blob: d8e5dcfede36b0bd216c3d7a86bd487a562ca596 [file] [log] [blame]
Jes Sorensenc1b0b932010-10-26 10:39:19 +02001/*
2 * os-posix-lib.c
3 *
4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2010 Red Hat, Inc.
6 *
7 * QEMU library functions on POSIX which are shared between QEMU and
8 * the QEMU tools.
9 *
10 * Permission is hereby granted, free of charge, to any person obtaining a copy
11 * of this software and associated documentation files (the "Software"), to deal
12 * in the Software without restriction, including without limitation the rights
13 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
14 * copies of the Software, and to permit persons to whom the Software is
15 * furnished to do so, subject to the following conditions:
16 *
17 * The above copyright notice and this permission notice shall be included in
18 * all copies or substantial portions of the Software.
19 *
20 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
21 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
23 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
24 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
25 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
26 * THE SOFTWARE.
27 */
28
Peter Maydellaafd7582016-01-29 17:49:55 +000029#include "qemu/osdep.h"
Stefan Hajnoczi13401ba2013-11-14 11:54:16 +010030#include <termios.h>
Daniel P. Berranged57e4e42015-05-12 17:09:19 +010031#include <termios.h>
Stefan Hajnoczi13401ba2013-11-14 11:54:16 +010032
Laszlo Erseke2ea3512013-05-18 06:31:48 +020033#include <glib/gprintf.h>
34
Paolo Bonzini9c17d612012-12-17 18:20:04 +010035#include "sysemu/sysemu.h"
Jes Sorensenc1b0b932010-10-26 10:39:19 +020036#include "trace.h"
Markus Armbrusterda34e652016-03-14 09:01:28 +010037#include "qapi/error.h"
Paolo Bonzini1de7afc2012-12-17 18:20:00 +010038#include "qemu/sockets.h"
Fam Zheng10f5bff2014-02-10 14:48:51 +080039#include <libgen.h>
Paolo Bonzini38183312014-05-14 17:43:21 +080040#include <sys/signal.h>
Veronia Bahaaf348b6d2016-03-20 19:16:19 +020041#include "qemu/cutils.h"
Jes Sorensenc1b0b932010-10-26 10:39:19 +020042
Paolo Bonzinicbcfa042011-09-12 16:20:11 +020043#ifdef CONFIG_LINUX
44#include <sys/syscall.h>
45#endif
Paolo Bonzinicbcfa042011-09-12 16:20:11 +020046
Andreas Färber41975b22014-03-13 14:27:59 +010047#ifdef __FreeBSD__
48#include <sys/sysctl.h>
49#endif
50
Markus Armbrustera9c94272016-06-22 19:11:19 +020051#include "qemu/mmap-alloc.h"
Michael S. Tsirkin794e8f32015-09-24 14:41:17 +030052
Paolo Bonzinicbcfa042011-09-12 16:20:11 +020053int qemu_get_thread_id(void)
54{
55#if defined(__linux__)
56 return syscall(SYS_gettid);
57#else
58 return getpid();
59#endif
60}
Alexandre Raymondf97742d2011-06-06 23:34:10 -040061
62int qemu_daemon(int nochdir, int noclose)
63{
64 return daemon(nochdir, noclose);
65}
66
Jes Sorensenb152aa82010-10-26 10:39:26 +020067void *qemu_oom_check(void *ptr)
Jes Sorensenc1b0b932010-10-26 10:39:19 +020068{
69 if (ptr == NULL) {
70 fprintf(stderr, "Failed to allocate memory: %s\n", strerror(errno));
71 abort();
72 }
73 return ptr;
74}
Jes Sorensenc1b0b932010-10-26 10:39:19 +020075
Kevin Wolf7d2a35c2014-05-20 12:24:05 +020076void *qemu_try_memalign(size_t alignment, size_t size)
Jes Sorensenc1b0b932010-10-26 10:39:19 +020077{
78 void *ptr;
Kevin Wolfe5354652013-11-29 21:29:17 +010079
80 if (alignment < sizeof(void*)) {
81 alignment = sizeof(void*);
82 }
83
Jes Sorensenc1b0b932010-10-26 10:39:19 +020084#if defined(_POSIX_C_SOURCE) && !defined(__sun__)
85 int ret;
86 ret = posix_memalign(&ptr, alignment, size);
87 if (ret != 0) {
Kevin Wolf7d2a35c2014-05-20 12:24:05 +020088 errno = ret;
89 ptr = NULL;
Jes Sorensenc1b0b932010-10-26 10:39:19 +020090 }
91#elif defined(CONFIG_BSD)
Kevin Wolf7d2a35c2014-05-20 12:24:05 +020092 ptr = valloc(size);
Jes Sorensenc1b0b932010-10-26 10:39:19 +020093#else
Kevin Wolf7d2a35c2014-05-20 12:24:05 +020094 ptr = memalign(alignment, size);
Jes Sorensenc1b0b932010-10-26 10:39:19 +020095#endif
96 trace_qemu_memalign(alignment, size, ptr);
97 return ptr;
98}
99
Kevin Wolf7d2a35c2014-05-20 12:24:05 +0200100void *qemu_memalign(size_t alignment, size_t size)
101{
102 return qemu_oom_check(qemu_try_memalign(alignment, size));
103}
104
Jes Sorensenc1b0b932010-10-26 10:39:19 +0200105/* alloc shared memory pages */
Igor Mammedova2b257d2014-10-31 16:38:37 +0000106void *qemu_anon_ram_alloc(size_t size, uint64_t *alignment)
Jes Sorensenc1b0b932010-10-26 10:39:19 +0200107{
Avi Kivity36b58622011-09-05 11:07:05 +0300108 size_t align = QEMU_VMALLOC_ALIGN;
Michael S. Tsirkin794e8f32015-09-24 14:41:17 +0300109 void *ptr = qemu_ram_mmap(-1, size, align, false);
Avi Kivity36b58622011-09-05 11:07:05 +0300110
Paolo Bonzini7dda5dc2013-04-09 17:43:43 +0200111 if (ptr == MAP_FAILED) {
Markus Armbruster39228252013-07-31 15:11:11 +0200112 return NULL;
Stefan Weilc2a82382011-10-31 21:29:46 +0100113 }
Stefan Weilc2a82382011-10-31 21:29:46 +0100114
Igor Mammedova2b257d2014-10-31 16:38:37 +0000115 if (alignment) {
116 *alignment = align;
117 }
Michael S. Tsirkinc2dfc5b2015-09-10 16:36:51 +0300118
Paolo Bonzini6eebf952013-05-13 16:19:55 +0200119 trace_qemu_anon_ram_alloc(size, ptr);
Jes Sorensenc7f41112011-07-25 17:13:36 +0200120 return ptr;
Jes Sorensenc1b0b932010-10-26 10:39:19 +0200121}
122
123void qemu_vfree(void *ptr)
124{
125 trace_qemu_vfree(ptr);
126 free(ptr);
127}
Jes Sorensen9549e762010-10-26 10:39:20 +0200128
Paolo Bonzinie7a09b92013-05-13 16:19:56 +0200129void qemu_anon_ram_free(void *ptr, size_t size)
130{
131 trace_qemu_anon_ram_free(ptr, size);
Michael S. Tsirkin794e8f32015-09-24 14:41:17 +0300132 qemu_ram_munmap(ptr, size);
Paolo Bonzinie7a09b92013-05-13 16:19:56 +0200133}
134
Stefan Hajnoczif9e8cac2013-03-27 10:10:43 +0100135void qemu_set_block(int fd)
Paolo Bonzini154b9a02011-10-05 09:17:32 +0200136{
137 int f;
138 f = fcntl(fd, F_GETFL);
139 fcntl(fd, F_SETFL, f & ~O_NONBLOCK);
140}
141
Stefan Hajnoczif9e8cac2013-03-27 10:10:43 +0100142void qemu_set_nonblock(int fd)
Jes Sorensen9549e762010-10-26 10:39:20 +0200143{
144 int f;
145 f = fcntl(fd, F_GETFL);
146 fcntl(fd, F_SETFL, f | O_NONBLOCK);
147}
148
Sebastian Ottlik606600a2013-10-02 12:23:12 +0200149int socket_set_fast_reuse(int fd)
150{
151 int val = 1, ret;
152
153 ret = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
154 (const char *)&val, sizeof(val));
155
156 assert(ret == 0);
157
158 return ret;
159}
160
Jes Sorensen9549e762010-10-26 10:39:20 +0200161void qemu_set_cloexec(int fd)
162{
163 int f;
164 f = fcntl(fd, F_GETFD);
165 fcntl(fd, F_SETFD, f | FD_CLOEXEC);
166}
Jes Sorensen70e72ce2010-10-26 10:39:21 +0200167
168/*
169 * Creates a pipe with FD_CLOEXEC set on both file descriptors
170 */
171int qemu_pipe(int pipefd[2])
172{
173 int ret;
174
175#ifdef CONFIG_PIPE2
176 ret = pipe2(pipefd, O_CLOEXEC);
177 if (ret != -1 || errno != ENOSYS) {
178 return ret;
179 }
180#endif
181 ret = pipe(pipefd);
182 if (ret == 0) {
183 qemu_set_cloexec(pipefd[0]);
184 qemu_set_cloexec(pipefd[1]);
185 }
186
187 return ret;
188}
Hidetoshi Seto38671422010-11-24 11:38:10 +0900189
Paolo Bonziniae0f9402011-11-21 09:29:11 +0100190int qemu_utimens(const char *path, const struct timespec *times)
Hidetoshi Seto38671422010-11-24 11:38:10 +0900191{
192 struct timeval tv[2], tv_now;
193 struct stat st;
194 int i;
195#ifdef CONFIG_UTIMENSAT
196 int ret;
197
Paolo Bonziniae0f9402011-11-21 09:29:11 +0100198 ret = utimensat(AT_FDCWD, path, times, AT_SYMLINK_NOFOLLOW);
Hidetoshi Seto38671422010-11-24 11:38:10 +0900199 if (ret != -1 || errno != ENOSYS) {
200 return ret;
201 }
202#endif
203 /* Fallback: use utimes() instead of utimensat() */
204
205 /* happy if special cases */
206 if (times[0].tv_nsec == UTIME_OMIT && times[1].tv_nsec == UTIME_OMIT) {
207 return 0;
208 }
209 if (times[0].tv_nsec == UTIME_NOW && times[1].tv_nsec == UTIME_NOW) {
210 return utimes(path, NULL);
211 }
212
213 /* prepare for hard cases */
214 if (times[0].tv_nsec == UTIME_NOW || times[1].tv_nsec == UTIME_NOW) {
215 gettimeofday(&tv_now, NULL);
216 }
217 if (times[0].tv_nsec == UTIME_OMIT || times[1].tv_nsec == UTIME_OMIT) {
218 stat(path, &st);
219 }
220
221 for (i = 0; i < 2; i++) {
222 if (times[i].tv_nsec == UTIME_NOW) {
223 tv[i].tv_sec = tv_now.tv_sec;
224 tv[i].tv_usec = tv_now.tv_usec;
225 } else if (times[i].tv_nsec == UTIME_OMIT) {
226 tv[i].tv_sec = (i == 0) ? st.st_atime : st.st_mtime;
227 tv[i].tv_usec = 0;
228 } else {
229 tv[i].tv_sec = times[i].tv_sec;
230 tv[i].tv_usec = times[i].tv_nsec / 1000;
231 }
232 }
233
234 return utimes(path, &tv[0]);
235}
Laszlo Erseke2ea3512013-05-18 06:31:48 +0200236
237char *
238qemu_get_local_state_pathname(const char *relative_pathname)
239{
240 return g_strdup_printf("%s/%s", CONFIG_QEMU_LOCALSTATEDIR,
241 relative_pathname);
242}
Stefan Hajnoczi13401ba2013-11-14 11:54:16 +0100243
244void qemu_set_tty_echo(int fd, bool echo)
245{
246 struct termios tty;
247
248 tcgetattr(fd, &tty);
249
250 if (echo) {
251 tty.c_lflag |= ECHO | ECHONL | ICANON | IEXTEN;
252 } else {
253 tty.c_lflag &= ~(ECHO | ECHONL | ICANON | IEXTEN);
254 }
255
256 tcsetattr(fd, TCSANOW, &tty);
257}
Fam Zheng10f5bff2014-02-10 14:48:51 +0800258
259static char exec_dir[PATH_MAX];
260
261void qemu_init_exec_dir(const char *argv0)
262{
263 char *dir;
264 char *p = NULL;
265 char buf[PATH_MAX];
266
267 assert(!exec_dir[0]);
268
269#if defined(__linux__)
270 {
271 int len;
272 len = readlink("/proc/self/exe", buf, sizeof(buf) - 1);
273 if (len > 0) {
274 buf[len] = 0;
275 p = buf;
276 }
277 }
278#elif defined(__FreeBSD__)
279 {
280 static int mib[4] = {CTL_KERN, KERN_PROC, KERN_PROC_PATHNAME, -1};
281 size_t len = sizeof(buf) - 1;
282
283 *buf = '\0';
284 if (!sysctl(mib, ARRAY_SIZE(mib), buf, &len, NULL, 0) &&
285 *buf) {
286 buf[sizeof(buf) - 1] = '\0';
287 p = buf;
288 }
289 }
290#endif
291 /* If we don't have any way of figuring out the actual executable
292 location then try argv[0]. */
293 if (!p) {
294 if (!argv0) {
295 return;
296 }
297 p = realpath(argv0, buf);
298 if (!p) {
299 return;
300 }
301 }
302 dir = dirname(p);
303
304 pstrcpy(exec_dir, sizeof(exec_dir), dir);
305}
306
307char *qemu_get_exec_dir(void)
308{
309 return g_strdup(exec_dir);
310}
Paolo Bonzini38183312014-05-14 17:43:21 +0800311
312static sigjmp_buf sigjump;
313
314static void sigbus_handler(int signal)
315{
316 siglongjmp(sigjump, 1);
317}
318
Paolo Bonzini38183312014-05-14 17:43:21 +0800319void os_mem_prealloc(int fd, char *area, size_t memory)
320{
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200321 int ret;
Paolo Bonzini38183312014-05-14 17:43:21 +0800322 struct sigaction act, oldact;
323 sigset_t set, oldset;
Paolo Bonzini38183312014-05-14 17:43:21 +0800324
325 memset(&act, 0, sizeof(act));
326 act.sa_handler = &sigbus_handler;
327 act.sa_flags = 0;
328
329 ret = sigaction(SIGBUS, &act, &oldact);
330 if (ret) {
331 perror("os_mem_prealloc: failed to install signal handler");
332 exit(1);
333 }
334
335 /* unblock SIGBUS */
336 sigemptyset(&set);
337 sigaddset(&set, SIGBUS);
338 pthread_sigmask(SIG_UNBLOCK, &set, &oldset);
339
340 if (sigsetjmp(sigjump, 1)) {
Michal Privoznik404ac832014-10-16 15:13:32 +0200341 fprintf(stderr, "os_mem_prealloc: Insufficient free host memory "
342 "pages available to allocate guest RAM\n");
Paolo Bonzini38183312014-05-14 17:43:21 +0800343 exit(1);
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200344 } else {
345 int i;
Michael S. Tsirkin7197fb42015-12-02 21:14:12 +0200346 size_t hpagesize = qemu_fd_getpagesize(fd);
Stefan Weil2a0457b2015-03-01 13:52:06 +0100347 size_t numpages = DIV_ROUND_UP(memory, hpagesize);
Paolo Bonzini38183312014-05-14 17:43:21 +0800348
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200349 /* MAP_POPULATE silently ignores failures */
Stefan Weil2a0457b2015-03-01 13:52:06 +0100350 for (i = 0; i < numpages; i++) {
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200351 memset(area + (hpagesize * i), 0, 1);
352 }
Paolo Bonzini38183312014-05-14 17:43:21 +0800353
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200354 ret = sigaction(SIGBUS, &oldact, NULL);
355 if (ret) {
356 perror("os_mem_prealloc: failed to reinstall signal handler");
357 exit(1);
358 }
Paolo Bonzini38183312014-05-14 17:43:21 +0800359
Stefan Weilb7bf8f52014-06-24 22:52:29 +0200360 pthread_sigmask(SIG_SETMASK, &oldset, NULL);
361 }
Paolo Bonzini38183312014-05-14 17:43:21 +0800362}
Daniel P. Berranged57e4e42015-05-12 17:09:19 +0100363
364
365static struct termios oldtty;
366
367static void term_exit(void)
368{
369 tcsetattr(0, TCSANOW, &oldtty);
370}
371
372static void term_init(void)
373{
374 struct termios tty;
375
376 tcgetattr(0, &tty);
377 oldtty = tty;
378
379 tty.c_iflag &= ~(IGNBRK|BRKINT|PARMRK|ISTRIP
380 |INLCR|IGNCR|ICRNL|IXON);
381 tty.c_oflag |= OPOST;
382 tty.c_lflag &= ~(ECHO|ECHONL|ICANON|IEXTEN);
383 tty.c_cflag &= ~(CSIZE|PARENB);
384 tty.c_cflag |= CS8;
385 tty.c_cc[VMIN] = 1;
386 tty.c_cc[VTIME] = 0;
387
388 tcsetattr(0, TCSANOW, &tty);
389
390 atexit(term_exit);
391}
392
393int qemu_read_password(char *buf, int buf_size)
394{
395 uint8_t ch;
396 int i, ret;
397
398 printf("password: ");
399 fflush(stdout);
400 term_init();
401 i = 0;
402 for (;;) {
403 ret = read(0, &ch, 1);
404 if (ret == -1) {
405 if (errno == EAGAIN || errno == EINTR) {
406 continue;
407 } else {
408 break;
409 }
410 } else if (ret == 0) {
411 ret = -1;
412 break;
413 } else {
Daniel P. Berrange6a11d512015-05-12 17:09:20 +0100414 if (ch == '\r' ||
415 ch == '\n') {
Daniel P. Berranged57e4e42015-05-12 17:09:19 +0100416 ret = 0;
417 break;
418 }
419 if (i < (buf_size - 1)) {
420 buf[i++] = ch;
421 }
422 }
423 }
424 term_exit();
425 buf[i] = '\0';
426 printf("\n");
427 return ret;
428}
Daniel P. Berrange57cb38b2015-08-28 14:40:01 +0100429
430
431pid_t qemu_fork(Error **errp)
432{
433 sigset_t oldmask, newmask;
434 struct sigaction sig_action;
435 int saved_errno;
436 pid_t pid;
437
438 /*
439 * Need to block signals now, so that child process can safely
440 * kill off caller's signal handlers without a race.
441 */
442 sigfillset(&newmask);
443 if (pthread_sigmask(SIG_SETMASK, &newmask, &oldmask) != 0) {
444 error_setg_errno(errp, errno,
445 "cannot block signals");
446 return -1;
447 }
448
449 pid = fork();
450 saved_errno = errno;
451
452 if (pid < 0) {
453 /* attempt to restore signal mask, but ignore failure, to
454 * avoid obscuring the fork failure */
455 (void)pthread_sigmask(SIG_SETMASK, &oldmask, NULL);
456 error_setg_errno(errp, saved_errno,
457 "cannot fork child process");
458 errno = saved_errno;
459 return -1;
460 } else if (pid) {
461 /* parent process */
462
463 /* Restore our original signal mask now that the child is
464 * safely running. Only documented failures are EFAULT (not
465 * possible, since we are using just-grabbed mask) or EINVAL
466 * (not possible, since we are using correct arguments). */
467 (void)pthread_sigmask(SIG_SETMASK, &oldmask, NULL);
468 } else {
469 /* child process */
470 size_t i;
471
472 /* Clear out all signal handlers from parent so nothing
473 * unexpected can happen in our child once we unblock
474 * signals */
475 sig_action.sa_handler = SIG_DFL;
476 sig_action.sa_flags = 0;
477 sigemptyset(&sig_action.sa_mask);
478
479 for (i = 1; i < NSIG; i++) {
480 /* Only possible errors are EFAULT or EINVAL The former
481 * won't happen, the latter we expect, so no need to check
482 * return value */
483 (void)sigaction(i, &sig_action, NULL);
484 }
485
486 /* Unmask all signals in child, since we've no idea what the
487 * caller's done with their signal mask and don't want to
488 * propagate that to children */
489 sigemptyset(&newmask);
490 if (pthread_sigmask(SIG_SETMASK, &newmask, NULL) != 0) {
491 Error *local_err = NULL;
492 error_setg_errno(&local_err, errno,
493 "cannot unblock signals");
494 error_report_err(local_err);
495 _exit(1);
496 }
497 }
498 return pid;
499}