virutil.c 48.5 KB
Newer Older
1
/*
2
 * virutil.c: common, generic utility functions
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
 * Copyright (C) 2006 Daniel P. Berrange
 * Copyright (C) 2006, 2007 Binary Karma
 * Copyright (C) 2006 Shuveb Hussain
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
20
 * License along with this library.  If not, see
O
Osier Yang 已提交
21
 * <http://www.gnu.org/licenses/>.
22 23 24 25 26
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 * File created Jul 18, 2007 - Shuveb Hussain <shuveb@binarykarma.com>
 */

27
#include <config.h>
28

29
#include <stdlib.h>
30 31 32 33 34
#include <stdio.h>
#include <stdarg.h>
#include <unistd.h>
#include <fcntl.h>
#include <errno.h>
C
Cole Robinson 已提交
35
#include <poll.h>
36
#include <sys/stat.h>
37 38 39 40 41 42 43

#ifdef MAJOR_IN_MKDEV
# include <sys/mkdev.h>
#elif MAJOR_IN_SYSMACROS
# include <sys/sysmacros.h>
#endif

44
#include <sys/types.h>
45
#include <sys/ioctl.h>
46
#include <string.h>
E
Eric Blake 已提交
47
#include <termios.h>
48

49
#if WITH_DEVMAPPER
50 51
# include <libdevmapper.h>
#endif
52

53
#include <netdb.h>
54
#ifdef HAVE_GETPWUID_R
55 56
# include <pwd.h>
# include <grp.h>
57
#endif
58
#if WITH_CAPNG
59
# include <cap-ng.h>
60
# include <sys/prctl.h>
61
#endif
62

63
#ifdef WIN32
64 65 66
# ifdef HAVE_WINSOCK2_H
#  include <winsock2.h>
# endif
67 68 69 70
# include <windows.h>
# include <shlobj.h>
#endif

71
#include "c-ctype.h"
E
Eric Blake 已提交
72
#include "mgetgroups.h"
73
#include "virerror.h"
74
#include "virlog.h"
75
#include "virbuffer.h"
76
#include "viralloc.h"
E
Eric Blake 已提交
77
#include "verify.h"
78 79 80 81 82 83
#include "virfile.h"
#include "vircommand.h"
#include "nonblocking.h"
#include "virprocess.h"
#include "virstring.h"
#include "virutil.h"
84

85 86
verify(sizeof(gid_t) <= sizeof(unsigned int) &&
       sizeof(uid_t) <= sizeof(unsigned int));
87

88
#define VIR_FROM_THIS VIR_FROM_NONE
89

90 91
VIR_LOG_INIT("util.util");

J
Ján Tomko 已提交
92 93 94 95 96
VIR_ENUM_IMPL(virTristateBool, VIR_TRISTATE_BOOL_LAST,
              "default",
              "yes",
              "no")

J
Ján Tomko 已提交
97 98 99 100 101 102
VIR_ENUM_IMPL(virTristateSwitch, VIR_TRISTATE_SWITCH_LAST,
              "default",
              "on",
              "off")


103
#ifndef WIN32
104

105 106
int virSetInherit(int fd, bool inherit)
{
107 108
    int fflags;
    if ((fflags = fcntl(fd, F_GETFD)) < 0)
109
        return -1;
110 111 112 113 114
    if (inherit)
        fflags &= ~FD_CLOEXEC;
    else
        fflags |= FD_CLOEXEC;
    if ((fcntl(fd, F_SETFD, fflags)) < 0)
115
        return -1;
116 117 118
    return 0;
}

119
#else /* WIN32 */
120

121
int virSetInherit(int fd ATTRIBUTE_UNUSED, bool inherit ATTRIBUTE_UNUSED)
122
{
123 124 125 126 127
    /* FIXME: Currently creating child processes is not supported on
     * Win32, so there is no point in failing calls that are only relevant
     * when creating child processes. So just pretend that we changed the
     * inheritance property of the given fd as requested. */
    return 0;
128 129
}

130
#endif /* WIN32 */
131

132 133
int virSetBlocking(int fd, bool blocking)
{
134
    return set_nonblocking_flag(fd, !blocking);
135 136
}

137 138
int virSetNonBlock(int fd)
{
139
    return virSetBlocking(fd, false);
140
}
141

142
int virSetCloseExec(int fd)
143
{
144
    return virSetInherit(fd, false);
145 146
}

147
#ifdef WIN32
148
int virSetSockReuseAddr(int fd ATTRIBUTE_UNUSED, bool fatal ATTRIBUTE_UNUSED)
149 150 151 152 153 154 155 156 157 158 159 160 161 162
{
    /*
     * SO_REUSEADDR on Windows is actually akin to SO_REUSEPORT
     * on Linux/BSD. ie it allows 2 apps to listen to the same
     * port at once which is certainly not what we want here.
     *
     * Win32 sockets have Linux/BSD-like SO_REUSEADDR behaviour
     * by default, so we can be a no-op.
     *
     * http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx
     */
    return 0;
}
#else
163
int virSetSockReuseAddr(int fd, bool fatal)
164 165
{
    int opt = 1;
166 167 168 169 170 171 172 173
    int ret = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt));

    if (ret < 0 && fatal) {
        virReportSystemError(errno, "%s",
                             _("Unable to set socket reuse addr flag"));
    }

    return ret;
174 175 176
}
#endif

177 178 179
int
virPipeReadUntilEOF(int outfd, int errfd,
                    char **outbuf, char **errbuf) {
180

181
    struct pollfd fds[2];
182
    size_t i;
183
    bool finished[2];
184

185 186 187
    fds[0].fd = outfd;
    fds[0].events = POLLIN;
    fds[0].revents = 0;
188
    finished[0] = false;
189 190 191
    fds[1].fd = errfd;
    fds[1].events = POLLIN;
    fds[1].revents = 0;
192
    finished[1] = false;
193

194
    while (!(finished[0] && finished[1])) {
195

196 197 198 199
        if (poll(fds, ARRAY_CARDINALITY(fds), -1) < 0) {
            if ((errno == EAGAIN) || (errno == EINTR))
                continue;
            goto pollerr;
200 201
        }

202 203 204
        for (i = 0; i < ARRAY_CARDINALITY(fds); ++i) {
            char data[1024], **buf;
            int got, size;
205

206 207 208
            if (!(fds[i].revents))
                continue;
            else if (fds[i].revents & POLLHUP)
209
                finished[i] = true;
210

211 212 213
            if (!(fds[i].revents & POLLIN)) {
                if (fds[i].revents & POLLHUP)
                    continue;
214

215 216 217 218
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               "%s", _("Unknown poll response."));
                goto error;
            }
219

220
            got = read(fds[i].fd, data, sizeof(data));
221

222
            if (got == sizeof(data))
223
                finished[i] = false;
A
Amy Griffis 已提交
224

225
            if (got == 0) {
226
                finished[i] = true;
227 228 229 230 231 232 233 234 235
                continue;
            }
            if (got < 0) {
                if (errno == EINTR)
                    continue;
                if (errno == EAGAIN)
                    break;
                goto pollerr;
            }
A
Amy Griffis 已提交
236

237 238
            buf = ((fds[i].fd == outfd) ? outbuf : errbuf);
            size = (*buf ? strlen(*buf) : 0);
239
            if (VIR_REALLOC_N(*buf, size+got+1) < 0)
240 241 242
                goto error;
            memmove(*buf+size, data, got);
            (*buf)[size+got] = '\0';
A
Amy Griffis 已提交
243
        }
244
        continue;
245

246 247 248 249
    pollerr:
        virReportSystemError(errno,
                             "%s", _("poll error"));
        goto error;
250 251
    }

252
    return 0;
253

254
 error:
255 256 257
    VIR_FREE(*outbuf);
    VIR_FREE(*errbuf);
    return -1;
258 259
}

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274
/* Convert C from hexadecimal character to integer.  */
int
virHexToBin(unsigned char c)
{
    switch (c) {
    default: return c - '0';
    case 'a': case 'A': return 10;
    case 'b': case 'B': return 11;
    case 'c': case 'C': return 12;
    case 'd': case 'D': return 13;
    case 'e': case 'E': return 14;
    case 'f': case 'F': return 15;
    }
}

275 276 277 278 279 280 281 282 283 284 285 286 287 288
/* Scale an integer VALUE in-place by an optional case-insensitive
 * SUFFIX, defaulting to SCALE if suffix is NULL or empty (scale is
 * typically 1 or 1024).  Recognized suffixes include 'b' or 'bytes',
 * as well as power-of-two scaling via binary abbreviations ('KiB',
 * 'MiB', ...) or their one-letter counterpart ('k', 'M', ...), and
 * power-of-ten scaling via SI abbreviations ('KB', 'MB', ...).
 * Ensure that the result does not exceed LIMIT.  Return 0 on success,
 * -1 with error message raised on failure.  */
int
virScaleInteger(unsigned long long *value, const char *suffix,
                unsigned long long scale, unsigned long long limit)
{
    if (!suffix || !*suffix) {
        if (!scale) {
289 290
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("invalid scale %llu"), scale);
291 292 293 294 295 296 297 298 299 300 301 302 303 304
            return -1;
        }
        suffix = "";
    } else if (STRCASEEQ(suffix, "b") || STRCASEEQ(suffix, "byte") ||
               STRCASEEQ(suffix, "bytes")) {
        scale = 1;
    } else {
        int base;

        if (!suffix[1] || STRCASEEQ(suffix + 1, "iB")) {
            base = 1024;
        } else if (c_tolower(suffix[1]) == 'b' && !suffix[2]) {
            base = 1000;
        } else {
305
            virReportError(VIR_ERR_INVALID_ARG,
306 307 308 309 310 311 312
                         _("unknown suffix '%s'"), suffix);
            return -1;
        }
        scale = 1;
        switch (c_tolower(*suffix)) {
        case 'e':
            scale *= base;
M
Marc Hartmayer 已提交
313
            ATTRIBUTE_FALLTHROUGH;
314 315
        case 'p':
            scale *= base;
M
Marc Hartmayer 已提交
316
            ATTRIBUTE_FALLTHROUGH;
317 318
        case 't':
            scale *= base;
M
Marc Hartmayer 已提交
319
            ATTRIBUTE_FALLTHROUGH;
320 321
        case 'g':
            scale *= base;
M
Marc Hartmayer 已提交
322
            ATTRIBUTE_FALLTHROUGH;
323 324
        case 'm':
            scale *= base;
M
Marc Hartmayer 已提交
325
            ATTRIBUTE_FALLTHROUGH;
326 327 328 329
        case 'k':
            scale *= base;
            break;
        default:
330 331
            virReportError(VIR_ERR_INVALID_ARG,
                           _("unknown suffix '%s'"), suffix);
332 333 334 335
            return -1;
        }
    }

G
Guannan Ren 已提交
336
    if (*value && *value > (limit / scale)) {
337 338
        virReportError(VIR_ERR_OVERFLOW, _("value too large: %llu%s"),
                       *value, suffix);
339 340 341 342 343 344
        return -1;
    }
    *value *= scale;
    return 0;
}

E
Eric Blake 已提交
345

346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
/**
 * virParseNumber:
 * @str: pointer to the char pointer used
 *
 * Parse an unsigned number
 *
 * Returns the unsigned number or -1 in case of error. @str will be
 *         updated to skip the number.
 */
int
virParseNumber(const char **str)
{
    int ret = 0;
    const char *cur = *str;

    if ((*cur < '0') || (*cur > '9'))
362
        return -1;
363

J
Jim Meyering 已提交
364
    while (c_isdigit(*cur)) {
365 366 367 368
        unsigned int c = *cur - '0';

        if ((ret > INT_MAX / 10) ||
            ((ret == INT_MAX / 10) && (c > INT_MAX % 10)))
369
            return -1;
370 371 372 373
        ret = ret * 10 + c;
        cur++;
    }
    *str = cur;
374
    return ret;
375
}
376

377 378 379 380
/**
 * virParseVersionString:
 * @str: const char pointer to the version string
 * @version: unsigned long pointer to output the version number
381 382
 * @allowMissing: true to treat 3 like 3.0.0, false to error out on
 * missing minor or micro
383 384 385 386 387 388 389 390 391 392 393
 *
 * Parse an unsigned version number from a version string. Expecting
 * 'major.minor.micro' format, ignoring an optional suffix.
 *
 * The major, minor and micro numbers are encoded into a single version number:
 *
 *   1000000 * major + 1000 * minor + micro
 *
 * Returns the 0 for success, -1 for error.
 */
int
394 395
virParseVersionString(const char *str, unsigned long *version,
                      bool allowMissing)
396
{
397
    unsigned int major, minor = 0, micro = 0;
398 399
    char *tmp;

400
    if (virStrToLong_ui(str, &tmp, 10, &major) < 0)
401 402
        return -1;

403 404 405
    if (!allowMissing && *tmp != '.')
        return -1;

406
    if ((*tmp == '.') && virStrToLong_ui(tmp + 1, &tmp, 10, &minor) < 0)
407 408
        return -1;

409 410 411
    if (!allowMissing && *tmp != '.')
        return -1;

412
    if ((*tmp == '.') && virStrToLong_ui(tmp + 1, &tmp, 10, &micro) < 0)
413 414
        return -1;

415 416 417
    if (major > UINT_MAX / 1000000 || minor > 999 || micro > 999)
        return -1;

418 419 420 421 422
    *version = 1000000 * major + 1000 * minor + micro;

    return 0;
}

423 424 425 426
int virEnumFromString(const char *const*types,
                      unsigned int ntypes,
                      const char *type)
{
427
    size_t i;
428 429 430
    if (!type)
        return -1;

431
    for (i = 0; i < ntypes; i++)
432 433 434 435 436 437
        if (STREQ(types[i], type))
            return i;

    return -1;
}

D
Daniel P. Berrange 已提交
438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467

/**
 * Format @val as a base-10 decimal number, in the
 * buffer @buf of size @buflen. To allocate a suitable
 * sized buffer, the INT_BUFLEN(int) macro should be
 * used
 *
 * Returns pointer to start of the number in @buf
 */
char *
virFormatIntDecimal(char *buf, size_t buflen, int val)
{
    char *p = buf + buflen - 1;
    *p = '\0';
    if (val >= 0) {
        do {
            *--p = '0' + (val % 10);
            val /= 10;
        } while (val != 0);
    } else {
        do {
            *--p = '0' - (val % 10);
            val /= 10;
        } while (val != 0);
        *--p = '-';
    }
    return p;
}


468 469 470 471 472 473 474 475 476 477
const char *virEnumToString(const char *const*types,
                            unsigned int ntypes,
                            int type)
{
    if (type < 0 || type >= ntypes)
        return NULL;

    return types[type];
}

478
/* Translates a device name of the form (regex) /^[fhv]d[a-z]+[0-9]*$/
479 480
 * into the corresponding index and partition number
 * (e.g. sda0 => (0,0), hdz2 => (25,2), vdaa12 => (26,12))
481
 * @param name The name of the device
482 483 484
 * @param disk The disk index to be returned
 * @param partition The partition index to be returned
 * @return 0 on success, or -1 on failure
485
 */
486
int virDiskNameParse(const char *name, int *disk, int *partition)
487
{
488
    const char *ptr = NULL;
489
    char *rem;
490
    int idx = 0;
491
    static char const* const drive_prefix[] = {"fd", "hd", "vd", "sd", "xvd", "ubd"};
492
    size_t i;
493

494 495 496
    for (i = 0; i < ARRAY_CARDINALITY(drive_prefix); i++) {
        if (STRPREFIX(name, drive_prefix[i])) {
            ptr = name + strlen(drive_prefix[i]);
497
            break;
498
        }
499 500
    }

501
    if (!ptr || !c_islower(*ptr))
502 503
        return -1;

D
Daniel Veillard 已提交
504
    for (i = 0; *ptr; i++) {
J
Jim Meyering 已提交
505
        if (!c_islower(*ptr))
506
            break;
507

508
        idx = (idx + (i < 1 ? 0 : 1)) * 26;
509 510 511 512
        idx += *ptr - 'a';
        ptr++;
    }

513 514 515 516 517
    /* Count the trailing digits.  */
    size_t n_digits = strspn(ptr, "0123456789");
    if (ptr[n_digits] != '\0')
        return -1;

518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547
    *disk = idx;

    /* Convert trailing digits into our partition index */
    if (partition) {
        *partition = 0;

        /* Shouldn't start by zero */
        if (n_digits > 1 && *ptr == '0')
            return -1;

        if (n_digits && virStrToLong_i(ptr, &rem, 10, partition) < 0)
            return -1;
    }

    return 0;
}

/* Translates a device name of the form (regex) /^[fhv]d[a-z]+[0-9]*$/
 * into the corresponding index (e.g. sda => 0, hdz => 25, vdaa => 26)
 * Note that any trailing string of digits is simply ignored.
 * @param name The name of the device
 * @return name's index, or -1 on failure
 */
int virDiskNameToIndex(const char *name)
{
    int idx;

    if (virDiskNameParse(name, &idx, NULL))
        idx = -1;

548 549
    return idx;
}
G
Guido Günther 已提交
550

551 552 553
char *virIndexToDiskName(int idx, const char *prefix)
{
    char *name = NULL;
554 555 556
    size_t i;
    int ctr;
    int offset;
557 558

    if (idx < 0) {
559 560
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Disk index %d is negative"), idx);
561 562 563
        return NULL;
    }

564
    for (i = 0, ctr = idx; ctr >= 0; ++i, ctr = ctr / 26 - 1) { }
565 566 567

    offset = strlen(prefix);

568
    if (VIR_ALLOC_N(name, offset + i + 1))
569 570 571 572 573
        return NULL;

    strcpy(name, prefix);
    name[offset + i] = '\0';

574
    for (i = i - 1, ctr = idx; ctr >= 0; --i, ctr = ctr / 26 - 1)
575
        name[offset + i] = 'a' + (ctr % 26);
576 577 578 579

    return name;
}

580
#ifndef AI_CANONIDN
581
# define AI_CANONIDN 0
582 583
#endif

C
Chris Lalancette 已提交
584 585 586 587 588 589 590 591 592 593 594 595 596 597 598
/* Who knew getting a hostname could be so delicate.  In Linux (and Unices
 * in general), many things depend on "hostname" returning a value that will
 * resolve one way or another.  In the modern world where networks frequently
 * come and go this is often being hard-coded to resolve to "localhost".  If
 * it *doesn't* resolve to localhost, then we would prefer to have the FQDN.
 * That leads us to 3 possibilities:
 *
 * 1)  gethostname() returns an FQDN (not localhost) - we return the string
 *     as-is, it's all of the information we want
 * 2)  gethostname() returns "localhost" - we return localhost; doing further
 *     work to try to resolve it is pointless
 * 3)  gethostname() returns a shortened hostname - in this case, we want to
 *     try to resolve this to a fully-qualified name.  Therefore we pass it
 *     to getaddrinfo().  There are two possible responses:
 *     a)  getaddrinfo() resolves to a FQDN - return the FQDN
599
 *     b)  getaddrinfo() fails or resolves to localhost - in this case, the
600 601 602
 *         data we got from gethostname() is actually more useful than what
 *         we got from getaddrinfo().  Return the value from gethostname()
 *         and hope for the best.
C
Chris Lalancette 已提交
603
 */
604 605
static char *
virGetHostnameImpl(bool quiet)
606 607
{
    int r;
608
    char hostname[HOST_NAME_MAX+1], *result = NULL;
C
Chris Lalancette 已提交
609
    struct addrinfo hints, *info;
610

611
    r = gethostname(hostname, sizeof(hostname));
612
    if (r == -1) {
613 614 615
        if (!quiet)
            virReportSystemError(errno,
                                 "%s", _("failed to determine host name"));
616
        return NULL;
617
    }
618 619
    NUL_TERMINATE(hostname);

C
Chris Lalancette 已提交
620 621 622 623 624 625 626
    if (STRPREFIX(hostname, "localhost") || strchr(hostname, '.')) {
        /* in this case, gethostname returned localhost (meaning we can't
         * do any further canonicalization), or it returned an FQDN (and
         * we don't need to do any further canonicalization).  Return the
         * string as-is; it's up to callers to check whether "localhost"
         * is allowed.
         */
627
        ignore_value(VIR_STRDUP_QUIET(result, hostname));
628
        goto cleanup;
C
Chris Lalancette 已提交
629 630 631 632 633 634
    }

    /* otherwise, it's a shortened, non-localhost, hostname.  Attempt to
     * canonicalize the hostname by running it through getaddrinfo
     */

635 636 637 638
    memset(&hints, 0, sizeof(hints));
    hints.ai_flags = AI_CANONNAME|AI_CANONIDN;
    hints.ai_family = AF_UNSPEC;
    r = getaddrinfo(hostname, NULL, &hints, &info);
639
    if (r != 0) {
640 641 642 643
        if (!quiet)
            VIR_WARN("getaddrinfo failed for '%s': %s",
                     hostname, gai_strerror(r));
        ignore_value(VIR_STRDUP_QUIET(result, hostname));
644
        goto cleanup;
645
    }
646

647
    /* Tell static analyzers about getaddrinfo semantics.  */
648
    sa_assert(info);
649

C
Chris Lalancette 已提交
650 651 652 653 654 655
    if (info->ai_canonname == NULL ||
        STRPREFIX(info->ai_canonname, "localhost"))
        /* in this case, we tried to canonicalize and we ended up back with
         * localhost.  Ignore the canonicalized name and just return the
         * original hostname
         */
656
        ignore_value(VIR_STRDUP_QUIET(result, hostname));
C
Chris Lalancette 已提交
657 658
    else
        /* Caller frees this string. */
659
        ignore_value(VIR_STRDUP_QUIET(result, info->ai_canonname));
660

C
Chris Lalancette 已提交
661
    freeaddrinfo(info);
662

663
 cleanup:
664 665
    if (!result)
        virReportOOMError();
666 667 668
    return result;
}

D
Dan Walsh 已提交
669

670 671 672 673 674 675 676 677 678 679 680 681 682 683
char *
virGetHostname(void)
{
    return virGetHostnameImpl(false);
}


char *
virGetHostnameQuiet(void)
{
    return virGetHostnameImpl(true);
}


D
Dan Walsh 已提交
684 685 686 687 688 689 690
char *
virGetUserDirectory(void)
{
    return virGetUserDirectoryByUID(geteuid());
}


691
#ifdef HAVE_GETPWUID_R
E
Eric Blake 已提交
692
/* Look up fields from the user database for the given user.  On
693 694
 * error, set errno, report the error if not instructed otherwise via @quiet,
 * and return -1.  */
E
Eric Blake 已提交
695
static int
696
virGetUserEnt(uid_t uid, char **name, gid_t *group, char **dir, char **shell, bool quiet)
697 698 699
{
    char *strbuf;
    struct passwd pwbuf;
700
    struct passwd *pw = NULL;
701 702
    long val = sysconf(_SC_GETPW_R_SIZE_MAX);
    size_t strbuflen = val;
703
    int rc;
E
Eric Blake 已提交
704 705 706 707 708 709
    int ret = -1;

    if (name)
        *name = NULL;
    if (dir)
        *dir = NULL;
710 711
    if (shell)
        *shell = NULL;
712

713 714 715
    /* sysconf is a hint; if it fails, fall back to a reasonable size */
    if (val < 0)
        strbuflen = 1024;
716

717
    if (VIR_ALLOC_N(strbuf, strbuflen) < 0)
E
Eric Blake 已提交
718
        return -1;
719

720 721 722 723 724 725 726
    /*
     * From the manpage (terrifying but true):
     *
     * ERRORS
     *  0 or ENOENT or ESRCH or EBADF or EPERM or ...
     *        The given name or uid was not found.
     */
727
    while ((rc = getpwuid_r(uid, &pwbuf, strbuf, strbuflen, &pw)) == ERANGE) {
728
        if (VIR_RESIZE_N(strbuf, strbuflen, strbuflen, strbuflen) < 0)
E
Eric Blake 已提交
729
            goto cleanup;
730
    }
731

732
    if (rc != 0) {
733 734 735
        if (quiet)
            goto cleanup;

736
        virReportSystemError(rc,
E
Eric Blake 已提交
737 738
                             _("Failed to find user record for uid '%u'"),
                             (unsigned int) uid);
E
Eric Blake 已提交
739
        goto cleanup;
740
    } else if (pw == NULL) {
741 742 743
        if (quiet)
            goto cleanup;

744 745 746 747
        virReportError(VIR_ERR_SYSTEM_ERROR,
                       _("Failed to find user record for uid '%u'"),
                       (unsigned int) uid);
        goto cleanup;
E
Eric Blake 已提交
748 749 750 751 752 753
    }

    if (name && VIR_STRDUP(*name, pw->pw_name) < 0)
        goto cleanup;
    if (group)
        *group = pw->pw_gid;
754 755 756
    if (dir && VIR_STRDUP(*dir, pw->pw_dir) < 0)
        goto cleanup;
    if (shell && VIR_STRDUP(*shell, pw->pw_shell) < 0)
E
Eric Blake 已提交
757
        goto cleanup;
758

E
Eric Blake 已提交
759
    ret = 0;
760
 cleanup:
761 762 763 764 765 766 767 768
    if (ret < 0) {
        if (name)
            VIR_FREE(*name);
        if (dir)
            VIR_FREE(*dir);
        if (shell)
            VIR_FREE(*shell);
    }
769 770 771
    VIR_FREE(strbuf);
    return ret;
}
772

773 774 775 776 777 778 779 780 781 782 783 784 785 786
static char *virGetGroupEnt(gid_t gid)
{
    char *strbuf;
    char *ret;
    struct group grbuf;
    struct group *gr = NULL;
    long val = sysconf(_SC_GETGR_R_SIZE_MAX);
    size_t strbuflen = val;
    int rc;

    /* sysconf is a hint; if it fails, fall back to a reasonable size */
    if (val < 0)
        strbuflen = 1024;

787
    if (VIR_ALLOC_N(strbuf, strbuflen) < 0)
788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803
        return NULL;

    /*
     * From the manpage (terrifying but true):
     *
     * ERRORS
     *  0 or ENOENT or ESRCH or EBADF or EPERM or ...
     *        The given name or gid was not found.
     */
    while ((rc = getgrgid_r(gid, &grbuf, strbuf, strbuflen, &gr)) == ERANGE) {
        if (VIR_RESIZE_N(strbuf, strbuflen, strbuflen, strbuflen) < 0) {
            VIR_FREE(strbuf);
            return NULL;
        }
    }
    if (rc != 0 || gr == NULL) {
804 805 806 807 808 809 810 811 812 813
        if (rc != 0) {
            virReportSystemError(rc,
                                 _("Failed to find group record for gid '%u'"),
                                 (unsigned int) gid);
        } else {
            virReportError(VIR_ERR_SYSTEM_ERROR,
                           _("Failed to find group record for gid '%u'"),
                           (unsigned int) gid);
        }

814 815 816 817
        VIR_FREE(strbuf);
        return NULL;
    }

818
    ignore_value(VIR_STRDUP(ret, gr->gr_name));
819 820 821 822
    VIR_FREE(strbuf);
    return ret;
}

D
Dan Walsh 已提交
823 824 825

char *
virGetUserDirectoryByUID(uid_t uid)
826
{
E
Eric Blake 已提交
827
    char *ret;
828
    virGetUserEnt(uid, NULL, NULL, &ret, NULL, false);
829 830 831 832 833 834 835
    return ret;
}


char *virGetUserShell(uid_t uid)
{
    char *ret;
836
    virGetUserEnt(uid, NULL, NULL, NULL, &ret, false);
E
Eric Blake 已提交
837
    return ret;
838 839
}

D
Dan Walsh 已提交
840

841
static char *virGetXDGDirectory(const char *xdgenvname, const char *xdgdefdir)
842
{
843
    const char *path = virGetEnvBlockSUID(xdgenvname);
844
    char *ret = NULL;
845
    char *home = NULL;
846 847

    if (path && path[0]) {
848
        ignore_value(virAsprintf(&ret, "%s/libvirt", path));
849
    } else {
E
Eric Blake 已提交
850 851 852
        home = virGetUserDirectory();
        if (home)
            ignore_value(virAsprintf(&ret, "%s/%s/libvirt", home, xdgdefdir));
853 854 855 856 857 858
    }

    VIR_FREE(home);
    return ret;
}

859
char *virGetUserConfigDirectory(void)
860
{
861
    return virGetXDGDirectory("XDG_CONFIG_HOME", ".config");
862 863
}

864
char *virGetUserCacheDirectory(void)
865
{
866
     return virGetXDGDirectory("XDG_CACHE_HOME", ".cache");
867 868
}

869
char *virGetUserRuntimeDirectory(void)
870
{
871
    const char *path = virGetEnvBlockSUID("XDG_RUNTIME_DIR");
872 873

    if (!path || !path[0]) {
874
        return virGetUserCacheDirectory();
875 876 877
    } else {
        char *ret;

878
        ignore_value(virAsprintf(&ret, "%s/libvirt", path));
879 880 881 882
        return ret;
    }
}

883
char *virGetUserName(uid_t uid)
884
{
E
Eric Blake 已提交
885
    char *ret;
886
    virGetUserEnt(uid, &ret, NULL, NULL, NULL, false);
E
Eric Blake 已提交
887
    return ret;
888 889
}

890 891 892 893 894
char *virGetGroupName(gid_t gid)
{
    return virGetGroupEnt(gid);
}

895 896 897 898 899
/* Search in the password database for a user id that matches the user name
 * `name`. Returns 0 on success, -1 on failure or 1 if name cannot be found.
 */
static int
virGetUserIDByName(const char *name, uid_t *uid)
900
{
901
    char *strbuf = NULL;
902 903
    struct passwd pwbuf;
    struct passwd *pw = NULL;
904 905
    long val = sysconf(_SC_GETPW_R_SIZE_MAX);
    size_t strbuflen = val;
906
    int rc;
907
    int ret = -1;
908

909 910 911
    /* sysconf is a hint; if it fails, fall back to a reasonable size */
    if (val < 0)
        strbuflen = 1024;
912

913
    if (VIR_ALLOC_N(strbuf, strbuflen) < 0)
914
        goto cleanup;
915

916
    while ((rc = getpwnam_r(name, &pwbuf, strbuf, strbuflen, &pw)) == ERANGE) {
917
        if (VIR_RESIZE_N(strbuf, strbuflen, strbuflen, strbuflen) < 0)
918
            goto cleanup;
919
    }
920 921

    if (!pw) {
922 923 924 925 926
        if (rc != 0) {
            char buf[1024];
            /* log the possible error from getpwnam_r. Unfortunately error
             * reporting from this function is bad and we can't really
             * rely on it, so we just report that the user wasn't found */
927
            VIR_WARN("User record for user '%s' was not found: %s",
928 929 930
                     name, virStrerror(rc, buf, sizeof(buf)));
        }

931 932
        ret = 1;
        goto cleanup;
933 934 935
    }

    *uid = pw->pw_uid;
936
    ret = 0;
937

938
 cleanup:
939 940
    VIR_FREE(strbuf);

941
    return ret;
942 943
}

944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973
/* Try to match a user id based on `user`. The default behavior is to parse
 * `user` first as a user name and then as a user id. However if `user`
 * contains a leading '+', the rest of the string is always parsed as a uid.
 *
 * Returns 0 on success and -1 otherwise.
 */
int
virGetUserID(const char *user, uid_t *uid)
{
    unsigned int uint_uid;

    if (*user == '+') {
        user++;
    } else {
        int rc = virGetUserIDByName(user, uid);
        if (rc <= 0)
            return rc;
    }

    if (virStrToLong_ui(user, NULL, 10, &uint_uid) < 0 ||
        ((uid_t) uint_uid) != uint_uid) {
        virReportError(VIR_ERR_INVALID_ARG, _("Failed to parse user '%s'"),
                       user);
        return -1;
    }

    *uid = uint_uid;

    return 0;
}
974

975 976 977 978 979
/* Search in the group database for a group id that matches the group name
 * `name`. Returns 0 on success, -1 on failure or 1 if name cannot be found.
 */
static int
virGetGroupIDByName(const char *name, gid_t *gid)
980
{
981
    char *strbuf = NULL;
982 983
    struct group grbuf;
    struct group *gr = NULL;
984 985
    long val = sysconf(_SC_GETGR_R_SIZE_MAX);
    size_t strbuflen = val;
986
    int rc;
987
    int ret = -1;
988

989 990 991
    /* sysconf is a hint; if it fails, fall back to a reasonable size */
    if (val < 0)
        strbuflen = 1024;
992

993
    if (VIR_ALLOC_N(strbuf, strbuflen) < 0)
994
        goto cleanup;
995

996
    while ((rc = getgrnam_r(name, &grbuf, strbuf, strbuflen, &gr)) == ERANGE) {
997
        if (VIR_RESIZE_N(strbuf, strbuflen, strbuflen, strbuflen) < 0)
998
            goto cleanup;
999
    }
1000 1001

    if (!gr) {
1002 1003 1004 1005 1006
        if (rc != 0) {
            char buf[1024];
            /* log the possible error from getgrnam_r. Unfortunately error
             * reporting from this function is bad and we can't really
             * rely on it, so we just report that the user wasn't found */
1007
            VIR_WARN("Group record for user '%s' was not found: %s",
1008 1009 1010
                     name, virStrerror(rc, buf, sizeof(buf)));
        }

1011 1012
        ret = 1;
        goto cleanup;
1013 1014 1015
    }

    *gid = gr->gr_gid;
1016
    ret = 0;
1017

1018
 cleanup:
1019 1020
    VIR_FREE(strbuf);

1021
    return ret;
1022
}
1023

1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053
/* Try to match a group id based on `group`. The default behavior is to parse
 * `group` first as a group name and then as a group id. However if `group`
 * contains a leading '+', the rest of the string is always parsed as a guid.
 *
 * Returns 0 on success and -1 otherwise.
 */
int
virGetGroupID(const char *group, gid_t *gid)
{
    unsigned int uint_gid;

    if (*group == '+') {
        group++;
    } else {
        int rc = virGetGroupIDByName(group, gid);
        if (rc <= 0)
            return rc;
    }

    if (virStrToLong_ui(group, NULL, 10, &uint_gid) < 0 ||
        ((gid_t) uint_gid) != uint_gid) {
        virReportError(VIR_ERR_INVALID_ARG, _("Failed to parse group '%s'"),
                       group);
        return -1;
    }

    *gid = uint_gid;

    return 0;
}
L
Laine Stump 已提交
1054

E
Eric Blake 已提交
1055

1056 1057
/* Compute the list of primary and supplementary groups associated
 * with @uid, and including @gid in the list (unless it is -1),
1058 1059 1060 1061 1062 1063
 * storing a malloc'd result into @list. If uid is -1 or doesn't exist in the
 * system database querying of the supplementary groups is skipped.
 *
 * Returns the size of the list on success, or -1 on failure with error
 * reported and errno set. May not be called between fork and exec.
 * */
E
Eric Blake 已提交
1064 1065 1066
int
virGetGroupList(uid_t uid, gid_t gid, gid_t **list)
{
1067
    int ret = 0;
E
Eric Blake 已提交
1068
    char *user = NULL;
1069
    gid_t primary;
E
Eric Blake 已提交
1070 1071 1072

    *list = NULL;

1073 1074 1075 1076 1077 1078 1079 1080 1081
    /* invalid users have no supplementary groups */
    if (uid != (uid_t)-1 &&
        virGetUserEnt(uid, &user, &primary, NULL, NULL, true) >= 0) {
        if ((ret = mgetgroups(user, primary, list)) < 0) {
            virReportSystemError(errno,
                                 _("cannot get group list for '%s'"), user);
            ret = -1;
            goto cleanup;
        }
1082 1083 1084
    }

    if (gid != (gid_t)-1) {
E
Eric Blake 已提交
1085
        size_t i;
1086

E
Eric Blake 已提交
1087
        for (i = 0; i < ret; i++) {
1088 1089 1090
            if ((*list)[i] == gid)
                goto cleanup;
        }
E
Eric Blake 已提交
1091
        if (VIR_APPEND_ELEMENT(*list, i, gid) < 0) {
1092 1093 1094 1095
            ret = -1;
            VIR_FREE(*list);
            goto cleanup;
        } else {
E
Eric Blake 已提交
1096
            ret = i;
1097 1098 1099
        }
    }

1100
 cleanup:
E
Eric Blake 已提交
1101 1102 1103 1104 1105
    VIR_FREE(user);
    return ret;
}


1106 1107 1108 1109
/* Set the real and effective uid and gid to the given values, as well
 * as all the supplementary groups, so that the process has all the
 * assumed group membership of that uid. Return 0 on success, -1 on
 * failure (the original system error remains in errno).
L
Laine Stump 已提交
1110 1111
 */
int
1112 1113
virSetUIDGID(uid_t uid, gid_t gid, gid_t *groups ATTRIBUTE_UNUSED,
             int ngroups ATTRIBUTE_UNUSED)
L
Laine Stump 已提交
1114
{
1115 1116 1117 1118 1119
    if (gid != (gid_t)-1 && setregid(gid, gid) < 0) {
        virReportSystemError(errno,
                             _("cannot change to '%u' group"),
                             (unsigned int) gid);
        return -1;
L
Laine Stump 已提交
1120 1121
    }

1122
# if HAVE_SETGROUPS
1123
    if (gid != (gid_t)-1 && setgroups(ngroups, groups) < 0) {
1124 1125 1126 1127
        virReportSystemError(errno, "%s",
                             _("cannot set supplemental groups"));
        return -1;
    }
L
Laine Stump 已提交
1128
# endif
1129 1130 1131 1132 1133 1134

    if (uid != (uid_t)-1 && setreuid(uid, uid) < 0) {
        virReportSystemError(errno,
                             _("cannot change to uid to '%u'"),
                             (unsigned int) uid);
        return -1;
L
Laine Stump 已提交
1135
    }
1136

L
Laine Stump 已提交
1137 1138 1139
    return 0;
}

1140 1141
#else /* ! HAVE_GETPWUID_R */

E
Eric Blake 已提交
1142 1143 1144 1145 1146 1147 1148 1149
int
virGetGroupList(uid_t uid ATTRIBUTE_UNUSED, gid_t gid ATTRIBUTE_UNUSED,
                gid_t **list)
{
    *list = NULL;
    return 0;
}

1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161
# ifdef WIN32
/* These methods are adapted from GLib2 under terms of LGPLv2+ */
static int
virGetWin32SpecialFolder(int csidl, char **path)
{
    char buf[MAX_PATH+1];
    LPITEMIDLIST pidl = NULL;
    int ret = 0;

    *path = NULL;

    if (SHGetSpecialFolderLocation(NULL, csidl, &pidl) == S_OK) {
1162 1163
        if (SHGetPathFromIDList(pidl, buf) && VIR_STRDUP(*path, buf) < 0)
            ret = -1;
1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175
        CoTaskMemFree(pidl);
    }
    return ret;
}

static int
virGetWin32DirectoryRoot(char **path)
{
    char windowsdir[MAX_PATH];

    *path = NULL;

E
Eric Blake 已提交
1176
    if (GetWindowsDirectory(windowsdir, ARRAY_CARDINALITY(windowsdir))) {
1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190
        const char *tmp;
        /* Usually X:\Windows, but in terminal server environments
         * might be an UNC path, AFAIK.
         */
        tmp = virFileSkipRoot(windowsdir);
        if (VIR_FILE_IS_DIR_SEPARATOR(tmp[-1]) &&
            tmp[-2] != ':')
            tmp--;

        windowsdir[tmp - windowsdir] = '\0';
    } else {
        strcpy(windowsdir, "C:\\");
    }

1191
    return VIR_STRDUP(*path, windowsdir) < 0 ? -1 : 0;
1192 1193 1194 1195 1196
}



char *
D
Dan Walsh 已提交
1197
virGetUserDirectoryByUID(uid_t uid ATTRIBUTE_UNUSED)
1198
{
D
Dan Walsh 已提交
1199 1200 1201
    /* Since Windows lacks setuid binaries, and since we already fake
     * geteuid(), we can safely assume that this is only called when
     * querying about the current user */
1202 1203 1204
    const char *dir;
    char *ret;

1205
    dir = virGetEnvBlockSUID("HOME");
1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218

    /* Only believe HOME if it is an absolute path and exists */
    if (dir) {
        if (!virFileIsAbsPath(dir) ||
            !virFileExists(dir))
            dir = NULL;
    }

    /* In case HOME is Unix-style (it happens), convert it to
     * Windows style.
     */
    if (dir) {
        char *p;
1219
        while ((p = strchr(dir, '/')) != NULL)
1220 1221 1222 1223 1224
            *p = '\\';
    }

    if (!dir)
        /* USERPROFILE is probably the closest equivalent to $HOME? */
1225
        dir = virGetEnvBlockSUID("USERPROFILE");
1226

1227 1228
    if (VIR_STRDUP(ret, dir) < 0)
        return NULL;
1229 1230 1231 1232 1233 1234 1235 1236 1237 1238

    if (!ret &&
        virGetWin32SpecialFolder(CSIDL_PROFILE, &ret) < 0)
        return NULL;

    if (!ret &&
        virGetWin32DirectoryRoot(&ret) < 0)
        return NULL;

    if (!ret) {
1239 1240
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Unable to determine home directory"));
1241 1242 1243 1244 1245 1246
        return NULL;
    }

    return ret;
}

1247 1248 1249 1250 1251 1252 1253 1254 1255
char *
virGetUserShell(uid_t uid ATTRIBUTE_UNUSED)
{
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserShell is not available"));

    return NULL;
}

1256 1257 1258 1259 1260 1261
char *
virGetUserConfigDirectory(void)
{
    char *ret;
    if (virGetWin32SpecialFolder(CSIDL_LOCAL_APPDATA, &ret) < 0)
        return NULL;
1262

1263
    if (!ret) {
1264 1265
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Unable to determine config directory"));
1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278
        return NULL;
    }
    return ret;
}

char *
virGetUserCacheDirectory(void)
{
    char *ret;
    if (virGetWin32SpecialFolder(CSIDL_INTERNET_CACHE, &ret) < 0)
        return NULL;

    if (!ret) {
1279 1280
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Unable to determine config directory"));
1281 1282 1283 1284 1285 1286 1287 1288 1289 1290
        return NULL;
    }
    return ret;
}

char *
virGetUserRuntimeDirectory(void)
{
    return virGetUserCacheDirectory();
}
E
Eric Blake 已提交
1291

1292
# else /* !HAVE_GETPWUID_R && !WIN32 */
1293
char *
D
Dan Walsh 已提交
1294
virGetUserDirectoryByUID(uid_t uid ATTRIBUTE_UNUSED)
1295
{
1296 1297
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserDirectory is not available"));
1298 1299 1300 1301

    return NULL;
}

1302 1303 1304 1305 1306 1307 1308 1309 1310
char *
virGetUserShell(uid_t uid ATTRIBUTE_UNUSED)
{
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserShell is not available"));

    return NULL;
}

1311 1312 1313
char *
virGetUserConfigDirectory(void)
{
1314 1315
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserConfigDirectory is not available"));
1316 1317 1318 1319 1320 1321 1322

    return NULL;
}

char *
virGetUserCacheDirectory(void)
{
1323 1324
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserCacheDirectory is not available"));
1325 1326 1327 1328 1329 1330 1331

    return NULL;
}

char *
virGetUserRuntimeDirectory(void)
{
1332 1333
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserRuntimeDirectory is not available"));
1334 1335 1336 1337 1338

    return NULL;
}
# endif /* ! HAVE_GETPWUID_R && ! WIN32 */

1339 1340 1341
char *
virGetUserName(uid_t uid ATTRIBUTE_UNUSED)
{
1342 1343
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserName is not available"));
1344 1345 1346 1347 1348 1349 1350

    return NULL;
}

int virGetUserID(const char *name ATTRIBUTE_UNUSED,
                 uid_t *uid ATTRIBUTE_UNUSED)
{
1351 1352
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetUserID is not available"));
1353

1354
    return -1;
1355 1356 1357 1358 1359 1360
}


int virGetGroupID(const char *name ATTRIBUTE_UNUSED,
                  gid_t *gid ATTRIBUTE_UNUSED)
{
1361 1362
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetGroupID is not available"));
1363

1364
    return -1;
1365
}
L
Laine Stump 已提交
1366 1367 1368

int
virSetUIDGID(uid_t uid ATTRIBUTE_UNUSED,
1369 1370 1371
             gid_t gid ATTRIBUTE_UNUSED,
             gid_t *groups ATTRIBUTE_UNUSED,
             int ngroups ATTRIBUTE_UNUSED)
L
Laine Stump 已提交
1372
{
1373 1374
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virSetUIDGID is not available"));
L
Laine Stump 已提交
1375 1376
    return -1;
}
1377 1378 1379 1380

char *
virGetGroupName(gid_t gid ATTRIBUTE_UNUSED)
{
1381 1382
    virReportError(VIR_ERR_INTERNAL_ERROR,
                   "%s", _("virGetGroupName is not available"));
1383 1384 1385

    return NULL;
}
1386
#endif /* HAVE_GETPWUID_R */
1387

1388 1389 1390 1391 1392 1393 1394
#if WITH_CAPNG
/* Set the real and effective uid and gid to the given values, while
 * maintaining the capabilities indicated by bits in @capBits. Return
 * 0 on success, -1 on failure (the original system error remains in
 * errno).
 */
int
1395 1396
virSetUIDGIDWithCaps(uid_t uid, gid_t gid, gid_t *groups, int ngroups,
                     unsigned long long capBits, bool clearExistingCaps)
1397
{
1398 1399
    size_t i;
    int capng_ret, ret = -1;
1400
    bool need_setgid = false, need_setuid = false;
1401
    bool need_setpcap = false;
1402

1403 1404 1405 1406
    /* First drop all caps (unless the requested uid is "unchanged" or
     * root and clearExistingCaps wasn't requested), then add back
     * those in capBits + the extra ones we need to change uid/gid and
     * change the capabilities bounding set.
1407 1408
     */

1409
    if (clearExistingCaps || (uid != (uid_t)-1 && uid != 0))
1410
       capng_clear(CAPNG_SELECT_BOTH);
1411

1412 1413
    for (i = 0; i <= CAP_LAST_CAP; i++) {
        if (capBits & (1ULL << i)) {
1414 1415 1416
            capng_update(CAPNG_ADD,
                         CAPNG_EFFECTIVE|CAPNG_INHERITABLE|
                         CAPNG_PERMITTED|CAPNG_BOUNDING_SET,
1417
                         i);
1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441
        }
    }

    if (gid != (gid_t)-1 &&
        !capng_have_capability(CAPNG_EFFECTIVE, CAP_SETGID)) {
        need_setgid = true;
        capng_update(CAPNG_ADD, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETGID);
    }
    if (uid != (uid_t)-1 &&
        !capng_have_capability(CAPNG_EFFECTIVE, CAP_SETUID)) {
        need_setuid = true;
        capng_update(CAPNG_ADD, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETUID);
    }
# ifdef PR_CAPBSET_DROP
    /* If newer kernel, we need also need setpcap to change the bounding set */
    if ((capBits || need_setgid || need_setuid) &&
        !capng_have_capability(CAPNG_EFFECTIVE, CAP_SETPCAP)) {
        need_setpcap = true;
    }
    if (need_setpcap)
        capng_update(CAPNG_ADD, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETPCAP);
# endif

    /* Tell system we want to keep caps across uid change */
1442
    if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0)) {
1443 1444 1445 1446 1447 1448
        virReportSystemError(errno, "%s",
                             _("prctl failed to set KEEPCAPS"));
        goto cleanup;
    }

    /* Change to the temp capabilities */
1449
    if ((capng_ret = capng_apply(CAPNG_SELECT_CAPS)) < 0) {
1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464
        /* Failed.  If we are running unprivileged, and the arguments make sense
         * for this scenario, assume we're starting some kind of setuid helper:
         * do not set any of capBits in the permitted or effective sets, and let
         * the program get them on its own.
         *
         * (Too bad we cannot restrict the bounding set to the capabilities we
         * would like the helper to have!).
         */
        if (getuid() > 0 && clearExistingCaps && !need_setuid && !need_setgid) {
            capng_clear(CAPNG_SELECT_CAPS);
        } else {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot apply process capabilities %d"), capng_ret);
            goto cleanup;
        }
1465 1466
    }

1467
    if (virSetUIDGID(uid, gid, groups, ngroups) < 0)
1468 1469 1470
        goto cleanup;

    /* Tell it we are done keeping capabilities */
1471
    if (prctl(PR_SET_KEEPCAPS, 0, 0, 0, 0)) {
1472 1473 1474 1475 1476
        virReportSystemError(errno, "%s",
                             _("prctl failed to reset KEEPCAPS"));
        goto cleanup;
    }

1477 1478 1479 1480 1481 1482
    /* Set bounding set while we have CAP_SETPCAP.  Unfortunately we cannot
     * do this if we failed to get the capability above, so ignore the
     * return value.
     */
    capng_apply(CAPNG_SELECT_BOUNDS);

1483 1484 1485 1486 1487 1488 1489 1490 1491
    /* Drop the caps that allow setuid/gid (unless they were requested) */
    if (need_setgid)
        capng_update(CAPNG_DROP, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETGID);
    if (need_setuid)
        capng_update(CAPNG_DROP, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETUID);
    /* Throw away CAP_SETPCAP so no more changes */
    if (need_setpcap)
        capng_update(CAPNG_DROP, CAPNG_EFFECTIVE|CAPNG_PERMITTED, CAP_SETPCAP);

1492
    if (((capng_ret = capng_apply(CAPNG_SELECT_CAPS)) < 0)) {
1493 1494 1495 1496 1497 1498 1499
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("cannot apply process capabilities %d"), capng_ret);
        ret = -1;
        goto cleanup;
    }

    ret = 0;
1500
 cleanup:
1501 1502 1503 1504 1505 1506 1507 1508 1509 1510
    return ret;
}

#else
/*
 * On platforms without libcapng, the capabilities setting is treated
 * as a NOP.
 */

int
1511
virSetUIDGIDWithCaps(uid_t uid, gid_t gid, gid_t *groups, int ngroups,
1512 1513
                     unsigned long long capBits ATTRIBUTE_UNUSED,
                     bool clearExistingCaps ATTRIBUTE_UNUSED)
1514
{
1515
    return virSetUIDGID(uid, gid, groups, ngroups);
1516 1517 1518
}
#endif

1519

1520
#if defined(UDEVADM) || defined(UDEVSETTLE)
J
John Ferlan 已提交
1521
void virWaitForDevices(void)
D
Daniel P. Berrange 已提交
1522
{
1523
# ifdef UDEVADM
D
Daniel P. Berrange 已提交
1524
    const char *const settleprog[] = { UDEVADM, "settle", NULL };
1525
# else
D
Daniel P. Berrange 已提交
1526
    const char *const settleprog[] = { UDEVSETTLE, NULL };
1527
# endif
D
Daniel P. Berrange 已提交
1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538
    int exitstatus;

    if (access(settleprog[0], X_OK) != 0)
        return;

    /*
     * NOTE: we ignore errors here; this is just to make sure that any device
     * nodes that are being created finish before we try to scan them.
     * If this fails for any reason, we still have the backup of polling for
     * 5 seconds for device nodes.
     */
E
Eric Blake 已提交
1539
    ignore_value(virRun(settleprog, &exitstatus));
D
Daniel P. Berrange 已提交
1540
}
1541
#else
J
John Ferlan 已提交
1542
void virWaitForDevices(void)
1543
{}
D
Daniel P. Berrange 已提交
1544
#endif
1545

1546
#if WITH_DEVMAPPER
1547
bool
1548
virIsDevMapperDevice(const char *dev_name)
1549 1550 1551
{
    struct stat buf;

1552
    if (!stat(dev_name, &buf) &&
1553 1554 1555 1556 1557 1558
        S_ISBLK(buf.st_mode) &&
        dm_is_dm_major(major(buf.st_rdev)))
            return true;

    return false;
}
1559
#else
1560
bool virIsDevMapperDevice(const char *dev_name ATTRIBUTE_UNUSED)
1561 1562 1563 1564
{
    return false;
}
#endif
O
Osier Yang 已提交
1565 1566

bool
1567 1568
virValidateWWN(const char *wwn)
{
1569
    size_t i;
1570
    const char *p = wwn;
O
Osier Yang 已提交
1571

1572
    if (STRPREFIX(wwn, "0x"))
1573 1574 1575 1576
        p += 2;

    for (i = 0; p[i]; i++) {
        if (!c_isxdigit(p[i]))
O
Osier Yang 已提交
1577
            break;
1578
    }
O
Osier Yang 已提交
1579

1580
    if (i != 16 || p[i]) {
1581 1582
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Malformed wwn: %s"), wwn);
O
Osier Yang 已提交
1583 1584 1585 1586 1587
        return false;
    }

    return true;
}
1588

1589 1590 1591 1592 1593 1594
#if defined(major) && defined(minor)
int
virGetDeviceID(const char *path, int *maj, int *min)
{
    struct stat sb;

1595
    if (stat(path, &sb) < 0)
1596 1597
        return -errno;

1598
    if (!S_ISBLK(sb.st_mode))
1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609
        return -EINVAL;

    if (maj)
        *maj = major(sb.st_rdev);
    if (min)
        *min = minor(sb.st_rdev);

    return 0;
}
#else
int
E
Eric Blake 已提交
1610 1611 1612
virGetDeviceID(const char *path ATTRIBUTE_UNUSED,
               int *maj ATTRIBUTE_UNUSED,
               int *min ATTRIBUTE_UNUSED)
1613 1614 1615 1616 1617 1618 1619 1620
{

    return -ENOSYS;
}
#endif

#define SYSFS_DEV_BLOCK_PATH "/sys/dev/block"

1621
char *
1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635
virGetUnprivSGIOSysfsPath(const char *path,
                          const char *sysfs_dir)
{
    int maj, min;
    char *sysfs_path = NULL;
    int rc;

    if ((rc = virGetDeviceID(path, &maj, &min)) < 0) {
        virReportSystemError(-rc,
                             _("Unable to get device ID '%s'"),
                             path);
        return NULL;
    }

1636 1637 1638
    ignore_value(virAsprintf(&sysfs_path, "%s/%d:%d/queue/unpriv_sgio",
                             sysfs_dir ? sysfs_dir : SYSFS_DEV_BLOCK_PATH,
                             maj, min));
1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660
    return sysfs_path;
}

int
virSetDeviceUnprivSGIO(const char *path,
                       const char *sysfs_dir,
                       int unpriv_sgio)
{
    char *sysfs_path = NULL;
    char *val = NULL;
    int ret = -1;
    int rc;

    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(path, sysfs_dir)))
        return -1;

    if (!virFileExists(sysfs_path)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("unpriv_sgio is not supported by this kernel"));
        goto cleanup;
    }

1661
    if (virAsprintf(&val, "%d", unpriv_sgio) < 0)
1662 1663 1664 1665 1666 1667 1668 1669
        goto cleanup;

    if ((rc = virFileWriteStr(sysfs_path, val, 0)) < 0) {
        virReportSystemError(-rc, _("failed to set %s"), sysfs_path);
        goto cleanup;
    }

    ret = 0;
1670
 cleanup:
1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707
    VIR_FREE(sysfs_path);
    VIR_FREE(val);
    return ret;
}

int
virGetDeviceUnprivSGIO(const char *path,
                       const char *sysfs_dir,
                       int *unpriv_sgio)
{
    char *sysfs_path = NULL;
    char *buf = NULL;
    char *tmp = NULL;
    int ret = -1;

    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(path, sysfs_dir)))
        return -1;

    if (!virFileExists(sysfs_path)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("unpriv_sgio is not supported by this kernel"));
        goto cleanup;
    }

    if (virFileReadAll(sysfs_path, 1024, &buf) < 0)
        goto cleanup;

    if ((tmp = strchr(buf, '\n')))
        *tmp = '\0';

    if (virStrToLong_i(buf, NULL, 10, unpriv_sgio) < 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("failed to parse value of %s"), sysfs_path);
        goto cleanup;
    }

    ret = 0;
1708
 cleanup:
1709 1710 1711 1712
    VIR_FREE(sysfs_path);
    VIR_FREE(buf);
    return ret;
}
1713

1714

M
Martin Kletzander 已提交
1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764
/**
 * virParseOwnershipIds:
 *
 * Parse the usual "uid:gid" ownership specification into uid_t and
 * gid_t passed as parameters.  NULL value for those parameters mean
 * the information is not needed.  Also, none of those values are
 * changed in case of any error.
 *
 * Returns -1 on error, 0 otherwise.
 */
int
virParseOwnershipIds(const char *label, uid_t *uidPtr, gid_t *gidPtr)
{
    int rc = -1;
    uid_t theuid;
    gid_t thegid;
    char *tmp_label = NULL;
    char *sep = NULL;
    char *owner = NULL;
    char *group = NULL;

    if (VIR_STRDUP(tmp_label, label) < 0)
        goto cleanup;

    /* Split label */
    sep = strchr(tmp_label, ':');
    if (sep == NULL) {
        virReportError(VIR_ERR_INVALID_ARG,
                       _("Failed to parse uid and gid from '%s'"),
                       label);
        goto cleanup;
    }
    *sep = '\0';
    owner = tmp_label;
    group = sep + 1;

    /* Parse owner and group, error message is defined by
     * virGetUserID or virGetGroupID.
     */
    if (virGetUserID(owner, &theuid) < 0 ||
        virGetGroupID(group, &thegid) < 0)
        goto cleanup;

    if (uidPtr)
        *uidPtr = theuid;
    if (gidPtr)
        *gidPtr = thegid;

    rc = 0;

1765
 cleanup:
M
Martin Kletzander 已提交
1766 1767 1768 1769
    VIR_FREE(tmp_label);

    return rc;
}
1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781


/**
 * virGetEnvBlockSUID:
 * @name: the environment variable name
 *
 * Obtain an environment variable which is unsafe to
 * use when running setuid. If running setuid, a NULL
 * value will be returned
 */
const char *virGetEnvBlockSUID(const char *name)
{
1782
    return secure_getenv(name); /* exempt from syntax-check */
1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795
}


/**
 * virGetEnvBlockSUID:
 * @name: the environment variable name
 *
 * Obtain an environment variable which is safe to
 * use when running setuid. The value will be returned
 * even when running setuid
 */
const char *virGetEnvAllowSUID(const char *name)
{
1796
    return getenv(name); /* exempt from syntax-check */
1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808
}


/**
 * virIsSUID:
 * Return a true value if running setuid. Does not
 * check for elevated capabilities bits.
 */
bool virIsSUID(void)
{
    return getuid() != geteuid();
}
1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831


static time_t selfLastChanged;

time_t virGetSelfLastChanged(void)
{
    return selfLastChanged;
}


void virUpdateSelfLastChanged(const char *path)
{
    struct stat sb;

    if (stat(path, &sb) < 0)
        return;

    if (sb.st_ctime > selfLastChanged) {
        VIR_DEBUG("Setting self last changed to %lld for '%s'",
                  (long long)sb.st_ctime, path);
        selfLastChanged = sb.st_ctime;
    }
}
1832

1833 1834
#ifndef WIN32

1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863
/**
 * virGetListenFDs:
 *
 * Parse LISTEN_PID and LISTEN_FDS passed from caller.
 *
 * Returns number of passed FDs.
 */
unsigned int
virGetListenFDs(void)
{
    const char *pidstr;
    const char *fdstr;
    size_t i = 0;
    unsigned long long procid;
    unsigned int nfds;

    VIR_DEBUG("Setting up networking from caller");

    if (!(pidstr = virGetEnvAllowSUID("LISTEN_PID"))) {
        VIR_DEBUG("No LISTEN_PID from caller");
        return 0;
    }

    if (virStrToLong_ull(pidstr, NULL, 10, &procid) < 0) {
        VIR_DEBUG("Malformed LISTEN_PID from caller %s", pidstr);
        return 0;
    }

    if ((pid_t)procid != getpid()) {
M
Michal Privoznik 已提交
1864 1865
        VIR_DEBUG("LISTEN_PID %s is not for us %lld",
                  pidstr, (long long) getpid());
1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888
        return 0;
    }

    if (!(fdstr = virGetEnvAllowSUID("LISTEN_FDS"))) {
        VIR_DEBUG("No LISTEN_FDS from caller");
        return 0;
    }

    if (virStrToLong_ui(fdstr, NULL, 10, &nfds) < 0) {
        VIR_DEBUG("Malformed LISTEN_FDS from caller %s", fdstr);
        return 0;
    }

    unsetenv("LISTEN_PID");
    unsetenv("LISTEN_FDS");

    VIR_DEBUG("Got %u file descriptors", nfds);

    for (i = 0; i < nfds; i++) {
        int fd = STDERR_FILENO + i + 1;

        VIR_DEBUG("Disabling inheritance of passed FD %d", fd);

1889
        if (virSetInherit(fd, false) < 0)
1890 1891 1892 1893 1894
            VIR_WARN("Couldn't disable inheritance of passed FD %d", fd);
    }

    return nfds;
}
1895 1896 1897 1898 1899 1900 1901 1902 1903 1904

#else /* WIN32 */

unsigned int
virGetListenFDs(void)
{
    return 0;
}

#endif /* WIN32 */
1905

P
Pavel Hrdina 已提交
1906
#ifndef WIN32
1907 1908 1909 1910
long virGetSystemPageSize(void)
{
    return sysconf(_SC_PAGESIZE);
}
P
Pavel Hrdina 已提交
1911 1912 1913 1914 1915 1916 1917
#else /* WIN32 */
long virGetSystemPageSize(void)
{
    errno = ENOSYS;
    return -1;
}
#endif /* WIN32 */
1918 1919 1920 1921 1922 1923 1924 1925

long virGetSystemPageSizeKB(void)
{
    long val = virGetSystemPageSize();
    if (val < 0)
        return val;
    return val / 1024;
}
1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949

/**
 * virMemoryLimitTruncate
 *
 * Return truncated memory limit to VIR_DOMAIN_MEMORY_PARAM_UNLIMITED as maximum
 * which means that the limit is not set => unlimited.
 */
unsigned long long
virMemoryLimitTruncate(unsigned long long value)
{
    return value < VIR_DOMAIN_MEMORY_PARAM_UNLIMITED ? value :
        VIR_DOMAIN_MEMORY_PARAM_UNLIMITED;
}

/**
 * virMemoryLimitIsSet
 *
 * Returns true if the limit is set and false for unlimited value.
 */
bool
virMemoryLimitIsSet(unsigned long long value)
{
    return value < VIR_DOMAIN_MEMORY_PARAM_UNLIMITED;
}
1950 1951 1952 1953 1954


/**
 * virMemoryMaxValue
 *
1955
 * @capped: whether the value must fit into unsigned long
1956 1957
 *   (long long is assumed otherwise)
 *
1958 1959
 * Note: This function is mocked in tests/qemuxml2argvmock.c for test stability
 *
1960 1961 1962
 * Returns the maximum possible memory value in bytes.
 */
unsigned long long
1963
virMemoryMaxValue(bool capped)
1964 1965 1966
{
    /* On 32-bit machines, our bound is 0xffffffff * KiB. On 64-bit
     * machines, our bound is off_t (2^63).  */
1967
    if (capped && sizeof(unsigned long) < sizeof(long long))
1968 1969 1970 1971
        return 1024ull * ULONG_MAX;
    else
        return LLONG_MAX;
}