security_dac.c 64.8 KB
Newer Older
1
/*
2
 * Copyright (C) 2010-2014 Red Hat, Inc.
3 4 5 6 7 8 9 10 11 12 13 14
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
15
 * License along with this library.  If not, see
O
Osier Yang 已提交
16
 * <http://www.gnu.org/licenses/>.
17 18 19 20 21 22 23 24 25
 *
 * POSIX DAC security driver
 */

#include <config.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>

26 27 28 29 30
#ifdef  __FreeBSD__
# include <sys/sysctl.h>
# include <sys/user.h>
#endif

31
#include "security_dac.h"
32
#include "virerror.h"
33
#include "virfile.h"
34
#include "viralloc.h"
35
#include "virlog.h"
36
#include "virmdev.h"
37
#include "virpci.h"
38
#include "virusb.h"
39
#include "virscsi.h"
40
#include "virscsivhost.h"
41
#include "virstoragefile.h"
42
#include "virstring.h"
M
Martin Kletzander 已提交
43
#include "virutil.h"
44 45

#define VIR_FROM_THIS VIR_FROM_SECURITY
46 47 48

VIR_LOG_INIT("security.security_dac");

49
#define SECURITY_DAC_NAME "dac"
50 51 52 53 54 55 56

typedef struct _virSecurityDACData virSecurityDACData;
typedef virSecurityDACData *virSecurityDACDataPtr;

struct _virSecurityDACData {
    uid_t user;
    gid_t group;
57 58
    gid_t *groups;
    int ngroups;
59
    bool dynamicOwnership;
60
    bool mountNamespace;
61
    char *baselabel;
62
    virSecurityManagerDACChownCallback chownCallback;
63 64
};

65 66 67 68 69 70 71 72
typedef struct _virSecurityDACCallbackData virSecurityDACCallbackData;
typedef virSecurityDACCallbackData *virSecurityDACCallbackDataPtr;

struct _virSecurityDACCallbackData {
    virSecurityManagerPtr manager;
    virSecurityLabelDefPtr secdef;
};

73 74 75
typedef struct _virSecurityDACChownItem virSecurityDACChownItem;
typedef virSecurityDACChownItem *virSecurityDACChownItemPtr;
struct _virSecurityDACChownItem {
76
    char *path;
77 78 79
    const virStorageSource *src;
    uid_t uid;
    gid_t gid;
80
    bool restore;
81 82 83 84 85
};

typedef struct _virSecurityDACChownList virSecurityDACChownList;
typedef virSecurityDACChownList *virSecurityDACChownListPtr;
struct _virSecurityDACChownList {
86
    virSecurityManagerPtr manager;
87 88 89 90 91 92 93 94 95 96 97 98
    virSecurityDACChownItemPtr *items;
    size_t nItems;
};


virThreadLocal chownList;

static int
virSecurityDACChownListAppend(virSecurityDACChownListPtr list,
                              const char *path,
                              const virStorageSource *src,
                              uid_t uid,
99 100
                              gid_t gid,
                              bool restore)
101
{
102 103 104
    int ret = -1;
    char *tmp = NULL;
    virSecurityDACChownItemPtr item = NULL;
105 106 107 108

    if (VIR_ALLOC(item) < 0)
        return -1;

109 110 111 112
    if (VIR_STRDUP(tmp, path) < 0)
        goto cleanup;

    item->path = tmp;
113 114 115
    item->src = src;
    item->uid = uid;
    item->gid = gid;
116
    item->restore = restore;
117

118 119
    if (VIR_APPEND_ELEMENT(list->items, list->nItems, item) < 0)
        goto cleanup;
120

121 122 123 124 125 126 127
    tmp = NULL;

    ret = 0;
 cleanup:
    VIR_FREE(tmp);
    VIR_FREE(item);
    return ret;
128 129 130 131 132 133 134 135 136 137 138
}

static void
virSecurityDACChownListFree(void *opaque)
{
    virSecurityDACChownListPtr list = opaque;
    size_t i;

    if (!list)
        return;

139 140
    for (i = 0; i < list->nItems; i++) {
        VIR_FREE(list->items[i]->path);
141
        VIR_FREE(list->items[i]);
142
    }
143
    VIR_FREE(list->items);
144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164
    VIR_FREE(list);
}


/**
 * virSecurityDACTransactionAppend:
 * @path: Path to chown
 * @src: disk source to chown
 * @uid: user ID
 * @gid: group ID
 *
 * Appends an entry onto transaction list.
 *
 * Returns: 1 in case of successful append
 *          0 if there is no transaction enabled
 *         -1 otherwise.
 */
static int
virSecurityDACTransactionAppend(const char *path,
                                const virStorageSource *src,
                                uid_t uid,
165 166
                                gid_t gid,
                                bool restore)
167 168 169 170 171
{
    virSecurityDACChownListPtr list = virThreadLocalGet(&chownList);
    if (!list)
        return 0;

172
    if (virSecurityDACChownListAppend(list, path, src, uid, gid, restore) < 0)
173 174 175 176 177 178
        return -1;

    return 1;
}


179 180 181 182 183
static int virSecurityDACSetOwnership(virSecurityManagerPtr mgr,
                                      const virStorageSource *src,
                                      const char *path,
                                      uid_t uid,
                                      gid_t gid);
184

185 186 187
static int virSecurityDACRestoreFileLabelInternal(virSecurityManagerPtr mgr,
                                                  const virStorageSource *src,
                                                  const char *path);
188 189 190 191 192 193 194
/**
 * virSecurityDACTransactionRun:
 * @pid: process pid
 * @opaque: opaque data
 *
 * This is the callback that runs in the same namespace as the domain we are
 * relabelling. For given transaction (@opaque) it relabels all the paths on
195 196
 * the list. Depending on security manager configuration it might lock paths
 * we will relabel.
197 198 199 200 201 202 203 204 205
 *
 * Returns: 0 on success
 *         -1 otherwise.
 */
static int
virSecurityDACTransactionRun(pid_t pid ATTRIBUTE_UNUSED,
                             void *opaque)
{
    virSecurityDACChownListPtr list = opaque;
206 207
    const char **paths = NULL;
    size_t npaths = 0;
208
    size_t i;
209
    int rv = 0;
210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225
    int ret = -1;

    if (VIR_ALLOC_N(paths, list->nItems) < 0)
        return -1;

    for (i = 0; i < list->nItems; i++) {
        const char *p = list->items[i]->path;

        if (virFileIsDir(p))
            continue;

        VIR_APPEND_ELEMENT_COPY_INPLACE(paths, npaths, p);
    }

    if (virSecurityManagerMetadataLock(list->manager, paths, npaths) < 0)
        goto cleanup;
226 227 228 229 230

    for (i = 0; i < list->nItems; i++) {
        virSecurityDACChownItemPtr item = list->items[i];

        /* TODO Implement rollback */
231 232 233 234 235 236 237 238 239 240 241 242 243
        if (!item->restore) {
            rv = virSecurityDACSetOwnership(list->manager,
                                            item->src,
                                            item->path,
                                            item->uid,
                                            item->gid);
        } else {
            rv = virSecurityDACRestoreFileLabelInternal(list->manager,
                                                        item->src,
                                                        item->path);
        }

        if (rv < 0)
244
            break;
245 246
    }

247 248 249 250 251 252 253 254 255 256
    if (virSecurityManagerMetadataUnlock(list->manager, paths, npaths) < 0)
        goto cleanup;

    if (rv < 0)
        goto cleanup;

    ret = 0;
 cleanup:
    VIR_FREE(paths);
    return ret;
257 258 259
}


260 261 262 263 264
/* returns -1 on error, 0 on success */
int
virSecurityDACSetUserAndGroup(virSecurityManagerPtr mgr,
                              uid_t user,
                              gid_t group)
265 266 267 268
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    priv->user = user;
    priv->group = group;
269

270
    if (virAsprintf(&priv->baselabel, "+%u:+%u",
271 272
                    (unsigned int)user,
                    (unsigned int)group) < 0)
273 274 275
        return -1;

    return 0;
276 277
}

O
Osier Yang 已提交
278 279 280
void
virSecurityDACSetDynamicOwnership(virSecurityManagerPtr mgr,
                                  bool dynamicOwnership)
281 282 283 284 285
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    priv->dynamicOwnership = dynamicOwnership;
}

286 287 288 289 290 291 292 293 294
void
virSecurityDACSetMountNamespace(virSecurityManagerPtr mgr,
                                bool mountNamespace)
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    priv->mountNamespace = mountNamespace;
}


295 296 297 298 299 300 301 302
void
virSecurityDACSetChownCallback(virSecurityManagerPtr mgr,
                               virSecurityManagerDACChownCallback chownCallback)
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    priv->chownCallback = chownCallback;
}

303
/* returns 1 if label isn't found, 0 on success, -1 on error */
O
Osier Yang 已提交
304
static int
305
ATTRIBUTE_NONNULL(2) ATTRIBUTE_NONNULL(3)
306 307
virSecurityDACParseIds(virSecurityLabelDefPtr seclabel,
                       uid_t *uidPtr, gid_t *gidPtr)
308
{
309
    if (!seclabel || !seclabel->label)
310
        return 1;
311

312
    if (virParseOwnershipIds(seclabel->label, uidPtr, gidPtr) < 0)
313 314 315 316 317
        return -1;

    return 0;
}

O
Osier Yang 已提交
318
static int
319
ATTRIBUTE_NONNULL(3) ATTRIBUTE_NONNULL(4)
320 321
virSecurityDACGetIds(virSecurityLabelDefPtr seclabel,
                     virSecurityDACDataPtr priv,
322 323
                     uid_t *uidPtr, gid_t *gidPtr,
                     gid_t **groups, int *ngroups)
324
{
325 326
    int ret;

327 328 329 330 331
    if (groups)
        *groups = priv ? priv->groups : NULL;
    if (ngroups)
        *ngroups = priv ? priv->ngroups : 0;

332
    if ((ret = virSecurityDACParseIds(seclabel, uidPtr, gidPtr)) <= 0)
333 334 335
        return ret;

    if (!priv) {
336 337
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("DAC seclabel couldn't be determined"));
338 339 340
        return -1;
    }

341 342
    *uidPtr = priv->user;
    *gidPtr = priv->group;
343 344

    return 0;
345 346
}

347 348

/* returns 1 if label isn't found, 0 on success, -1 on error */
O
Osier Yang 已提交
349
static int
350
ATTRIBUTE_NONNULL(2) ATTRIBUTE_NONNULL(3)
351
virSecurityDACParseImageIds(virSecurityLabelDefPtr seclabel,
O
Osier Yang 已提交
352
                            uid_t *uidPtr, gid_t *gidPtr)
353
{
354
    if (!seclabel || !seclabel->imagelabel)
355
        return 1;
356

357
    if (virParseOwnershipIds(seclabel->imagelabel, uidPtr, gidPtr) < 0)
358 359 360 361 362
        return -1;

    return 0;
}

O
Osier Yang 已提交
363
static int
364
ATTRIBUTE_NONNULL(3) ATTRIBUTE_NONNULL(4)
365 366
virSecurityDACGetImageIds(virSecurityLabelDefPtr seclabel,
                          virSecurityDACDataPtr priv,
O
Osier Yang 已提交
367
                          uid_t *uidPtr, gid_t *gidPtr)
368
{
369 370
    int ret;

371
    if ((ret = virSecurityDACParseImageIds(seclabel, uidPtr, gidPtr)) <= 0)
372 373 374
        return ret;

    if (!priv) {
375 376
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("DAC imagelabel couldn't be determined"));
377
        return -1;
378
    }
379

380 381
    *uidPtr = priv->user;
    *gidPtr = priv->group;
382 383

    return 0;
384 385
}

386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428
/**
 * virSecurityDACRememberLabel:
 * @priv: driver's private data
 * @path: path to the file
 * @uid: user owning the @path
 * @gid: group owning the @path
 *
 * Remember the owner of @path (represented by @uid:@gid).
 *
 * Returns: 0 on success, -1 on failure
 */
static int
virSecurityDACRememberLabel(virSecurityDACDataPtr priv ATTRIBUTE_UNUSED,
                            const char *path ATTRIBUTE_UNUSED,
                            uid_t uid ATTRIBUTE_UNUSED,
                            gid_t gid ATTRIBUTE_UNUSED)
{
    return 0;
}

/**
 * virSecurityDACRecallLabel:
 * @priv: driver's private data
 * @path: path to the file
 * @uid: user owning the @path
 * @gid: group owning the @path
 *
 * Recall the previously recorded owner for the @path. However, it may happen
 * that @path is still in use (e.g. by another domain). In that case, 1 is
 * returned and caller should not relabel the @path.
 *
 * Returns: 1 if @path is still in use (@uid and @gid not touched)
 *          0 if @path should be restored (@uid and @gid set)
 *         -1 on failure (@uid and @gid not touched)
 */
static int
virSecurityDACRecallLabel(virSecurityDACDataPtr priv ATTRIBUTE_UNUSED,
                          const char *path ATTRIBUTE_UNUSED,
                          uid_t *uid ATTRIBUTE_UNUSED,
                          gid_t *gid ATTRIBUTE_UNUSED)
{
    return 0;
}
429

430
static virSecurityDriverStatus
431
virSecurityDACProbe(const char *virtDriver ATTRIBUTE_UNUSED)
432 433 434 435 436 437 438
{
    return SECURITY_DRIVER_ENABLE;
}

static int
virSecurityDACOpen(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
{
439 440 441 442 443 444 445
    if (virThreadLocalInit(&chownList,
                           virSecurityDACChownListFree) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to initialize thread local variable"));
        return -1;
    }

446 447 448 449
    return 0;
}

static int
450
virSecurityDACClose(virSecurityManagerPtr mgr)
451
{
452 453
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    VIR_FREE(priv->groups);
454
    VIR_FREE(priv->baselabel);
455 456 457 458
    return 0;
}


O
Osier Yang 已提交
459 460
static const char *
virSecurityDACGetModel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
461
{
462
    return SECURITY_DAC_NAME;
463 464
}

O
Osier Yang 已提交
465 466
static const char *
virSecurityDACGetDOI(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
467 468 469 470
{
    return "0";
}

471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
static int
virSecurityDACPreFork(virSecurityManagerPtr mgr)
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    int ngroups;

    VIR_FREE(priv->groups);
    priv->ngroups = 0;
    if ((ngroups = virGetGroupList(priv->user, priv->group,
                                   &priv->groups)) < 0)
        return -1;
    priv->ngroups = ngroups;
    return 0;
}

486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513
/**
 * virSecurityDACTransactionStart:
 * @mgr: security manager
 *
 * Starts a new transaction. In transaction nothing is chown()-ed until
 * TransactionCommit() is called. This is implemented as a list that is
 * appended to whenever chown() would be called. Since secdriver APIs
 * can be called from multiple threads (to work over different domains)
 * the pointer to the list is stored in thread local variable.
 *
 * Returns 0 on success,
 *        -1 otherwise.
 */
static int
virSecurityDACTransactionStart(virSecurityManagerPtr mgr)
{
    virSecurityDACChownListPtr list;

    list = virThreadLocalGet(&chownList);
    if (list) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Another relabel transaction is already started"));
        return -1;
    }

    if (VIR_ALLOC(list) < 0)
        return -1;

514
    list->manager = mgr;
515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530

    if (virThreadLocalSet(&chownList, list) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to set thread local variable"));
        VIR_FREE(list);
        return -1;
    }

    return 0;
}

/**
 * virSecurityDACTransactionCommit:
 * @mgr: security manager
 * @pid: domain's PID
 *
531 532 533 534 535 536 537 538
 * If @pid is not -1 then enter the @pid namespace (usually @pid refers
 * to a domain) and perform all the chown()-s on the list. If @pid is -1
 * then the transaction is performed in the namespace of the caller.
 *
 * Note that the transaction is also freed, therefore new one has to be
 * started after successful return from this function. Also it is
 * considered as error if there's no transaction set and this function
 * is called.
539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562
 *
 * Returns: 0 on success,
 *         -1 otherwise.
 */
static int
virSecurityDACTransactionCommit(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                                pid_t pid)
{
    virSecurityDACChownListPtr list;
    int ret = -1;

    list = virThreadLocalGet(&chownList);
    if (!list) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("No transaction is set"));
        goto cleanup;
    }

    if (virThreadLocalSet(&chownList, NULL) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to clear thread local variable"));
        goto cleanup;
    }

563 564 565 566 567 568
    if ((pid == -1 &&
         virSecurityDACTransactionRun(pid, list) < 0) ||
        (pid != -1 &&
         virProcessRunInMountNamespace(pid,
                                       virSecurityDACTransactionRun,
                                       list) < 0))
569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597
        goto cleanup;

    ret = 0;
 cleanup:
    virSecurityDACChownListFree(list);
    return ret;
}

/**
 * virSecurityDACTransactionAbort:
 * @mgr: security manager
 *
 * Cancels and frees any out standing transaction.
 */
static void
virSecurityDACTransactionAbort(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED)
{
    virSecurityDACChownListPtr list;

    list = virThreadLocalGet(&chownList);
    if (!list)
        return;

    if (virThreadLocalSet(&chownList, NULL) < 0)
        VIR_DEBUG("Unable to clear thread local variable");
    virSecurityDACChownListFree(list);
}


598
static int
599 600
virSecurityDACSetOwnershipInternal(const virSecurityDACData *priv,
                                   const virStorageSource *src,
601 602 603
                                   const char *path,
                                   uid_t uid,
                                   gid_t gid)
604
{
605 606
    int rc;

607 608 609
    /* Be aware that this function might run in a separate process.
     * Therefore, any driver state changes would be thrown away. */

610 611 612 613 614 615 616 617 618
    if (priv && src && priv->chownCallback) {
        rc = priv->chownCallback(src, uid, gid);
        /* here path is used only for error messages */
        path = NULLSTR(src->path);

        /* on -2 returned an error was already reported */
        if (rc == -2)
            return -1;
    } else {
619 620
        struct stat sb;

621 622 623 624 625 626 627 628 629 630
        if (!path) {
            if (!src || !src->path)
                return 0;

            if (!virStorageSourceIsLocalStorage(src))
                return 0;

            path = src->path;
        }

631 632 633 634
        if (stat(path, &sb) < 0) {
            virReportSystemError(errno, _("unable to stat: %s"), path);
            return -1;
        }
635

636 637 638
        if (sb.st_uid == uid && sb.st_gid == gid) {
            /* nothing to chown */
            return 0;
639
        }
640 641

        rc = chown(path, uid, gid);
642
    }
643

644
    if (rc < 0) {
645
        if (errno == EOPNOTSUPP || errno == EINVAL) {
646 647
            VIR_INFO("Setting user and group to '%ld:%ld' on '%s' not "
                     "supported by filesystem",
648
                     (long)uid, (long)gid, path);
649
        } else if (errno == EPERM) {
650 651
            VIR_INFO("Setting user and group to '%ld:%ld' on '%s' not "
                     "permitted",
652
                     (long)uid, (long)gid, path);
653
        } else if (errno == EROFS) {
654 655
            VIR_INFO("Setting user and group to '%ld:%ld' on '%s' not "
                     "possible on readonly filesystem",
656
                     (long)uid, (long)gid, path);
657
        } else {
658
            virReportSystemError(errno,
659 660
                                 _("unable to set user and group to '%ld:%ld' "
                                   "on '%s'"),
661
                                 (long)uid, (long)gid, path);
662 663 664 665 666 667
            return -1;
        }
    }
    return 0;
}

668

669
static int
670
virSecurityDACSetOwnership(virSecurityManagerPtr mgr,
671
                           const virStorageSource *src,
672 673 674
                           const char *path,
                           uid_t uid,
                           gid_t gid)
675
{
676
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
677
    struct stat sb;
678
    int rc;
679 680 681 682 683

    if (!path && src && src->path &&
        virStorageSourceIsLocalStorage(src))
        path = src->path;

684 685 686 687 688 689 690 691
    /* Be aware that this function might run in a separate process.
     * Therefore, any driver state changes would be thrown away. */

    if ((rc = virSecurityDACTransactionAppend(path, src, uid, gid, false)) < 0)
        return -1;
    else if (rc > 0)
        return 0;

692 693 694 695 696 697 698 699 700 701
    if (path) {
        if (stat(path, &sb) < 0) {
            virReportSystemError(errno, _("unable to stat: %s"), path);
            return -1;
        }

        if (virSecurityDACRememberLabel(priv, path, sb.st_uid, sb.st_gid) < 0)
            return -1;
    }

702 703 704
    VIR_INFO("Setting DAC user and group on '%s' to '%ld:%ld'",
             NULLSTR(src ? src->path : path), (long)uid, (long)gid);

705
    return virSecurityDACSetOwnershipInternal(priv, src, path, uid, gid);
706 707 708 709
}


static int
710
virSecurityDACRestoreFileLabelInternal(virSecurityManagerPtr mgr,
711
                                       const virStorageSource *src,
712
                                       const char *path)
713
{
714
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
715 716 717 718 719 720 721 722
    int rv;
    uid_t uid = 0;  /* By default return to root:root */
    gid_t gid = 0;

    if (!path && src && src->path &&
        virStorageSourceIsLocalStorage(src))
        path = src->path;

723 724 725 726 727 728 729 730
    /* Be aware that this function might run in a separate process.
     * Therefore, any driver state changes would be thrown away. */

    if ((rv = virSecurityDACTransactionAppend(path, src, uid, gid, true)) < 0)
        return -1;
    else if (rv > 0)
        return 0;

731 732 733 734 735 736 737 738
    if (path) {
        rv = virSecurityDACRecallLabel(priv, path, &uid, &gid);
        if (rv < 0)
            return -1;
        if (rv > 0)
            return 0;
    }

739 740 741
    VIR_INFO("Restoring DAC user and group on '%s' to %ld:%ld",
             NULLSTR(src ? src->path : path), (long)uid, (long)gid);

742
    return virSecurityDACSetOwnershipInternal(priv, src, path, uid, gid);
743 744 745 746
}


static int
747
virSecurityDACRestoreFileLabel(virSecurityManagerPtr mgr,
748
                               const char *path)
749
{
750
    return virSecurityDACRestoreFileLabelInternal(mgr, NULL, path);
751 752 753 754
}


static int
755 756 757 758
virSecurityDACSetImageLabelInternal(virSecurityManagerPtr mgr,
                                    virDomainDefPtr def,
                                    virStorageSourcePtr src,
                                    virStorageSourcePtr parent)
759
{
760
    virSecurityLabelDefPtr secdef;
761
    virSecurityDeviceLabelDefPtr disk_seclabel;
762
    virSecurityDeviceLabelDefPtr parent_seclabel = NULL;
763
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
764 765 766
    uid_t user;
    gid_t group;

767 768 769 770
    if (!priv->dynamicOwnership)
        return 0;

    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
771
    if (secdef && !secdef->relabel)
772
        return 0;
773

774 775 776 777 778 779 780 781
    disk_seclabel = virStorageSourceGetSecurityLabelDef(src, SECURITY_DAC_NAME);
    if (parent)
        parent_seclabel = virStorageSourceGetSecurityLabelDef(parent,
                                                              SECURITY_DAC_NAME);

    if (disk_seclabel && (!disk_seclabel->relabel || disk_seclabel->label)) {
        if (!disk_seclabel->relabel)
            return 0;
782 783 784

        if (virParseOwnershipIds(disk_seclabel->label, &user, &group) < 0)
            return -1;
785 786 787 788 789 790 791
    } else if (parent_seclabel &&
               (!parent_seclabel->relabel || parent_seclabel->label)) {
        if (!parent_seclabel->relabel)
            return 0;

        if (virParseOwnershipIds(parent_seclabel->label, &user, &group) < 0)
            return -1;
792 793 794 795
    } else {
        if (virSecurityDACGetImageIds(secdef, priv, &user, &group))
            return -1;
    }
796

797
    return virSecurityDACSetOwnership(mgr, src, NULL, user, group);
798 799 800
}


801 802 803 804 805 806 807 808
static int
virSecurityDACSetImageLabel(virSecurityManagerPtr mgr,
                            virDomainDefPtr def,
                            virStorageSourcePtr src)
{
    return virSecurityDACSetImageLabelInternal(mgr, def, src, NULL);
}

809
static int
810 811 812
virSecurityDACSetDiskLabel(virSecurityManagerPtr mgr,
                           virDomainDefPtr def,
                           virDomainDiskDefPtr disk)
813 814

{
815
    virStorageSourcePtr next;
816

817
    for (next = disk->src; virStorageSourceIsBacking(next); next = next->backingStore) {
818
        if (virSecurityDACSetImageLabelInternal(mgr, def, next, disk->src) < 0)
819 820
            return -1;
    }
821

822
    return 0;
823 824 825 826
}


static int
827 828 829 830
virSecurityDACRestoreImageLabelInt(virSecurityManagerPtr mgr,
                                   virDomainDefPtr def,
                                   virStorageSourcePtr src,
                                   bool migrated)
831 832
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
833 834
    virSecurityLabelDefPtr secdef;
    virSecurityDeviceLabelDefPtr disk_seclabel;
835 836 837 838

    if (!priv->dynamicOwnership)
        return 0;

839 840 841 842 843 844 845
    /* Don't restore labels on readoly/shared disks, because other VMs may
     * still be accessing these. Alternatively we could iterate over all
     * running domains and try to figure out if it is in use, but this would
     * not work for clustered filesystems, since we can't see running VMs using
     * the file on other nodes. Safest bet is thus to skip the restore step. */
    if (src->readonly || src->shared)
        return 0;
846

847
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
848
    if (secdef && !secdef->relabel)
849 850
        return 0;

851
    disk_seclabel = virStorageSourceGetSecurityLabelDef(src,
852
                                                        SECURITY_DAC_NAME);
853
    if (disk_seclabel && !disk_seclabel->relabel)
854 855
        return 0;

856 857 858
    /* If we have a shared FS and are doing migration, we must not change
     * ownership, because that kills access on the destination host which is
     * sub-optimal for the guest VM's I/O attempts :-) */
859
    if (migrated) {
860 861 862 863 864 865 866 867 868 869
        int rc = 1;

        if (virStorageSourceIsLocalStorage(src)) {
            if (!src->path)
                return 0;

            if ((rc = virFileIsSharedFS(src->path)) < 0)
                return -1;
        }

870 871
        if (rc == 1) {
            VIR_DEBUG("Skipping image label restore on %s because FS is shared",
872
                      src->path);
873 874 875 876
            return 0;
        }
    }

877
    return virSecurityDACRestoreFileLabelInternal(mgr, src, NULL);
878 879 880 881
}


static int
882 883 884
virSecurityDACRestoreImageLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr def,
                                virStorageSourcePtr src)
885
{
886
    return virSecurityDACRestoreImageLabelInt(mgr, def, src, false);
887 888 889 890
}


static int
891 892 893
virSecurityDACRestoreDiskLabel(virSecurityManagerPtr mgr,
                               virDomainDefPtr def,
                               virDomainDiskDefPtr disk)
894
{
895
    return virSecurityDACRestoreImageLabelInt(mgr, def, disk->src, false);
896 897 898 899
}


static int
900 901
virSecurityDACSetHostdevLabelHelper(const char *file,
                                    void *opaque)
902
{
903 904 905
    virSecurityDACCallbackDataPtr cbdata = opaque;
    virSecurityManagerPtr mgr = cbdata->manager;
    virSecurityLabelDefPtr secdef = cbdata->secdef;
906
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
907 908
    uid_t user;
    gid_t group;
909

910
    if (virSecurityDACGetIds(secdef, priv, &user, &group, NULL, NULL) < 0)
911 912
        return -1;

913
    return virSecurityDACSetOwnership(mgr, NULL, file, user, group);
914 915 916
}


917
static int
918 919 920
virSecurityDACSetPCILabel(virPCIDevicePtr dev ATTRIBUTE_UNUSED,
                          const char *file,
                          void *opaque)
921
{
922
    return virSecurityDACSetHostdevLabelHelper(file, opaque);
923 924 925
}


926
static int
927 928 929
virSecurityDACSetUSBLabel(virUSBDevicePtr dev ATTRIBUTE_UNUSED,
                          const char *file,
                          void *opaque)
930
{
931
    return virSecurityDACSetHostdevLabelHelper(file, opaque);
932
}
933

934

935
static int
936 937 938
virSecurityDACSetSCSILabel(virSCSIDevicePtr dev ATTRIBUTE_UNUSED,
                           const char *file,
                           void *opaque)
939
{
940
    return virSecurityDACSetHostdevLabelHelper(file, opaque);
941 942 943
}


944 945 946 947 948 949 950 951 952
static int
virSecurityDACSetHostLabel(virSCSIVHostDevicePtr dev ATTRIBUTE_UNUSED,
                           const char *file,
                           void *opaque)
{
    return virSecurityDACSetHostdevLabelHelper(file, opaque);
}


953
static int
954 955 956 957
virSecurityDACSetHostdevLabel(virSecurityManagerPtr mgr,
                              virDomainDefPtr def,
                              virDomainHostdevDefPtr dev,
                              const char *vroot)
958 959
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
960
    virSecurityDACCallbackData cbdata;
961
    virDomainHostdevSubsysUSBPtr usbsrc = &dev->source.subsys.u.usb;
962
    virDomainHostdevSubsysPCIPtr pcisrc = &dev->source.subsys.u.pci;
963
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
964
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &dev->source.subsys.u.scsi_host;
965
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &dev->source.subsys.u.mdev;
966 967 968 969 970 971 972 973
    int ret = -1;

    if (!priv->dynamicOwnership)
        return 0;

    if (dev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
        return 0;

974
    /* Like virSecurityDACSetImageLabel() for a networked disk,
975 976
     * do nothing for an iSCSI hostdev
     */
977 978
    if (dev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI &&
        scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI)
979 980
        return 0;

981 982 983
    cbdata.manager = mgr;
    cbdata.secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

984
    if (cbdata.secdef && !cbdata.secdef->relabel)
985 986
        return 0;

987
    switch ((virDomainHostdevSubsysType)dev->source.subsys.type) {
988
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB: {
989
        virUSBDevicePtr usb;
990

991 992 993
        if (dev->missing)
            return 0;

994
        if (!(usb = virUSBDeviceNew(usbsrc->bus, usbsrc->device, vroot)))
995 996
            goto done;

997
        ret = virUSBDeviceFileIterate(usb,
998
                                      virSecurityDACSetUSBLabel,
999
                                      &cbdata);
1000
        virUSBDeviceFree(usb);
1001 1002 1003 1004
        break;
    }

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: {
1005
        virPCIDevicePtr pci =
1006 1007
            virPCIDeviceNew(pcisrc->addr.domain, pcisrc->addr.bus,
                            pcisrc->addr.slot, pcisrc->addr.function);
1008 1009 1010 1011

        if (!pci)
            goto done;

1012
        if (pcisrc->backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
1013
            char *vfioGroupDev = virPCIDeviceGetIOMMUGroupDev(pci);
1014

1015 1016
            if (!vfioGroupDev) {
                virPCIDeviceFree(pci);
1017
                goto done;
1018
            }
1019
            ret = virSecurityDACSetPCILabel(pci, vfioGroupDev, &cbdata);
1020 1021
            VIR_FREE(vfioGroupDev);
        } else {
1022
            ret = virPCIDeviceFileIterate(pci,
1023
                                          virSecurityDACSetPCILabel,
1024
                                          &cbdata);
1025 1026
        }

1027
        virPCIDeviceFree(pci);
1028 1029 1030
        break;
    }

1031
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
1032
        virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
1033
        virSCSIDevicePtr scsi =
1034
            virSCSIDeviceNew(NULL,
1035 1036
                             scsihostsrc->adapter, scsihostsrc->bus,
                             scsihostsrc->target, scsihostsrc->unit,
1037
                             dev->readonly, dev->shareable);
1038 1039 1040 1041

        if (!scsi)
            goto done;

1042
        ret = virSCSIDeviceFileIterate(scsi,
1043
                                       virSecurityDACSetSCSILabel,
1044
                                       &cbdata);
1045 1046 1047 1048 1049
        virSCSIDeviceFree(scsi);

        break;
    }

1050
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST: {
1051 1052 1053 1054 1055 1056 1057 1058 1059 1060
        virSCSIVHostDevicePtr host = virSCSIVHostDeviceNew(hostsrc->wwpn);

        if (!host)
            goto done;

        ret = virSCSIVHostDeviceFileIterate(host,
                                            virSecurityDACSetHostLabel,
                                            &cbdata);
        virSCSIVHostDeviceFree(host);
        break;
1061 1062
    }

1063 1064 1065
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV: {
        char *vfiodev = NULL;

1066
        if (!(vfiodev = virMediatedDeviceGetIOMMUGroupDev(mdevsrc->uuidstr)))
1067 1068 1069 1070 1071 1072 1073 1074
            goto done;

        ret = virSecurityDACSetHostdevLabelHelper(vfiodev, &cbdata);

        VIR_FREE(vfiodev);
        break;
    }

1075
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
1076 1077 1078 1079
        ret = 0;
        break;
    }

1080
 done:
1081 1082 1083 1084 1085
    return ret;
}


static int
1086 1087 1088
virSecurityDACRestorePCILabel(virPCIDevicePtr dev ATTRIBUTE_UNUSED,
                              const char *file,
                              void *opaque)
1089
{
1090
    virSecurityManagerPtr mgr = opaque;
1091
    return virSecurityDACRestoreFileLabel(mgr, file);
1092 1093 1094 1095
}


static int
1096 1097 1098
virSecurityDACRestoreUSBLabel(virUSBDevicePtr dev ATTRIBUTE_UNUSED,
                              const char *file,
                              void *opaque)
1099
{
1100
    virSecurityManagerPtr mgr = opaque;
1101
    return virSecurityDACRestoreFileLabel(mgr, file);
1102 1103 1104
}


1105
static int
1106 1107 1108
virSecurityDACRestoreSCSILabel(virSCSIDevicePtr dev ATTRIBUTE_UNUSED,
                               const char *file,
                               void *opaque)
1109
{
1110
    virSecurityManagerPtr mgr = opaque;
1111
    return virSecurityDACRestoreFileLabel(mgr, file);
1112 1113 1114
}


1115 1116 1117 1118 1119 1120
static int
virSecurityDACRestoreHostLabel(virSCSIVHostDevicePtr dev ATTRIBUTE_UNUSED,
                               const char *file,
                               void *opaque)
{
    virSecurityManagerPtr mgr = opaque;
1121
    return virSecurityDACRestoreFileLabel(mgr, file);
1122 1123 1124
}


1125
static int
1126 1127 1128 1129
virSecurityDACRestoreHostdevLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr def,
                                  virDomainHostdevDefPtr dev,
                                  const char *vroot)
1130 1131 1132

{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
1133
    virSecurityLabelDefPtr secdef;
1134
    virDomainHostdevSubsysUSBPtr usbsrc = &dev->source.subsys.u.usb;
1135
    virDomainHostdevSubsysPCIPtr pcisrc = &dev->source.subsys.u.pci;
1136
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
1137
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &dev->source.subsys.u.scsi_host;
1138
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &dev->source.subsys.u.mdev;
1139 1140
    int ret = -1;

1141 1142
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

1143
    if (!priv->dynamicOwnership || (secdef && !secdef->relabel))
1144 1145 1146 1147 1148
        return 0;

    if (dev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
        return 0;

1149
    /* Like virSecurityDACRestoreImageLabelInt() for a networked disk,
1150 1151
     * do nothing for an iSCSI hostdev
     */
1152 1153
    if (dev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI &&
        scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI)
1154 1155
        return 0;

1156
    switch ((virDomainHostdevSubsysType)dev->source.subsys.type) {
1157
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB: {
1158
        virUSBDevicePtr usb;
1159 1160 1161

        if (dev->missing)
            return 0;
1162

1163
        if (!(usb = virUSBDeviceNew(usbsrc->bus, usbsrc->device, vroot)))
1164 1165
            goto done;

1166
        ret = virUSBDeviceFileIterate(usb, virSecurityDACRestoreUSBLabel, mgr);
1167
        virUSBDeviceFree(usb);
1168 1169 1170 1171 1172

        break;
    }

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: {
1173
        virPCIDevicePtr pci =
1174 1175
            virPCIDeviceNew(pcisrc->addr.domain, pcisrc->addr.bus,
                            pcisrc->addr.slot, pcisrc->addr.function);
1176 1177 1178 1179

        if (!pci)
            goto done;

1180
        if (pcisrc->backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
1181
            char *vfioGroupDev = virPCIDeviceGetIOMMUGroupDev(pci);
1182

1183 1184
            if (!vfioGroupDev) {
                virPCIDeviceFree(pci);
1185
                goto done;
1186
            }
1187
            ret = virSecurityDACRestorePCILabel(pci, vfioGroupDev, mgr);
1188 1189
            VIR_FREE(vfioGroupDev);
        } else {
1190
            ret = virPCIDeviceFileIterate(pci, virSecurityDACRestorePCILabel, mgr);
1191
        }
1192
        virPCIDeviceFree(pci);
1193 1194 1195
        break;
    }

1196
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
1197
        virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
1198
        virSCSIDevicePtr scsi =
1199
            virSCSIDeviceNew(NULL,
1200 1201
                             scsihostsrc->adapter, scsihostsrc->bus,
                             scsihostsrc->target, scsihostsrc->unit,
1202
                             dev->readonly, dev->shareable);
1203 1204 1205 1206

        if (!scsi)
            goto done;

1207
        ret = virSCSIDeviceFileIterate(scsi, virSecurityDACRestoreSCSILabel, mgr);
1208 1209 1210 1211 1212
        virSCSIDeviceFree(scsi);

        break;
    }

1213
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST: {
1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224
        virSCSIVHostDevicePtr host = virSCSIVHostDeviceNew(hostsrc->wwpn);

        if (!host)
            goto done;

        ret = virSCSIVHostDeviceFileIterate(host,
                                            virSecurityDACRestoreHostLabel,
                                            mgr);
        virSCSIVHostDeviceFree(host);

        break;
1225 1226
    }

1227 1228 1229
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV: {
        char *vfiodev = NULL;

1230
        if (!(vfiodev = virMediatedDeviceGetIOMMUGroupDev(mdevsrc->uuidstr)))
1231 1232
            goto done;

1233
        ret = virSecurityDACRestoreFileLabel(mgr, vfiodev);
1234 1235 1236 1237
        VIR_FREE(vfiodev);
        break;
    }

1238
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
1239 1240 1241 1242
        ret = 0;
        break;
    }

1243
 done:
1244 1245 1246 1247 1248 1249
    return ret;
}


static int
virSecurityDACSetChardevLabel(virSecurityManagerPtr mgr,
1250
                              virDomainDefPtr def,
1251 1252
                              virDomainChrSourceDefPtr dev_source,
                              bool chardevStdioLogd)
1253 1254 1255

{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
1256
    virSecurityLabelDefPtr seclabel;
1257
    virSecurityDeviceLabelDefPtr chr_seclabel = NULL;
1258 1259
    char *in = NULL, *out = NULL;
    int ret = -1;
1260 1261 1262
    uid_t user;
    gid_t group;

1263 1264
    seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

1265 1266
    chr_seclabel = virDomainChrSourceDefGetSecurityLabelDef(dev_source,
                                                            SECURITY_DAC_NAME);
1267

1268
    if (chr_seclabel && !chr_seclabel->relabel)
1269 1270
        return 0;

1271 1272 1273
    if (!chr_seclabel &&
        dev_source->type == VIR_DOMAIN_CHR_TYPE_FILE &&
        chardevStdioLogd)
1274 1275
        return 0;

1276 1277 1278 1279 1280 1281 1282
    if (chr_seclabel && chr_seclabel->label) {
        if (virParseOwnershipIds(chr_seclabel->label, &user, &group) < 0)
            return -1;
    } else {
        if (virSecurityDACGetIds(seclabel, priv, &user, &group, NULL, NULL) < 0)
            return -1;
    }
1283

1284
    switch ((virDomainChrType)dev_source->type) {
1285 1286
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
1287
        ret = virSecurityDACSetOwnership(mgr, NULL,
1288
                                         dev_source->data.file.path,
1289
                                         user, group);
1290 1291 1292
        break;

    case VIR_DOMAIN_CHR_TYPE_PIPE:
J
Jiri Denemark 已提交
1293 1294
        if (virAsprintf(&in, "%s.in", dev_source->data.file.path) < 0 ||
            virAsprintf(&out, "%s.out", dev_source->data.file.path) < 0)
1295 1296
            goto done;
        if (virFileExists(in) && virFileExists(out)) {
1297 1298
            if (virSecurityDACSetOwnership(mgr, NULL, in, user, group) < 0 ||
                virSecurityDACSetOwnership(mgr, NULL, out, user, group) < 0)
1299
                goto done;
1300
        } else if (virSecurityDACSetOwnership(mgr, NULL,
1301
                                              dev_source->data.file.path,
1302
                                              user, group) < 0) {
1303
            goto done;
1304 1305 1306 1307
        }
        ret = 0;
        break;

1308 1309
    case VIR_DOMAIN_CHR_TYPE_UNIX:
        if (!dev_source->data.nix.listen) {
1310
            if (virSecurityDACSetOwnership(mgr, NULL,
1311
                                           dev_source->data.nix.path,
1312 1313 1314 1315 1316 1317
                                           user, group) < 0)
                goto done;
        }
        ret = 0;
        break;

1318 1319 1320 1321 1322 1323 1324 1325 1326 1327
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
    case VIR_DOMAIN_CHR_TYPE_NULL:
    case VIR_DOMAIN_CHR_TYPE_VC:
    case VIR_DOMAIN_CHR_TYPE_PTY:
    case VIR_DOMAIN_CHR_TYPE_STDIO:
    case VIR_DOMAIN_CHR_TYPE_UDP:
    case VIR_DOMAIN_CHR_TYPE_TCP:
    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
    case VIR_DOMAIN_CHR_TYPE_NMDM:
    case VIR_DOMAIN_CHR_TYPE_LAST:
1328 1329 1330 1331
        ret = 0;
        break;
    }

1332
 done:
1333 1334 1335 1336 1337 1338
    VIR_FREE(in);
    VIR_FREE(out);
    return ret;
}

static int
1339
virSecurityDACRestoreChardevLabel(virSecurityManagerPtr mgr,
1340
                                  virDomainDefPtr def ATTRIBUTE_UNUSED,
1341 1342
                                  virDomainChrSourceDefPtr dev_source,
                                  bool chardevStdioLogd)
1343
{
1344
    virSecurityDeviceLabelDefPtr chr_seclabel = NULL;
1345 1346 1347
    char *in = NULL, *out = NULL;
    int ret = -1;

1348 1349
    chr_seclabel = virDomainChrSourceDefGetSecurityLabelDef(dev_source,
                                                            SECURITY_DAC_NAME);
1350

1351
    if (chr_seclabel && !chr_seclabel->relabel)
1352 1353
        return 0;

1354 1355 1356
    if (!chr_seclabel &&
        dev_source->type == VIR_DOMAIN_CHR_TYPE_FILE &&
        chardevStdioLogd)
1357 1358
        return 0;

1359
    switch ((virDomainChrType)dev_source->type) {
1360 1361
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
1362
        ret = virSecurityDACRestoreFileLabel(mgr, dev_source->data.file.path);
1363 1364 1365
        break;

    case VIR_DOMAIN_CHR_TYPE_PIPE:
J
Jiri Denemark 已提交
1366 1367
        if (virAsprintf(&out, "%s.out", dev_source->data.file.path) < 0 ||
            virAsprintf(&in, "%s.in", dev_source->data.file.path) < 0)
1368
            goto done;
1369
        if (virFileExists(in) && virFileExists(out)) {
1370 1371
            if (virSecurityDACRestoreFileLabel(mgr, out) < 0 ||
                virSecurityDACRestoreFileLabel(mgr, in) < 0)
J
Jim Fehlig 已提交
1372
                goto done;
1373
        } else if (virSecurityDACRestoreFileLabel(mgr, dev_source->data.file.path) < 0) {
1374 1375
            goto done;
        }
1376 1377 1378
        ret = 0;
        break;

1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389
    case VIR_DOMAIN_CHR_TYPE_NULL:
    case VIR_DOMAIN_CHR_TYPE_VC:
    case VIR_DOMAIN_CHR_TYPE_PTY:
    case VIR_DOMAIN_CHR_TYPE_STDIO:
    case VIR_DOMAIN_CHR_TYPE_UDP:
    case VIR_DOMAIN_CHR_TYPE_TCP:
    case VIR_DOMAIN_CHR_TYPE_UNIX:
    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
    case VIR_DOMAIN_CHR_TYPE_NMDM:
    case VIR_DOMAIN_CHR_TYPE_LAST:
1390 1391 1392 1393
        ret = 0;
        break;
    }

1394
 done:
1395 1396 1397 1398 1399 1400
    VIR_FREE(in);
    VIR_FREE(out);
    return ret;
}


1401 1402 1403 1404 1405 1406
struct _virSecuritySELinuxChardevCallbackData {
    virSecurityManagerPtr mgr;
    bool chardevStdioLogd;
};


1407
static int
1408
virSecurityDACRestoreChardevCallback(virDomainDefPtr def,
1409
                                     virDomainChrDefPtr dev ATTRIBUTE_UNUSED,
1410 1411
                                     void *opaque)
{
1412
    struct _virSecuritySELinuxChardevCallbackData *data = opaque;
1413

1414 1415
    return virSecurityDACRestoreChardevLabel(data->mgr, def, dev->source,
                                             data->chardevStdioLogd);
1416 1417 1418
}


1419
static int
1420 1421 1422
virSecurityDACSetTPMFileLabel(virSecurityManagerPtr mgr,
                              virDomainDefPtr def,
                              virDomainTPMDefPtr tpm)
1423 1424 1425 1426 1427
{
    int ret = 0;

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
1428
        ret = virSecurityDACSetChardevLabel(mgr, def,
1429 1430
                                            &tpm->data.passthrough.source,
                                            false);
1431
        break;
1432
    case VIR_DOMAIN_TPM_TYPE_EMULATOR:
1433 1434 1435 1436
        ret = virSecurityDACSetChardevLabel(mgr, def,
                                            &tpm->data.emulator.source,
                                            false);
        break;
1437 1438 1439 1440 1441 1442 1443 1444 1445
    case VIR_DOMAIN_TPM_TYPE_LAST:
        break;
    }

    return ret;
}


static int
1446 1447 1448
virSecurityDACRestoreTPMFileLabel(virSecurityManagerPtr mgr,
                                  virDomainDefPtr def,
                                  virDomainTPMDefPtr tpm)
1449 1450 1451 1452 1453
{
    int ret = 0;

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
1454
        ret = virSecurityDACRestoreChardevLabel(mgr, def,
1455 1456
                                                &tpm->data.passthrough.source,
                                                false);
1457
        break;
1458
    case VIR_DOMAIN_TPM_TYPE_EMULATOR:
1459
        /* swtpm will have removed the Unix socket upon termination */
1460 1461 1462 1463 1464 1465 1466 1467
    case VIR_DOMAIN_TPM_TYPE_LAST:
        break;
    }

    return ret;
}


1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492
static int
virSecurityDACSetGraphicsLabel(virSecurityManagerPtr mgr,
                               virDomainDefPtr def,
                               virDomainGraphicsDefPtr gfx)

{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr seclabel;
    uid_t user;
    gid_t group;

    /* Skip chowning the shared render file if namespaces are disabled */
    if (!priv->mountNamespace)
        return 0;

    seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
    if (seclabel && !seclabel->relabel)
        return 0;

    if (virSecurityDACGetIds(seclabel, priv, &user, &group, NULL, NULL) < 0)
        return -1;

    if (gfx->type == VIR_DOMAIN_GRAPHICS_TYPE_SPICE &&
        gfx->data.spice.gl == VIR_TRISTATE_BOOL_YES &&
        gfx->data.spice.rendernode) {
1493
        if (virSecurityDACSetOwnership(mgr, NULL,
1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515
                                       gfx->data.spice.rendernode,
                                       user, group) < 0)
            return -1;
    }

    return 0;
}


static int
virSecurityDACRestoreGraphicsLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                               virDomainDefPtr def ATTRIBUTE_UNUSED,
                               virDomainGraphicsDefPtr gfx ATTRIBUTE_UNUSED)

{
    /* The only graphics labelling we do is dependent on mountNamespaces,
       in which case 'restoring' the label doesn't actually accomplish
       anything, so there's nothing to do here */
    return 0;
}


1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531
static int
virSecurityDACSetInputLabel(virSecurityManagerPtr mgr,
                            virDomainDefPtr def,
                            virDomainInputDefPtr input)

{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr seclabel;
    int ret = -1;
    uid_t user;
    gid_t group;

    seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
    if (seclabel && !seclabel->relabel)
        return 0;

1532
    switch ((virDomainInputType)input->type) {
1533 1534 1535 1536
    case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
        if (virSecurityDACGetIds(seclabel, priv, &user, &group, NULL, NULL) < 0)
            return -1;

1537
        ret = virSecurityDACSetOwnership(mgr, NULL, input->source.evdev, user, group);
1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557
        break;

    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
    case VIR_DOMAIN_INPUT_TYPE_KBD:
    case VIR_DOMAIN_INPUT_TYPE_LAST:
        ret = 0;
        break;
    }

    return ret;
}

static int
virSecurityDACRestoreInputLabel(virSecurityManagerPtr mgr,
                                virDomainDefPtr def ATTRIBUTE_UNUSED,
                                virDomainInputDefPtr input)
{
    int ret = -1;

1558
    switch ((virDomainInputType)input->type) {
1559
    case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
1560
        ret = virSecurityDACRestoreFileLabel(mgr, input->source.evdev);
1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574
        break;

    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
    case VIR_DOMAIN_INPUT_TYPE_KBD:
    case VIR_DOMAIN_INPUT_TYPE_LAST:
        ret = 0;
        break;
    }

    return ret;
}


1575 1576 1577 1578 1579 1580 1581 1582 1583
static int
virSecurityDACRestoreMemoryLabel(virSecurityManagerPtr mgr,
                                 virDomainDefPtr def ATTRIBUTE_UNUSED,
                                 virDomainMemoryDefPtr mem)
{
    int ret = -1;

    switch ((virDomainMemoryModel) mem->model) {
    case VIR_DOMAIN_MEMORY_MODEL_NVDIMM:
1584
        ret = virSecurityDACRestoreFileLabel(mgr, mem->nvdimmPath);
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597
        break;

    case VIR_DOMAIN_MEMORY_MODEL_DIMM:
    case VIR_DOMAIN_MEMORY_MODEL_LAST:
    case VIR_DOMAIN_MEMORY_MODEL_NONE:
        ret = 0;
        break;
    }

    return ret;
}


1598
static int
1599 1600
virSecurityDACRestoreAllLabel(virSecurityManagerPtr mgr,
                              virDomainDefPtr def,
1601 1602
                              bool migrated,
                              bool chardevStdioLogd)
1603 1604
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
1605
    virSecurityLabelDefPtr secdef;
1606
    size_t i;
1607 1608
    int rc = 0;

1609
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
1610

1611
    if (!priv->dynamicOwnership || (secdef && !secdef->relabel))
1612
        return 0;
1613 1614

    VIR_DEBUG("Restoring security label on %s migrated=%d",
1615
              def->name, migrated);
1616

1617
    for (i = 0; i < def->nhostdevs; i++) {
1618 1619 1620 1621
        if (virSecurityDACRestoreHostdevLabel(mgr,
                                              def,
                                              def->hostdevs[i],
                                              NULL) < 0)
1622 1623
            rc = -1;
    }
1624

1625 1626 1627 1628 1629
    for (i = 0; i < def->ngraphics; i++) {
        if (virSecurityDACRestoreGraphicsLabel(mgr, def, def->graphics[i]) < 0)
            return -1;
    }

1630 1631 1632 1633 1634
    for (i = 0; i < def->ninputs; i++) {
        if (virSecurityDACRestoreInputLabel(mgr, def, def->inputs[i]) < 0)
            rc = -1;
    }

1635
    for (i = 0; i < def->ndisks; i++) {
1636 1637 1638 1639
        if (virSecurityDACRestoreImageLabelInt(mgr,
                                               def,
                                               def->disks[i]->src,
                                               migrated) < 0)
1640 1641 1642
            rc = -1;
    }

1643 1644 1645 1646 1647 1648 1649
    for (i = 0; i < def->nmems; i++) {
        if (virSecurityDACRestoreMemoryLabel(mgr,
                                             def,
                                             def->mems[i]) < 0)
            rc = -1;
    }

1650 1651 1652 1653 1654
    struct _virSecuritySELinuxChardevCallbackData chardevData = {
        .mgr = mgr,
        .chardevStdioLogd = chardevStdioLogd,
    };

1655
    if (virDomainChrDefForeach(def,
1656 1657
                               false,
                               virSecurityDACRestoreChardevCallback,
1658
                               &chardevData) < 0)
1659 1660
        rc = -1;

1661
    if (def->tpm) {
1662 1663 1664
        if (virSecurityDACRestoreTPMFileLabel(mgr,
                                              def,
                                              def->tpm) < 0)
1665 1666 1667
            rc = -1;
    }

1668
    if (def->os.loader && def->os.loader->nvram &&
1669
        virSecurityDACRestoreFileLabel(mgr, def->os.loader->nvram) < 0)
1670 1671
        rc = -1;

1672 1673 1674 1675 1676
    return rc;
}


static int
1677
virSecurityDACSetChardevCallback(virDomainDefPtr def,
1678
                                 virDomainChrDefPtr dev ATTRIBUTE_UNUSED,
1679 1680
                                 void *opaque)
{
1681
    struct _virSecuritySELinuxChardevCallbackData *data = opaque;
1682

1683 1684
    return virSecurityDACSetChardevLabel(data->mgr, def, dev->source,
                                         data->chardevStdioLogd);
1685 1686 1687
}


1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708
static int
virSecurityDACSetMemoryLabel(virSecurityManagerPtr mgr,
                             virDomainDefPtr def,
                             virDomainMemoryDefPtr mem)

{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr seclabel;
    int ret = -1;
    uid_t user;
    gid_t group;

    switch ((virDomainMemoryModel) mem->model) {
    case VIR_DOMAIN_MEMORY_MODEL_NVDIMM:
        seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
        if (seclabel && !seclabel->relabel)
            return 0;

        if (virSecurityDACGetIds(seclabel, priv, &user, &group, NULL, NULL) < 0)
            return -1;

1709
        ret = virSecurityDACSetOwnership(mgr, NULL, mem->nvdimmPath, user, group);
1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722
        break;

    case VIR_DOMAIN_MEMORY_MODEL_DIMM:
    case VIR_DOMAIN_MEMORY_MODEL_LAST:
    case VIR_DOMAIN_MEMORY_MODEL_NONE:
        ret = 0;
        break;
    }

    return ret;
}


1723
static int
1724 1725
virSecurityDACSetAllLabel(virSecurityManagerPtr mgr,
                          virDomainDefPtr def,
1726 1727
                          const char *stdin_path ATTRIBUTE_UNUSED,
                          bool chardevStdioLogd)
1728 1729
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
1730
    virSecurityLabelDefPtr secdef;
1731
    size_t i;
1732 1733
    uid_t user;
    gid_t group;
1734

1735 1736
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

1737
    if (!priv->dynamicOwnership || (secdef && !secdef->relabel))
1738 1739
        return 0;

1740
    for (i = 0; i < def->ndisks; i++) {
1741
        /* XXX fixme - we need to recursively label the entire tree :-( */
E
Eric Blake 已提交
1742
        if (virDomainDiskGetType(def->disks[i]) == VIR_STORAGE_TYPE_DIR)
1743
            continue;
1744 1745 1746
        if (virSecurityDACSetDiskLabel(mgr,
                                       def,
                                       def->disks[i]) < 0)
1747 1748
            return -1;
    }
1749

1750 1751 1752 1753 1754
    for (i = 0; i < def->ngraphics; i++) {
        if (virSecurityDACSetGraphicsLabel(mgr, def, def->graphics[i]) < 0)
            return -1;
    }

1755 1756 1757 1758 1759
    for (i = 0; i < def->ninputs; i++) {
        if (virSecurityDACSetInputLabel(mgr, def, def->inputs[i]) < 0)
            return -1;
    }

1760
    for (i = 0; i < def->nhostdevs; i++) {
1761 1762 1763 1764
        if (virSecurityDACSetHostdevLabel(mgr,
                                          def,
                                          def->hostdevs[i],
                                          NULL) < 0)
1765 1766 1767
            return -1;
    }

1768 1769 1770 1771 1772 1773 1774
    for (i = 0; i < def->nmems; i++) {
        if (virSecurityDACSetMemoryLabel(mgr,
                                         def,
                                         def->mems[i]) < 0)
            return -1;
    }

1775 1776 1777 1778 1779
    struct _virSecuritySELinuxChardevCallbackData chardevData = {
        .mgr = mgr,
        .chardevStdioLogd = chardevStdioLogd,
    };

1780
    if (virDomainChrDefForeach(def,
1781 1782
                               true,
                               virSecurityDACSetChardevCallback,
1783
                               &chardevData) < 0)
1784 1785
        return -1;

1786
    if (def->tpm) {
1787 1788 1789
        if (virSecurityDACSetTPMFileLabel(mgr,
                                          def,
                                          def->tpm) < 0)
1790 1791 1792
            return -1;
    }

1793
    if (virSecurityDACGetImageIds(secdef, priv, &user, &group))
1794 1795
        return -1;

1796
    if (def->os.loader && def->os.loader->nvram &&
1797
        virSecurityDACSetOwnership(mgr, NULL,
1798
                                   def->os.loader->nvram, user, group) < 0)
1799 1800
        return -1;

1801
    if (def->os.kernel &&
1802
        virSecurityDACSetOwnership(mgr, NULL,
1803
                                   def->os.kernel, user, group) < 0)
1804 1805
        return -1;

1806
    if (def->os.initrd &&
1807
        virSecurityDACSetOwnership(mgr, NULL,
1808
                                   def->os.initrd, user, group) < 0)
1809 1810
        return -1;

O
Olivia Yin 已提交
1811
    if (def->os.dtb &&
1812
        virSecurityDACSetOwnership(mgr, NULL,
1813
                                   def->os.dtb, user, group) < 0)
O
Olivia Yin 已提交
1814 1815
        return -1;

J
Ján Tomko 已提交
1816
    if (def->os.slic_table &&
1817
        virSecurityDACSetOwnership(mgr, NULL,
J
Ján Tomko 已提交
1818 1819 1820
                                   def->os.slic_table, user, group) < 0)
        return -1;

1821 1822 1823 1824 1825 1826
    return 0;
}


static int
virSecurityDACSetSavedStateLabel(virSecurityManagerPtr mgr,
1827
                                 virDomainDefPtr def,
1828 1829
                                 const char *savefile)
{
1830 1831
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr secdef;
1832 1833
    uid_t user;
    gid_t group;
1834

1835 1836 1837
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

    if (virSecurityDACGetImageIds(secdef, priv, &user, &group) < 0)
1838 1839
        return -1;

1840
    return virSecurityDACSetOwnership(mgr, NULL, savefile, user, group);
1841 1842 1843 1844 1845
}


static int
virSecurityDACRestoreSavedStateLabel(virSecurityManagerPtr mgr,
1846
                                     virDomainDefPtr def ATTRIBUTE_UNUSED,
1847 1848 1849 1850 1851 1852 1853
                                     const char *savefile)
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);

    if (!priv->dynamicOwnership)
        return 0;

1854
    return virSecurityDACRestoreFileLabel(mgr, savefile);
1855 1856 1857 1858 1859
}


static int
virSecurityDACSetProcessLabel(virSecurityManagerPtr mgr,
1860
                              virDomainDefPtr def)
1861
{
1862 1863
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr secdef;
1864 1865
    uid_t user;
    gid_t group;
1866 1867
    gid_t *groups;
    int ngroups;
1868

1869 1870 1871
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

    if (virSecurityDACGetIds(secdef, priv, &user, &group, &groups, &ngroups) < 0)
1872
        return -1;
1873

J
Jiri Denemark 已提交
1874
    VIR_DEBUG("Dropping privileges to %u:%u, %d supplemental groups",
1875
              (unsigned int)user, (unsigned int)group, ngroups);
1876

1877
    if (virSetUIDGID(user, group, groups, ngroups) < 0)
1878 1879 1880
        return -1;

    return 0;
1881 1882 1883
}


1884 1885
static int
virSecurityDACSetChildProcessLabel(virSecurityManagerPtr mgr,
1886
                                   virDomainDefPtr def,
1887 1888
                                   virCommandPtr cmd)
{
1889 1890
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr secdef;
1891 1892 1893
    uid_t user;
    gid_t group;

1894 1895
    secdef = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

1896
    if (virSecurityDACGetIds(secdef, priv, &user, &group, NULL, NULL) < 0)
1897 1898
        return -1;

J
Jiri Denemark 已提交
1899
    VIR_DEBUG("Setting child to drop privileges to %u:%u",
1900
              (unsigned int)user, (unsigned int)group);
1901 1902 1903 1904 1905 1906 1907

    virCommandSetUID(cmd, user);
    virCommandSetGID(cmd, group);
    return 0;
}


1908 1909 1910 1911 1912 1913 1914 1915
static int
virSecurityDACVerify(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                     virDomainDefPtr def ATTRIBUTE_UNUSED)
{
    return 0;
}

static int
1916 1917
virSecurityDACGenLabel(virSecurityManagerPtr mgr,
                       virDomainDefPtr def)
1918
{
1919 1920 1921 1922 1923
    int rc = -1;
    virSecurityLabelDefPtr seclabel;
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);

    seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);
1924
    if (seclabel == NULL)
1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942
        return rc;

    if (seclabel->imagelabel) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("security image label already "
                         "defined for VM"));
        return rc;
    }

    if (seclabel->model
        && STRNEQ(seclabel->model, SECURITY_DAC_NAME)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("security label model %s is not supported "
                         "with selinux"),
                       seclabel->model);
            return rc;
    }

1943
    switch ((virDomainSeclabelType)seclabel->type) {
1944 1945 1946 1947 1948 1949 1950 1951 1952
    case VIR_DOMAIN_SECLABEL_STATIC:
        if (seclabel->label == NULL) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("missing label for static security "
                             "driver in domain %s"), def->name);
            return rc;
        }
        break;
    case VIR_DOMAIN_SECLABEL_DYNAMIC:
1953
        if (virAsprintf(&seclabel->label, "+%u:+%u",
1954 1955
                        (unsigned int)priv->user,
                        (unsigned int)priv->group) < 0)
1956 1957 1958 1959 1960 1961 1962 1963 1964 1965
            return rc;
        if (seclabel->label == NULL) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot generate dac user and group id "
                             "for domain %s"), def->name);
            return rc;
        }
        break;
    case VIR_DOMAIN_SECLABEL_NONE:
        /* no op */
1966
        return 0;
1967 1968
    case VIR_DOMAIN_SECLABEL_DEFAULT:
    case VIR_DOMAIN_SECLABEL_LAST:
1969 1970 1971 1972 1973 1974
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected security label type '%s'"),
                       virDomainSeclabelTypeToString(seclabel->type));
        return rc;
    }

1975
    if (seclabel->relabel && !seclabel->imagelabel &&
1976 1977 1978
        VIR_STRDUP(seclabel->imagelabel, seclabel->label) < 0) {
        VIR_FREE(seclabel->label);
        return rc;
1979 1980
    }

1981 1982 1983 1984 1985
    return 0;
}

static int
virSecurityDACReleaseLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
1986
                           virDomainDefPtr def ATTRIBUTE_UNUSED)
1987 1988 1989 1990 1991 1992
{
    return 0;
}

static int
virSecurityDACReserveLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
1993 1994
                           virDomainDefPtr def ATTRIBUTE_UNUSED,
                           pid_t pid ATTRIBUTE_UNUSED)
1995 1996 1997 1998
{
    return 0;
}

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009
#ifdef __linux__
static int
virSecurityDACGetProcessLabelInternal(pid_t pid,
                                      virSecurityLabelPtr seclabel)
{
    struct stat sb;
    char *path = NULL;
    int ret = -1;

    VIR_DEBUG("Getting DAC user and group on process '%d'", pid);

2010
    if (virAsprintf(&path, "/proc/%d", (int)pid) < 0)
2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
        goto cleanup;

    if (lstat(path, &sb) < 0) {
        virReportSystemError(errno,
                             _("unable to get uid and gid for PID %d via procfs"),
                             pid);
        goto cleanup;
    }

    snprintf(seclabel->label, VIR_SECURITY_LABEL_BUFLEN,
2021
             "+%u:+%u", (unsigned int)sb.st_uid, (unsigned int)sb.st_gid);
2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049
    ret = 0;

 cleanup:
    VIR_FREE(path);
    return ret;
}
#elif defined(__FreeBSD__)
static int
virSecurityDACGetProcessLabelInternal(pid_t pid,
                                      virSecurityLabelPtr seclabel)
{
    struct kinfo_proc p;
    int mib[4];
    size_t len = 4;

    sysctlnametomib("kern.proc.pid", mib, &len);

    len = sizeof(struct kinfo_proc);
    mib[3] = pid;

    if (sysctl(mib, 4, &p, &len, NULL, 0) < 0) {
        virReportSystemError(errno,
                             _("unable to get PID %d uid and gid via sysctl"),
                             pid);
        return -1;
    }

    snprintf(seclabel->label, VIR_SECURITY_LABEL_BUFLEN,
2050
             "+%u:+%u", (unsigned int)p.ki_uid, (unsigned int)p.ki_groups[0]);
2051 2052 2053 2054 2055

    return 0;
}
#else
static int
J
Ján Tomko 已提交
2056 2057
virSecurityDACGetProcessLabelInternal(pid_t pid ATTRIBUTE_UNUSED,
                                      virSecurityLabelPtr seclabel ATTRIBUTE_UNUSED)
2058 2059 2060 2061 2062 2063 2064
{
    virReportSystemError(ENOSYS, "%s",
                         _("Cannot get process uid and gid on this platform"));
    return -1;
}
#endif

2065 2066
static int
virSecurityDACGetProcessLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
2067
                              virDomainDefPtr def,
2068
                              pid_t pid,
2069
                              virSecurityLabelPtr seclabel)
2070
{
2071 2072 2073
    virSecurityLabelDefPtr secdef =
        virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

2074 2075 2076 2077 2078 2079 2080 2081
    if (secdef == NULL) {
        VIR_DEBUG("missing label for DAC security "
                  "driver in domain %s", def->name);

        if (virSecurityDACGetProcessLabelInternal(pid, seclabel) < 0)
            return -1;
        return 0;
    }
2082 2083

    if (secdef->label)
2084 2085
        ignore_value(virStrcpy(seclabel->label, secdef->label,
                               VIR_SECURITY_LABEL_BUFLEN));
2086

2087 2088 2089 2090
    return 0;
}

static int
2091
virSecurityDACSetDaemonSocketLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
2092
                                   virDomainDefPtr vm ATTRIBUTE_UNUSED)
2093 2094 2095 2096 2097
{
    return 0;
}


2098 2099
static int
virSecurityDACSetSocketLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
2100
                             virDomainDefPtr def ATTRIBUTE_UNUSED)
2101 2102 2103 2104 2105
{
    return 0;
}


2106 2107
static int
virSecurityDACClearSocketLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
2108
                               virDomainDefPtr def ATTRIBUTE_UNUSED)
2109 2110 2111 2112
{
    return 0;
}

2113
static int
2114
virSecurityDACSetImageFDLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
2115
                              virDomainDefPtr def ATTRIBUTE_UNUSED,
2116
                              int fd ATTRIBUTE_UNUSED)
2117 2118 2119 2120
{
    return 0;
}

2121 2122 2123 2124 2125 2126 2127 2128
static int
virSecurityDACSetTapFDLabel(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                            virDomainDefPtr def ATTRIBUTE_UNUSED,
                            int fd ATTRIBUTE_UNUSED)
{
    return 0;
}

O
Osier Yang 已提交
2129 2130 2131 2132
static char *
virSecurityDACGetMountOptions(virSecurityManagerPtr mgr ATTRIBUTE_UNUSED,
                              virDomainDefPtr vm ATTRIBUTE_UNUSED)
{
2133 2134 2135
    return NULL;
}

2136 2137 2138 2139 2140 2141 2142 2143
static const char *
virSecurityDACGetBaseLabel(virSecurityManagerPtr mgr,
                           int virt ATTRIBUTE_UNUSED)
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    return priv->baselabel;
}

2144
static int
2145 2146
virSecurityDACDomainSetPathLabel(virSecurityManagerPtr mgr,
                                 virDomainDefPtr def,
2147 2148
                                 const char *path,
                                 bool allowSubtree ATTRIBUTE_UNUSED)
2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159
{
    virSecurityDACDataPtr priv = virSecurityManagerGetPrivateData(mgr);
    virSecurityLabelDefPtr seclabel;
    uid_t user;
    gid_t group;

    seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_DAC_NAME);

    if (virSecurityDACGetIds(seclabel, priv, &user, &group, NULL, NULL) < 0)
        return -1;

2160
    return virSecurityDACSetOwnership(mgr, NULL, path, user, group);
2161 2162
}

2163
virSecurityDriver virSecurityDriverDAC = {
2164
    .privateDataLen                     = sizeof(virSecurityDACData),
2165
    .name                               = SECURITY_DAC_NAME,
2166 2167 2168
    .probe                              = virSecurityDACProbe,
    .open                               = virSecurityDACOpen,
    .close                              = virSecurityDACClose,
2169

2170 2171
    .getModel                           = virSecurityDACGetModel,
    .getDOI                             = virSecurityDACGetDOI,
2172

2173 2174
    .preFork                            = virSecurityDACPreFork,

2175 2176 2177 2178
    .transactionStart                   = virSecurityDACTransactionStart,
    .transactionCommit                  = virSecurityDACTransactionCommit,
    .transactionAbort                   = virSecurityDACTransactionAbort,

2179
    .domainSecurityVerify               = virSecurityDACVerify,
2180

2181 2182
    .domainSetSecurityDiskLabel         = virSecurityDACSetDiskLabel,
    .domainRestoreSecurityDiskLabel     = virSecurityDACRestoreDiskLabel,
2183

2184 2185
    .domainSetSecurityImageLabel        = virSecurityDACSetImageLabel,
    .domainRestoreSecurityImageLabel    = virSecurityDACRestoreImageLabel,
2186

2187 2188 2189
    .domainSetSecurityMemoryLabel       = virSecurityDACSetMemoryLabel,
    .domainRestoreSecurityMemoryLabel   = virSecurityDACRestoreMemoryLabel,

2190 2191 2192
    .domainSetSecurityInputLabel        = virSecurityDACSetInputLabel,
    .domainRestoreSecurityInputLabel    = virSecurityDACRestoreInputLabel,

2193 2194 2195
    .domainSetSecurityDaemonSocketLabel = virSecurityDACSetDaemonSocketLabel,
    .domainSetSecuritySocketLabel       = virSecurityDACSetSocketLabel,
    .domainClearSecuritySocketLabel     = virSecurityDACClearSocketLabel,
2196

2197 2198 2199
    .domainGenSecurityLabel             = virSecurityDACGenLabel,
    .domainReserveSecurityLabel         = virSecurityDACReserveLabel,
    .domainReleaseSecurityLabel         = virSecurityDACReleaseLabel,
2200

2201 2202
    .domainGetSecurityProcessLabel      = virSecurityDACGetProcessLabel,
    .domainSetSecurityProcessLabel      = virSecurityDACSetProcessLabel,
2203
    .domainSetSecurityChildProcessLabel = virSecurityDACSetChildProcessLabel,
2204

2205 2206
    .domainSetSecurityAllLabel          = virSecurityDACSetAllLabel,
    .domainRestoreSecurityAllLabel      = virSecurityDACRestoreAllLabel,
2207

2208 2209
    .domainSetSecurityHostdevLabel      = virSecurityDACSetHostdevLabel,
    .domainRestoreSecurityHostdevLabel  = virSecurityDACRestoreHostdevLabel,
2210

2211 2212
    .domainSetSavedStateLabel           = virSecurityDACSetSavedStateLabel,
    .domainRestoreSavedStateLabel       = virSecurityDACRestoreSavedStateLabel,
2213

2214
    .domainSetSecurityImageFDLabel      = virSecurityDACSetImageFDLabel,
2215
    .domainSetSecurityTapFDLabel        = virSecurityDACSetTapFDLabel,
2216

2217
    .domainGetSecurityMountOptions      = virSecurityDACGetMountOptions,
2218 2219

    .getBaseLabel                       = virSecurityDACGetBaseLabel,
2220

2221
    .domainSetPathLabel                 = virSecurityDACDomainSetPathLabel,
2222 2223 2224

    .domainSetSecurityChardevLabel      = virSecurityDACSetChardevLabel,
    .domainRestoreSecurityChardevLabel  = virSecurityDACRestoreChardevLabel,
2225
};