security_manager.c 21.9 KB
Newer Older
1 2 3
/*
 * security_manager.c: Internal security manager API
 *
4
 * Copyright (C) 2010-2013 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23 24 25 26 27 28
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>


#include "security_driver.h"
#include "security_stack.h"
#include "security_dac.h"
29
#include "virerror.h"
30
#include "viralloc.h"
31
#include "virobject.h"
32
#include "virlog.h"
33 34 35 36 37

#define VIR_FROM_THIS VIR_FROM_SECURITY


struct _virSecurityManager {
38 39
    virObjectLockable parent;

40 41
    virSecurityDriverPtr drv;
    bool allowDiskFormatProbing;
42 43
    bool defaultConfined;
    bool requireConfined;
44
    const char *virtDriver;
45
    void *privateData;
46 47
};

48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
static virClassPtr virSecurityManagerClass;

static void virSecurityManagerDispose(void *obj);

static int virSecurityManagerOnceInit(void)
{
    if (!(virSecurityManagerClass = virClassNew(virClassForObjectLockable(),
                                                "virSecurityManagerClass",
                                                sizeof(virSecurityManager),
                                                virSecurityManagerDispose)))
        return -1;

    return 0;
}

VIR_ONCE_GLOBAL_INIT(virSecurityManager);

65
static virSecurityManagerPtr virSecurityManagerNewDriver(virSecurityDriverPtr drv,
66
                                                         const char *virtDriver,
67 68 69
                                                         bool allowDiskFormatProbing,
                                                         bool defaultConfined,
                                                         bool requireConfined)
70 71
{
    virSecurityManagerPtr mgr;
72 73 74 75
    char *privateData;

    if (virSecurityManagerInitialize() < 0)
        return NULL;
76

77 78 79 80 81 82
    VIR_DEBUG("drv=%p (%s) virtDriver=%s allowDiskFormatProbing=%d "
              "defaultConfined=%d requireConfined=%d",
              drv, drv->name, virtDriver,
              allowDiskFormatProbing, defaultConfined,
              requireConfined);

83
    if (VIR_ALLOC_N(privateData, drv->privateDataLen) < 0)
84 85
        return NULL;

86 87 88 89 90
    if (!(mgr = virObjectLockableNew(virSecurityManagerClass))) {
        VIR_FREE(privateData);
        return NULL;
    }

91 92
    mgr->drv = drv;
    mgr->allowDiskFormatProbing = allowDiskFormatProbing;
93 94
    mgr->defaultConfined = defaultConfined;
    mgr->requireConfined = requireConfined;
95
    mgr->virtDriver = virtDriver;
96
    mgr->privateData = privateData;
97 98

    if (drv->open(mgr) < 0) {
99
        virObjectUnref(mgr);
100 101 102 103 104 105
        return NULL;
    }

    return mgr;
}

106
virSecurityManagerPtr virSecurityManagerNewStack(virSecurityManagerPtr primary)
107 108 109
{
    virSecurityManagerPtr mgr =
        virSecurityManagerNewDriver(&virSecurityDriverStack,
110
                                    virSecurityManagerGetDriver(primary),
111 112 113
                                    virSecurityManagerGetAllowDiskFormatProbing(primary),
                                    virSecurityManagerGetDefaultConfined(primary),
                                    virSecurityManagerGetRequireConfined(primary));
114 115 116 117

    if (!mgr)
        return NULL;

118
    virSecurityStackAddNested(mgr, primary);
119 120 121 122

    return mgr;
}

123 124 125 126 127 128 129 130
int virSecurityManagerStackAddNested(virSecurityManagerPtr stack,
                                     virSecurityManagerPtr nested)
{
    if (!STREQ("stack", stack->drv->name))
        return -1;
    return virSecurityStackAddNested(stack, nested);
}

131 132
virSecurityManagerPtr virSecurityManagerNewDAC(const char *virtDriver,
                                               uid_t user,
133 134
                                               gid_t group,
                                               bool allowDiskFormatProbing,
135 136
                                               bool defaultConfined,
                                               bool requireConfined,
137 138 139 140
                                               bool dynamicOwnership)
{
    virSecurityManagerPtr mgr =
        virSecurityManagerNewDriver(&virSecurityDriverDAC,
141
                                    virtDriver,
142 143 144
                                    allowDiskFormatProbing,
                                    defaultConfined,
                                    requireConfined);
145 146 147 148

    if (!mgr)
        return NULL;

149 150 151 152
    if (virSecurityDACSetUserAndGroup(mgr, user, group) < 0) {
        virSecurityManagerDispose(mgr);
        return NULL;
    }
153 154 155 156 157 158
    virSecurityDACSetDynamicOwnership(mgr, dynamicOwnership);

    return mgr;
}

virSecurityManagerPtr virSecurityManagerNew(const char *name,
159
                                            const char *virtDriver,
160 161 162
                                            bool allowDiskFormatProbing,
                                            bool defaultConfined,
                                            bool requireConfined)
163
{
164
    virSecurityDriverPtr drv = virSecurityDriverLookup(name, virtDriver);
165 166 167
    if (!drv)
        return NULL;

168 169 170
    /* driver "none" needs some special handling of *Confined bools */
    if (STREQ(drv->name, "none")) {
        if (requireConfined) {
171 172
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Security driver \"none\" cannot create confined guests"));
173 174 175 176 177 178 179 180 181 182 183 184 185 186 187
            return NULL;
        }

        if (defaultConfined) {
            if (name != NULL) {
                VIR_WARN("Configured security driver \"none\" disables default"
                         " policy to create confined guests");
            } else {
                VIR_DEBUG("Auto-probed security driver is \"none\";"
                          " confined guests will not be created");
            }
            defaultConfined = false;
        }
    }

188
    return virSecurityManagerNewDriver(drv,
189
                                       virtDriver,
190 191 192
                                       allowDiskFormatProbing,
                                       defaultConfined,
                                       requireConfined);
193 194
}

195 196 197

/*
 * Must be called before fork()'ing to ensure mutex state
198 199 200 201
 * is sane for the child to use. A negative return means the
 * child must not be forked; a successful return must be
 * followed by a call to virSecurityManagerPostFork() in both
 * parent and child.
202
 */
203
int virSecurityManagerPreFork(virSecurityManagerPtr mgr)
204
{
205 206
    int ret = 0;

207
    virObjectLock(mgr);
208 209 210 211 212 213 214
    if (mgr->drv->preFork) {
        ret = mgr->drv->preFork(mgr);
        if (ret < 0)
            virObjectUnlock(mgr);
    }

    return ret;
215 216 217 218 219 220 221 222 223 224 225 226
}


/*
 * Must be called after fork()'ing in both parent and child
 * to ensure mutex state is sane for the child to use
 */
void virSecurityManagerPostFork(virSecurityManagerPtr mgr)
{
    virObjectUnlock(mgr);
}

227 228
void *virSecurityManagerGetPrivateData(virSecurityManagerPtr mgr)
{
229
    return mgr->privateData;
230 231 232
}


233
static void virSecurityManagerDispose(void *obj)
234
{
235
    virSecurityManagerPtr mgr = obj;
236 237 238

    if (mgr->drv->close)
        mgr->drv->close(mgr);
239
    VIR_FREE(mgr->privateData);
240 241
}

242 243 244 245 246 247
const char *
virSecurityManagerGetDriver(virSecurityManagerPtr mgr)
{
    return mgr->virtDriver;
}

248 249 250
const char *
virSecurityManagerGetDOI(virSecurityManagerPtr mgr)
{
251 252 253 254 255 256 257
    if (mgr->drv->getDOI) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getDOI(mgr);
        virObjectUnlock(mgr);
        return ret;
    }
258

259
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
260 261 262 263 264 265
    return NULL;
}

const char *
virSecurityManagerGetModel(virSecurityManagerPtr mgr)
{
266 267 268 269 270 271 272
    if (mgr->drv->getModel) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getModel(mgr);
        virObjectUnlock(mgr);
        return ret;
    }
273

274
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
275 276 277
    return NULL;
}

278 279 280 281 282 283 284 285 286 287 288 289 290 291 292
/* return NULL if a base label is not present */
const char *
virSecurityManagerGetBaseLabel(virSecurityManagerPtr mgr, int virtType)
{
    if (mgr->drv->getBaseLabel) {
        const char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->getBaseLabel(mgr, virtType);
        virObjectUnlock(mgr);
        return ret;
    }

    return NULL;
}

293 294 295 296 297
bool virSecurityManagerGetAllowDiskFormatProbing(virSecurityManagerPtr mgr)
{
    return mgr->allowDiskFormatProbing;
}

298 299 300 301 302 303 304 305 306 307
bool virSecurityManagerGetDefaultConfined(virSecurityManagerPtr mgr)
{
    return mgr->defaultConfined;
}

bool virSecurityManagerGetRequireConfined(virSecurityManagerPtr mgr)
{
    return mgr->requireConfined;
}

308
int virSecurityManagerRestoreImageLabel(virSecurityManagerPtr mgr,
309
                                        virDomainDefPtr vm,
310 311
                                        virDomainDiskDefPtr disk)
{
312 313 314 315 316 317 318
    if (mgr->drv->domainRestoreSecurityImageLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityImageLabel(mgr, vm, disk);
        virObjectUnlock(mgr);
        return ret;
    }
319

320
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
321 322 323
    return -1;
}

324
int virSecurityManagerSetDaemonSocketLabel(virSecurityManagerPtr mgr,
325
                                           virDomainDefPtr vm)
326
{
327 328 329 330 331 332 333
    if (mgr->drv->domainSetSecurityDaemonSocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityDaemonSocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
334

335
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
336 337 338
    return -1;
}

339
int virSecurityManagerSetSocketLabel(virSecurityManagerPtr mgr,
340
                                     virDomainDefPtr vm)
341
{
342 343 344 345 346 347 348
    if (mgr->drv->domainSetSecuritySocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecuritySocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
349

350
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
351 352 353
    return -1;
}

354
int virSecurityManagerClearSocketLabel(virSecurityManagerPtr mgr,
355
                                       virDomainDefPtr vm)
356
{
357 358 359 360 361 362 363
    if (mgr->drv->domainClearSecuritySocketLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainClearSecuritySocketLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
364

365
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
366 367 368 369
    return -1;
}

int virSecurityManagerSetImageLabel(virSecurityManagerPtr mgr,
370
                                    virDomainDefPtr vm,
371 372
                                    virDomainDiskDefPtr disk)
{
373 374 375 376 377 378 379
    if (mgr->drv->domainSetSecurityImageLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityImageLabel(mgr, vm, disk);
        virObjectUnlock(mgr);
        return ret;
    }
380

381
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
382 383 384 385
    return -1;
}

int virSecurityManagerRestoreHostdevLabel(virSecurityManagerPtr mgr,
386
                                          virDomainDefPtr vm,
387 388
                                          virDomainHostdevDefPtr dev,
                                          const char *vroot)
389
{
390 391 392 393 394 395 396
    if (mgr->drv->domainRestoreSecurityHostdevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityHostdevLabel(mgr, vm, dev, vroot);
        virObjectUnlock(mgr);
        return ret;
    }
397

398
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
399 400 401 402
    return -1;
}

int virSecurityManagerSetHostdevLabel(virSecurityManagerPtr mgr,
403
                                      virDomainDefPtr vm,
404 405
                                      virDomainHostdevDefPtr dev,
                                      const char *vroot)
406
{
407 408 409 410 411 412 413
    if (mgr->drv->domainSetSecurityHostdevLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityHostdevLabel(mgr, vm, dev, vroot);
        virObjectUnlock(mgr);
        return ret;
    }
414

415
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
416 417 418 419
    return -1;
}

int virSecurityManagerSetSavedStateLabel(virSecurityManagerPtr mgr,
420
                                         virDomainDefPtr vm,
421 422
                                         const char *savefile)
{
423 424 425 426 427 428 429
    if (mgr->drv->domainSetSavedStateLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSavedStateLabel(mgr, vm, savefile);
        virObjectUnlock(mgr);
        return ret;
    }
430

431
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
432 433 434 435
    return -1;
}

int virSecurityManagerRestoreSavedStateLabel(virSecurityManagerPtr mgr,
436
                                             virDomainDefPtr vm,
437 438
                                             const char *savefile)
{
439 440 441 442 443 444 445
    if (mgr->drv->domainRestoreSavedStateLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSavedStateLabel(mgr, vm, savefile);
        virObjectUnlock(mgr);
        return ret;
    }
446

447
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
448 449 450 451
    return -1;
}

int virSecurityManagerGenLabel(virSecurityManagerPtr mgr,
452
                               virDomainDefPtr vm)
453
{
454
    int ret = -1;
455
    size_t i, j;
456 457
    virSecurityManagerPtr* sec_managers = NULL;
    virSecurityLabelDefPtr seclabel;
458
    bool generated = false;
459

460
    if (mgr == NULL || mgr->drv == NULL)
461
        return ret;
462 463

    if ((sec_managers = virSecurityManagerGetNested(mgr)) == NULL)
464
        return ret;
465

466
    virObjectLock(mgr);
467
    for (i = 0; i < vm->nseclabels; i++) {
468 469 470
        if (!vm->seclabels[i]->model)
            continue;

471 472 473 474 475 476 477 478 479 480 481 482
        for (j = 0; sec_managers[j]; j++)
            if (STREQ(vm->seclabels[i]->model, sec_managers[j]->drv->name))
                break;

        if (!sec_managers[j]) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unable to find security driver for label %s"),
                           vm->seclabels[i]->model);
            goto cleanup;
        }
    }

483
    for (i = 0; sec_managers[i]; i++) {
484 485 486 487 488 489
        generated = false;
        seclabel = virDomainDefGetSecurityLabelDef(vm, sec_managers[i]->drv->name);
        if (!seclabel) {
            if (!(seclabel = virDomainDefGenSecurityLabelDef(sec_managers[i]->drv->name)))
                goto cleanup;
            generated = seclabel->implicit = true;
490
        }
491

492
        if (seclabel->type == VIR_DOMAIN_SECLABEL_DEFAULT) {
493
            if (sec_managers[i]->defaultConfined) {
494
                seclabel->type = VIR_DOMAIN_SECLABEL_DYNAMIC;
495
            } else {
496
                seclabel->type = VIR_DOMAIN_SECLABEL_NONE;
497 498
                seclabel->norelabel = true;
            }
499 500
        }

501 502 503 504 505 506 507 508
        if (seclabel->type == VIR_DOMAIN_SECLABEL_NONE) {
            if (sec_managers[i]->requireConfined) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Unconfined guests are not allowed on this host"));
                goto cleanup;
            } else if (vm->nseclabels && generated) {
                VIR_DEBUG("Skipping auto generated seclabel of type none");
                virSecurityLabelDefFree(seclabel);
509
                seclabel = NULL;
510 511
                continue;
            }
512 513 514 515 516
        }

        if (!sec_managers[i]->drv->domainGenSecurityLabel) {
            virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
        } else {
517 518
            /* The seclabel must be added to @vm prior calling domainGenSecurityLabel
             * which may require seclabel to be presented already */
519
            if (generated &&
520
                VIR_APPEND_ELEMENT(vm->seclabels, vm->nseclabels, seclabel) < 0)
521 522 523 524 525 526
                goto cleanup;

            if (sec_managers[i]->drv->domainGenSecurityLabel(sec_managers[i], vm) < 0) {
                if (VIR_DELETE_ELEMENT(vm->seclabels,
                                       vm->nseclabels -1, vm->nseclabels) < 0)
                    vm->nseclabels--;
527
                goto cleanup;
528
            }
529 530

            seclabel = NULL;
531 532 533
        }
    }

534 535
    ret = 0;

536
cleanup:
537
    virObjectUnlock(mgr);
538 539
    if (generated)
        virSecurityLabelDefFree(seclabel);
540
    VIR_FREE(sec_managers);
541
    return ret;
542 543 544
}

int virSecurityManagerReserveLabel(virSecurityManagerPtr mgr,
545 546
                                   virDomainDefPtr vm,
                                   pid_t pid)
547
{
548 549 550 551 552 553 554
    if (mgr->drv->domainReserveSecurityLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainReserveSecurityLabel(mgr, vm, pid);
        virObjectUnlock(mgr);
        return ret;
    }
555

556
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
557 558 559 560
    return -1;
}

int virSecurityManagerReleaseLabel(virSecurityManagerPtr mgr,
561
                                   virDomainDefPtr vm)
562
{
563 564 565 566 567 568 569
    if (mgr->drv->domainReleaseSecurityLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainReleaseSecurityLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
570

571
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
572 573 574 575
    return -1;
}

int virSecurityManagerSetAllLabel(virSecurityManagerPtr mgr,
576
                                  virDomainDefPtr vm,
577 578
                                  const char *stdin_path)
{
579 580 581 582 583 584 585
    if (mgr->drv->domainSetSecurityAllLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityAllLabel(mgr, vm, stdin_path);
        virObjectUnlock(mgr);
        return ret;
    }
586

587
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
588 589 590 591
    return -1;
}

int virSecurityManagerRestoreAllLabel(virSecurityManagerPtr mgr,
592
                                      virDomainDefPtr vm,
593 594
                                      int migrated)
{
595 596 597 598 599 600 601
    if (mgr->drv->domainRestoreSecurityAllLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainRestoreSecurityAllLabel(mgr, vm, migrated);
        virObjectUnlock(mgr);
        return ret;
    }
602

603
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
604 605 606 607
    return -1;
}

int virSecurityManagerGetProcessLabel(virSecurityManagerPtr mgr,
608 609
                                      virDomainDefPtr vm,
                                      pid_t pid,
610 611
                                      virSecurityLabelPtr sec)
{
612 613 614 615 616 617 618
    if (mgr->drv->domainGetSecurityProcessLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainGetSecurityProcessLabel(mgr, vm, pid, sec);
        virObjectUnlock(mgr);
        return ret;
    }
619

620
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
621 622 623 624
    return -1;
}

int virSecurityManagerSetProcessLabel(virSecurityManagerPtr mgr,
625
                                      virDomainDefPtr vm)
626
{
627 628 629 630 631 632 633
    if (mgr->drv->domainSetSecurityProcessLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityProcessLabel(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
634

635
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
636 637 638
    return -1;
}

639 640 641 642 643 644 645 646 647 648 649
int virSecurityManagerSetChildProcessLabel(virSecurityManagerPtr mgr,
                                           virDomainDefPtr vm,
                                           virCommandPtr cmd)
{
    if (mgr->drv->domainSetSecurityChildProcessLabel)
       return mgr->drv->domainSetSecurityChildProcessLabel(mgr, vm, cmd);

    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
    return -1;
}

650 651 652
int virSecurityManagerVerify(virSecurityManagerPtr mgr,
                             virDomainDefPtr def)
{
653 654 655 656 657
    virSecurityLabelDefPtr secdef;

    if (mgr == NULL || mgr->drv == NULL)
        return 0;

658 659 660 661
    /* NULL model == dynamic labelling, with whatever driver
     * is active, so we can short circuit verify check to
     * avoid drivers de-referencing NULLs by accident
     */
662 663
    secdef = virDomainDefGetSecurityLabelDef(def, mgr->drv->name);
    if (secdef == NULL || secdef->model == NULL)
664 665
        return 0;

666 667 668 669 670 671 672
    if (mgr->drv->domainSecurityVerify) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSecurityVerify(mgr, def);
        virObjectUnlock(mgr);
        return ret;
    }
673

674
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
675 676
    return -1;
}
677

678
int virSecurityManagerSetImageFDLabel(virSecurityManagerPtr mgr,
679
                                      virDomainDefPtr vm,
680
                                      int fd)
681
{
682 683 684 685 686 687 688
    if (mgr->drv->domainSetSecurityImageFDLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityImageFDLabel(mgr, vm, fd);
        virObjectUnlock(mgr);
        return ret;
    }
689

690
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
691 692
    return -1;
}
693

694 695 696 697
int virSecurityManagerSetTapFDLabel(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm,
                                    int fd)
{
698 699 700 701 702 703 704
    if (mgr->drv->domainSetSecurityTapFDLabel) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityTapFDLabel(mgr, vm, fd);
        virObjectUnlock(mgr);
        return ret;
    }
705 706 707 708 709

    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
    return -1;
}

710 711 712
char *virSecurityManagerGetMountOptions(virSecurityManagerPtr mgr,
                                        virDomainDefPtr vm)
{
713 714 715 716 717 718 719
    if (mgr->drv->domainGetSecurityMountOptions) {
        char *ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainGetSecurityMountOptions(mgr, vm);
        virObjectUnlock(mgr);
        return ret;
    }
720

721
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
722 723
    return NULL;
}
724 725 726 727 728 729 730 731 732 733

virSecurityManagerPtr*
virSecurityManagerGetNested(virSecurityManagerPtr mgr)
{
    virSecurityManagerPtr* list = NULL;

    if (STREQ("stack", mgr->drv->name)) {
        return virSecurityStackGetNested(mgr);
    }

734
    if (VIR_ALLOC_N(list, 2) < 0)
735 736 737 738 739 740
        return NULL;

    list[0] = mgr;
    list[1] = NULL;
    return list;
}
741 742 743 744 745

int virSecurityManagerSetHugepages(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm,
                                    const char *path)
{
746 747 748 749 750 751 752
    if (mgr->drv->domainSetSecurityHugepages) {
        int ret;
        virObjectLock(mgr);
        ret = mgr->drv->domainSetSecurityHugepages(mgr, vm, path);
        virObjectUnlock(mgr);
        return ret;
    }
753 754 755

    return 0;
}