“efa5832b0ae8a19e4ed4874f029307e30135f9f8”上不存在“src/security/security_selinux.c”
security_selinux.c 50.1 KB
Newer Older
1
/*
2
 * Copyright (C) 2008-2012 Red Hat, Inc.
3 4 5 6 7 8 9 10
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * Authors:
 *     James Morris <jmorris@namei.org>
11
 *     Dan Walsh <dwalsh@redhat.com>
12 13 14 15 16 17 18 19 20
 *
 * SELinux security driver.
 */
#include <config.h>
#include <selinux/selinux.h>
#include <selinux/context.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
E
Eric Blake 已提交
21 22 23
#if HAVE_SELINUX_LABEL_H
# include <selinux/label.h>
#endif
24

25
#include "security_driver.h"
26 27 28 29
#include "security_selinux.h"
#include "virterror_internal.h"
#include "util.h"
#include "memory.h"
30
#include "logging.h"
31 32
#include "pci.h"
#include "hostusb.h"
33
#include "storage_file.h"
E
Eric Blake 已提交
34
#include "virfile.h"
35
#include "virrandom.h"
36 37
#include "util.h"
#include "conf.h"
D
Daniel P. Berrange 已提交
38 39 40

#define VIR_FROM_THIS VIR_FROM_SECURITY

41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
#define MAX_CONTEXT 1024

typedef struct _virSecuritySELinuxData virSecuritySELinuxData;
typedef virSecuritySELinuxData *virSecuritySELinuxDataPtr;

typedef struct _virSecuritySELinuxCallbackData virSecuritySELinuxCallbackData;
typedef virSecuritySELinuxCallbackData *virSecuritySELinuxCallbackDataPtr;

struct _virSecuritySELinuxData {
    char *domain_context;
    char *file_context;
    char *content_context;
};

struct _virSecuritySELinuxCallbackData {
    virSecurityManagerPtr manager;
    virSecurityLabelDefPtr secdef;
};

60 61 62 63 64 65 66
#define SECURITY_SELINUX_VOID_DOI       "0"
#define SECURITY_SELINUX_NAME "selinux"

/* TODO
   The data struct of used mcs should be replaced with a better data structure in the future
*/

67 68 69
typedef struct virSecuritySELinuxMCS virSecuritySELinuxMCS;
typedef virSecuritySELinuxMCS *virSecuritySELinuxMCSPtr;
struct virSecuritySELinuxMCS {
70
    char *mcs;
71
    virSecuritySELinuxMCSPtr next;
72
};
73
static virSecuritySELinuxMCSPtr mcsList = NULL;
74

75 76 77
/*
 * Returns 0 on success, 1 if already reserved, or -1 on fatal error
 */
78
static int
79
virSecuritySELinuxMCSAdd(const char *mcs)
80
{
81
    virSecuritySELinuxMCSPtr ptr;
82 83

    for (ptr = mcsList; ptr; ptr = ptr->next) {
D
Daniel P. Berrange 已提交
84
        if (STREQ(ptr->mcs, mcs))
85
            return 1;
86
    }
87 88
    if (VIR_ALLOC(ptr) < 0) {
        virReportOOMError();
D
Daniel P. Berrange 已提交
89
        return -1;
90 91 92 93 94 95
    }
    if (!(ptr->mcs = strdup(mcs))) {
        virReportOOMError();
        VIR_FREE(ptr);
        return -1;
    }
96 97 98 99 100 101
    ptr->next = mcsList;
    mcsList = ptr;
    return 0;
}

static int
102
virSecuritySELinuxMCSRemove(const char *mcs)
103
{
104 105
    virSecuritySELinuxMCSPtr prevptr = NULL;
    virSecuritySELinuxMCSPtr ptr = NULL;
106 107

    for (ptr = mcsList; ptr; ptr = ptr->next) {
D
Daniel P. Berrange 已提交
108
        if (STREQ(ptr->mcs, mcs)) {
109 110 111 112 113
            if (prevptr)
                prevptr->next = ptr->next;
            else {
                mcsList = ptr->next;
            }
114 115
            VIR_FREE(ptr->mcs);
            VIR_FREE(ptr);
116 117 118 119 120 121 122 123
            return 0;
        }
        prevptr = ptr;
    }
    return -1;
}

static char *
124
virSecuritySELinuxGenNewContext(const char *oldcontext, const char *mcs)
125 126 127
{
    char *newcontext = NULL;
    char *scontext = strdup(oldcontext);
128
    context_t con;
129
    if (!scontext) goto err;
130
    con = context_new(scontext);
131 132 133 134 135 136
    if (!con) goto err;
    context_range_set(con, mcs);
    newcontext = strdup(context_str(con));
    context_free(con);
err:
    freecon(scontext);
137
    return newcontext;
138 139
}

140

141
#ifdef HAVE_SELINUX_LXC_CONTEXTS_PATH
142
static int
143
virSecuritySELinuxLXCInitialize(virSecurityManagerPtr mgr)
144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203
{
    virConfValuePtr scon = NULL;
    virConfValuePtr tcon = NULL;
    virConfValuePtr dcon = NULL;
    virConfPtr selinux_conf;
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);

    selinux_conf = virConfReadFile(selinux_lxc_contexts_path(), 0);
    if (!selinux_conf) {
        virReportSystemError(errno,
                             _("cannot open SELinux lxc contexts file '%s'"),
                             selinux_lxc_contexts_path());
        return -1;
    }

    scon = virConfGetValue(selinux_conf, "process");
    if (! scon || scon->type != VIR_CONF_STRING || (! scon->str)) {
        virReportSystemError(errno,
                             _("cannot read 'process' value from selinux lxc contexts file '%s'"),
                             selinux_lxc_contexts_path());
        goto error;
    }

    tcon = virConfGetValue(selinux_conf, "file");
    if (! tcon || tcon->type != VIR_CONF_STRING || (! tcon->str)) {
        virReportSystemError(errno,
                             _("cannot read 'file' value from selinux lxc contexts file '%s'"),
                             selinux_lxc_contexts_path());
        goto error;
    }

    dcon = virConfGetValue(selinux_conf, "content");
    if (! dcon || dcon->type != VIR_CONF_STRING || (! dcon->str)) {
        virReportSystemError(errno,
                             _("cannot read 'file' value from selinux lxc contexts file '%s'"),
                             selinux_lxc_contexts_path());
        goto error;
    }

    data->domain_context = strdup(scon->str);
    data->file_context = strdup(tcon->str);
    data->content_context = strdup(dcon->str);
    if (!data->domain_context ||
        !data->file_context ||
        !data->content_context) {
        virReportSystemError(errno,
                             _("cannot allocate memory for LXC SELinux contexts '%s'"),
                             selinux_lxc_contexts_path());
        goto error;
    }
    virConfFree(selinux_conf);
    return 0;

error:
    virConfFree(selinux_conf);
    VIR_FREE(data->domain_context);
    VIR_FREE(data->file_context);
    VIR_FREE(data->content_context);
    return -1;
}
204 205
#else
static int
206
virSecuritySELinuxLXCInitialize(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
207 208 209 210 211 212
{
    virReportSystemError(ENOSYS, "%s",
                         _("libselinux does not support LXC contexts path"));
    return -1;
}
#endif
213 214 215


static int
216
virSecuritySELinuxQEMUInitialize(virSecurityManagerPtr mgr)
217
{
218 219
    char *ptr;
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);
220

221
    if (virFileReadAll(selinux_virtual_domain_context_path(), MAX_CONTEXT, &(data->domain_context)) < 0) {
222
        virReportSystemError(errno,
223
                             _("cannot read SELinux virtual domain context file '%s'"),
224
                             selinux_virtual_domain_context_path());
225
        goto error;
226 227
    }

228 229 230
    ptr = strchrnul(data->domain_context, '\n');
    if (ptr)
        *ptr = '\0';
231

232
    if (virFileReadAll(selinux_virtual_image_context_path(), 2*MAX_CONTEXT, &(data->file_context)) < 0) {
233
        virReportSystemError(errno,
234 235
                             _("cannot read SELinux virtual image context file %s"),
                             selinux_virtual_image_context_path());
236
        goto error;
237 238
    }

239 240
    ptr = strchrnul(data->file_context, '\n');
    if (ptr && *ptr == '\n') {
241
        *ptr = '\0';
242 243 244 245 246 247 248
        data->content_context = strdup(ptr+1);
        if (!data->content_context) {
            virReportOOMError();
            goto error;
        }
        ptr = strchrnul(data->content_context, '\n');
        if (ptr && *ptr == '\n')
249 250
            *ptr = '\0';
    }
251

252
    return 0;
253 254 255 256 257 258

error:
    VIR_FREE(data->domain_context);
    VIR_FREE(data->file_context);
    VIR_FREE(data->content_context);
    return -1;
259 260
}

261 262

static int
263
virSecuritySELinuxInitialize(virSecurityManagerPtr mgr)
264 265 266
{
    VIR_DEBUG("SELinuxInitialize %s", virSecurityManagerGetDriver(mgr));
    if (STREQ(virSecurityManagerGetDriver(mgr),  "LXC")) {
267
        return virSecuritySELinuxLXCInitialize(mgr);
268
    } else {
269
        return virSecuritySELinuxQEMUInitialize(mgr);
270 271 272 273
    }
}


274
static int
275 276
virSecuritySELinuxGenSecurityLabel(virSecurityManagerPtr mgr,
                                   virDomainDefPtr def)
277 278
{
    int rc = -1;
279
    char *mcs = NULL;
280 281 282
    char *scontext = NULL;
    int c1 = 0;
    int c2 = 0;
283
    context_t ctx = NULL;
284
    const char *range;
285
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);
286

287
    VIR_DEBUG("driver=%s", virSecurityManagerGetDriver(mgr));
288 289 290
    if ((def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) &&
        !def->seclabel.baselabel &&
        def->seclabel.model) {
291 292
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("security model already defined for VM"));
293 294 295
        return rc;
    }

296 297
    if (def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC &&
        def->seclabel.label) {
298 299
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("security label already defined for VM"));
300
        return rc;
D
Daniel P. Berrange 已提交
301
    }
302

303
    if (def->seclabel.imagelabel) {
304 305
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("security image label already defined for VM"));
306 307 308
        return rc;
    }

309 310
    if (def->seclabel.model &&
        STRNEQ(def->seclabel.model, SECURITY_SELINUX_NAME)) {
311 312 313
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label model %s is not supported with selinux"),
                       def->seclabel.model);
314 315 316
        return rc;
    }

317
    VIR_DEBUG("type=%d", def->seclabel.type);
318

319 320
    switch (def->seclabel.type) {
    case VIR_DOMAIN_SECLABEL_STATIC:
321
        if (!(ctx = context_new(def->seclabel.label)) ) {
322 323
            virReportSystemError(errno,
                                 _("unable to allocate socket security context '%s'"),
324
                                 def->seclabel.label);
325
            return rc;
326 327
        }

328
        range = context_range_get(ctx);
329 330 331 332 333
        if (!range ||
            !(mcs = strdup(range))) {
            virReportOOMError();
            goto cleanup;
        }
334 335 336
        break;

    case VIR_DOMAIN_SECLABEL_DYNAMIC:
337 338
        for (;;) {
            int rv;
339 340
            c1 = virRandomBits(10);
            c2 = virRandomBits(10);
341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357

            if ( c1 == c2 ) {
                if (virAsprintf(&mcs, "s0:c%d", c1) < 0) {
                    virReportOOMError();
                    goto cleanup;
                }
            } else {
                if (c1 > c2) {
                    c1 ^= c2;
                    c2 ^= c1;
                    c1 ^= c2;
                }
                if (virAsprintf(&mcs, "s0:c%d,c%d", c1, c2) < 0) {
                    virReportOOMError();
                    goto cleanup;
                }
            }
358 359 360 361 362
            if ((rv = virSecuritySELinuxMCSAdd(mcs)) < 0)
                goto cleanup;
            if (rv == 0)
                break;
        }
363

364
        def->seclabel.label =
365 366 367
            virSecuritySELinuxGenNewContext(def->seclabel.baselabel ?
                                            def->seclabel.baselabel :
                                            data->domain_context, mcs);
368
        if (! def->seclabel.label)  {
369 370
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot generate selinux context for %s"), mcs);
371 372
            goto cleanup;
        }
373 374 375 376 377 378 379
        break;

    case VIR_DOMAIN_SECLABEL_NONE:
        /* no op */
        break;

    default:
380 381 382
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected security label type '%s'"),
                       virDomainSeclabelTypeToString(def->seclabel.type));
383
        goto cleanup;
D
Daniel P. Berrange 已提交
384
    }
385

386
    if (!def->seclabel.norelabel) {
387
        def->seclabel.imagelabel = virSecuritySELinuxGenNewContext(data->file_context, mcs);
388
        if (!def->seclabel.imagelabel)  {
389 390
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot generate selinux context for %s"), mcs);
391 392 393 394
            goto cleanup;
        }
    }

395 396
    if (!def->seclabel.model &&
        !(def->seclabel.model = strdup(SECURITY_SELINUX_NAME))) {
397
        virReportOOMError();
398
        goto cleanup;
D
Daniel P. Berrange 已提交
399 400
    }

401
    rc = 0;
402 403 404

cleanup:
    if (rc != 0) {
405 406 407 408 409 410
        if (def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC)
            VIR_FREE(def->seclabel.label);
        VIR_FREE(def->seclabel.imagelabel);
        if (def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC &&
            !def->seclabel.baselabel)
            VIR_FREE(def->seclabel.model);
411 412 413 414
    }

    if (ctx)
        context_free(ctx);
D
Daniel P. Berrange 已提交
415
    VIR_FREE(scontext);
416 417 418
    VIR_FREE(mcs);

    VIR_DEBUG("model=%s label=%s imagelabel=%s baselabel=%s",
419 420 421 422
              NULLSTR(def->seclabel.model),
              NULLSTR(def->seclabel.label),
              NULLSTR(def->seclabel.imagelabel),
              NULLSTR(def->seclabel.baselabel));
423

424 425 426
    return rc;
}

427
static int
428 429 430
virSecuritySELinuxReserveSecurityLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                       virDomainDefPtr def,
                                       pid_t pid)
431 432 433 434
{
    security_context_t pctx;
    context_t ctx = NULL;
    const char *mcs;
435
    int rv;
436

437
    if (def->seclabel.type == VIR_DOMAIN_SECLABEL_STATIC)
438 439
        return 0;

440
    if (getpidcon(pid, &pctx) == -1) {
441
        virReportSystemError(errno,
442
                             _("unable to get PID %d security context"), pid);
443 444 445 446
        return -1;
    }

    ctx = context_new(pctx);
447
    freecon(pctx);
448
    if (!ctx)
449
        goto error;
450 451 452

    mcs = context_range_get(ctx);
    if (!mcs)
453 454 455 456
        goto error;

    if ((rv = virSecuritySELinuxMCSAdd(mcs)) < 0)
        goto error;
457

458 459 460 461 462 463
    if (rv == 1) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("MCS level for existing domain label %s already reserved"),
                       (char*)pctx);
        goto error;
    }
464 465 466 467 468

    context_free(ctx);

    return 0;

469
error:
470 471 472 473 474
    context_free(ctx);
    return -1;
}


475
static int
476
virSecuritySELinuxSecurityDriverProbe(const char *virtDriver)
477
{
478 479 480
    if (!is_selinux_enabled())
        return SECURITY_DRIVER_DISABLE;

481 482 483 484 485 486
    if (virtDriver && STREQ(virtDriver, "LXC")) {
#if HAVE_SELINUX_LXC_CONTEXTS_PATH
        if (!virFileExists(selinux_lxc_contexts_path()))
#endif
            return SECURITY_DRIVER_DISABLE;
    }
487 488

    return SECURITY_DRIVER_ENABLE;
489 490
}

491

492
static int
493
virSecuritySELinuxSecurityDriverOpen(virSecurityManagerPtr mgr)
494
{
495
    return virSecuritySELinuxInitialize(mgr);
496 497
}

498

499
static int
500
virSecuritySELinuxSecurityDriverClose(virSecurityManagerPtr mgr)
501
{
502 503 504 505 506 507 508 509 510
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);

    if (!data)
        return 0;

    VIR_FREE(data->domain_context);
    VIR_FREE(data->file_context);
    VIR_FREE(data->content_context);

511 512 513 514
    return 0;
}


515 516
static const char *
virSecuritySELinuxSecurityGetModel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
517 518 519 520
{
    return SECURITY_SELINUX_NAME;
}

521 522
static const char *
virSecuritySELinuxSecurityGetDOI(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
523 524 525 526 527
{
    /*
     * Where will the DOI come from?  SELinux configuration, or qemu
     * configuration? For the moment, we'll just set it to "0".
     */
528
    return SECURITY_SELINUX_VOID_DOI;
529 530 531
}

static int
532 533 534 535
virSecuritySELinuxGetSecurityProcessLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                          virDomainDefPtr def ATTRIBUTE_UNUSED,
                                          pid_t pid,
                                          virSecurityLabelPtr sec)
536 537 538
{
    security_context_t ctx;

539
    if (getpidcon(pid, &ctx) == -1) {
540
        virReportSystemError(errno,
541
                             _("unable to get PID %d security context"),
542
                             pid);
543 544 545 546
        return -1;
    }

    if (strlen((char *) ctx) >= VIR_SECURITY_LABEL_BUFLEN) {
547 548 549 550
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label exceeds "
                         "maximum length: %d"),
                       VIR_SECURITY_LABEL_BUFLEN - 1);
551
        freecon(ctx);
552 553 554 555
        return -1;
    }

    strcpy(sec->label, (char *) ctx);
556
    freecon(ctx);
557

558
    VIR_DEBUG("label=%s", sec->label);
559 560
    sec->enforcing = security_getenforce();
    if (sec->enforcing == -1) {
561
        virReportSystemError(errno, "%s",
562
                             _("error calling security_getenforce()"));
563 564 565 566 567 568
        return -1;
    }

    return 0;
}

569 570 571
/* Attempt to change the label of PATH to TCON.  If OPTIONAL is true,
 * return 1 if labelling was not possible.  Otherwise, require a label
 * change, and return 0 for success, -1 for failure.  */
572
static int
573
virSecuritySELinuxSetFileconHelper(const char *path, char *tcon, bool optional)
574
{
575
    security_context_t econ;
576

577 578
    VIR_INFO("Setting SELinux context on '%s' to '%s'", path, tcon);

579
    if (setfilecon(path, tcon) < 0) {
580 581
        int setfilecon_errno = errno;

582 583 584 585
        if (getfilecon(path, &econ) >= 0) {
            if (STREQ(tcon, econ)) {
                freecon(econ);
                /* It's alright, there's nothing to change anyway. */
586
                return optional ? 1 : 0;
587 588 589
            }
            freecon(econ);
        }
590 591

        /* if the error complaint is related to an image hosted on
592 593
         * an nfs mount, or a usbfs/sysfs filesystem not supporting
         * labelling, then just ignore it & hope for the best.
594
         * The user hopefully set one of the necessary SELinux
595
         * virt_use_{nfs,usb,pci}  boolean tunables to allow it...
596
         */
597
        if (setfilecon_errno != EOPNOTSUPP && setfilecon_errno != ENOTSUP) {
598
            virReportSystemError(setfilecon_errno,
599
                                 _("unable to set security context '%s' on '%s'"),
600
                                 tcon, path);
601 602
            if (security_getenforce() == 1)
                return -1;
603
        } else {
604 605 606 607 608 609 610 611 612 613 614 615 616 617
            const char *msg;
            if ((virStorageFileIsSharedFSType(path,
                                              VIR_STORAGE_FILE_SHFS_NFS) == 1) &&
                security_get_boolean_active("virt_use_nfs") != 1) {
                msg = _("Setting security context '%s' on '%s' not supported. "
                        "Consider setting virt_use_nfs");
               if (security_getenforce() == 1)
                   VIR_WARN(msg, tcon, path);
               else
                   VIR_INFO(msg, tcon, path);
            } else {
                VIR_INFO("Setting security context '%s' on '%s' not supported",
                         tcon, path);
            }
618 619
            if (optional)
                return 1;
620
        }
621 622 623 624
    }
    return 0;
}

625
static int
626
virSecuritySELinuxSetFileconOptional(const char *path, char *tcon)
627
{
628
    return virSecuritySELinuxSetFileconHelper(path, tcon, true);
629 630 631
}

static int
632
virSecuritySELinuxSetFilecon(const char *path, char *tcon)
633
{
634
    return virSecuritySELinuxSetFileconHelper(path, tcon, false);
635 636
}

637
static int
638
virSecuritySELinuxFSetFilecon(int fd, char *tcon)
639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675
{
    security_context_t econ;

    VIR_INFO("Setting SELinux context on fd %d to '%s'", fd, tcon);

    if (fsetfilecon(fd, tcon) < 0) {
        int fsetfilecon_errno = errno;

        if (fgetfilecon(fd, &econ) >= 0) {
            if (STREQ(tcon, econ)) {
                freecon(econ);
                /* It's alright, there's nothing to change anyway. */
                return 0;
            }
            freecon(econ);
        }

        /* if the error complaint is related to an image hosted on
         * an nfs mount, or a usbfs/sysfs filesystem not supporting
         * labelling, then just ignore it & hope for the best.
         * The user hopefully set one of the necessary SELinux
         * virt_use_{nfs,usb,pci}  boolean tunables to allow it...
         */
        if (fsetfilecon_errno != EOPNOTSUPP) {
            virReportSystemError(fsetfilecon_errno,
                                 _("unable to set security context '%s' on fd %d"),
                                 tcon, fd);
            if (security_getenforce() == 1)
                return -1;
        } else {
            VIR_INFO("Setting security context '%s' on fd %d not supported",
                     tcon, fd);
        }
    }
    return 0;
}

E
Eric Blake 已提交
676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694
/* Set fcon to the appropriate label for path and mode, or return -1.  */
static int
getContext(const char *newpath, mode_t mode, security_context_t *fcon)
{
#if HAVE_SELINUX_LABEL_H
    struct selabel_handle *handle = selabel_open(SELABEL_CTX_FILE, NULL, 0);
    int ret;

    if (handle == NULL)
        return -1;

    ret = selabel_lookup(handle, fcon, newpath, mode);
    selabel_close(handle);
    return ret;
#else
    return matchpathcon(newpath, mode, fcon);
#endif
}

695 696 697

/* This method shouldn't raise errors, since they'll overwrite
 * errors that the caller(s) are already dealing with */
698
static int
699
virSecuritySELinuxRestoreSecurityFileLabel(const char *path)
700
{
701 702 703 704
    struct stat buf;
    security_context_t fcon = NULL;
    int rc = -1;
    char *newpath = NULL;
705
    char ebuf[1024];
706

707 708
    VIR_INFO("Restoring SELinux context on '%s'", path);

709
    if (virFileResolveLink(path, &newpath) < 0) {
710 711
        VIR_WARN("cannot resolve symlink %s: %s", path,
                 virStrerror(errno, ebuf, sizeof(ebuf)));
D
Daniel P. Berrange 已提交
712
        goto err;
713
    }
714

715
    if (stat(newpath, &buf) != 0) {
716 717
        VIR_WARN("cannot stat %s: %s", newpath,
                 virStrerror(errno, ebuf, sizeof(ebuf)));
D
Daniel P. Berrange 已提交
718
        goto err;
719
    }
D
Daniel P. Berrange 已提交
720

E
Eric Blake 已提交
721
    if (getContext(newpath, buf.st_mode, &fcon) < 0) {
722
        VIR_WARN("cannot lookup default selinux label for %s", newpath);
723
    } else {
724
        rc = virSecuritySELinuxSetFilecon(newpath, fcon);
725
    }
726

727
err:
728
    freecon(fcon);
729 730
    VIR_FREE(newpath);
    return rc;
731 732
}

733
static int
734 735 736 737
virSecuritySELinuxRestoreSecurityImageLabelInt(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                               virDomainDefPtr def,
                                               virDomainDiskDefPtr disk,
                                               int migrated)
738
{
739
    const virSecurityLabelDefPtr secdef = &def->seclabel;
740

741
    if (secdef->norelabel || (disk->seclabel && disk->seclabel->norelabel))
742 743
        return 0;

744 745 746 747 748 749 750 751 752 753 754
    /* Don't restore labels on readoly/shared disks, because
     * other VMs may still be accessing these
     * Alternatively we could iterate over all running
     * domains and try to figure out if it is in use, but
     * this would not work for clustered filesystems, since
     * we can't see running VMs using the file on other nodes
     * Safest bet is thus to skip the restore step.
     */
    if (disk->readonly || disk->shared)
        return 0;

755
    if (!disk->src || disk->type == VIR_DOMAIN_DISK_TYPE_NETWORK)
756 757
        return 0;

758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773
    /* If we have a shared FS & doing migrated, we must not
     * change ownership, because that kills access on the
     * destination host which is sub-optimal for the guest
     * VM's I/O attempts :-)
     */
    if (migrated) {
        int rc = virStorageFileIsSharedFS(disk->src);
        if (rc < 0)
            return -1;
        if (rc == 1) {
            VIR_DEBUG("Skipping image label restore on %s because FS is shared",
                      disk->src);
            return 0;
        }
    }

774
    return virSecuritySELinuxRestoreSecurityFileLabel(disk->src);
775 776
}

777 778

static int
779 780 781
virSecuritySELinuxRestoreSecurityImageLabel(virSecurityManagerPtr mgr,
                                            virDomainDefPtr def,
                                            virDomainDiskDefPtr disk)
782
{
783
    return virSecuritySELinuxRestoreSecurityImageLabelInt(mgr, def, disk, 0);
784 785 786
}


787
static int
788 789 790 791
virSecuritySELinuxSetSecurityFileLabel(virDomainDiskDefPtr disk,
                                       const char *path,
                                       size_t depth,
                                       void *opaque)
792
{
793 794
    virSecuritySELinuxCallbackDataPtr cbdata = opaque;
    const virSecurityLabelDefPtr secdef = cbdata->secdef;
795
    int ret;
796
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(cbdata->manager);
797

798 799 800 801 802
    if (disk->seclabel && disk->seclabel->norelabel)
        return 0;

    if (disk->seclabel && !disk->seclabel->norelabel &&
        disk->seclabel->label) {
803
        ret = virSecuritySELinuxSetFilecon(path, disk->seclabel->label);
804
    } else if (depth == 0) {
805

806
        if (disk->shared) {
807
            ret = virSecuritySELinuxSetFileconOptional(path, data->file_context);
808
        } else if (disk->readonly) {
809
            ret = virSecuritySELinuxSetFileconOptional(path, data->content_context);
810
        } else if (secdef->imagelabel) {
811
            ret = virSecuritySELinuxSetFileconOptional(path, secdef->imagelabel);
812
        } else {
813
            ret = 0;
814 815
        }
    } else {
816
        ret = virSecuritySELinuxSetFileconOptional(path, data->content_context);
817 818 819 820 821 822 823 824 825 826
    }
    if (ret == 1 && !disk->seclabel) {
        /* If we failed to set a label, but virt_use_nfs let us
         * proceed anyway, then we don't need to relabel later.  */
        if (VIR_ALLOC(disk->seclabel) < 0) {
            virReportOOMError();
            return -1;
        }
        disk->seclabel->norelabel = true;
        ret = 0;
827
    }
828
    return ret;
829 830
}

831
static int
832 833 834
virSecuritySELinuxSetSecurityImageLabel(virSecurityManagerPtr mgr,
                                        virDomainDefPtr def,
                                        virDomainDiskDefPtr disk)
835 836

{
837 838 839 840
    virSecuritySELinuxCallbackData cbdata;
    cbdata.secdef = &def->seclabel;
    cbdata.manager = mgr;

841
    bool allowDiskFormatProbing = virSecurityManagerGetAllowDiskFormatProbing(mgr);
842

843
    if (cbdata.secdef->norelabel)
844 845
        return 0;

846 847 848
    if (disk->type == VIR_DOMAIN_DISK_TYPE_NETWORK)
        return 0;

849 850 851 852 853 854
    /* XXX On one hand, it would be nice to have the driver's uid:gid
     * here so we could retry opens with it. On the other hand, it
     * probably doesn't matter because in practice that's only useful
     * for files on root-squashed NFS shares, and NFS doesn't properly
     * support selinux anyway.
     */
855
    return virDomainDiskDefForeachPath(disk,
856
                                       allowDiskFormatProbing,
857
                                       true,
858
                                       -1, -1, /* current process uid:gid */
859
                                       virSecuritySELinuxSetSecurityFileLabel,
860
                                       &cbdata);
861 862
}

863 864

static int
865 866
virSecuritySELinuxSetSecurityPCILabel(pciDevice *dev ATTRIBUTE_UNUSED,
                                      const char *file, void *opaque)
867
{
868 869
    virDomainDefPtr def = opaque;
    const virSecurityLabelDefPtr secdef = &def->seclabel;
870

871
    return virSecuritySELinuxSetFilecon(file, secdef->imagelabel);
872 873 874
}

static int
875 876
virSecuritySELinuxSetSecurityUSBLabel(usbDevice *dev ATTRIBUTE_UNUSED,
                                      const char *file, void *opaque)
877
{
878 879
    virDomainDefPtr def = opaque;
    const virSecurityLabelDefPtr secdef = &def->seclabel;
880

881
    return virSecuritySELinuxSetFilecon(file, secdef->imagelabel);
882 883 884
}

static int
885 886 887
virSecuritySELinuxSetSecurityHostdevLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                          virDomainDefPtr def,
                                          virDomainHostdevDefPtr dev)
888 889

{
890
    const virSecurityLabelDefPtr secdef = &def->seclabel;
891 892
    int ret = -1;

893
    if (secdef->norelabel)
894 895
        return 0;

896 897 898 899 900
    if (dev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
        return 0;

    switch (dev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB: {
901
        usbDevice *usb = usbGetDevice(dev->source.subsys.u.usb.bus,
902
                                      dev->source.subsys.u.usb.device);
903

904 905
        if (!usb)
            goto done;
906

907
        ret = usbDeviceFileIterate(usb, virSecuritySELinuxSetSecurityUSBLabel, def);
908
        usbFreeDevice(usb);
M
Mark McLoughlin 已提交
909
        break;
910 911 912
    }

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: {
913
        pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain,
914 915 916 917 918 919 920
                                      dev->source.subsys.u.pci.bus,
                                      dev->source.subsys.u.pci.slot,
                                      dev->source.subsys.u.pci.function);

        if (!pci)
            goto done;

921
        ret = pciDeviceFileIterate(pci, virSecuritySELinuxSetSecurityPCILabel, def);
922
        pciFreeDevice(pci);
923 924 925 926 927 928 929 930 931 932 933 934 935

        break;
    }

    default:
        ret = 0;
        break;
    }

done:
    return ret;
}

936

937
static int
938 939 940
virSecuritySELinuxRestoreSecurityPCILabel(pciDevice *dev ATTRIBUTE_UNUSED,
                                          const char *file,
                                          void *opaque ATTRIBUTE_UNUSED)
941
{
942
    return virSecuritySELinuxRestoreSecurityFileLabel(file);
943 944 945
}

static int
946 947 948
virSecuritySELinuxRestoreSecurityUSBLabel(usbDevice *dev ATTRIBUTE_UNUSED,
                                          const char *file,
                                          void *opaque ATTRIBUTE_UNUSED)
949
{
950
    return virSecuritySELinuxRestoreSecurityFileLabel(file);
951 952 953
}

static int
954 955 956
virSecuritySELinuxRestoreSecurityHostdevLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                              virDomainDefPtr def,
                                              virDomainHostdevDefPtr dev)
957 958

{
959
    const virSecurityLabelDefPtr secdef = &def->seclabel;
960 961
    int ret = -1;

962
    if (secdef->norelabel)
963 964
        return 0;

965 966 967 968 969
    if (dev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
        return 0;

    switch (dev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB: {
970
        usbDevice *usb = usbGetDevice(dev->source.subsys.u.usb.bus,
971
                                      dev->source.subsys.u.usb.device);
972 973 974 975

        if (!usb)
            goto done;

976
        ret = usbDeviceFileIterate(usb, virSecuritySELinuxRestoreSecurityUSBLabel, NULL);
977
        usbFreeDevice(usb);
978 979 980 981 982

        break;
    }

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: {
983
        pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain,
984 985 986 987 988 989 990
                                      dev->source.subsys.u.pci.bus,
                                      dev->source.subsys.u.pci.slot,
                                      dev->source.subsys.u.pci.function);

        if (!pci)
            goto done;

991
        ret = pciDeviceFileIterate(pci, virSecuritySELinuxRestoreSecurityPCILabel, NULL);
992
        pciFreeDevice(pci);
993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005

        break;
    }

    default:
        ret = 0;
        break;
    }

done:
    return ret;
}

1006 1007

static int
1008 1009
virSecuritySELinuxSetSecurityChardevLabel(virDomainDefPtr def,
                                          virDomainChrSourceDefPtr dev)
1010 1011

{
1012
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1013 1014 1015
    char *in = NULL, *out = NULL;
    int ret = -1;

1016
    if (secdef->norelabel)
1017 1018 1019 1020 1021
        return 0;

    switch (dev->type) {
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
1022
        ret = virSecuritySELinuxSetFilecon(dev->data.file.path, secdef->imagelabel);
1023 1024 1025
        break;

    case VIR_DOMAIN_CHR_TYPE_PIPE:
1026 1027 1028 1029 1030 1031
        if ((virAsprintf(&in, "%s.in", dev->data.file.path) < 0) ||
            (virAsprintf(&out, "%s.out", dev->data.file.path) < 0)) {
            virReportOOMError();
            goto done;
        }
        if (virFileExists(in) && virFileExists(out)) {
1032 1033
            if ((virSecuritySELinuxSetFilecon(in, secdef->imagelabel) < 0) ||
                (virSecuritySELinuxSetFilecon(out, secdef->imagelabel) < 0)) {
1034
                goto done;
1035
            }
1036
        } else if (virSecuritySELinuxSetFilecon(dev->data.file.path, secdef->imagelabel) < 0) {
1037
            goto done;
1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053
        }
        ret = 0;
        break;

    default:
        ret = 0;
        break;
    }

done:
    VIR_FREE(in);
    VIR_FREE(out);
    return ret;
}

static int
1054 1055
virSecuritySELinuxRestoreSecurityChardevLabel(virDomainDefPtr def,
                                              virDomainChrSourceDefPtr dev)
1056 1057

{
1058
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1059 1060 1061
    char *in = NULL, *out = NULL;
    int ret = -1;

1062
    if (secdef->norelabel)
1063 1064 1065 1066 1067
        return 0;

    switch (dev->type) {
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
1068
        if (virSecuritySELinuxRestoreSecurityFileLabel(dev->data.file.path) < 0)
1069 1070
            goto done;
        ret = 0;
1071 1072 1073 1074 1075 1076 1077
        break;
    case VIR_DOMAIN_CHR_TYPE_PIPE:
        if ((virAsprintf(&out, "%s.out", dev->data.file.path) < 0) ||
            (virAsprintf(&in, "%s.in", dev->data.file.path) < 0)) {
            virReportOOMError();
            goto done;
        }
1078
        if (virFileExists(in) && virFileExists(out)) {
1079 1080
            if ((virSecuritySELinuxRestoreSecurityFileLabel(out) < 0) ||
                (virSecuritySELinuxRestoreSecurityFileLabel(in) < 0)) {
1081 1082
                goto done;
            }
1083
        } else if (virSecuritySELinuxRestoreSecurityFileLabel(dev->data.file.path) < 0) {
1084
            goto done;
1085
        }
1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101
        ret = 0;
        break;

    default:
        ret = 0;
        break;
    }

done:
    VIR_FREE(in);
    VIR_FREE(out);
    return ret;
}


static int
1102 1103 1104
virSecuritySELinuxRestoreSecurityChardevCallback(virDomainDefPtr def,
                                                 virDomainChrDefPtr dev,
                                                 void *opaque ATTRIBUTE_UNUSED)
1105
{
1106 1107 1108 1109 1110
    /* This is taken care of by processing of def->serials */
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        dev->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL)
        return 0;

1111
    return virSecuritySELinuxRestoreSecurityChardevLabel(def, &dev->source);
1112 1113 1114
}


E
Eric Blake 已提交
1115
static int
1116 1117 1118
virSecuritySELinuxRestoreSecuritySmartcardCallback(virDomainDefPtr def,
                                                   virDomainSmartcardDefPtr dev,
                                                   void *opaque ATTRIBUTE_UNUSED)
E
Eric Blake 已提交
1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129
{
    const char *database;

    switch (dev->type) {
    case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
        database = dev->data.cert.database;
        if (!database)
            database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
1130
        return virSecuritySELinuxRestoreSecurityFileLabel(database);
E
Eric Blake 已提交
1131 1132

    case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
1133
        return virSecuritySELinuxRestoreSecurityChardevLabel(def, &dev->data.passthru);
E
Eric Blake 已提交
1134 1135

    default:
1136 1137 1138
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unknown smartcard type %d"),
                       dev->type);
E
Eric Blake 已提交
1139 1140 1141 1142 1143 1144 1145
        return -1;
    }

    return 0;
}


1146
static int
1147 1148 1149
virSecuritySELinuxRestoreSecurityAllLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                          virDomainDefPtr def,
                                          int migrated ATTRIBUTE_UNUSED)
1150
{
1151
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1152 1153
    int i;
    int rc = 0;
1154

1155
    VIR_DEBUG("Restoring security label on %s", def->name);
1156

1157
    if (secdef->norelabel)
1158 1159
        return 0;

1160
    for (i = 0 ; i < def->nhostdevs ; i++) {
1161 1162 1163
        if (virSecuritySELinuxRestoreSecurityHostdevLabel(mgr,
                                                          def,
                                                          def->hostdevs[i]) < 0)
1164
            rc = -1;
1165
    }
1166
    for (i = 0 ; i < def->ndisks ; i++) {
1167 1168 1169 1170
        if (virSecuritySELinuxRestoreSecurityImageLabelInt(mgr,
                                                           def,
                                                           def->disks[i],
                                                           migrated) < 0)
1171 1172
            rc = -1;
    }
1173

1174
    if (virDomainChrDefForeach(def,
1175
                               false,
1176
                               virSecuritySELinuxRestoreSecurityChardevCallback,
1177
                               NULL) < 0)
1178 1179
        rc = -1;

1180
    if (virDomainSmartcardDefForeach(def,
E
Eric Blake 已提交
1181
                                     false,
1182
                                     virSecuritySELinuxRestoreSecuritySmartcardCallback,
1183
                                     NULL) < 0)
E
Eric Blake 已提交
1184 1185
        rc = -1;

1186
    if (def->os.kernel &&
1187
        virSecuritySELinuxRestoreSecurityFileLabel(def->os.kernel) < 0)
1188 1189
        rc = -1;

1190
    if (def->os.initrd &&
1191
        virSecuritySELinuxRestoreSecurityFileLabel(def->os.initrd) < 0)
1192 1193
        rc = -1;

1194 1195 1196 1197
    return rc;
}

static int
1198 1199
virSecuritySELinuxReleaseSecurityLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                       virDomainDefPtr def)
1200
{
1201
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1202

1203 1204 1205 1206
    if (secdef->type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
        if (secdef->label != NULL) {
            context_t con = context_new(secdef->label);
            if (con) {
1207
                virSecuritySELinuxMCSRemove(context_range_get(con));
1208 1209 1210 1211 1212 1213
                context_free(con);
            }
        }
        VIR_FREE(secdef->label);
        if (!secdef->baselabel)
            VIR_FREE(secdef->model);
1214 1215 1216
    }
    VIR_FREE(secdef->imagelabel);

1217
    return 0;
1218 1219
}

1220 1221

static int
1222 1223 1224
virSecuritySELinuxSetSavedStateLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                     virDomainDefPtr def,
                                     const char *savefile)
1225
{
1226
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1227

1228
    if (secdef->norelabel)
1229 1230
        return 0;

1231
    return virSecuritySELinuxSetFilecon(savefile, secdef->imagelabel);
1232 1233 1234 1235
}


static int
1236 1237 1238
virSecuritySELinuxRestoreSavedStateLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                         virDomainDefPtr def,
                                         const char *savefile)
1239
{
1240
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1241

1242
    if (secdef->norelabel)
1243 1244
        return 0;

1245
    return virSecuritySELinuxRestoreSecurityFileLabel(savefile);
1246 1247 1248
}


1249
static int
1250 1251
virSecuritySELinuxSecurityVerify(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                 virDomainDefPtr def)
1252 1253
{
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1254
    if (!STREQ(virSecurityManagerGetModel(mgr), secdef->model)) {
1255 1256 1257 1258 1259
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label driver mismatch: "
                         "'%s' model configured for domain, but "
                         "hypervisor driver is '%s'."),
                       secdef->model, virSecurityManagerGetModel(mgr));
1260 1261 1262
        return -1;
    }

1263 1264
    if (secdef->type == VIR_DOMAIN_SECLABEL_STATIC) {
        if (security_check_context(secdef->label) != 0) {
1265 1266
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid security label %s"), secdef->label);
1267 1268 1269 1270 1271 1272
            return -1;
        }
    }
    return 0;
}

1273
static int
1274 1275
virSecuritySELinuxSetSecurityProcessLabel(virSecurityManagerPtr mgr,
                                          virDomainDefPtr def)
1276 1277
{
    /* TODO: verify DOI */
1278
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1279
    VIR_DEBUG("label=%s", secdef->label);
1280

1281
    if (def->seclabel.label == NULL)
1282 1283
        return 0;

1284
    if (!STREQ(virSecurityManagerGetModel(mgr), secdef->model)) {
1285 1286 1287 1288 1289
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label driver mismatch: "
                         "'%s' model configured for domain, but "
                         "hypervisor driver is '%s'."),
                       secdef->model, virSecurityManagerGetModel(mgr));
1290
        if (security_getenforce() == 1)
1291
            return -1;
1292 1293 1294
    }

    if (setexeccon(secdef->label) == -1) {
1295
        virReportSystemError(errno,
1296 1297
                             _("unable to set security context '%s'"),
                             secdef->label);
1298
        if (security_getenforce() == 1)
1299
            return -1;
1300 1301
    }

1302 1303 1304
    return 0;
}

1305
static int
1306 1307
virSecuritySELinuxSetSecurityDaemonSocketLabel(virSecurityManagerPtr mgr,
                                               virDomainDefPtr def)
1308 1309
{
    /* TODO: verify DOI */
1310
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1311 1312 1313 1314 1315
    context_t execcon = NULL;
    context_t proccon = NULL;
    security_context_t scon = NULL;
    int rc = -1;

1316
    if (def->seclabel.label == NULL)
1317 1318
        return 0;

1319
    if (!STREQ(virSecurityManagerGetModel(mgr), secdef->model)) {
1320 1321 1322 1323 1324
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label driver mismatch: "
                         "'%s' model configured for domain, but "
                         "hypervisor driver is '%s'."),
                       secdef->model, virSecurityManagerGetModel(mgr));
1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356
        goto done;
    }

    if ( !(execcon = context_new(secdef->label)) ) {
        virReportSystemError(errno,
                             _("unable to allocate socket security context '%s'"),
                             secdef->label);
        goto done;
    }

    if (getcon(&scon) == -1) {
        virReportSystemError(errno,
                             _("unable to get current process context '%s'"),
                             secdef->label);
        goto done;
    }

    if ( !(proccon = context_new(scon)) ) {
        virReportSystemError(errno,
                             _("unable to set socket security context '%s'"),
                             secdef->label);
        goto done;
    }

    if (context_range_set(proccon, context_range_get(execcon)) == -1) {
        virReportSystemError(errno,
                             _("unable to set socket security context range '%s'"),
                             secdef->label);
        goto done;
    }

    VIR_DEBUG("Setting VM %s socket context %s",
1357
              def->name, context_str(proccon));
1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375
    if (setsockcreatecon(context_str(proccon)) == -1) {
        virReportSystemError(errno,
                             _("unable to set socket security context '%s'"),
                             context_str(proccon));
        goto done;
    }

    rc = 0;
done:

    if (security_getenforce() != 1)
        rc = 0;
    if (execcon) context_free(execcon);
    if (proccon) context_free(proccon);
    freecon(scon);
    return rc;
}

1376
static int
1377 1378
virSecuritySELinuxSetSecuritySocketLabel(virSecurityManagerPtr mgr,
                                         virDomainDefPtr vm)
1379
{
1380
    const virSecurityLabelDefPtr secdef = &vm->seclabel;
1381 1382 1383 1384 1385 1386
    int rc = -1;

    if (secdef->label == NULL)
        return 0;

    if (!STREQ(virSecurityManagerGetModel(mgr), secdef->model)) {
1387 1388 1389 1390 1391
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label driver mismatch: "
                         "'%s' model configured for domain, but "
                         "hypervisor driver is '%s'."),
                       secdef->model, virSecurityManagerGetModel(mgr));
1392 1393 1394 1395
        goto done;
    }

    VIR_DEBUG("Setting VM %s socket context %s",
1396
              vm->name, secdef->label);
1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412
    if (setsockcreatecon(secdef->label) == -1) {
        virReportSystemError(errno,
                             _("unable to set socket security context '%s'"),
                             secdef->label);
        goto done;
    }

    rc = 0;

done:
    if (security_getenforce() != 1)
        rc = 0;

    return rc;
}

1413
static int
1414 1415
virSecuritySELinuxClearSecuritySocketLabel(virSecurityManagerPtr mgr,
                                           virDomainDefPtr def)
1416 1417
{
    /* TODO: verify DOI */
1418
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1419

1420
    if (def->seclabel.label == NULL)
1421 1422
        return 0;

1423
    if (!STREQ(virSecurityManagerGetModel(mgr), secdef->model)) {
1424 1425 1426 1427 1428
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label driver mismatch: "
                         "'%s' model configured for domain, but "
                         "hypervisor driver is '%s'."),
                       secdef->model, virSecurityManagerGetModel(mgr));
1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442
        if (security_getenforce() == 1)
            return -1;
    }

    if (setsockcreatecon(NULL) == -1) {
        virReportSystemError(errno,
                             _("unable to clear socket security context '%s'"),
                             secdef->label);
        if (security_getenforce() == 1)
            return -1;
    }
    return 0;
}

1443 1444

static int
1445 1446 1447
virSecuritySELinuxSetSecurityChardevCallback(virDomainDefPtr def,
                                             virDomainChrDefPtr dev,
                                             void *opaque ATTRIBUTE_UNUSED)
1448
{
1449 1450 1451 1452 1453
    /* This is taken care of by processing of def->serials */
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        dev->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL)
        return 0;

1454
    return virSecuritySELinuxSetSecurityChardevLabel(def, &dev->source);
1455 1456 1457
}


E
Eric Blake 已提交
1458
static int
1459 1460 1461
virSecuritySELinuxSetSecuritySmartcardCallback(virDomainDefPtr def,
                                               virDomainSmartcardDefPtr dev,
                                               void *opaque)
E
Eric Blake 已提交
1462 1463
{
    const char *database;
1464 1465
    virSecurityManagerPtr mgr = opaque;
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);
E
Eric Blake 已提交
1466 1467 1468 1469 1470 1471 1472 1473 1474

    switch (dev->type) {
    case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
        database = dev->data.cert.database;
        if (!database)
            database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
1475
        return virSecuritySELinuxSetFilecon(database, data->content_context);
E
Eric Blake 已提交
1476 1477

    case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
1478
        return virSecuritySELinuxSetSecurityChardevLabel(def, &dev->data.passthru);
E
Eric Blake 已提交
1479 1480

    default:
1481 1482 1483
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unknown smartcard type %d"),
                       dev->type);
E
Eric Blake 已提交
1484 1485 1486 1487 1488 1489 1490
        return -1;
    }

    return 0;
}


1491
static int
1492 1493 1494
virSecuritySELinuxSetSecurityAllLabel(virSecurityManagerPtr mgr,
                                      virDomainDefPtr def,
                                      const char *stdin_path)
1495
{
1496
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);
1497
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1498 1499
    int i;

1500
    if (secdef->norelabel)
1501 1502
        return 0;

1503
    for (i = 0 ; i < def->ndisks ; i++) {
1504
        /* XXX fixme - we need to recursively label the entire tree :-( */
1505
        if (def->disks[i]->type == VIR_DOMAIN_DISK_TYPE_DIR) {
1506
            VIR_WARN("Unable to relabel directory tree %s for disk %s",
1507
                     def->disks[i]->src, def->disks[i]->dst);
1508
            continue;
1509
        }
1510
        if (virSecuritySELinuxSetSecurityImageLabel(mgr,
1511
                                         def, def->disks[i]) < 0)
1512 1513
            return -1;
    }
1514
    /* XXX fixme process  def->fss if relabel == true */
1515

1516
    for (i = 0 ; i < def->nhostdevs ; i++) {
1517
        if (virSecuritySELinuxSetSecurityHostdevLabel(mgr,
1518 1519
                                           def,
                                           def->hostdevs[i]) < 0)
1520
            return -1;
1521 1522
    }

1523
    if (virDomainChrDefForeach(def,
1524
                               true,
1525
                               virSecuritySELinuxSetSecurityChardevCallback,
1526
                               NULL) < 0)
1527 1528
        return -1;

1529
    if (virDomainSmartcardDefForeach(def,
E
Eric Blake 已提交
1530
                                     true,
1531
                                     virSecuritySELinuxSetSecuritySmartcardCallback,
1532
                                     mgr) < 0)
E
Eric Blake 已提交
1533 1534
        return -1;

1535
    if (def->os.kernel &&
1536
        virSecuritySELinuxSetFilecon(def->os.kernel, data->content_context) < 0)
1537 1538
        return -1;

1539
    if (def->os.initrd &&
1540
        virSecuritySELinuxSetFilecon(def->os.initrd, data->content_context) < 0)
1541 1542
        return -1;

1543
    if (stdin_path) {
1544
        if (virSecuritySELinuxSetFilecon(stdin_path, data->content_context) < 0 &&
1545 1546 1547 1548
            virStorageFileIsSharedFSType(stdin_path,
                                         VIR_STORAGE_FILE_SHFS_NFS) != 1)
            return -1;
    }
1549

1550 1551 1552
    return 0;
}

1553
static int
1554 1555 1556
virSecuritySELinuxSetImageFDLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                  virDomainDefPtr def,
                                  int fd)
1557
{
1558
    const virSecurityLabelDefPtr secdef = &def->seclabel;
1559 1560 1561 1562

    if (secdef->imagelabel == NULL)
        return 0;

1563
    return virSecuritySELinuxFSetFilecon(fd, secdef->imagelabel);
1564 1565
}

1566 1567 1568 1569
static char *
virSecuritySELinuxGenImageLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr def)
{
1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589
    const virSecurityLabelDefPtr secdef = &def->seclabel;
    virSecuritySELinuxDataPtr data = virSecurityManagerGetPrivateData(mgr);
    const char *range;
    context_t ctx = NULL;
    char *label = NULL;
    const char *mcs = NULL;

    if (secdef->label) {
        ctx = context_new(secdef->label);
        if (!ctx) {
            virReportOOMError();
            goto cleanup;
        }
        range = context_range_get(ctx);
        if (range) {
            mcs = strdup(range);
            if (!mcs) {
                virReportOOMError();
                goto cleanup;
            }
1590
            label = virSecuritySELinuxGenNewContext(data->file_context, mcs);
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603
            if (!label) {
                virReportOOMError();
                goto cleanup;
            }
        }
    }

cleanup:
        context_free(ctx);
        VIR_FREE(mcs);
        return label;
}

1604 1605 1606 1607
static char *
virSecuritySELinuxGetSecurityMountOptions(virSecurityManagerPtr mgr,
                                          virDomainDefPtr def)
{
1608 1609 1610 1611
    char *opts = NULL;
    const virSecurityLabelDefPtr secdef = &def->seclabel;

    if (! secdef->imagelabel)
1612
        secdef->imagelabel = virSecuritySELinuxGenImageLabel(mgr,def);
1613 1614 1615 1616 1617 1618 1619

    if (secdef->imagelabel) {
        virAsprintf(&opts,
                    ",context=\"%s\"",
                    (const char*) secdef->imagelabel);
    }

1620
    VIR_DEBUG("imageLabel=%s", secdef->imagelabel);
1621 1622 1623
    return opts;
}

1624
virSecurityDriver virSecurityDriverSELinux = {
1625 1626
    .privateDataLen                     = sizeof(virSecuritySELinuxData),
    .name                               = SECURITY_SELINUX_NAME,
1627 1628 1629
    .probe                              = virSecuritySELinuxSecurityDriverProbe,
    .open                               = virSecuritySELinuxSecurityDriverOpen,
    .close                              = virSecuritySELinuxSecurityDriverClose,
1630

1631 1632
    .getModel                           = virSecuritySELinuxSecurityGetModel,
    .getDOI                             = virSecuritySELinuxSecurityGetDOI,
1633

1634
    .domainSecurityVerify               = virSecuritySELinuxSecurityVerify,
1635

1636 1637
    .domainSetSecurityImageLabel        = virSecuritySELinuxSetSecurityImageLabel,
    .domainRestoreSecurityImageLabel    = virSecuritySELinuxRestoreSecurityImageLabel,
1638

1639 1640 1641
    .domainSetSecurityDaemonSocketLabel = virSecuritySELinuxSetSecurityDaemonSocketLabel,
    .domainSetSecuritySocketLabel       = virSecuritySELinuxSetSecuritySocketLabel,
    .domainClearSecuritySocketLabel     = virSecuritySELinuxClearSecuritySocketLabel,
1642

1643 1644 1645
    .domainGenSecurityLabel             = virSecuritySELinuxGenSecurityLabel,
    .domainReserveSecurityLabel         = virSecuritySELinuxReserveSecurityLabel,
    .domainReleaseSecurityLabel         = virSecuritySELinuxReleaseSecurityLabel,
1646

1647 1648
    .domainGetSecurityProcessLabel      = virSecuritySELinuxGetSecurityProcessLabel,
    .domainSetSecurityProcessLabel      = virSecuritySELinuxSetSecurityProcessLabel,
1649

1650 1651
    .domainSetSecurityAllLabel          = virSecuritySELinuxSetSecurityAllLabel,
    .domainRestoreSecurityAllLabel      = virSecuritySELinuxRestoreSecurityAllLabel,
1652

1653 1654
    .domainSetSecurityHostdevLabel      = virSecuritySELinuxSetSecurityHostdevLabel,
    .domainRestoreSecurityHostdevLabel  = virSecuritySELinuxRestoreSecurityHostdevLabel,
1655

1656 1657
    .domainSetSavedStateLabel           = virSecuritySELinuxSetSavedStateLabel,
    .domainRestoreSavedStateLabel       = virSecuritySELinuxRestoreSavedStateLabel,
1658

1659
    .domainSetSecurityImageFDLabel      = virSecuritySELinuxSetImageFDLabel,
1660

1661
    .domainGetSecurityMountOptions      = virSecuritySELinuxGetSecurityMountOptions,
1662
};