From nobody Fri Apr 4 03:51:52 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=fail (BodyHash is different from the expected one); dmarc=pass(p=quarantine dis=none) header.from=akamai.com Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1741977280161405.4348021404835; Fri, 14 Mar 2025 11:34:40 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1tt9rb-0000rb-Px; Fri, 14 Mar 2025 14:34:32 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tt9rD-0000a5-TG for qemu-devel@nongnu.org; Fri, 14 Mar 2025 14:34:12 -0400 Received: from mx0b-00190b01.pphosted.com ([67.231.157.127]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tt9rA-0007oE-Ne for qemu-devel@nongnu.org; Fri, 14 Mar 2025 14:34:07 -0400 Received: from pps.filterd (m0409411.ppops.net [127.0.0.1]) by m0409411.ppops.net-00190b01. (8.18.1.2/8.18.1.2) with ESMTP id 52EFbLB7015681; Fri, 14 Mar 2025 18:34:00 GMT Received: from prod-mail-ppoint1 (prod-mail-ppoint1.akamai.com [184.51.33.18] (may be forged)) by m0409411.ppops.net-00190b01. (PPS) with ESMTPS id 45au4tbvf6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 14 Mar 2025 18:34:00 +0000 (GMT) Received: from pps.filterd (prod-mail-ppoint1.akamai.com [127.0.0.1]) by prod-mail-ppoint1.akamai.com (8.18.1.2/8.18.1.2) with ESMTP id 52EG5skb021827; Fri, 14 Mar 2025 14:33:59 -0400 Received: from email.msg.corp.akamai.com ([172.27.50.206]) by prod-mail-ppoint1.akamai.com (PPS) with ESMTPS id 45au4e2shb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 14 Mar 2025 14:33:58 -0400 Received: from ustx2ex-exedge3.msg.corp.akamai.com (172.27.50.214) by ustx2ex-dag4mb7.msg.corp.akamai.com (172.27.50.206) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 14 Mar 2025 11:33:57 -0700 Received: from ustx2ex-exedge3.msg.corp.akamai.com (172.27.50.214) by ustx2ex-exedge3.msg.corp.akamai.com (172.27.50.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 14 Mar 2025 13:33:57 -0500 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.247.45.132) by ustx2ex-exedge3.msg.corp.akamai.com (172.27.50.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 14 Mar 2025 13:33:57 -0500 Received: from BN8PR17MB2755.namprd17.prod.outlook.com (2603:10b6:408:53::19) by DS0PR17MB6984.namprd17.prod.outlook.com (2603:10b6:8:165::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 18:33:55 +0000 Received: from BN8PR17MB2755.namprd17.prod.outlook.com ([fe80::7ac4:a8e9:d7c9:6016]) by BN8PR17MB2755.namprd17.prod.outlook.com ([fe80::7ac4:a8e9:d7c9:6016%4]) with mapi id 15.20.8534.027; Fri, 14 Mar 2025 18:33:55 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=cc :content-id:content-transfer-encoding:content-type:date:from :message-id:mime-version:subject:to; s=jan2016.eng; bh=ivkNAhxJZ JIRra6MMclNVIVnQ0Z84qDMdeMWVajBgGs=; b=JfqzM5VhdpJQnf4W98El4oAhW 6yejVbiePDoHHfQljvTDE6YNsT3sZbdR55dgx/cMY2MuxYrFQP0tMQk5cdDLHX1d xAYiqHHElqYPYIzJ3TSj4wfiww8jCuWZ7qbE5lU6WDYc5gVY9anEuz/iUPeQJjat yo3f8ZI5dZFZSHWsOW8oqlEqECXcoBH1wLrOy/edQs1cMlndZR1S/FrJ+nNb2pGo GK6aoAfioZxHj3uqjBU4n2pFGNosRNeD68YejKYDkRCP5agHlhPYys15Lq0fTuhg 2+cQFZiqiI1vv4G3ZGuDbgDLKOdTo34rRKvZWMOfl1+Hj5x1mRd4qllNzQQ8w== From: "Chaney, Ben" To: Steven Sistare , "qemu-devel@nongnu.org" CC: "peterx@redhat.com" , Fabiano Rosas , "armbru@redhat.com" , "Glasgall, Anna" , "Hunt, Joshua" , "Tottenham, Max" Subject: [BUG][RFC] CPR transfer Issues: Socket permissions and PID files Thread-Topic: [BUG][RFC] CPR transfer Issues: Socket permissions and PID files Thread-Index: AQHblQ+koYDHHa36dECBReju+gYnxg== Date: Fri, 14 Mar 2025 18:33:55 +0000 Message-ID: <3D32B62F-29E2-4470-86A5-9A2B3B29E371@akamai.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: BN8PR17MB2755:EE_|DS0PR17MB6984:EE_ x-ms-office365-filtering-correlation-id: cf03f535-ffbd-46c6-3ea8-08dd6326c6cc x-ld-processed: 514876bd-5965-4b40-b0c8-e336cf72c743,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; ARA:13230040|366016|1800799024|376014|38070700018; x-microsoft-antispam-message-info: =?utf-8?B?c0Q1alkxMzFxMlM5V1JIT1AzOUJ3V0VSaTFSMlYyZnVIWDk1bHRBTXc5T1J6?= =?utf-8?B?NWZIR25ONkpCV2F1aDFEVy9kMDZ0RldIM0UzSWpkSGZHVnVvWWRqbWNocDZL?= =?utf-8?B?ZmRHNGVTdU05SUFNUE9hNHh2TkRNTm1TZmZMeEd3L1ZqMXZaSlFZQXBYMXRQ?= =?utf-8?B?cDI0QStQUWtkRE5RU2pHUUI3ODNrcmdheThaUGdGMXFGMUZMaitxTjNtTWgr?= =?utf-8?B?MlhNZmU1RTBLaVFCZHNtcWR5QTZJaHF0LzQ2czRMWlRQL2RJd1RsOE1WbkEx?= =?utf-8?B?c1UyTVZrZ2FIQTNOSmtzb2QrYWpSSkNTTWwzRmtZSEJkK1JzTXMxNEF1cFRN?= =?utf-8?B?a1hpU2dWUnhYTzZNZnVlNUw3Ym5TOXJLYm5tWU5Ca2REOVRoTW5YWlVKUy96?= =?utf-8?B?ZTczd0dRMlMwd253VHlUdnJZTnNFL1Fna0lDYVcvcHUydVBaZkk4QzJTSGR2?= =?utf-8?B?cUh0V240ZjBMNGRmM2JyS05rc1FNSUdWT1hYbTR1ekM2b05rNjVaZzZyQ0N6?= =?utf-8?B?TXdxaktuZzFSWkpudmtHZDYwWGlQWEVLTEFSOUgwNXZyRWxXWlFtdEpKUTZr?= =?utf-8?B?Y04yOExiMTFvK011UWpyWFpXTG5JZFdBRzczR0RQZlpzK05iNytIOXU3Q0pO?= =?utf-8?B?aytGR1Irc0JVL1l3ZVpkZlpKbzBTUGd2THB0VERGaks4RWNiL2pnWHh6VXN5?= =?utf-8?B?MnJsYmsydFRCZkZrYUlGMTg0MURldWl5cGtDRUpoVExJVkhmaThnVUdOMGpE?= =?utf-8?B?NXVTWUJjNHVpQzRNL0J4VytENXlWTmo2a1pkTTZqdncxdVZoN2F6SjB4c29p?= =?utf-8?B?cDZtVEluR2l2RDE4SUxSeVpLMmc4VE1ld2s1YThpMmZXeVg3VXZRTUdKYURa?= =?utf-8?B?R05wd01RZEIzaHZNVFpPeDE4ajF1NUdJUVBSMnY4N0NqR3JiVlMyZ2JpSlhy?= =?utf-8?B?aXQ2OEQxYmlCdTdMNHVvVFhHT0JSbDRZUlNIdGhkbHh4ZHF4MzhMR0JTMjZ2?= =?utf-8?B?WjViR0RlV0thRkFvUlNPeWxIdnJ6djFLTXo4NmxLeS9MZzYyN0NsSVVLdXBr?= =?utf-8?B?a0dZYnMyVnBncURGdTdRd016VUV0MjNxY0Q2WW9DNENwa2NPRUVsUGJ3OWxY?= =?utf-8?B?SWh1ZEtXOVk3TDBPcS9XZWNXVGJ6MUVCYTR0OVJ6V0FuYzJHWUsvOWt6WC9k?= =?utf-8?B?QXFNOFJNQUpSc2pVRzQvdTN3a3JKbm96MGQybytvWW1Tb1A5Q3RFQkhJT2o0?= =?utf-8?B?eU5rb1VLT0c1OUROWVAyNUNtNURCVE1Kc2R2Rzc0V3RZL2FmV203Mi85dVRM?= =?utf-8?B?dk1wRDF0TDhvLzV2bmo4NEdzWHZERlFWYlU0YU1EMUJDM1VUQlBQbzJmb1ND?= =?utf-8?B?KzVKQVRiYi9MOVFaU2ozZVAwUTVrVFZtZWZYUGUwb3BuVVRaV1BaZkFhL3RH?= =?utf-8?B?RDBMaEVjaTRJNGhJZzNKZUwxeFBjajdKNmUxeVJXalU4T3hZWjV0OUoxVks5?= =?utf-8?B?VFQwQ2hCY3hVMi9NWWRZRUlHR1ZYTmM3N2krRnd6R2YrMXk1WFZZL3dKcHdm?= =?utf-8?B?TWVxdlk1dnFteHlXTjZEdjdCeXZPVVFmVnUwbFFEUnNkVmIxV2tZKy91R2pY?= =?utf-8?B?UnNaOEJxWmVRUWk5TEJzc0NWVFlNQjZHclBueU5QeWZVLzR5Qy9KZGMzYk5H?= =?utf-8?B?UDYxYWZLSC9pZnd2eVEzT3Z3RUFrNG95Mlh2UEwxZU9FdDBXS2FuYWt0VWtr?= =?utf-8?B?QkNxZko4TFV1TUpBeTNLMDYvSnpsWDdybFpoQnZmZXhkbHJxTFNvaDV4RW1w?= =?utf-8?B?K1R0VTFXRG9yMmovUXphN2FTcm83eDFNWERFUFk5eUZjZXZDTS9HbDJNSE1l?= =?utf-8?B?dWdERzZUcDNlMVRVS0xyWFRJcHRGMXB6YTdKamYzcUtzN3FOWkhjNFNxYUFS?= =?utf-8?Q?LzdE6O2oGA7leJHZ9dWMYS7JDJ2ue6DN?= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR17MB2755.namprd17.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(366016)(1800799024)(376014)(38070700018); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MGw3VmR4WkMyZEhFV1ZBN2pOWWU3K0ZHWThzRVFBOU1jcnN4Unl0Y0pGNEds?= =?utf-8?B?M3I4VEJsdmdWa3pIdEZlR1ZhckJ0bjRGU1RlRVFVMjB2aWQ2R0txMkw4Q3RT?= =?utf-8?B?cEN6TldQK281ZC9KVkkydHRNS1NQVGdiMFgxQzNlak83Mkp4VTRvaUhxallP?= =?utf-8?B?S1RJdFlYV284alRCNk5rQjJ2WThLRklRRldBN3hhNTM0TU9hckJmY2gvNEt0?= =?utf-8?B?NjYwTWlibytFV3Z5UDZraDdjTnB2cnVIaDc1ODVZQld5dENZMHhZY1BwRjh1?= =?utf-8?B?WkN4dnYwOW9NMDVUcjlaVkQvalFPNTZHaDBRMFlqR1dpdnJ2VkRKZmVjOXVr?= =?utf-8?B?cUl6dVRlajZvNzgyY3YwSzM5NmJYZ21TZzRsd1Q0OGpFWG1HblRPTVFaOGRH?= =?utf-8?B?NkMvcm5yM2M0RnNLeGtLeW1IK2UxaHgxdUhjeUhTVlRYd2lqZDZQYlBKb2xl?= =?utf-8?B?OE9NM1YvZ1h2eEJQTVJiSHE2Y0dYYk5aTHJ3dUZ5OXVuMXpRR1pUS3oxRXUy?= =?utf-8?B?K1Q1aHl1cmllMENvK1UyemlFckwrUWxURUUwQUtWNnpEOEtKcXVhZ2VBVDBn?= =?utf-8?B?ZEZZZDRJTUlwREhxRFRDV2ovQnQzNDFROGZlN3dSVzhIdU5Qd2djWUJaRkcz?= =?utf-8?B?eE9ZenMwTWFNcWk1QVZDU3lMMU9tbDNpOVVpdHBWNzFtaGJhZUhOUUJBVGY4?= =?utf-8?B?S25zNzlVRVJEODMvczNTcGM2RVo1T2hqS0xiM2R4UmpSTDJ6ZFhSbSs2Wnd4?= =?utf-8?B?bXVSQ2JSVGlxWENESGNOZ2hwOVBQdkZjUGhib2dYRkczeXUrcVJsaXZvMGUr?= =?utf-8?B?Sm9jcGk5T3BKYW10UnNUbWFvbWdnVGo0aU4zYnZWRUxuYS8reEM1ZjlwQ2N1?= =?utf-8?B?dzRkZlUvRmJkTUlIa0svbFo1cllzdTNNL0c4WXhTdVUxTDVlc2tpam9DN0NX?= =?utf-8?B?MnBjWG9MWnlMZFpGSEFYWDVrQ2xPS3ZDVXhiMkFwendvVGs3bVRqd3lkc3NX?= =?utf-8?B?cFFITmRKeWpsak5RcEc5OTFVaWhtTnBHcjJLWDJrMWlkb1JSR3IvbWlSeHcz?= =?utf-8?B?U1lGQ0NVNGpPZ25NOG9RQVBOV09QaGpjUm5rYzdDM2RBSEVOZFJNSURLRWtP?= =?utf-8?B?UkxjZzVPSzZHQ1Q5bzVIeXFRcHpuUkpiL0FrVGN4RXdSL1RaZ0JuckMzSGpC?= =?utf-8?B?WHZwTWRnUjZTdFVhcytHbkw4L2hqVDFocmJLTnFsSVAvWWtPbWlra29mZ3Nz?= =?utf-8?B?TmwrUjJjK09QNytRMEhJTWNBUnhGT3c4ZG5tZ2hxUkg1T0xqMzF0czBTNUFx?= =?utf-8?B?S3l5clBRMnVMekFXdnVZVEVkZTdGaURGcHd2Wlp6bG5WeHFhNGNvWnhRbHda?= =?utf-8?B?MEpMSkh4MjhDbmlaUlpVSytva3Z2UW5CWEUyRFQ5Nm1iR05ZQ1ppOStvTURB?= =?utf-8?B?UDl0djFlQUxHUVlnRzJBR051LzRDQVRONDNkVCtSSEdjd0J6NTdJeEZ3TGQ4?= =?utf-8?B?L3BEeTFrK1ArMUJOOWNHdFpYZTJldSsyMGFCbDRVd0VOejlwUEErcytCN0lt?= =?utf-8?B?bmEvMzhNQ2lubWRiTXhmbDJLMENiaDlOUFBhR0taNVF5b2dWZWV3NERrWlFo?= =?utf-8?B?aUxGRGJUWFJMTTYyQktWMTZGRVdGZTVSamhIM2xuUlQ3OUVkSlByQ0dZRTVn?= =?utf-8?B?WWVtRjliZkMvcE81RFNtSGxJK2padFY2WmJzUlhQSWZzQityZ2xGeWl1eHUv?= =?utf-8?B?NXduYWlzSlZHOTVMUmJYd2pGK3V4UUFPZzRQMHYxS2hnZUwwYU94ZWhaRjFV?= =?utf-8?B?bVc5bEplWXEzS2tPckpCdm1jbWlUR0E1Vkw3aG93NjM2ZUVTMThzd1hiN2RS?= =?utf-8?B?TVNOTElmeTlKT2tBT0hoS1IzV0NWUHd0Z0EwWmNwRGNmWEkwb3B4NzVWT1ly?= =?utf-8?B?LzVvcnBiZUdSb0ZXRTNLUmQ0eUpmdjJIME95ZFFHeTNqQWpEa3REZS9haStU?= =?utf-8?B?cjBXVUpRNEY0SHZQc055S1FtbzB6QVJLdlZJNjRXTmxORVNacGRCaWZWTTZW?= =?utf-8?B?WFpkNXdBS3hLUXAwRVg2U095a25SMmgxcmEzUlNtQmIvWnhQb1pNNWx4bklZ?= =?utf-8?Q?oOLWfACDDyOTlYFRdd1SAJ5lU?= arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EXmcIwELplWjsGlXZiFu228U9H/De50EsEUswBM4CttcjYyFHN36HGKQac09HEZoeaW2SrNhcmyW11y81XOpJITu2shSYxQLubCQkViwMI+02PkXxOudr1AlCWWsovjtBA7qHKFhLyH962AZd68IsnglfxD9Phcdh8adfuD8JbCRnoS9RPzJnDxhPGKquYkibcyq4xQ7TvvxwcAM7eekrkiks08Bq6NdUazRnmGN2zgkfL7svhfrMpdg5iD7dMXqVYBkOsSbjQfvXgI1P5aXb0gtcrd8cY3GkZYQvw/CjPZ+tQxZSwnMKQdPSO0SzI5dv3REo1pYij3eW4n6QaaKjw== arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2y5ycm7asFW37Vyp8NAyAZQPxeHBh2cqIntDNrI2NnY=; b=g5rZ9jSPw+njg5amWplmEi9KOX8VcIlXwomAKoLAiXtar7Bd4/VNbyBhPIQDSpGhmQG3bFBrtkUpkcSXNchONcwWOK2K8G4jwJc/azvtpJ+z25SjUqR8ZuCJby1xlljgMThiZbN1sXW6ntaagIcuUQ8zvmzackHjm4euOG4LsYO6vNjMya3XLP3MYeQVITVhrvG8KiFIGLdyA6c3oT/AsoD+UVn2xQ65iUuAMRwqJ3wY4AZWDzO45LZE9Kzw3e2LxZ8EqvZvkM/d/fNdduv2rVnZS7sVF0zeF6XfZHxPs3gPM3i0hS/4vsusMKbhDtS8v21ftmlEXUwozdDGghKSwQ== arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=akamai.com; dmarc=pass action=none header.from=akamai.com; dkim=pass header.d=akamai.com; arc=none dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai365.onmicrosoft.com; s=selector1-akamai365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2y5ycm7asFW37Vyp8NAyAZQPxeHBh2cqIntDNrI2NnY=; b=jeYz0Ig2I7fBvcbWuC8Gu9rlKKRikSmP38Kn4l/981s5wbG4WprjgUcG1Dbi8ZGuIEwrDvIdmfTWcoZqLfVlimj++HixLUzV4zLFamVKhvs5WUreAdLOT4yVCvK4p13eGp2kPBXElDbqt/GRwq3OHfdO5iyeGQuPik0flVL7sio= x-ms-exchange-crosstenant-authas: Internal x-ms-exchange-crosstenant-authsource: BN8PR17MB2755.namprd17.prod.outlook.com x-ms-exchange-crosstenant-network-message-id: cf03f535-ffbd-46c6-3ea8-08dd6326c6cc x-ms-exchange-crosstenant-originalarrivaltime: 14 Mar 2025 18:33:55.1559 (UTC) x-ms-exchange-crosstenant-fromentityheader: Hosted x-ms-exchange-crosstenant-id: 514876bd-5965-4b40-b0c8-e336cf72c743 x-ms-exchange-crosstenant-mailboxtype: HOSTED x-ms-exchange-crosstenant-userprincipalname: ZO5AlS+avLUkpZ/8qZYdWko2sZQcyYE7OqNyShNsuTofg460gVC2mDUFi22yHtlHHAv911kmN023LSQyPeZE5Q== x-ms-exchange-transport-crosstenantheadersstamped: DS0PR17MB6984 Content-Type: text/plain; charset="utf-8" Content-ID: <96121A493C23FA4A9B0B41DB1FA774A2@namprd17.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: akamai.com X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-14_07,2025-03-14_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 bulkscore=0 spamscore=0 malwarescore=0 phishscore=0 adultscore=0 mlxscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502280000 definitions=main-2503140143 X-Proofpoint-ORIG-GUID: xn438jabMrfuCUclaKZYRYkaVnBtoZ0A X-Authority-Analysis: v=2.4 cv=Pav/hjhd c=1 sm=1 tr=0 ts=67d47698 cx=c_pps a=StLZT/nZ0R8Xs+spdojYmg==:117 a=StLZT/nZ0R8Xs+spdojYmg==:17 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=IkcTkHD0fZMA:10 a=Vs1iUdzkB0EA:10 a=g1y_e2JewP0A:10 a=5u7KhYVwOYSIvCfEw0kA:9 a=QEXdDO2ut3YA:10 X-Proofpoint-GUID: xn438jabMrfuCUclaKZYRYkaVnBtoZ0A X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-14_07,2025-03-14_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 malwarescore=0 clxscore=1015 mlxscore=0 spamscore=0 priorityscore=1501 impostorscore=0 mlxlogscore=999 suspectscore=0 bulkscore=0 adultscore=0 lowpriorityscore=0 classifier=spam authscore=0 authtc=n/a authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2502280000 definitions=main-2503140145 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=67.231.157.127; envelope-from=bchaney@akamai.com; helo=mx0b-00190b01.pphosted.com X-Spam_score_int: 5 X-Spam_score: 0.5 X-Spam_bar: / X-Spam_report: (0.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_SBL_CSS=3.335, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @akamai.com) X-ZM-MESSAGEID: 1741977281713019000 Hello, While testing CPR transfer I encountered two issues. The first is that the = transfer fails when running with pidfiles due to the destination qemu proce= ss attempting to create the pidfile while it is still locked by the source = process. The second is that the transfer fails when running with the -run-w= ith user=3D$USERID parameter. This is because the destination qemu process = creates the UNIX sockets used for the CPR transfer before dropping to the l= ower permissioned user, which causes them to be owned by the original user.= The source qemu process then does not have permission to connect to it bec= ause it is already running as the lesser permissioned user. Reproducing the first issue: Create a source and destination qemu instance associated with the same VM w= here both processes have the -pidfile parameter passed on the command line.= You should see the following error on the command line of the second proce= ss: qemu-system-x86_64: cannot create PID file: Cannot lock pid file: Resource = temporarily unavailable Reproducing the second issue: Create a source and destination qemu instance associated with the same VM w= here both processes have -run-with user=3D$USERID passed on the command lin= e, where $USERID is a different user from the one launching the processes. = Then attempt a CPR transfer using UNIX sockets for the main and cpr sockets= . You should receive the following error via QMP: {"error": {"class": "GenericError", "desc": "Failed to connect to 'cpr.sock= ': Permission denied"}} I provided a minimal patch that works around the second issue. Thank you, Ben Chaney --- include/system/os-posix.h | 4 ++++ os-posix.c | 8 -------- util/qemu-sockets.c | 21 +++++++++++++++++++++ 3 files changed, 25 insertions(+), 8 deletions(-) diff --git a/include/system/os-posix.h b/include/system/os-posix.h index ce5b3bccf8..2a414a914a 100644 --- a/include/system/os-posix.h +++ b/include/system/os-posix.h @@ -55,6 +55,10 @@ void os_setup_limits(void); void os_setup_post(void); int os_mlock(bool on_fault); +extern struct passwd *user_pwd; +extern uid_t user_uid; +extern gid_t user_gid; + /** * qemu_alloc_stack: * @sz: pointer to a size_t holding the requested usable stack size diff --git a/os-posix.c b/os-posix.c index 52925c23d3..9369b312a0 100644 --- a/os-posix.c +++ b/os-posix.c @@ -86,14 +86,6 @@ void os_set_proc_name(const char *s) } -/* - * Must set all three of these at once. - * Legal combinations are unset by name by uid - */ -static struct passwd *user_pwd; /* NULL non-NULL NULL */ -static uid_t user_uid =3D (uid_t)-1; /* -1 -1 >=3D0 */ -static gid_t user_gid =3D (gid_t)-1; /* -1 -1 >=3D0 */ - /* * Prepare to change user ID. user_id can be one of 3 forms: * - a username, in which case user ID will be changed to its uid, diff --git a/util/qemu-sockets.c b/util/qemu-sockets.c index 77477c1cd5..987977ead9 100644 --- a/util/qemu-sockets.c +++ b/util/qemu-sockets.c @@ -871,6 +871,14 @@ static bool saddr_is_tight(UnixSocketAddress *saddr) #endif } +/* + * Must set all three of these at once. + * Legal combinations are unset by name by uid + */ +struct passwd *user_pwd; /* NULL non-NULL NULL */ +uid_t user_uid =3D (uid_t)-1; /* -1 -1 >=3D0 */ +gid_t user_gid =3D (gid_t)-1; /* -1 -1 >=3D0 */ + static int unix_listen_saddr(UnixSocketAddress *saddr, int num, Error **errp) @@ -947,6 +955,19 @@ static int unix_listen_saddr(UnixSocketAddress *saddr, error_setg_errno(errp, errno, "Failed to bind socket to %s", path); goto err; } + if (user_pwd) { + if (chown(un.sun_path, user_pwd->pw_uid, user_pwd->pw_gid) < 0) { + error_setg_errno(errp, errno, "Failed to change permissions on socket %s"= , path); + goto err; + } + } + else if (user_uid !=3D -1 && user_gid !=3D -1) { + if (chown(un.sun_path, user_uid, user_gid) < 0) { + error_setg_errno(errp, errno, "Failed to change permissions on socket %s"= , path); + goto err; + } + } + if (listen(sock, num) < 0) { error_setg_errno(errp, errno, "Failed to listen on socket"); goto err; -- 2.40.1