From nobody Thu Apr 18 22:39:41 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1567680737; cv=none; d=zoho.com; s=zohoarc; b=E399JwtEa+T2AwcKoorw37Bhx4rTtIZpqJ92llsYWODjlmVy1SwSqwSVhD6AjTFQNiaGYFZnBMnl0d8i/+6jN5gtU7wQfaba1xDm+BPMptRxCjwE0mWOO6Vkbi2S0wksqheKceZdqtmEKj1uVv3aS2BhwaOT3PPaOMggq8HODE8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1567680737; h=Content-Type:Content-Transfer-Encoding:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To:ARC-Authentication-Results; bh=HuMUKBNrijUyJqyqORHmCHVHlgzSkKBOWD4C6ZjcNwY=; b=MqLNxNUT7AzFM5UgFQatobHocP3FchpWYCkEdqfIlc3QYHbewD9XA3W5B8i9JBnv6w/THmjCTnKq4x4kDiaQrV63+xNeT00Mkn37WR3T9HGZNxs8IcZ9+yicKDfy95ojcSlzr0fC0baih2iGSr0tuSJq88OgdeHfZtk5fNCHdP4= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1567680737868294.6116921325679; Thu, 5 Sep 2019 03:52:17 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A22062A09CB; Thu, 5 Sep 2019 10:52:15 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 12B2561366; Thu, 5 Sep 2019 10:52:15 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id D1AEF3CBF; Thu, 5 Sep 2019 10:52:13 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id x85AqC8Q029020 for ; Thu, 5 Sep 2019 06:52:12 -0400 Received: by smtp.corp.redhat.com (Postfix) id E547560C44; Thu, 5 Sep 2019 10:52:12 +0000 (UTC) Received: from dhcp-17-64.lcy.redhat.com (unknown [10.42.17.64]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5D6B260C63; Thu, 5 Sep 2019 10:52:09 +0000 (UTC) From: =?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= To: libvir-list@redhat.com Date: Thu, 5 Sep 2019 11:52:09 +0100 Message-Id: <20190905105209.27758-1-berrange@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-loop: libvir-list@redhat.com Subject: [libvirt] [PATCH v2] util: activate directory override when used from library X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Thu, 05 Sep 2019 10:52:16 +0000 (UTC) The Perl bindings for libvirt use the test driver for unit tests. This tries to load the cpu_map/index.xml file, and when run from an uninstalled build will fail. The problem is that virFileActivateDirOverride is called by our various binaries like libvirtd, virsh, but is not called when a 3rd party app uses libvirt.so To deal with this we allow the LIBVIRT_DIR_OVERRIDE=3D1 env variable to be set and make virInitialize look for this. The 'run' script will set it, so now build using this script to run against an uninstalled tree we will correctly resolve files to the source tree. Signed-off-by: Daniel P. Berrang=C3=A9 Reviewed-by: Pavel Hrdina --- Changed in v2: - Use a separate function for env var override run.in | 7 ++++++ src/libvirt.c | 2 ++ src/libvirt_private.syms | 3 ++- src/locking/lock_daemon.c | 2 +- src/logging/log_daemon.c | 2 +- src/remote/remote_daemon.c | 2 +- src/security/virt-aa-helper.c | 2 +- src/util/virfile.c | 40 ++++++++++++++++++++++++++--------- src/util/virfile.h | 3 ++- tests/testutils.c | 2 +- tools/virsh.c | 2 +- tools/virt-admin.c | 2 +- 12 files changed, 50 insertions(+), 19 deletions(-) diff --git a/run.in b/run.in index 9a1c6ea11a..ed946a0899 100644 --- a/run.in +++ b/run.in @@ -60,6 +60,13 @@ else fi export PKG_CONFIG_PATH =20 +# Ensure that any 3rd party apps using libvirt.so from +# the build tree get files resolved to the build/source +# tree too. Typically useful for language bindings +# running tests against non-installed libvirt. +LIBVIRT_DIR_OVERRIDE=3D1 +export LIBVIRT_DIR_OVERRIDE + # This is a cheap way to find some use-after-free and uninitialized # read problems when using glibc. random_val=3D"$(awk 'BEGIN{srand(); print 1+int(255*rand())}' < /dev/null)" diff --git a/src/libvirt.c b/src/libvirt.c index 9650aaa453..a1ecd8bacc 100644 --- a/src/libvirt.c +++ b/src/libvirt.c @@ -247,6 +247,8 @@ virGlobalInit(void) virErrorInitialize() < 0) goto error; =20 + virFileActivateDirOverrideForLib(); + if (getuid() !=3D geteuid() || getgid() !=3D getegid()) { virReportError(VIR_ERR_INTERNAL_ERROR, "%s", diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms index a34d92f5ef..21cd6a8ef7 100644 --- a/src/libvirt_private.syms +++ b/src/libvirt_private.syms @@ -1917,7 +1917,8 @@ virDirOpenQuiet; virDirRead; virFileAbsPath; virFileAccessibleAs; -virFileActivateDirOverride; +virFileActivateDirOverrideForLib; +virFileActivateDirOverrideForProg; virFileBindMountDevice; virFileBuildPath; virFileCanonicalizePath; diff --git a/src/locking/lock_daemon.c b/src/locking/lock_daemon.c index ac242bf65c..edb61d74c0 100644 --- a/src/locking/lock_daemon.c +++ b/src/locking/lock_daemon.c @@ -1188,7 +1188,7 @@ int main(int argc, char **argv) { } } =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 if (!(config =3D virLockDaemonConfigNew(privileged))) { VIR_ERROR(_("Can't create initial configuration")); diff --git a/src/logging/log_daemon.c b/src/logging/log_daemon.c index f74e900aea..85c58aaa7b 100644 --- a/src/logging/log_daemon.c +++ b/src/logging/log_daemon.c @@ -960,7 +960,7 @@ int main(int argc, char **argv) { } } =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 if (!(config =3D virLogDaemonConfigNew(privileged))) { VIR_ERROR(_("Can't create initial configuration")); diff --git a/src/remote/remote_daemon.c b/src/remote/remote_daemon.c index 546328b24d..8cf9412128 100644 --- a/src/remote/remote_daemon.c +++ b/src/remote/remote_daemon.c @@ -1034,7 +1034,7 @@ int main(int argc, char **argv) { =20 virUpdateSelfLastChanged(argv[0]); =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 while (1) { int optidx =3D 0; diff --git a/src/security/virt-aa-helper.c b/src/security/virt-aa-helper.c index 3f9d775acc..326cfaf52a 100644 --- a/src/security/virt-aa-helper.c +++ b/src/security/virt-aa-helper.c @@ -1427,7 +1427,7 @@ main(int argc, char **argv) exit(EXIT_FAILURE); } =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 /* Initialize the log system */ virLogSetFromEnv(); diff --git a/src/util/virfile.c b/src/util/virfile.c index 81a3c096eb..d9ac482435 100644 --- a/src/util/virfile.c +++ b/src/util/virfile.c @@ -1766,7 +1766,7 @@ virFileFindResource(const char *filename, =20 =20 /** - * virFileActivateDirOverride: + * virFileActivateDirOverrideForProg: * @argv0: argv[0] of the calling program * * Look at @argv0 and try to detect if running from @@ -1774,20 +1774,40 @@ virFileFindResource(const char *filename, * on the binary name, or '/.libs/' in the path */ void -virFileActivateDirOverride(const char *argv0) +virFileActivateDirOverrideForProg(const char *argv0) { - char *file =3D strrchr(argv0, '/'); - if (!file || file[1] =3D=3D '\0') - return; - file++; - if (STRPREFIX(file, "lt-") || - strstr(argv0, "/.libs/")) { - useDirOverride =3D true; - VIR_DEBUG("Activating build dir override for %s", argv0); + if (argv0 =3D=3D NULL) { + if (getenv("LIBVIRT_DIR_OVERRIDE") !=3D NULL) + useDirOverride =3D true; + } else { + char *file =3D strrchr(argv0, '/'); + if (!file || file[1] =3D=3D '\0') + return; + file++; + if (STRPREFIX(file, "lt-") || + strstr(argv0, "/.libs/")) { + useDirOverride =3D true; + VIR_DEBUG("Activating build dir override for %s", argv0); + } } } =20 =20 +/** + * virFileActivateDirOverrideForEnv: + * + * Look for LIBVIRT_DIR_OVERRIDE env var to see if + * we should find files from the build/src tree + * instead of install tree + */ +void +virFileActivateDirOverrideForLib(void) +{ + if (getenv("LIBVIRT_DIR_OVERRIDE") !=3D NULL) + useDirOverride =3D true; +} + + /** * virFileLength: * @path: full path of the file diff --git a/src/util/virfile.h b/src/util/virfile.h index a8a5dd8074..2b037b00aa 100644 --- a/src/util/virfile.h +++ b/src/util/virfile.h @@ -193,8 +193,9 @@ char *virFileFindResourceFull(const char *filename, const char *installdir, const char *envname) ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(4) ATTRIBUTE_NONNULL(5); -void virFileActivateDirOverride(const char *argv0) +void virFileActivateDirOverrideForProg(const char *argv0) ATTRIBUTE_NONNULL(1); +void virFileActivateDirOverrideForLib(void); =20 off_t virFileLength(const char *path, int fd) ATTRIBUTE_NONNULL(1); bool virFileIsDir (const char *file) ATTRIBUTE_NONNULL(1); diff --git a/tests/testutils.c b/tests/testutils.c index 8b2c51044e..003893dc44 100644 --- a/tests/testutils.c +++ b/tests/testutils.c @@ -992,7 +992,7 @@ int virTestMain(int argc, =20 setenv("VIR_TEST_MOCK_PROGNAME", progname, 1); =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 if (virTestSetEnvPath() < 0) return EXIT_AM_HARDFAIL; diff --git a/tools/virsh.c b/tools/virsh.c index e76d242ec8..ec20f35a77 100644 --- a/tools/virsh.c +++ b/tools/virsh.c @@ -897,7 +897,7 @@ main(int argc, char **argv) return EXIT_FAILURE; } =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 if (!vshInit(ctl, cmdGroups, NULL)) exit(EXIT_FAILURE); diff --git a/tools/virt-admin.c b/tools/virt-admin.c index 4ff006ffcb..e549ec1f83 100644 --- a/tools/virt-admin.c +++ b/tools/virt-admin.c @@ -1552,7 +1552,7 @@ main(int argc, char **argv) return EXIT_FAILURE; } =20 - virFileActivateDirOverride(argv[0]); + virFileActivateDirOverrideForProg(argv[0]); =20 if (!vshInit(ctl, cmdGroups, NULL)) exit(EXIT_FAILURE); --=20 2.21.0 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list