pwd) {
141 user_uid = -1;
142 user_gid = -1;
143 } else if (!os_parse_runas_uid_gid(optarg)) {
144 error_report("User \"%s\" doesn't exist"
145 " (and is not <uid>:<gid>)",
146 optarg);
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200147 exit(1);
148 }
149 break;
Jes Sorensen07663792010-06-10 11:42:27 +0200150 case QEMU_OPTION_chroot:
151 chroot_dir = optarg;
152 break;
Jes Sorenseneb505be2010-06-10 11:42:28 +0200153 case QEMU_OPTION_daemonize:
154 daemonize = 1;
155 break;
Claudio Imbrendac891c242022-08-12 15:34:53 +0200156#if defined(CONFIG_LINUX)
Claudio Imbrenda80bd81c2023-05-05 14:00:51 +0200157 /* deprecated */
Claudio Imbrendac891c242022-08-12 15:34:53 +0200158 case QEMU_OPTION_asyncteardown:
159 init_async_teardown();
160 break;
Claudio Imbrenda80bd81c2023-05-05 14:00:51 +0200161 case QEMU_OPTION_run_with: {
162 QemuOpts *opts = qemu_opts_parse_noisily(qemu_find_opts("run-with"),
163 optarg, false);
164 if (!opts) {
165 exit(1);
166 }
167 if (qemu_opt_get_bool(opts, "async-teardown", false)) {
168 init_async_teardown();
169 }
170 break;
171 }
Claudio Imbrendac891c242022-08-12 15:34:53 +0200172#endif
Thomas Huth1217d6ca2018-05-04 19:01:07 +0200173 default:
174 return -1;
Jes Sorensen59a52642010-06-10 11:42:25 +0200175 }
Thomas Huth1217d6ca2018-05-04 19:01:07 +0200176
177 return 0;
Jes Sorensen59a52642010-06-10 11:42:25 +0200178}
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200179
Jes Sorensene06eb602010-06-10 11:42:29 +0200180static void change_process_uid(void)
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200181{
Ian Jackson2c42f1e2017-09-15 18:10:44 +0100182 assert((user_uid == (uid_t)-1) || user_pwd == NULL);
183 assert((user_uid == (uid_t)-1) ==
184 (user_gid == (gid_t)-1));
185
186 if (user_pwd || user_uid != (uid_t)-1) {
187 gid_t intended_gid = user_pwd ? user_pwd->pw_gid : user_gid;
188 uid_t intended_uid = user_pwd ? user_pwd->pw_uid : user_uid;
189 if (setgid(intended_gid) < 0) {
190 error_report("Failed to setgid(%d)", intended_gid);
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200191 exit(1);
192 }
Ian Jackson2c42f1e2017-09-15 18:10:44 +0100193 if (user_pwd) {
194 if (initgroups(user_pwd->pw_name, user_pwd->pw_gid) < 0) {
195 error_report("Failed to initgroups(\"%s\", %d)",
196 user_pwd->pw_name, user_pwd->pw_gid);
197 exit(1);
198 }
199 } else {
200 if (setgroups(1, &user_gid) < 0) {
201 error_report("Failed to setgroups(1, [%d])",
202 user_gid);
203 exit(1);
204 }
Stefan Hajnoczicc4662f2011-07-09 10:22:07 +0100205 }
Ian Jackson2c42f1e2017-09-15 18:10:44 +0100206 if (setuid(intended_uid) < 0) {
207 error_report("Failed to setuid(%d)", intended_uid);
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200208 exit(1);
209 }
210 if (setuid(0) != -1) {
Ian Jacksonf0a21712018-04-16 15:08:03 +0100211 error_report("Dropping privileges failed");
Jes Sorensen8847cfe2010-06-10 11:42:26 +0200212 exit(1);
213 }
214 }
215}
Jes Sorensen07663792010-06-10 11:42:27 +0200216
Jes Sorensene06eb602010-06-10 11:42:29 +0200217static void change_root(void)
Jes Sorensen07663792010-06-10 11:42:27 +0200218{
219 if (chroot_dir) {
220 if (chroot(chroot_dir) < 0) {
Ian Jackson22cd4f42018-04-16 15:15:51 +0100221 error_report("chroot failed");
Jes Sorensen07663792010-06-10 11:42:27 +0200222 exit(1);
223 }
224 if (chdir("/")) {
Ian Jacksona7aaec12018-04-16 15:16:23 +0100225 error_report("not able to chdir to /: %s", strerror(errno));
Jes Sorensen07663792010-06-10 11:42:27 +0200226 exit(1);
227 }
228 }
229
230}
Jes Sorenseneb505be2010-06-10 11:42:28 +0200231
232void os_daemonize(void)
233{
234 if (daemonize) {
Gonglei63ce8e12014-09-26 16:14:30 +0800235 pid_t pid;
Michael Tokarev0be5e432014-10-30 17:30:51 +0300236 int fds[2];
Jes Sorenseneb505be2010-06-10 11:42:28 +0200237
Marc-André Lureau3338a412022-04-22 14:47:59 +0400238 if (!g_unix_open_pipe(fds, FD_CLOEXEC, NULL)) {
Gonglei63ce8e12014-09-26 16:14:30 +0800239 exit(1);
240 }
Jes Sorenseneb505be2010-06-10 11:42:28 +0200241
Gonglei63ce8e12014-09-26 16:14:30 +0800242 pid = fork();
243 if (pid > 0) {
244 uint8_t status;
245 ssize_t len;
Jes Sorenseneb505be2010-06-10 11:42:28 +0200246
Gonglei63ce8e12014-09-26 16:14:30 +0800247 close(fds[1]);
Jes Sorenseneb505be2010-06-10 11:42:28 +0200248
Michael Tokarevccea25f2014-10-30 17:37:16 +0300249 do {
250 len = read(fds[0], &status, 1);
251 } while (len < 0 && errno == EINTR);
Michael Tokarevfee78fd2014-10-30 17:40:48 +0300252
253 /* only exit successfully if our child actually wrote
254 * a one-byte zero to our pipe, upon successful init */
255 exit(len == 1 && status == 0 ? 0 : 1);
256
257 } else if (pid < 0) {
258 exit(1);
259 }
Gonglei63ce8e12014-09-26 16:14:30 +0800260
261 close(fds[0]);
Michael Tokarev0be5e432014-10-30 17:30:51 +0300262 daemon_pipe = fds[1];
Gonglei63ce8e12014-09-26 16:14:30 +0800263
264 setsid();
265
266 pid = fork();
267 if (pid > 0) {
268 exit(0);
269 } else if (pid < 0) {
Jes Sorenseneb505be2010-06-10 11:42:28 +0200270 exit(1);
Gonglei63ce8e12014-09-26 16:14:30 +0800271 }
272 umask(027);
Jes Sorenseneb505be2010-06-10 11:42:28 +0200273
274 signal(SIGTSTP, SIG_IGN);
275 signal(SIGTTOU, SIG_IGN);
276 signal(SIGTTIN, SIG_IGN);
277 }
278}
279
280void os_setup_post(void)
281{
282 int fd = 0;
283
284 if (daemonize) {
Jes Sorenseneb505be2010-06-10 11:42:28 +0200285 if (chdir("/")) {
Ian Jacksona7aaec12018-04-16 15:16:23 +0100286 error_report("not able to chdir to /: %s", strerror(errno));
Jes Sorenseneb505be2010-06-10 11:42:28 +0200287 exit(1);
288 }
Nikita Ivanov8b6aa692022-10-23 12:04:21 +0300289 fd = RETRY_ON_EINTR(qemu_open_old("/dev/null", O_RDWR));
Gonglei63ce8e12014-09-26 16:14:30 +0800290 if (fd == -1) {
291 exit(1);
292 }
Jes Sorenseneb505be2010-06-10 11:42:28 +0200293 }
294
Jes Sorensene06eb602010-06-10 11:42:29 +0200295 change_root();
296 change_process_uid();
Jes Sorenseneb505be2010-06-10 11:42:28 +0200297
298 if (daemonize) {
Michael Tokarev25cec2b2014-10-30 17:47:46 +0300299 uint8_t status = 0;
300 ssize_t len;
301
Jes Sorenseneb505be2010-06-10 11:42:28 +0200302 dup2(fd, 0);
303 dup2(fd, 1);
Dimitris Aragiorgis96c33a42016-02-18 13:38:38 +0200304 /* In case -D is given do not redirect stderr to /dev/null */
Richard Henderson229ef2e2022-04-17 11:29:45 -0700305 if (!qemu_log_enabled()) {
Dimitris Aragiorgis96c33a42016-02-18 13:38:38 +0200306 dup2(fd, 2);
307 }
Jes Sorenseneb505be2010-06-10 11:42:28 +0200308
309 close(fd);
Michael Tokarev25cec2b2014-10-30 17:47:46 +0300310
311 do {
312 len = write(daemon_pipe, &status, 1);
313 } while (len < 0 && errno == EINTR);
314 if (len != 1) {
315 exit(1);
316 }
Jes Sorenseneb505be2010-06-10 11:42:28 +0200317 }
318}
319
Jes Sorensen9156d762010-06-10 11:42:30 +0200320void os_set_line_buffering(void)
321{
322 setvbuf(stdout, NULL, _IOLBF, 0);
323}
Jes Sorensen949d31e2010-10-26 10:39:22 +0200324
Hitoshi Mitake995ee2b2012-09-15 01:15:41 +0900325bool is_daemonized(void)
326{
327 return daemonize;
328}
Satoru Moriya888a6bc2013-04-19 16:42:06 +0200329
Hanna Reitzf22ac472022-03-03 17:48:11 +0100330int os_set_daemonize(bool d)
331{
332 daemonize = d;
333 return 0;
334}
335
Satoru Moriya888a6bc2013-04-19 16:42:06 +0200336int os_mlock(void)
337{
David CARLIER195588c2020-07-13 14:36:09 +0100338#ifdef HAVE_MLOCKALL
Satoru Moriya888a6bc2013-04-19 16:42:06 +0200339 int ret = 0;
340
341 ret = mlockall(MCL_CURRENT | MCL_FUTURE);
342 if (ret < 0) {
Ian Jacksona7aaec12018-04-16 15:16:23 +0100343 error_report("mlockall: %s", strerror(errno));
Satoru Moriya888a6bc2013-04-19 16:42:06 +0200344 }
345
346 return ret;
David CARLIER195588c2020-07-13 14:36:09 +0100347#else
348 return -ENOSYS;
349#endif
Satoru Moriya888a6bc2013-04-19 16:42:06 +0200350}