The dangling remainder of the -tdf option revealed a deficiency in our option parsing: Options that have been declared, but are not supported in the switch-case statement in vl.c and not handled in the OS-specifc os_parse_cmd_args() functions are currently silently ignored. We should rather tell the users that they specified something that we can not handle, so let's print an error message and exit instead. Reported-by: Markus Armbruster <armbru@redhat.com> Signed-off-by: Thomas Huth <thuth@redhat.com> Message-Id: <1525453270-23074-3-git-send-email-thuth@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
		
			
				
	
	
		
			395 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			395 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * os-posix.c
 | 
						|
 *
 | 
						|
 * Copyright (c) 2003-2008 Fabrice Bellard
 | 
						|
 * Copyright (c) 2010 Red Hat, Inc.
 | 
						|
 *
 | 
						|
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 | 
						|
 * of this software and associated documentation files (the "Software"), to deal
 | 
						|
 * in the Software without restriction, including without limitation the rights
 | 
						|
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 | 
						|
 * copies of the Software, and to permit persons to whom the Software is
 | 
						|
 * furnished to do so, subject to the following conditions:
 | 
						|
 *
 | 
						|
 * The above copyright notice and this permission notice shall be included in
 | 
						|
 * all copies or substantial portions of the Software.
 | 
						|
 *
 | 
						|
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | 
						|
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 | 
						|
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
 | 
						|
 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 | 
						|
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 | 
						|
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 | 
						|
 * THE SOFTWARE.
 | 
						|
 */
 | 
						|
 | 
						|
#include "qemu/osdep.h"
 | 
						|
#include <sys/wait.h>
 | 
						|
#include <pwd.h>
 | 
						|
#include <grp.h>
 | 
						|
#include <libgen.h>
 | 
						|
 | 
						|
/* Needed early for CONFIG_BSD etc. */
 | 
						|
#include "sysemu/sysemu.h"
 | 
						|
#include "net/slirp.h"
 | 
						|
#include "qemu-options.h"
 | 
						|
#include "qemu/error-report.h"
 | 
						|
#include "qemu/log.h"
 | 
						|
#include "qemu/cutils.h"
 | 
						|
 | 
						|
#ifdef CONFIG_LINUX
 | 
						|
#include <sys/prctl.h>
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * Must set all three of these at once.
 | 
						|
 * Legal combinations are              unset   by name   by uid
 | 
						|
 */
 | 
						|
static struct passwd *user_pwd;    /*   NULL   non-NULL   NULL   */
 | 
						|
static uid_t user_uid = (uid_t)-1; /*   -1      -1        >=0    */
 | 
						|
static gid_t user_gid = (gid_t)-1; /*   -1      -1        >=0    */
 | 
						|
 | 
						|
static const char *chroot_dir;
 | 
						|
static int daemonize;
 | 
						|
static int daemon_pipe;
 | 
						|
 | 
						|
void os_setup_early_signal_handling(void)
 | 
						|
{
 | 
						|
    struct sigaction act;
 | 
						|
    sigfillset(&act.sa_mask);
 | 
						|
    act.sa_flags = 0;
 | 
						|
    act.sa_handler = SIG_IGN;
 | 
						|
    sigaction(SIGPIPE, &act, NULL);
 | 
						|
}
 | 
						|
 | 
						|
static void termsig_handler(int signal, siginfo_t *info, void *c)
 | 
						|
{
 | 
						|
    qemu_system_killed(info->si_signo, info->si_pid);
 | 
						|
}
 | 
						|
 | 
						|
void os_setup_signal_handling(void)
 | 
						|
{
 | 
						|
    struct sigaction act;
 | 
						|
 | 
						|
    memset(&act, 0, sizeof(act));
 | 
						|
    act.sa_sigaction = termsig_handler;
 | 
						|
    act.sa_flags = SA_SIGINFO;
 | 
						|
    sigaction(SIGINT,  &act, NULL);
 | 
						|
    sigaction(SIGHUP,  &act, NULL);
 | 
						|
    sigaction(SIGTERM, &act, NULL);
 | 
						|
}
 | 
						|
 | 
						|
/* Find a likely location for support files using the location of the binary.
 | 
						|
   For installed binaries this will be "$bindir/../share/qemu".  When
 | 
						|
   running from the build tree this will be "$bindir/../pc-bios".  */
 | 
						|
#define SHARE_SUFFIX "/share/qemu"
 | 
						|
#define BUILD_SUFFIX "/pc-bios"
 | 
						|
char *os_find_datadir(void)
 | 
						|
{
 | 
						|
    char *dir, *exec_dir;
 | 
						|
    char *res;
 | 
						|
    size_t max_len;
 | 
						|
 | 
						|
    exec_dir = qemu_get_exec_dir();
 | 
						|
    if (exec_dir == NULL) {
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    dir = g_path_get_dirname(exec_dir);
 | 
						|
 | 
						|
    max_len = strlen(dir) +
 | 
						|
        MAX(strlen(SHARE_SUFFIX), strlen(BUILD_SUFFIX)) + 1;
 | 
						|
    res = g_malloc0(max_len);
 | 
						|
    snprintf(res, max_len, "%s%s", dir, SHARE_SUFFIX);
 | 
						|
    if (access(res, R_OK)) {
 | 
						|
        snprintf(res, max_len, "%s%s", dir, BUILD_SUFFIX);
 | 
						|
        if (access(res, R_OK)) {
 | 
						|
            g_free(res);
 | 
						|
            res = NULL;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    g_free(dir);
 | 
						|
    g_free(exec_dir);
 | 
						|
    return res;
 | 
						|
}
 | 
						|
#undef SHARE_SUFFIX
 | 
						|
#undef BUILD_SUFFIX
 | 
						|
 | 
						|
void os_set_proc_name(const char *s)
 | 
						|
{
 | 
						|
#if defined(PR_SET_NAME)
 | 
						|
    char name[16];
 | 
						|
    if (!s)
 | 
						|
        return;
 | 
						|
    pstrcpy(name, sizeof(name), s);
 | 
						|
    /* Could rewrite argv[0] too, but that's a bit more complicated.
 | 
						|
       This simple way is enough for `top'. */
 | 
						|
    if (prctl(PR_SET_NAME, name)) {
 | 
						|
        error_report("unable to change process name: %s", strerror(errno));
 | 
						|
        exit(1);
 | 
						|
    }
 | 
						|
#else
 | 
						|
    error_report("Change of process name not supported by your OS");
 | 
						|
    exit(1);
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static bool os_parse_runas_uid_gid(const char *optarg)
 | 
						|
{
 | 
						|
    unsigned long lv;
 | 
						|
    const char *ep;
 | 
						|
    uid_t got_uid;
 | 
						|
    gid_t got_gid;
 | 
						|
    int rc;
 | 
						|
 | 
						|
    rc = qemu_strtoul(optarg, &ep, 0, &lv);
 | 
						|
    got_uid = lv; /* overflow here is ID in C99 */
 | 
						|
    if (rc || *ep != ':' || got_uid != lv || got_uid == (uid_t)-1) {
 | 
						|
        return false;
 | 
						|
    }
 | 
						|
 | 
						|
    rc = qemu_strtoul(ep + 1, 0, 0, &lv);
 | 
						|
    got_gid = lv; /* overflow here is ID in C99 */
 | 
						|
    if (rc || got_gid != lv || got_gid == (gid_t)-1) {
 | 
						|
        return false;
 | 
						|
    }
 | 
						|
 | 
						|
    user_pwd = NULL;
 | 
						|
    user_uid = got_uid;
 | 
						|
    user_gid = got_gid;
 | 
						|
    return true;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Parse OS specific command line options.
 | 
						|
 * return 0 if option handled, -1 otherwise
 | 
						|
 */
 | 
						|
int os_parse_cmd_args(int index, const char *optarg)
 | 
						|
{
 | 
						|
    switch (index) {
 | 
						|
#ifdef CONFIG_SLIRP
 | 
						|
    case QEMU_OPTION_smb:
 | 
						|
        error_report("The -smb option is deprecated. "
 | 
						|
                     "Please use '-netdev user,smb=...' instead.");
 | 
						|
        if (net_slirp_smb(optarg) < 0)
 | 
						|
            exit(1);
 | 
						|
        break;
 | 
						|
#endif
 | 
						|
    case QEMU_OPTION_runas:
 | 
						|
        user_pwd = getpwnam(optarg);
 | 
						|
        if (user_pwd) {
 | 
						|
            user_uid = -1;
 | 
						|
            user_gid = -1;
 | 
						|
        } else if (!os_parse_runas_uid_gid(optarg)) {
 | 
						|
            error_report("User \"%s\" doesn't exist"
 | 
						|
                         " (and is not <uid>:<gid>)",
 | 
						|
                         optarg);
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        break;
 | 
						|
    case QEMU_OPTION_chroot:
 | 
						|
        chroot_dir = optarg;
 | 
						|
        break;
 | 
						|
    case QEMU_OPTION_daemonize:
 | 
						|
        daemonize = 1;
 | 
						|
        break;
 | 
						|
#if defined(CONFIG_LINUX)
 | 
						|
    case QEMU_OPTION_enablefips:
 | 
						|
        fips_set_state(true);
 | 
						|
        break;
 | 
						|
#endif
 | 
						|
    default:
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void change_process_uid(void)
 | 
						|
{
 | 
						|
    assert((user_uid == (uid_t)-1) || user_pwd == NULL);
 | 
						|
    assert((user_uid == (uid_t)-1) ==
 | 
						|
           (user_gid == (gid_t)-1));
 | 
						|
 | 
						|
    if (user_pwd || user_uid != (uid_t)-1) {
 | 
						|
        gid_t intended_gid = user_pwd ? user_pwd->pw_gid : user_gid;
 | 
						|
        uid_t intended_uid = user_pwd ? user_pwd->pw_uid : user_uid;
 | 
						|
        if (setgid(intended_gid) < 0) {
 | 
						|
            error_report("Failed to setgid(%d)", intended_gid);
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        if (user_pwd) {
 | 
						|
            if (initgroups(user_pwd->pw_name, user_pwd->pw_gid) < 0) {
 | 
						|
                error_report("Failed to initgroups(\"%s\", %d)",
 | 
						|
                        user_pwd->pw_name, user_pwd->pw_gid);
 | 
						|
                exit(1);
 | 
						|
            }
 | 
						|
        } else {
 | 
						|
            if (setgroups(1, &user_gid) < 0) {
 | 
						|
                error_report("Failed to setgroups(1, [%d])",
 | 
						|
                        user_gid);
 | 
						|
                exit(1);
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (setuid(intended_uid) < 0) {
 | 
						|
            error_report("Failed to setuid(%d)", intended_uid);
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        if (setuid(0) != -1) {
 | 
						|
            error_report("Dropping privileges failed");
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
static void change_root(void)
 | 
						|
{
 | 
						|
    if (chroot_dir) {
 | 
						|
        if (chroot(chroot_dir) < 0) {
 | 
						|
            error_report("chroot failed");
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        if (chdir("/")) {
 | 
						|
            error_report("not able to chdir to /: %s", strerror(errno));
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
void os_daemonize(void)
 | 
						|
{
 | 
						|
    if (daemonize) {
 | 
						|
        pid_t pid;
 | 
						|
        int fds[2];
 | 
						|
 | 
						|
        if (pipe(fds) == -1) {
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
 | 
						|
        pid = fork();
 | 
						|
        if (pid > 0) {
 | 
						|
            uint8_t status;
 | 
						|
            ssize_t len;
 | 
						|
 | 
						|
            close(fds[1]);
 | 
						|
 | 
						|
            do {
 | 
						|
                len = read(fds[0], &status, 1);
 | 
						|
            } while (len < 0 && errno == EINTR);
 | 
						|
 | 
						|
            /* only exit successfully if our child actually wrote
 | 
						|
             * a one-byte zero to our pipe, upon successful init */
 | 
						|
            exit(len == 1 && status == 0 ? 0 : 1);
 | 
						|
 | 
						|
        } else if (pid < 0) {
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
 | 
						|
        close(fds[0]);
 | 
						|
        daemon_pipe = fds[1];
 | 
						|
        qemu_set_cloexec(daemon_pipe);
 | 
						|
 | 
						|
        setsid();
 | 
						|
 | 
						|
        pid = fork();
 | 
						|
        if (pid > 0) {
 | 
						|
            exit(0);
 | 
						|
        } else if (pid < 0) {
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        umask(027);
 | 
						|
 | 
						|
        signal(SIGTSTP, SIG_IGN);
 | 
						|
        signal(SIGTTOU, SIG_IGN);
 | 
						|
        signal(SIGTTIN, SIG_IGN);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
void os_setup_post(void)
 | 
						|
{
 | 
						|
    int fd = 0;
 | 
						|
 | 
						|
    if (daemonize) {
 | 
						|
        if (chdir("/")) {
 | 
						|
            error_report("not able to chdir to /: %s", strerror(errno));
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
        TFR(fd = qemu_open("/dev/null", O_RDWR));
 | 
						|
        if (fd == -1) {
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    change_root();
 | 
						|
    change_process_uid();
 | 
						|
 | 
						|
    if (daemonize) {
 | 
						|
        uint8_t status = 0;
 | 
						|
        ssize_t len;
 | 
						|
 | 
						|
        dup2(fd, 0);
 | 
						|
        dup2(fd, 1);
 | 
						|
        /* In case -D is given do not redirect stderr to /dev/null */
 | 
						|
        if (!qemu_logfile) {
 | 
						|
            dup2(fd, 2);
 | 
						|
        }
 | 
						|
 | 
						|
        close(fd);
 | 
						|
 | 
						|
        do {        
 | 
						|
            len = write(daemon_pipe, &status, 1);
 | 
						|
        } while (len < 0 && errno == EINTR);
 | 
						|
        if (len != 1) {
 | 
						|
            exit(1);
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
void os_set_line_buffering(void)
 | 
						|
{
 | 
						|
    setvbuf(stdout, NULL, _IOLBF, 0);
 | 
						|
}
 | 
						|
 | 
						|
int qemu_create_pidfile(const char *filename)
 | 
						|
{
 | 
						|
    char buffer[128];
 | 
						|
    int len;
 | 
						|
    int fd;
 | 
						|
 | 
						|
    fd = qemu_open(filename, O_RDWR | O_CREAT, 0600);
 | 
						|
    if (fd == -1) {
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    if (lockf(fd, F_TLOCK, 0) == -1) {
 | 
						|
        close(fd);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    len = snprintf(buffer, sizeof(buffer), FMT_pid "\n", getpid());
 | 
						|
    if (write(fd, buffer, len) != len) {
 | 
						|
        close(fd);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* keep pidfile open & locked forever */
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
bool is_daemonized(void)
 | 
						|
{
 | 
						|
    return daemonize;
 | 
						|
}
 | 
						|
 | 
						|
int os_mlock(void)
 | 
						|
{
 | 
						|
    int ret = 0;
 | 
						|
 | 
						|
    ret = mlockall(MCL_CURRENT | MCL_FUTURE);
 | 
						|
    if (ret < 0) {
 | 
						|
        error_report("mlockall: %s", strerror(errno));
 | 
						|
    }
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 |