You need to sign in or sign up before continuing.
security_manager.c 36.2 KB
Newer Older
1 2 3
/*
 * security_manager.c: Internal security manager API
 *
4
 * Copyright (C) 2010-2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */
#include <config.h>

24 25 26 27
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>

28 29 30
#include "security_driver.h"
#include "security_stack.h"
#include "security_dac.h"
31
#include "virerror.h"
32
#include "viralloc.h"
33
#include "virobject.h"
34
#include "virlog.h"
35
#include "locking/lock_manager.h"
36
#include "virfile.h"
37 38 39

#define VIR_FROM_THIS VIR_FROM_SECURITY

40
VIR_LOG_INIT("security.security_manager");
41 42

struct _virSecurityManager {
43 44
    virObjectLockable parent;

45
    virSecurityDriverPtr drv;
46
    unsigned int flags;
47
    const char *virtDriver;
48
    void *privateData;
49 50

    virLockManagerPluginPtr lockPlugin;
51 52
};

53 54
static virClassPtr virSecurityManagerClass;

55 56 57 58 59 60

static
void virSecurityManagerDispose(void *obj)
{
    virSecurityManagerPtr mgr = obj;

61 62
    if (mgr->drv &&
        mgr->drv->close)
63
        mgr->drv->close(mgr);
64 65 66

    virObjectUnref(mgr->lockPlugin);

67 68 69
    VIR_FREE(mgr->privateData);
}

70

71 72
static int
virSecurityManagerOnceInit(void)
73
{
74
    if (!VIR_CLASS_NEW(virSecurityManager, virClassForObjectLockable()))
75 76 77 78 79 80 81
        return -1;

    return 0;
}

VIR_ONCE_GLOBAL_INIT(virSecurityManager);

82 83 84 85

static virSecurityManagerPtr
virSecurityManagerNewDriver(virSecurityDriverPtr drv,
                            const char *virtDriver,
86
                            const char *lockManagerPluginName,
87
                            unsigned int flags)
88
{
89 90
    virSecurityManagerPtr mgr = NULL;
    char *privateData = NULL;
91 92 93

    if (virSecurityManagerInitialize() < 0)
        return NULL;
94

95
    VIR_DEBUG("drv=%p (%s) virtDriver=%s flags=0x%x",
96 97 98
              drv, drv->name, virtDriver, flags);

    virCheckFlags(VIR_SECURITY_MANAGER_NEW_MASK, NULL);
99

100
    if (VIR_ALLOC_N(privateData, drv->privateDataLen) < 0)
101 102
        return NULL;

103 104
    if (!(mgr = virObjectLockableNew(virSecurityManagerClass)))
        goto error;
105

106 107 108 109 110 111 112 113
    if (!lockManagerPluginName)
        lockManagerPluginName = "nop";

    if (!(mgr->lockPlugin = virLockManagerPluginNew(lockManagerPluginName,
                                                    NULL, NULL, 0))) {
        goto error;
    }

114
    mgr->drv = drv;
115
    mgr->flags = flags;
116
    mgr->virtDriver = virtDriver;
117
    VIR_STEAL_PTR(mgr->privateData, privateData);
118

119 120
    if (drv->open(mgr) < 0)
        goto error;
121 122

    return mgr;
123 124 125 126
 error:
    VIR_FREE(privateData);
    virObjectUnref(mgr);
    return NULL;
127 128
}

129 130 131

virSecurityManagerPtr
virSecurityManagerNewStack(virSecurityManagerPtr primary)
132 133 134
{
    virSecurityManagerPtr mgr =
        virSecurityManagerNewDriver(&virSecurityDriverStack,
135
                                    virSecurityManagerGetDriver(primary),
136
                                    NULL,
137
                                    primary->flags);
138 139 140 141

    if (!mgr)
        return NULL;

142 143
    if (virSecurityStackAddNested(mgr, primary) < 0)
        goto error;
144

145 146
    mgr->lockPlugin = virObjectRef(mgr->lockPlugin);

147
    return mgr;
148 149 150
 error:
    virObjectUnref(mgr);
    return NULL;
151 152
}

153 154 155 156

int
virSecurityManagerStackAddNested(virSecurityManagerPtr stack,
                                 virSecurityManagerPtr nested)
157
{
158
    if (STRNEQ("stack", stack->drv->name))
159 160 161 162
        return -1;
    return virSecurityStackAddNested(stack, nested);
}

163 164 165 166 167

virSecurityManagerPtr
virSecurityManagerNewDAC(const char *virtDriver,
                         uid_t user,
                         gid_t group,
168
                         unsigned int flags,
169
                         const char *lockManagerPluginName,
170
                         virSecurityManagerDACChownCallback chownCallback)
171
{
172 173 174
    virSecurityManagerPtr mgr;

    virCheckFlags(VIR_SECURITY_MANAGER_NEW_MASK |
175 176
                  VIR_SECURITY_MANAGER_DYNAMIC_OWNERSHIP |
                  VIR_SECURITY_MANAGER_MOUNT_NAMESPACE, NULL);
177 178 179

    mgr = virSecurityManagerNewDriver(&virSecurityDriverDAC,
                                      virtDriver,
180
                                      lockManagerPluginName,
181
                                      flags & VIR_SECURITY_MANAGER_NEW_MASK);
182 183 184 185

    if (!mgr)
        return NULL;

186 187 188 189
    if (virSecurityDACSetUserAndGroup(mgr, user, group) < 0) {
        virSecurityManagerDispose(mgr);
        return NULL;
    }
190

191
    virSecurityDACSetDynamicOwnership(mgr, flags & VIR_SECURITY_MANAGER_DYNAMIC_OWNERSHIP);
192
    virSecurityDACSetMountNamespace(mgr, flags & VIR_SECURITY_MANAGER_MOUNT_NAMESPACE);
193
    virSecurityDACSetChownCallback(mgr, chownCallback);
194 195 196 197

    return mgr;
}

198 199 200 201

virSecurityManagerPtr
virSecurityManagerNew(const char *name,
                      const char *virtDriver,
202
                      const char *lockManagerPluginName,
203
                      unsigned int flags)
204
{
205
    virSecurityDriverPtr drv = virSecurityDriverLookup(name, virtDriver);
206 207 208
    if (!drv)
        return NULL;

209 210
    /* driver "none" needs some special handling of *Confined bools */
    if (STREQ(drv->name, "none")) {
211
        if (flags & VIR_SECURITY_MANAGER_REQUIRE_CONFINED) {
212 213
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Security driver \"none\" cannot create confined guests"));
214 215 216
            return NULL;
        }

217
        if (flags & VIR_SECURITY_MANAGER_DEFAULT_CONFINED) {
218 219 220 221 222 223 224
            if (name != NULL) {
                VIR_WARN("Configured security driver \"none\" disables default"
                         " policy to create confined guests");
            } else {
                VIR_DEBUG("Auto-probed security driver is \"none\";"
                          " confined guests will not be created");
            }
225
            flags &= ~VIR_SECURITY_MANAGER_DEFAULT_CONFINED;
226 227 228
        }
    }

229
    return virSecurityManagerNewDriver(drv,
230
                                       virtDriver,
231
                                       lockManagerPluginName,
232
                                       flags);
233 234
}

235 236 237

/*
 * Must be called before fork()'ing to ensure mutex state
238 239 240 241
 * is sane for the child to use. A negative return means the
 * child must not be forked; a successful return must be
 * followed by a call to virSecurityManagerPostFork() in both
 * parent and child.
242
 */
243 244
int
virSecurityManagerPreFork(virSecurityManagerPtr mgr)
245
{
246 247
    int ret = 0;

248
    virObjectLock(mgr);
249 250 251 252 253 254 255
    if (mgr->drv->preFork) {
        ret = mgr->drv->preFork(mgr);
        if (ret < 0)
            virObjectUnlock(mgr);
    }

    return ret;
256 257 258 259 260 261 262
}


/*
 * Must be called after fork()'ing in both parent and child
 * to ensure mutex state is sane for the child to use
 */
263 264
void
virSecurityManagerPostFork(virSecurityManagerPtr mgr)
265 266 267 268
{
    virObjectUnlock(mgr);
}

269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296

/**
 * virSecurityManagerTransactionStart:
 * @mgr: security manager
 *
 * Starts a new transaction. In transaction nothing is changed security
 * label until virSecurityManagerTransactionCommit() is called.
 *
 * Returns 0 on success,
 *        -1 otherwise.
 */
int
virSecurityManagerTransactionStart(virSecurityManagerPtr mgr)
{
    int ret = 0;

    virObjectLock(mgr);
    if (mgr->drv->transactionStart)
        ret = mgr->drv->transactionStart(mgr);
    virObjectUnlock(mgr);
    return ret;
}


/**
 * virSecurityManagerTransactionCommit:
 * @mgr: security manager
 * @pid: domain's PID
297
 * @lock: lock and unlock paths that are relabeled
298
 *
299 300 301 302 303
 * If @pid is not -1 then enter the @pid namespace (usually @pid refers
 * to a domain) and perform all the operations on the transaction list.
 * If @pid is -1 then the transaction is performed in the namespace of
 * the caller.
 *
304 305 306
 * If @lock is true then all the paths that transaction would
 * touch are locked before and unlocked after it is done so.
 *
307 308 309 310
 * Note that the transaction is also freed, therefore new one has to be
 * started after successful return from this function. Also it is
 * considered as error if there's no transaction set and this function
 * is called.
311 312 313 314 315 316
 *
 * Returns: 0 on success,
 *         -1 otherwise.
 */
int
virSecurityManagerTransactionCommit(virSecurityManagerPtr mgr,
317 318
                                    pid_t pid,
                                    bool lock)
319 320 321 322 323
{
    int ret = 0;

    virObjectLock(mgr);
    if (mgr->drv->transactionCommit)
324
        ret = mgr->drv->transactionCommit(mgr, pid, lock);
325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345
    virObjectUnlock(mgr);
    return ret;
}


/**
 * virSecurityManagerTransactionAbort:
 * @mgr: security manager
 *
 * Cancels and frees any out standing transaction.
 */
void
virSecurityManagerTransactionAbort(virSecurityManagerPtr mgr)
{
    virObjectLock(mgr);
    if (mgr->drv->transactionAbort)
        mgr->drv->transactionAbort(mgr);
    virObjectUnlock(mgr);
}


346 347
void *
virSecurityManagerGetPrivateData(virSecurityManagerPtr mgr)
348
{
349
    return mgr->privateData;
350 351 352
}


353 354 355 356 357 358
const char *
virSecurityManagerGetDriver(virSecurityManagerPtr mgr)
{
    return mgr->virtDriver;
}

359

360 361 362
const char *
virSecurityManagerGetDOI(virSecurityManagerPtr mgr)
{
363 364 365 366 367 368 369
    if (mgr->drv->getDOI) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getDOI(mgr);
        virObjectUnlock(mgr);
        return ret;
    }
370

371
    virReportUnsupportedError();
372 373 374
    return NULL;
}

375

376 377 378
const char *
virSecurityManagerGetModel(virSecurityManagerPtr mgr)
{
379 380 381 382 383 384 385
    if (mgr->drv->getModel) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getModel(mgr);
        virObjectUnlock(mgr);
        return ret;
    }
386

387
    virReportUnsupportedError();
388 389 390
    return NULL;
}

391

392 393
/* return NULL if a base label is not present */
const char *
394 395
virSecurityManagerGetBaseLabel(virSecurityManagerPtr mgr,
                               int virtType)
396 397 398 399 400 401 402 403 404 405 406 407
{
    if (mgr->drv->getBaseLabel) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getBaseLabel(mgr, virtType);
        virObjectUnlock(mgr);
        return ret;
    }

    return NULL;
}

408 409 410

bool
virSecurityManagerGetDefaultConfined(virSecurityManagerPtr mgr)
411
{
412
    return mgr->flags & VIR_SECURITY_MANAGER_DEFAULT_CONFINED;
413 414
}

415 416 417

bool
virSecurityManagerGetRequireConfined(virSecurityManagerPtr mgr)
418
{
419
    return mgr->flags & VIR_SECURITY_MANAGER_REQUIRE_CONFINED;
420 421
}

422

423 424 425
bool
virSecurityManagerGetPrivileged(virSecurityManagerPtr mgr)
{
426
    return mgr->flags & VIR_SECURITY_MANAGER_PRIVILEGED;
427 428 429
}


430 431 432 433 434 435 436 437 438 439 440
/**
 * virSecurityManagerRestoreDiskLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @disk: disk definition to operate on
 *
 * Removes security label from the source image of the disk. Note that this
 * function doesn't restore labels on backing chain elements of @disk.
 *
 * Returns: 0 on success, -1 on error.
 */
441 442 443 444
int
virSecurityManagerRestoreDiskLabel(virSecurityManagerPtr mgr,
                                   virDomainDefPtr vm,
                                   virDomainDiskDefPtr disk)
445
{
446
    if (mgr->drv->domainRestoreSecurityDiskLabel) {
447 448
        int ret;
        virObjectLock(mgr);
449
        ret = mgr->drv->domainRestoreSecurityDiskLabel(mgr, vm, disk);
450 451 452
        virObjectUnlock(mgr);
        return ret;
    }
453

454
    virReportUnsupportedError();
455 456 457
    return -1;
}

458

459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
/**
 * virSecurityManagerRestoreImageLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @src: disk source definition to operate on
 *
 * Removes security label from a single storage image.
 *
 * Returns: 0 on success, -1 on error.
 */
int
virSecurityManagerRestoreImageLabel(virSecurityManagerPtr mgr,
                                   virDomainDefPtr vm,
                                   virStorageSourcePtr src)
{
    if (mgr->drv->domainRestoreSecurityImageLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityImageLabel(mgr, vm, src);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}


487 488 489
int
virSecurityManagerSetDaemonSocketLabel(virSecurityManagerPtr mgr,
                                       virDomainDefPtr vm)
490
{
491 492 493 494 495 496 497
    if (mgr->drv->domainSetSecurityDaemonSocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityDaemonSocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
498

499
    virReportUnsupportedError();
500 501 502
    return -1;
}

503 504 505 506

int
virSecurityManagerSetSocketLabel(virSecurityManagerPtr mgr,
                                 virDomainDefPtr vm)
507
{
508 509 510 511 512 513 514
    if (mgr->drv->domainSetSecuritySocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecuritySocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
515

516
    virReportUnsupportedError();
517 518 519
    return -1;
}

520 521 522 523

int
virSecurityManagerClearSocketLabel(virSecurityManagerPtr mgr,
                                   virDomainDefPtr vm)
524
{
525 526 527 528 529 530 531
    if (mgr->drv->domainClearSecuritySocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainClearSecuritySocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
532

533
    virReportUnsupportedError();
534 535 536
    return -1;
}

537

538 539 540 541 542 543 544 545 546 547 548
/**
 * virSecurityManagerSetDiskLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @disk: disk definition to operate on
 *
 * Labels the disk image and all images in the backing chain with the configured
 * security label.
 *
 * Returns: 0 on success, -1 on error.
 */
549 550 551 552
int
virSecurityManagerSetDiskLabel(virSecurityManagerPtr mgr,
                               virDomainDefPtr vm,
                               virDomainDiskDefPtr disk)
553
{
554
    if (mgr->drv->domainSetSecurityDiskLabel) {
555 556
        int ret;
        virObjectLock(mgr);
557
        ret = mgr->drv->domainSetSecurityDiskLabel(mgr, vm, disk);
558 559 560
        virObjectUnlock(mgr);
        return ret;
    }
561

562
    virReportUnsupportedError();
563 564 565
    return -1;
}

566

567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594
/**
 * virSecurityManagerSetImageLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @src: disk source definition to operate on
 *
 * Labels a single storage image with the configured security label.
 *
 * Returns: 0 on success, -1 on error.
 */
int
virSecurityManagerSetImageLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr vm,
                                virStorageSourcePtr src)
{
    if (mgr->drv->domainSetSecurityImageLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityImageLabel(mgr, vm, src);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}


595 596 597 598 599
int
virSecurityManagerRestoreHostdevLabel(virSecurityManagerPtr mgr,
                                      virDomainDefPtr vm,
                                      virDomainHostdevDefPtr dev,
                                      const char *vroot)
600
{
601 602 603 604 605 606 607
    if (mgr->drv->domainRestoreSecurityHostdevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityHostdevLabel(mgr, vm, dev, vroot);
        virObjectUnlock(mgr);
        return ret;
    }
608

609
    virReportUnsupportedError();
610 611 612
    return -1;
}

613 614 615 616 617 618

int
virSecurityManagerSetHostdevLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm,
                                  virDomainHostdevDefPtr dev,
                                  const char *vroot)
619
{
620 621 622 623 624 625 626
    if (mgr->drv->domainSetSecurityHostdevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityHostdevLabel(mgr, vm, dev, vroot);
        virObjectUnlock(mgr);
        return ret;
    }
627

628
    virReportUnsupportedError();
629 630 631
    return -1;
}

632 633 634 635 636

int
virSecurityManagerSetSavedStateLabel(virSecurityManagerPtr mgr,
                                     virDomainDefPtr vm,
                                     const char *savefile)
637
{
638 639 640 641 642 643 644
    if (mgr->drv->domainSetSavedStateLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSavedStateLabel(mgr, vm, savefile);
        virObjectUnlock(mgr);
        return ret;
    }
645

646
    virReportUnsupportedError();
647 648 649
    return -1;
}

650 651 652 653
int
virSecurityManagerRestoreSavedStateLabel(virSecurityManagerPtr mgr,
                                         virDomainDefPtr vm,
                                         const char *savefile)
654
{
655 656 657 658 659 660 661
    if (mgr->drv->domainRestoreSavedStateLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSavedStateLabel(mgr, vm, savefile);
        virObjectUnlock(mgr);
        return ret;
    }
662

663
    virReportUnsupportedError();
664 665 666
    return -1;
}

667 668 669 670

int
virSecurityManagerGenLabel(virSecurityManagerPtr mgr,
                           virDomainDefPtr vm)
671
{
672
    int ret = -1;
673
    size_t i;
674 675
    virSecurityManagerPtr* sec_managers = NULL;
    virSecurityLabelDefPtr seclabel;
676
    bool generated = false;
677

678
    if ((sec_managers = virSecurityManagerGetNested(mgr)) == NULL)
679
        return ret;
680

681
    virObjectLock(mgr);
682

683
    for (i = 0; sec_managers[i]; i++) {
684 685
        generated = false;
        seclabel = virDomainDefGetSecurityLabelDef(vm, sec_managers[i]->drv->name);
686 687 688 689 690
        if (seclabel == NULL) {
            /* Only generate seclabel if confinement is enabled */
            if (!virSecurityManagerGetDefaultConfined(sec_managers[i])) {
                VIR_DEBUG("Skipping auto generated seclabel");
                continue;
691
            } else {
692 693 694 695 696 697 698 699 700 701 702 703 704
                if (!(seclabel = virSecurityLabelDefNew(sec_managers[i]->drv->name)))
                    goto cleanup;
                generated = seclabel->implicit = true;
                seclabel->type = VIR_DOMAIN_SECLABEL_DYNAMIC;
            }
        } else {
            if (seclabel->type == VIR_DOMAIN_SECLABEL_DEFAULT) {
                if (virSecurityManagerGetDefaultConfined(sec_managers[i])) {
                    seclabel->type = VIR_DOMAIN_SECLABEL_DYNAMIC;
                } else {
                    seclabel->type = VIR_DOMAIN_SECLABEL_NONE;
                    seclabel->relabel = false;
                }
705
            }
706

707 708 709 710 711 712
            if (seclabel->type == VIR_DOMAIN_SECLABEL_NONE) {
                if (virSecurityManagerGetRequireConfined(sec_managers[i])) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("Unconfined guests are not allowed on this host"));
                    goto cleanup;
                }
713
            }
714 715 716
        }

        if (!sec_managers[i]->drv->domainGenSecurityLabel) {
717
            virReportUnsupportedError();
718 719
            virSecurityLabelDefFree(seclabel);
            seclabel = NULL;
720
        } else {
721 722
            /* The seclabel must be added to @vm prior calling domainGenSecurityLabel
             * which may require seclabel to be presented already */
723
            if (generated &&
724
                VIR_APPEND_ELEMENT(vm->seclabels, vm->nseclabels, seclabel) < 0)
725 726 727 728 729 730
                goto cleanup;

            if (sec_managers[i]->drv->domainGenSecurityLabel(sec_managers[i], vm) < 0) {
                if (VIR_DELETE_ELEMENT(vm->seclabels,
                                       vm->nseclabels -1, vm->nseclabels) < 0)
                    vm->nseclabels--;
731
                goto cleanup;
732
            }
733 734

            seclabel = NULL;
735 736 737
        }
    }

738 739
    ret = 0;

740
 cleanup:
741
    virObjectUnlock(mgr);
742 743
    if (generated)
        virSecurityLabelDefFree(seclabel);
744
    VIR_FREE(sec_managers);
745
    return ret;
746 747
}

748 749 750 751 752

int
virSecurityManagerReserveLabel(virSecurityManagerPtr mgr,
                               virDomainDefPtr vm,
                               pid_t pid)
753
{
754 755 756 757 758 759 760
    if (mgr->drv->domainReserveSecurityLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainReserveSecurityLabel(mgr, vm, pid);
        virObjectUnlock(mgr);
        return ret;
    }
761

762
    virReportUnsupportedError();
763 764 765
    return -1;
}

766 767 768 769

int
virSecurityManagerReleaseLabel(virSecurityManagerPtr mgr,
                               virDomainDefPtr vm)
770
{
771 772 773 774 775 776 777
    if (mgr->drv->domainReleaseSecurityLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainReleaseSecurityLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
778

779
    virReportUnsupportedError();
780 781 782
    return -1;
}

783

784 785 786
static int virSecurityManagerCheckModel(virSecurityManagerPtr mgr,
                                        char *secmodel)
{
787
    int ret = -1;
788 789 790 791 792 793
    size_t i;
    virSecurityManagerPtr *sec_managers = NULL;

    if (STREQ_NULLABLE(secmodel, "none"))
        return 0;

794 795 796
    if ((sec_managers = virSecurityManagerGetNested(mgr)) == NULL)
        return -1;

797
    for (i = 0; sec_managers[i]; i++) {
798 799 800 801
        if (STREQ_NULLABLE(secmodel, sec_managers[i]->drv->name)) {
            ret = 0;
            goto cleanup;
        }
802 803 804 805 806
    }

    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                   _("Unable to find security driver for model %s"),
                   secmodel);
807 808 809
 cleanup:
    VIR_FREE(sec_managers);
    return ret;
810 811 812
}


813 814 815 816 817 818 819 820 821 822 823 824 825 826 827
static int
virSecurityManagerCheckDomainLabel(virSecurityManagerPtr mgr,
                                   virDomainDefPtr def)
{
    size_t i;

    for (i = 0; i < def->nseclabels; i++) {
        if (virSecurityManagerCheckModel(mgr, def->seclabels[i]->model) < 0)
            return -1;
    }

    return 0;
}


828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848
static int
virSecurityManagerCheckDiskLabel(virSecurityManagerPtr mgr,
                                 virDomainDiskDefPtr disk)
{
    size_t i;

    for (i = 0; i < disk->src->nseclabels; i++) {
        if (virSecurityManagerCheckModel(mgr, disk->src->seclabels[i]->model) < 0)
            return -1;
    }

    return 0;
}


static int
virSecurityManagerCheckChardevLabel(virSecurityManagerPtr mgr,
                                    virDomainChrDefPtr dev)
{
    size_t i;

849 850
    for (i = 0; i < dev->source->nseclabels; i++) {
        if (virSecurityManagerCheckModel(mgr, dev->source->seclabels[i]->model) < 0)
851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872
            return -1;
    }

    return 0;
}


static int
virSecurityManagerCheckChardevCallback(virDomainDefPtr def ATTRIBUTE_UNUSED,
                                       virDomainChrDefPtr dev,
                                       void *opaque)
{
    virSecurityManagerPtr mgr = opaque;
    return virSecurityManagerCheckChardevLabel(mgr, dev);
}


int virSecurityManagerCheckAllLabel(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm)
{
    size_t i;

873 874 875
    if (virSecurityManagerCheckDomainLabel(mgr, vm) < 0)
        return -1;

876 877 878 879 880 881 882 883 884 885 886 887 888 889 890
    for (i = 0; i < vm->ndisks; i++) {
        if (virSecurityManagerCheckDiskLabel(mgr, vm->disks[i]) < 0)
            return -1;
    }

    if (virDomainChrDefForeach(vm,
                               true,
                               virSecurityManagerCheckChardevCallback,
                               mgr) < 0)
        return -1;

    return 0;
}


891 892 893
int
virSecurityManagerSetAllLabel(virSecurityManagerPtr mgr,
                              virDomainDefPtr vm,
894 895
                              const char *stdin_path,
                              bool chardevStdioLogd)
896
{
897 898 899
    if (mgr->drv->domainSetSecurityAllLabel) {
        int ret;
        virObjectLock(mgr);
900 901
        ret = mgr->drv->domainSetSecurityAllLabel(mgr, vm, stdin_path,
                                                  chardevStdioLogd);
902 903 904
        virObjectUnlock(mgr);
        return ret;
    }
905

906
    virReportUnsupportedError();
907 908 909
    return -1;
}

910 911 912 913

int
virSecurityManagerRestoreAllLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm,
914 915
                                  bool migrated,
                                  bool chardevStdioLogd)
916
{
917 918 919
    if (mgr->drv->domainRestoreSecurityAllLabel) {
        int ret;
        virObjectLock(mgr);
920 921
        ret = mgr->drv->domainRestoreSecurityAllLabel(mgr, vm, migrated,
                                                      chardevStdioLogd);
922 923 924
        virObjectUnlock(mgr);
        return ret;
    }
925

926
    virReportUnsupportedError();
927 928 929
    return -1;
}

930 931 932 933 934
int
virSecurityManagerGetProcessLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm,
                                  pid_t pid,
                                  virSecurityLabelPtr sec)
935
{
936 937 938 939 940 941 942
    if (mgr->drv->domainGetSecurityProcessLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainGetSecurityProcessLabel(mgr, vm, pid, sec);
        virObjectUnlock(mgr);
        return ret;
    }
943

944
    virReportUnsupportedError();
945 946 947
    return -1;
}

948 949 950 951

int
virSecurityManagerSetProcessLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm)
952
{
953 954 955 956 957 958 959
    if (mgr->drv->domainSetSecurityProcessLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityProcessLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
960

961
    virReportUnsupportedError();
962 963 964
    return -1;
}

965 966 967 968 969

int
virSecurityManagerSetChildProcessLabel(virSecurityManagerPtr mgr,
                                       virDomainDefPtr vm,
                                       virCommandPtr cmd)
970 971 972 973
{
    if (mgr->drv->domainSetSecurityChildProcessLabel)
       return mgr->drv->domainSetSecurityChildProcessLabel(mgr, vm, cmd);

974
    virReportUnsupportedError();
975 976 977
    return -1;
}

978 979 980 981

int
virSecurityManagerVerify(virSecurityManagerPtr mgr,
                         virDomainDefPtr def)
982
{
983 984 985 986 987
    virSecurityLabelDefPtr secdef;

    if (mgr == NULL || mgr->drv == NULL)
        return 0;

988 989 990 991
    /* NULL model == dynamic labelling, with whatever driver
     * is active, so we can short circuit verify check to
     * avoid drivers de-referencing NULLs by accident
     */
992 993
    secdef = virDomainDefGetSecurityLabelDef(def, mgr->drv->name);
    if (secdef == NULL || secdef->model == NULL)
994 995
        return 0;

996 997 998 999 1000 1001 1002
    if (mgr->drv->domainSecurityVerify) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSecurityVerify(mgr, def);
        virObjectUnlock(mgr);
        return ret;
    }
1003

1004
    virReportUnsupportedError();
1005 1006
    return -1;
}
1007

1008 1009 1010 1011 1012

int
virSecurityManagerSetImageFDLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm,
                                  int fd)
1013
{
1014 1015 1016 1017 1018 1019 1020
    if (mgr->drv->domainSetSecurityImageFDLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityImageFDLabel(mgr, vm, fd);
        virObjectUnlock(mgr);
        return ret;
    }
1021

1022
    virReportUnsupportedError();
1023 1024
    return -1;
}
1025

1026 1027 1028 1029 1030

int
virSecurityManagerSetTapFDLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr vm,
                                int fd)
1031
{
1032 1033 1034 1035 1036 1037 1038
    if (mgr->drv->domainSetSecurityTapFDLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityTapFDLabel(mgr, vm, fd);
        virObjectUnlock(mgr);
        return ret;
    }
1039

1040
    virReportUnsupportedError();
1041 1042 1043
    return -1;
}

1044 1045 1046 1047

char *
virSecurityManagerGetMountOptions(virSecurityManagerPtr mgr,
                                  virDomainDefPtr vm)
1048
{
1049 1050 1051 1052 1053 1054 1055
    if (mgr->drv->domainGetSecurityMountOptions) {
        char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainGetSecurityMountOptions(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
1056

1057
    virReportUnsupportedError();
1058 1059
    return NULL;
}
1060

1061

1062 1063 1064 1065 1066
virSecurityManagerPtr*
virSecurityManagerGetNested(virSecurityManagerPtr mgr)
{
    virSecurityManagerPtr* list = NULL;

1067
    if (STREQ("stack", mgr->drv->name))
1068 1069
        return virSecurityStackGetNested(mgr);

1070
    if (VIR_ALLOC_N(list, 2) < 0)
1071 1072 1073 1074 1075 1076
        return NULL;

    list[0] = mgr;
    list[1] = NULL;
    return list;
}
1077

1078

1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092
/**
 * virSecurityManagerDomainSetPathLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @path: path to label
 * @allowSubtree: whether to allow just @path or its subtree too
 *
 * This function relabels given @path so that @vm can access it.
 * If @allowSubtree is set to true the manager will grant access
 * to @path and its subdirectories at any level (currently
 * implemented only by AppArmor).
 *
 * Returns: 0 on success, -1 on error.
 */
1093
int
1094 1095
virSecurityManagerDomainSetPathLabel(virSecurityManagerPtr mgr,
                                     virDomainDefPtr vm,
1096 1097
                                     const char *path,
                                     bool allowSubtree)
1098
{
1099
    if (mgr->drv->domainSetPathLabel) {
1100 1101
        int ret;
        virObjectLock(mgr);
1102
        ret = mgr->drv->domainSetPathLabel(mgr, vm, path, allowSubtree);
1103 1104 1105 1106 1107 1108
        virObjectUnlock(mgr);
        return ret;
    }

    return 0;
}
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164


/**
 * virSecurityManagerSetMemoryLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @mem: memory module to operate on
 *
 * Labels the host part of a memory module.
 *
 * Returns: 0 on success, -1 on error.
 */
int
virSecurityManagerSetMemoryLabel(virSecurityManagerPtr mgr,
                                     virDomainDefPtr vm,
                                     virDomainMemoryDefPtr mem)
{
    if (mgr->drv->domainSetSecurityMemoryLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityMemoryLabel(mgr, vm, mem);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}


/**
 * virSecurityManagerRestoreMemoryLabel:
 * @mgr: security manager object
 * @vm: domain definition object
 * @mem: memory module to operate on
 *
 * Removes security label from the host part of a memory module.
 *
 * Returns: 0 on success, -1 on error.
 */
int
virSecurityManagerRestoreMemoryLabel(virSecurityManagerPtr mgr,
                                        virDomainDefPtr vm,
                                        virDomainMemoryDefPtr mem)
{
    if (mgr->drv->domainRestoreSecurityMemoryLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityMemoryLabel(mgr, vm, mem);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}
1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200


int
virSecurityManagerSetInputLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr vm,
                                virDomainInputDefPtr input)
{
    if (mgr->drv->domainSetSecurityInputLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityInputLabel(mgr, vm, input);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}


int
virSecurityManagerRestoreInputLabel(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm,
                                    virDomainInputDefPtr input)
{
    if (mgr->drv->domainRestoreSecurityInputLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityInputLabel(mgr, vm, input);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}
1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240


int
virSecurityManagerSetChardevLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr def,
                                  virDomainChrSourceDefPtr dev_source,
                                  bool chardevStdioLogd)
{
    if (mgr->drv->domainSetSecurityChardevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityChardevLabel(mgr, def, dev_source,
                                                      chardevStdioLogd);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}


int
virSecurityManagerRestoreChardevLabel(virSecurityManagerPtr mgr,
                                      virDomainDefPtr def,
                                      virDomainChrSourceDefPtr dev_source,
                                      bool chardevStdioLogd)
{
    if (mgr->drv->domainRestoreSecurityChardevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityChardevLabel(mgr, def, dev_source,
                                                          chardevStdioLogd);
        virObjectUnlock(mgr);
        return ret;
    }

    virReportUnsupportedError();
    return -1;
}
1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276


int
virSecurityManagerSetTPMLabels(virSecurityManagerPtr mgr,
                               virDomainDefPtr vm)
{
    int ret;

    if (mgr->drv->domainSetSecurityTPMLabels) {
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityTPMLabels(mgr, vm);
        virObjectUnlock(mgr);

        return ret;
    }

    return 0;
}


int
virSecurityManagerRestoreTPMLabels(virSecurityManagerPtr mgr,
                                   virDomainDefPtr vm)
{
    int ret;

    if (mgr->drv->domainRestoreSecurityTPMLabels) {
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityTPMLabels(mgr, vm);
        virObjectUnlock(mgr);

        return ret;
    }

    return 0;
}
1277 1278


1279 1280 1281 1282
struct _virSecurityManagerMetadataLockState {
    size_t nfds;
    int *fds;
};
1283 1284


1285 1286 1287 1288 1289
static int
cmpstringp(const void *p1, const void *p2)
{
    const char *s1 = *(char * const *) p1;
    const char *s2 = *(char * const *) p2;
1290

1291 1292
    if (!s1 && !s2)
        return 0;
1293

1294 1295
    if (!s1 || !s2)
        return s2 ? -1 : 1;
1296

1297 1298 1299
    /* from man 3 qsort */
    return strcmp(s1, s2);
}
1300

1301 1302
#define METADATA_OFFSET 1
#define METADATA_LEN 1
1303

1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321
/**
 * virSecurityManagerMetadataLock:
 * @mgr: security manager object
 * @paths: paths to lock
 * @npaths: number of items in @paths array
 *
 * Lock passed @paths for metadata change. The returned state
 * should be passed to virSecurityManagerMetadataUnlock.
 *
 * NOTE: this function is not thread safe (because of usage of
 * POSIX locks).
 *
 * Returns: state on success,
 *          NULL on failure.
 */
virSecurityManagerMetadataLockStatePtr
virSecurityManagerMetadataLock(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                               const char **paths,
1322 1323
                               size_t npaths)
{
1324 1325 1326 1327
    size_t i = 0;
    size_t nfds = 0;
    int *fds = NULL;
    virSecurityManagerMetadataLockStatePtr ret = NULL;
1328

1329 1330
    if (VIR_ALLOC_N(fds, npaths) < 0)
        return NULL;
1331

1332 1333
    /* Sort paths to lock in order to avoid deadlocks. */
    qsort(paths, npaths, sizeof(*paths), cmpstringp);
1334

1335 1336 1337 1338 1339
    for (i = 0; i < npaths; i++) {
        const char *p = paths[i];
        struct stat sb;
        int retries = 10 * 1000;
        int fd;
1340

1341 1342
        if (!p || stat(p, &sb) < 0)
            continue;
1343

1344 1345
        if (S_ISDIR(sb.st_mode)) {
            /* Directories can't be locked */
1346
            continue;
1347
        }
1348

1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382
        if ((fd = open(p, O_RDWR)) < 0) {
            if (S_ISSOCK(sb.st_mode)) {
                /* Sockets can be opened only if there exists the
                 * other side that listens. */
                continue;
            }

            virReportSystemError(errno,
                                 _("unable to open %s"),
                                 p);
            goto cleanup;
        }

        do {
            if (virFileLock(fd, false,
                            METADATA_OFFSET, METADATA_LEN, false) < 0) {
                if (retries && (errno == EACCES || errno == EAGAIN)) {
                    /* File is locked. Try again. */
                    retries--;
                    usleep(1000);
                    continue;
                } else {
                    virReportSystemError(errno,
                                         _("unable to lock %s for metadata change"),
                                         p);
                    VIR_FORCE_CLOSE(fd);
                    goto cleanup;
                }
            }

            break;
        } while (1);

        VIR_APPEND_ELEMENT_COPY_INPLACE(fds, nfds, fd);
1383 1384
    }

1385
    if (VIR_ALLOC(ret) < 0)
1386 1387
        goto cleanup;

1388 1389 1390
    VIR_STEAL_PTR(ret->fds, fds);
    ret->nfds = nfds;
    nfds = 0;
1391 1392

 cleanup:
1393 1394 1395
    for (i = nfds; i > 0; i--)
        VIR_FORCE_CLOSE(fds[i - 1]);
    VIR_FREE(fds);
1396 1397 1398 1399
    return ret;
}


1400 1401 1402
void
virSecurityManagerMetadataUnlock(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                 virSecurityManagerMetadataLockStatePtr *state)
1403
{
1404
    size_t i;
1405

1406 1407
    if (!state)
        return;
1408

1409 1410 1411
    for (i = 0; i < (*state)->nfds; i++) {
        char ebuf[1024];
        int fd = (*state)->fds[i];
1412

1413 1414 1415 1416 1417 1418
        /* Technically, unlock is not needed because it will
         * happen on VIR_CLOSE() anyway. But let's play it nice. */
        if (virFileUnlock(fd, METADATA_OFFSET, METADATA_LEN) < 0) {
            VIR_WARN("Unable to unlock fd %d: %s",
                     fd, virStrerror(errno, ebuf, sizeof(ebuf)));
        }
1419

1420 1421 1422 1423 1424
        if (VIR_CLOSE(fd) < 0) {
            VIR_WARN("Unable to close fd %d: %s",
                     fd, virStrerror(errno, ebuf, sizeof(ebuf)));
        }
    }
1425

1426 1427
    VIR_FREE((*state)->fds);
    VIR_FREE(*state);
1428
}