2010-06-10 11:42:19 +02:00
|
|
|
/*
|
|
|
|
* os-posix.c
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003-2008 Fabrice Bellard
|
|
|
|
* Copyright (c) 2010 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2016-01-29 18:50:05 +01:00
|
|
|
#include "qemu/osdep.h"
|
2023-12-18 11:13:40 +01:00
|
|
|
#include <sys/resource.h>
|
2010-06-10 11:42:22 +02:00
|
|
|
#include <sys/wait.h>
|
2010-06-10 11:42:26 +02:00
|
|
|
#include <pwd.h>
|
2011-07-09 11:22:07 +02:00
|
|
|
#include <grp.h>
|
2010-06-10 11:42:23 +02:00
|
|
|
#include <libgen.h>
|
2010-06-10 11:42:19 +02:00
|
|
|
|
2016-01-13 09:05:32 +01:00
|
|
|
#include "qemu/error-report.h"
|
2016-02-18 12:38:38 +01:00
|
|
|
#include "qemu/log.h"
|
2019-08-12 07:23:59 +02:00
|
|
|
#include "sysemu/runstate.h"
|
2016-03-20 18:16:19 +01:00
|
|
|
#include "qemu/cutils.h"
|
2010-06-10 11:42:19 +02:00
|
|
|
|
2010-06-10 11:42:31 +02:00
|
|
|
#ifdef CONFIG_LINUX
|
|
|
|
#include <sys/prctl.h>
|
2010-10-26 10:39:22 +02:00
|
|
|
#endif
|
|
|
|
|
2010-06-10 11:42:26 +02:00
|
|
|
|
2010-06-10 11:42:21 +02:00
|
|
|
void os_setup_early_signal_handling(void)
|
2010-06-10 11:42:19 +02:00
|
|
|
{
|
|
|
|
struct sigaction act;
|
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_flags = 0;
|
|
|
|
act.sa_handler = SIG_IGN;
|
|
|
|
sigaction(SIGPIPE, &act, NULL);
|
|
|
|
}
|
2010-06-10 11:42:22 +02:00
|
|
|
|
2011-03-15 12:56:04 +01:00
|
|
|
static void termsig_handler(int signal, siginfo_t *info, void *c)
|
2010-06-10 11:42:22 +02:00
|
|
|
{
|
2011-03-15 12:56:04 +01:00
|
|
|
qemu_system_killed(info->si_signo, info->si_pid);
|
2010-06-10 11:42:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void os_setup_signal_handling(void)
|
|
|
|
{
|
|
|
|
struct sigaction act;
|
|
|
|
|
|
|
|
memset(&act, 0, sizeof(act));
|
2011-03-15 12:56:04 +01:00
|
|
|
act.sa_sigaction = termsig_handler;
|
|
|
|
act.sa_flags = SA_SIGINFO;
|
2010-06-10 11:42:22 +02:00
|
|
|
sigaction(SIGINT, &act, NULL);
|
|
|
|
sigaction(SIGHUP, &act, NULL);
|
|
|
|
sigaction(SIGTERM, &act, NULL);
|
|
|
|
}
|
2010-06-10 11:42:23 +02:00
|
|
|
|
2010-06-10 11:42:31 +02:00
|
|
|
void os_set_proc_name(const char *s)
|
|
|
|
{
|
|
|
|
#if defined(PR_SET_NAME)
|
|
|
|
char name[16];
|
|
|
|
if (!s)
|
|
|
|
return;
|
2012-10-04 13:09:51 +02:00
|
|
|
pstrcpy(name, sizeof(name), s);
|
2010-06-10 11:42:31 +02:00
|
|
|
/* Could rewrite argv[0] too, but that's a bit more complicated.
|
|
|
|
This simple way is enough for `top'. */
|
|
|
|
if (prctl(PR_SET_NAME, name)) {
|
2018-04-16 16:16:23 +02:00
|
|
|
error_report("unable to change process name: %s", strerror(errno));
|
2010-06-10 11:42:31 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
#else
|
2018-04-16 16:15:51 +02:00
|
|
|
error_report("Change of process name not supported by your OS");
|
2010-06-10 11:42:31 +02:00
|
|
|
exit(1);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-09-01 12:12:59 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Must set all three of these at once.
|
|
|
|
* Legal combinations are unset by name by uid
|
|
|
|
*/
|
|
|
|
static struct passwd *user_pwd; /* NULL non-NULL NULL */
|
|
|
|
static uid_t user_uid = (uid_t)-1; /* -1 -1 >=0 */
|
|
|
|
static gid_t user_gid = (gid_t)-1; /* -1 -1 >=0 */
|
|
|
|
|
2023-09-01 12:12:56 +02:00
|
|
|
/*
|
2023-10-04 14:00:07 +02:00
|
|
|
* Prepare to change user ID. user_id can be one of 3 forms:
|
2023-09-01 12:12:56 +02:00
|
|
|
* - a username, in which case user ID will be changed to its uid,
|
|
|
|
* with primary and supplementary groups set up too;
|
|
|
|
* - a numeric uid, in which case only the uid will be set;
|
|
|
|
* - a pair of numeric uid:gid.
|
|
|
|
*/
|
2023-10-04 14:00:07 +02:00
|
|
|
bool os_set_runas(const char *user_id)
|
2017-09-15 19:10:44 +02:00
|
|
|
{
|
|
|
|
unsigned long lv;
|
|
|
|
const char *ep;
|
|
|
|
uid_t got_uid;
|
|
|
|
gid_t got_gid;
|
|
|
|
int rc;
|
|
|
|
|
2023-10-04 14:00:07 +02:00
|
|
|
user_pwd = getpwnam(user_id);
|
2023-09-01 12:12:56 +02:00
|
|
|
if (user_pwd) {
|
|
|
|
user_uid = -1;
|
|
|
|
user_gid = -1;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2023-10-04 14:00:07 +02:00
|
|
|
rc = qemu_strtoul(user_id, &ep, 0, &lv);
|
2017-09-15 19:10:44 +02:00
|
|
|
got_uid = lv; /* overflow here is ID in C99 */
|
|
|
|
if (rc || *ep != ':' || got_uid != lv || got_uid == (uid_t)-1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = qemu_strtoul(ep + 1, 0, 0, &lv);
|
|
|
|
got_gid = lv; /* overflow here is ID in C99 */
|
|
|
|
if (rc || got_gid != lv || got_gid == (gid_t)-1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
user_pwd = NULL;
|
|
|
|
user_uid = got_uid;
|
|
|
|
user_gid = got_gid;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:29 +02:00
|
|
|
static void change_process_uid(void)
|
2010-06-10 11:42:26 +02:00
|
|
|
{
|
2017-09-15 19:10:44 +02:00
|
|
|
assert((user_uid == (uid_t)-1) || user_pwd == NULL);
|
|
|
|
assert((user_uid == (uid_t)-1) ==
|
|
|
|
(user_gid == (gid_t)-1));
|
|
|
|
|
|
|
|
if (user_pwd || user_uid != (uid_t)-1) {
|
|
|
|
gid_t intended_gid = user_pwd ? user_pwd->pw_gid : user_gid;
|
|
|
|
uid_t intended_uid = user_pwd ? user_pwd->pw_uid : user_uid;
|
|
|
|
if (setgid(intended_gid) < 0) {
|
|
|
|
error_report("Failed to setgid(%d)", intended_gid);
|
2010-06-10 11:42:26 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
2017-09-15 19:10:44 +02:00
|
|
|
if (user_pwd) {
|
|
|
|
if (initgroups(user_pwd->pw_name, user_pwd->pw_gid) < 0) {
|
|
|
|
error_report("Failed to initgroups(\"%s\", %d)",
|
|
|
|
user_pwd->pw_name, user_pwd->pw_gid);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (setgroups(1, &user_gid) < 0) {
|
|
|
|
error_report("Failed to setgroups(1, [%d])",
|
|
|
|
user_gid);
|
|
|
|
exit(1);
|
|
|
|
}
|
2011-07-09 11:22:07 +02:00
|
|
|
}
|
2017-09-15 19:10:44 +02:00
|
|
|
if (setuid(intended_uid) < 0) {
|
|
|
|
error_report("Failed to setuid(%d)", intended_uid);
|
2010-06-10 11:42:26 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
if (setuid(0) != -1) {
|
2018-04-16 16:08:03 +02:00
|
|
|
error_report("Dropping privileges failed");
|
2010-06-10 11:42:26 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2010-06-10 11:42:27 +02:00
|
|
|
|
2023-09-01 12:12:59 +02:00
|
|
|
|
|
|
|
static const char *chroot_dir;
|
|
|
|
|
2023-10-04 14:00:07 +02:00
|
|
|
void os_set_chroot(const char *path)
|
2023-09-01 12:12:57 +02:00
|
|
|
{
|
2023-10-04 14:00:07 +02:00
|
|
|
chroot_dir = path;
|
2023-09-01 12:12:57 +02:00
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:29 +02:00
|
|
|
static void change_root(void)
|
2010-06-10 11:42:27 +02:00
|
|
|
{
|
|
|
|
if (chroot_dir) {
|
|
|
|
if (chroot(chroot_dir) < 0) {
|
2018-04-16 16:15:51 +02:00
|
|
|
error_report("chroot failed");
|
2010-06-10 11:42:27 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
if (chdir("/")) {
|
2018-04-16 16:16:23 +02:00
|
|
|
error_report("not able to chdir to /: %s", strerror(errno));
|
2010-06-10 11:42:27 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2023-09-01 12:12:59 +02:00
|
|
|
|
|
|
|
static int daemonize;
|
|
|
|
static int daemon_pipe;
|
|
|
|
|
|
|
|
bool is_daemonized(void)
|
|
|
|
{
|
|
|
|
return daemonize;
|
|
|
|
}
|
|
|
|
|
|
|
|
int os_set_daemonize(bool d)
|
|
|
|
{
|
|
|
|
daemonize = d;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:28 +02:00
|
|
|
void os_daemonize(void)
|
|
|
|
{
|
|
|
|
if (daemonize) {
|
2014-09-26 10:14:30 +02:00
|
|
|
pid_t pid;
|
2014-10-30 15:30:51 +01:00
|
|
|
int fds[2];
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2022-04-22 12:47:59 +02:00
|
|
|
if (!g_unix_open_pipe(fds, FD_CLOEXEC, NULL)) {
|
2014-09-26 10:14:30 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-09-26 10:14:30 +02:00
|
|
|
pid = fork();
|
|
|
|
if (pid > 0) {
|
|
|
|
uint8_t status;
|
|
|
|
ssize_t len;
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-09-26 10:14:30 +02:00
|
|
|
close(fds[1]);
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-10-30 15:37:16 +01:00
|
|
|
do {
|
|
|
|
len = read(fds[0], &status, 1);
|
|
|
|
} while (len < 0 && errno == EINTR);
|
2014-10-30 15:40:48 +01:00
|
|
|
|
|
|
|
/* only exit successfully if our child actually wrote
|
|
|
|
* a one-byte zero to our pipe, upon successful init */
|
|
|
|
exit(len == 1 && status == 0 ? 0 : 1);
|
|
|
|
|
|
|
|
} else if (pid < 0) {
|
|
|
|
exit(1);
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-09-26 10:14:30 +02:00
|
|
|
close(fds[0]);
|
2014-10-30 15:30:51 +01:00
|
|
|
daemon_pipe = fds[1];
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-09-26 10:14:30 +02:00
|
|
|
setsid();
|
2010-06-10 11:42:28 +02:00
|
|
|
|
2014-09-26 10:14:30 +02:00
|
|
|
pid = fork();
|
|
|
|
if (pid > 0) {
|
|
|
|
exit(0);
|
|
|
|
} else if (pid < 0) {
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
umask(027);
|
2010-06-10 11:42:28 +02:00
|
|
|
|
|
|
|
signal(SIGTSTP, SIG_IGN);
|
|
|
|
signal(SIGTTOU, SIG_IGN);
|
|
|
|
signal(SIGTTIN, SIG_IGN);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-12-18 11:13:40 +01:00
|
|
|
void os_setup_limits(void)
|
|
|
|
{
|
|
|
|
struct rlimit nofile;
|
|
|
|
|
|
|
|
if (getrlimit(RLIMIT_NOFILE, &nofile) < 0) {
|
|
|
|
warn_report("unable to query NOFILE limit: %s", strerror(errno));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nofile.rlim_cur == nofile.rlim_max) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nofile.rlim_cur = nofile.rlim_max;
|
|
|
|
|
|
|
|
if (setrlimit(RLIMIT_NOFILE, &nofile) < 0) {
|
|
|
|
warn_report("unable to set NOFILE limit: %s", strerror(errno));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:28 +02:00
|
|
|
void os_setup_post(void)
|
|
|
|
{
|
|
|
|
int fd = 0;
|
|
|
|
|
|
|
|
if (daemonize) {
|
|
|
|
if (chdir("/")) {
|
2018-04-16 16:16:23 +02:00
|
|
|
error_report("not able to chdir to /: %s", strerror(errno));
|
2010-06-10 11:42:28 +02:00
|
|
|
exit(1);
|
|
|
|
}
|
2022-10-23 11:04:21 +02:00
|
|
|
fd = RETRY_ON_EINTR(qemu_open_old("/dev/null", O_RDWR));
|
2014-09-26 10:14:30 +02:00
|
|
|
if (fd == -1) {
|
|
|
|
exit(1);
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:29 +02:00
|
|
|
change_root();
|
|
|
|
change_process_uid();
|
2010-06-10 11:42:28 +02:00
|
|
|
|
|
|
|
if (daemonize) {
|
2014-10-30 15:47:46 +01:00
|
|
|
uint8_t status = 0;
|
|
|
|
ssize_t len;
|
|
|
|
|
2010-06-10 11:42:28 +02:00
|
|
|
dup2(fd, 0);
|
|
|
|
dup2(fd, 1);
|
2016-02-18 12:38:38 +01:00
|
|
|
/* In case -D is given do not redirect stderr to /dev/null */
|
2022-04-17 20:29:45 +02:00
|
|
|
if (!qemu_log_enabled()) {
|
2016-02-18 12:38:38 +01:00
|
|
|
dup2(fd, 2);
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
|
|
|
|
close(fd);
|
2014-10-30 15:47:46 +01:00
|
|
|
|
|
|
|
do {
|
|
|
|
len = write(daemon_pipe, &status, 1);
|
|
|
|
} while (len < 0 && errno == EINTR);
|
|
|
|
if (len != 1) {
|
|
|
|
exit(1);
|
|
|
|
}
|
2010-06-10 11:42:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-06-10 11:42:30 +02:00
|
|
|
void os_set_line_buffering(void)
|
|
|
|
{
|
|
|
|
setvbuf(stdout, NULL, _IOLBF, 0);
|
|
|
|
}
|
2010-10-26 10:39:22 +02:00
|
|
|
|
2013-04-19 16:42:06 +02:00
|
|
|
int os_mlock(void)
|
|
|
|
{
|
2020-07-13 15:36:09 +02:00
|
|
|
#ifdef HAVE_MLOCKALL
|
2013-04-19 16:42:06 +02:00
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
ret = mlockall(MCL_CURRENT | MCL_FUTURE);
|
|
|
|
if (ret < 0) {
|
2018-04-16 16:16:23 +02:00
|
|
|
error_report("mlockall: %s", strerror(errno));
|
2013-04-19 16:42:06 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2020-07-13 15:36:09 +02:00
|
|
|
#else
|
|
|
|
return -ENOSYS;
|
|
|
|
#endif
|
2013-04-19 16:42:06 +02:00
|
|
|
}
|