security_manager.c 16.1 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
/*
 * security_manager.c: Internal security manager API
 *
 * Copyright (C) 2010-2011 Red Hat, Inc.
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23 24 25 26 27 28
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>


#include "security_driver.h"
#include "security_stack.h"
#include "security_dac.h"
29
#include "virerror.h"
30
#include "viralloc.h"
31
#include "virlog.h"
32 33 34 35 36 37 38

#define VIR_FROM_THIS VIR_FROM_SECURITY


struct _virSecurityManager {
    virSecurityDriverPtr drv;
    bool allowDiskFormatProbing;
39 40
    bool defaultConfined;
    bool requireConfined;
41
    const char *virtDriver;
42 43 44
};

static virSecurityManagerPtr virSecurityManagerNewDriver(virSecurityDriverPtr drv,
45
                                                         const char *virtDriver,
46 47 48
                                                         bool allowDiskFormatProbing,
                                                         bool defaultConfined,
                                                         bool requireConfined)
49 50 51
{
    virSecurityManagerPtr mgr;

52 53 54 55 56 57
    VIR_DEBUG("drv=%p (%s) virtDriver=%s allowDiskFormatProbing=%d "
              "defaultConfined=%d requireConfined=%d",
              drv, drv->name, virtDriver,
              allowDiskFormatProbing, defaultConfined,
              requireConfined);

58 59 60 61 62 63 64
    if (VIR_ALLOC_VAR(mgr, char, drv->privateDataLen) < 0) {
        virReportOOMError();
        return NULL;
    }

    mgr->drv = drv;
    mgr->allowDiskFormatProbing = allowDiskFormatProbing;
65 66
    mgr->defaultConfined = defaultConfined;
    mgr->requireConfined = requireConfined;
67
    mgr->virtDriver = virtDriver;
68 69 70 71 72 73 74 75 76

    if (drv->open(mgr) < 0) {
        virSecurityManagerFree(mgr);
        return NULL;
    }

    return mgr;
}

77
virSecurityManagerPtr virSecurityManagerNewStack(virSecurityManagerPtr primary)
78 79 80
{
    virSecurityManagerPtr mgr =
        virSecurityManagerNewDriver(&virSecurityDriverStack,
81
                                    virSecurityManagerGetDriver(primary),
82 83 84
                                    virSecurityManagerGetAllowDiskFormatProbing(primary),
                                    virSecurityManagerGetDefaultConfined(primary),
                                    virSecurityManagerGetRequireConfined(primary));
85 86 87 88

    if (!mgr)
        return NULL;

89
    virSecurityStackAddNested(mgr, primary);
90 91 92 93

    return mgr;
}

94 95 96 97 98 99 100 101
int virSecurityManagerStackAddNested(virSecurityManagerPtr stack,
                                     virSecurityManagerPtr nested)
{
    if (!STREQ("stack", stack->drv->name))
        return -1;
    return virSecurityStackAddNested(stack, nested);
}

102 103
virSecurityManagerPtr virSecurityManagerNewDAC(const char *virtDriver,
                                               uid_t user,
104 105
                                               gid_t group,
                                               bool allowDiskFormatProbing,
106 107
                                               bool defaultConfined,
                                               bool requireConfined,
108 109 110 111
                                               bool dynamicOwnership)
{
    virSecurityManagerPtr mgr =
        virSecurityManagerNewDriver(&virSecurityDriverDAC,
112
                                    virtDriver,
113 114 115
                                    allowDiskFormatProbing,
                                    defaultConfined,
                                    requireConfined);
116 117 118 119 120 121 122 123 124 125 126 127

    if (!mgr)
        return NULL;

    virSecurityDACSetUser(mgr, user);
    virSecurityDACSetGroup(mgr, group);
    virSecurityDACSetDynamicOwnership(mgr, dynamicOwnership);

    return mgr;
}

virSecurityManagerPtr virSecurityManagerNew(const char *name,
128
                                            const char *virtDriver,
129 130 131
                                            bool allowDiskFormatProbing,
                                            bool defaultConfined,
                                            bool requireConfined)
132
{
133
    virSecurityDriverPtr drv = virSecurityDriverLookup(name, virtDriver);
134 135 136
    if (!drv)
        return NULL;

137 138 139
    /* driver "none" needs some special handling of *Confined bools */
    if (STREQ(drv->name, "none")) {
        if (requireConfined) {
140 141
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Security driver \"none\" cannot create confined guests"));
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156
            return NULL;
        }

        if (defaultConfined) {
            if (name != NULL) {
                VIR_WARN("Configured security driver \"none\" disables default"
                         " policy to create confined guests");
            } else {
                VIR_DEBUG("Auto-probed security driver is \"none\";"
                          " confined guests will not be created");
            }
            defaultConfined = false;
        }
    }

157
    return virSecurityManagerNewDriver(drv,
158
                                       virtDriver,
159 160 161
                                       allowDiskFormatProbing,
                                       defaultConfined,
                                       requireConfined);
162 163 164 165
}

void *virSecurityManagerGetPrivateData(virSecurityManagerPtr mgr)
{
166 167 168
    /* This accesses the memory just beyond mgr, which was allocated
     * via VIR_ALLOC_VAR earlier.  */
    return mgr + 1;
169 170 171 172 173 174 175 176 177 178 179 180 181 182
}


void virSecurityManagerFree(virSecurityManagerPtr mgr)
{
    if (!mgr)
        return;

    if (mgr->drv->close)
        mgr->drv->close(mgr);

    VIR_FREE(mgr);
}

183 184 185 186 187 188
const char *
virSecurityManagerGetDriver(virSecurityManagerPtr mgr)
{
    return mgr->virtDriver;
}

189 190 191 192 193 194
const char *
virSecurityManagerGetDOI(virSecurityManagerPtr mgr)
{
    if (mgr->drv->getDOI)
        return mgr->drv->getDOI(mgr);

195
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
196 197 198 199 200 201 202 203 204
    return NULL;
}

const char *
virSecurityManagerGetModel(virSecurityManagerPtr mgr)
{
    if (mgr->drv->getModel)
        return mgr->drv->getModel(mgr);

205
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
206 207 208 209 210 211 212 213
    return NULL;
}

bool virSecurityManagerGetAllowDiskFormatProbing(virSecurityManagerPtr mgr)
{
    return mgr->allowDiskFormatProbing;
}

214 215 216 217 218 219 220 221 222 223
bool virSecurityManagerGetDefaultConfined(virSecurityManagerPtr mgr)
{
    return mgr->defaultConfined;
}

bool virSecurityManagerGetRequireConfined(virSecurityManagerPtr mgr)
{
    return mgr->requireConfined;
}

224
int virSecurityManagerRestoreImageLabel(virSecurityManagerPtr mgr,
225
                                        virDomainDefPtr vm,
226 227 228 229 230
                                        virDomainDiskDefPtr disk)
{
    if (mgr->drv->domainRestoreSecurityImageLabel)
        return mgr->drv->domainRestoreSecurityImageLabel(mgr, vm, disk);

231
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
232 233 234
    return -1;
}

235
int virSecurityManagerSetDaemonSocketLabel(virSecurityManagerPtr mgr,
236
                                           virDomainDefPtr vm)
237
{
238 239
    if (mgr->drv->domainSetSecurityDaemonSocketLabel)
        return mgr->drv->domainSetSecurityDaemonSocketLabel(mgr, vm);
240

241
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
242 243 244
    return -1;
}

245
int virSecurityManagerSetSocketLabel(virSecurityManagerPtr mgr,
246
                                     virDomainDefPtr vm)
247 248 249 250
{
    if (mgr->drv->domainSetSecuritySocketLabel)
        return mgr->drv->domainSetSecuritySocketLabel(mgr, vm);

251
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
252 253 254
    return -1;
}

255
int virSecurityManagerClearSocketLabel(virSecurityManagerPtr mgr,
256
                                       virDomainDefPtr vm)
257 258 259 260
{
    if (mgr->drv->domainClearSecuritySocketLabel)
        return mgr->drv->domainClearSecuritySocketLabel(mgr, vm);

261
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
262 263 264 265
    return -1;
}

int virSecurityManagerSetImageLabel(virSecurityManagerPtr mgr,
266
                                    virDomainDefPtr vm,
267 268 269 270 271
                                    virDomainDiskDefPtr disk)
{
    if (mgr->drv->domainSetSecurityImageLabel)
        return mgr->drv->domainSetSecurityImageLabel(mgr, vm, disk);

272
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
273 274 275 276
    return -1;
}

int virSecurityManagerRestoreHostdevLabel(virSecurityManagerPtr mgr,
277
                                          virDomainDefPtr vm,
278 279
                                          virDomainHostdevDefPtr dev,
                                          const char *vroot)
280 281
{
    if (mgr->drv->domainRestoreSecurityHostdevLabel)
282
        return mgr->drv->domainRestoreSecurityHostdevLabel(mgr, vm, dev, vroot);
283

284
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
285 286 287 288
    return -1;
}

int virSecurityManagerSetHostdevLabel(virSecurityManagerPtr mgr,
289
                                      virDomainDefPtr vm,
290 291
                                      virDomainHostdevDefPtr dev,
                                      const char *vroot)
292 293
{
    if (mgr->drv->domainSetSecurityHostdevLabel)
294
        return mgr->drv->domainSetSecurityHostdevLabel(mgr, vm, dev, vroot);
295

296
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
297 298 299 300
    return -1;
}

int virSecurityManagerSetSavedStateLabel(virSecurityManagerPtr mgr,
301
                                         virDomainDefPtr vm,
302 303 304 305 306
                                         const char *savefile)
{
    if (mgr->drv->domainSetSavedStateLabel)
        return mgr->drv->domainSetSavedStateLabel(mgr, vm, savefile);

307
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
308 309 310 311
    return -1;
}

int virSecurityManagerRestoreSavedStateLabel(virSecurityManagerPtr mgr,
312
                                             virDomainDefPtr vm,
313 314 315 316 317
                                             const char *savefile)
{
    if (mgr->drv->domainRestoreSavedStateLabel)
        return mgr->drv->domainRestoreSavedStateLabel(mgr, vm, savefile);

318
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
319 320 321 322
    return -1;
}

int virSecurityManagerGenLabel(virSecurityManagerPtr mgr,
323
                               virDomainDefPtr vm)
324
{
325 326 327 328
    int rc = 0;
    size_t i;
    virSecurityManagerPtr* sec_managers = NULL;
    virSecurityLabelDefPtr seclabel;
329

330 331 332 333
    if (mgr == NULL || mgr->drv == NULL)
        return -1;

    if ((sec_managers = virSecurityManagerGetNested(mgr)) == NULL)
334 335
        return -1;

336 337 338 339 340 341 342
    for (i = 0; sec_managers[i]; i++) {
        seclabel = virDomainDefGetSecurityLabelDef(vm,
                                                   sec_managers[i]->drv->name);
        if (seclabel == NULL) {
            rc = -1;
            goto cleanup;
        }
343

344
        if (seclabel->type == VIR_DOMAIN_SECLABEL_DEFAULT) {
345
            if (sec_managers[i]->defaultConfined) {
346
                seclabel->type = VIR_DOMAIN_SECLABEL_DYNAMIC;
347
            } else {
348
                seclabel->type = VIR_DOMAIN_SECLABEL_NONE;
349 350
                seclabel->norelabel = true;
            }
351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372
        }

        if ((seclabel->type == VIR_DOMAIN_SECLABEL_NONE) &&
            sec_managers[i]->requireConfined) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Unconfined guests are not allowed on this host"));
            rc = -1;
            goto cleanup;
        }

        if (!sec_managers[i]->drv->domainGenSecurityLabel) {
            virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
        } else {
            rc += sec_managers[i]->drv->domainGenSecurityLabel(sec_managers[i], vm);
            if (rc)
                goto cleanup;
        }
    }

cleanup:
    VIR_FREE(sec_managers);
    return rc;
373 374 375
}

int virSecurityManagerReserveLabel(virSecurityManagerPtr mgr,
376 377
                                   virDomainDefPtr vm,
                                   pid_t pid)
378 379
{
    if (mgr->drv->domainReserveSecurityLabel)
380
        return mgr->drv->domainReserveSecurityLabel(mgr, vm, pid);
381

382
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
383 384 385 386
    return -1;
}

int virSecurityManagerReleaseLabel(virSecurityManagerPtr mgr,
387
                                   virDomainDefPtr vm)
388 389 390 391
{
    if (mgr->drv->domainReleaseSecurityLabel)
        return mgr->drv->domainReleaseSecurityLabel(mgr, vm);

392
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
393 394 395 396
    return -1;
}

int virSecurityManagerSetAllLabel(virSecurityManagerPtr mgr,
397
                                  virDomainDefPtr vm,
398 399 400 401 402
                                  const char *stdin_path)
{
    if (mgr->drv->domainSetSecurityAllLabel)
        return mgr->drv->domainSetSecurityAllLabel(mgr, vm, stdin_path);

403
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
404 405 406 407
    return -1;
}

int virSecurityManagerRestoreAllLabel(virSecurityManagerPtr mgr,
408
                                      virDomainDefPtr vm,
409 410 411 412 413
                                      int migrated)
{
    if (mgr->drv->domainRestoreSecurityAllLabel)
        return mgr->drv->domainRestoreSecurityAllLabel(mgr, vm, migrated);

414
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
415 416 417 418
    return -1;
}

int virSecurityManagerGetProcessLabel(virSecurityManagerPtr mgr,
419 420
                                      virDomainDefPtr vm,
                                      pid_t pid,
421 422 423
                                      virSecurityLabelPtr sec)
{
    if (mgr->drv->domainGetSecurityProcessLabel)
424
        return mgr->drv->domainGetSecurityProcessLabel(mgr, vm, pid, sec);
425

426
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
427 428 429 430
    return -1;
}

int virSecurityManagerSetProcessLabel(virSecurityManagerPtr mgr,
431
                                      virDomainDefPtr vm)
432 433 434 435
{
    if (mgr->drv->domainSetSecurityProcessLabel)
        return mgr->drv->domainSetSecurityProcessLabel(mgr, vm);

436
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
437 438 439 440 441 442
    return -1;
}

int virSecurityManagerVerify(virSecurityManagerPtr mgr,
                             virDomainDefPtr def)
{
443 444 445 446 447
    virSecurityLabelDefPtr secdef;

    if (mgr == NULL || mgr->drv == NULL)
        return 0;

448 449 450 451
    /* NULL model == dynamic labelling, with whatever driver
     * is active, so we can short circuit verify check to
     * avoid drivers de-referencing NULLs by accident
     */
452 453
    secdef = virDomainDefGetSecurityLabelDef(def, mgr->drv->name);
    if (secdef == NULL || secdef->model == NULL)
454 455
        return 0;

456 457 458
    if (mgr->drv->domainSecurityVerify)
        return mgr->drv->domainSecurityVerify(mgr, def);

459
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
460 461
    return -1;
}
462

463
int virSecurityManagerSetImageFDLabel(virSecurityManagerPtr mgr,
464
                                      virDomainDefPtr vm,
465
                                      int fd)
466
{
467 468
    if (mgr->drv->domainSetSecurityImageFDLabel)
        return mgr->drv->domainSetSecurityImageFDLabel(mgr, vm, fd);
469

470
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
471 472
    return -1;
}
473

474 475 476 477 478 479 480 481 482 483 484
int virSecurityManagerSetTapFDLabel(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm,
                                    int fd)
{
    if (mgr->drv->domainSetSecurityTapFDLabel)
        return mgr->drv->domainSetSecurityTapFDLabel(mgr, vm, fd);

    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
    return -1;
}

485 486 487 488 489 490
char *virSecurityManagerGetMountOptions(virSecurityManagerPtr mgr,
                                        virDomainDefPtr vm)
{
    if (mgr->drv->domainGetSecurityMountOptions)
        return mgr->drv->domainGetSecurityMountOptions(mgr, vm);

491
    virReportError(VIR_ERR_NO_SUPPORT, __FUNCTION__);
492 493
    return NULL;
}
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512

virSecurityManagerPtr*
virSecurityManagerGetNested(virSecurityManagerPtr mgr)
{
    virSecurityManagerPtr* list = NULL;

    if (STREQ("stack", mgr->drv->name)) {
        return virSecurityStackGetNested(mgr);
    }

    if (VIR_ALLOC_N(list, 2) < 0) {
        virReportOOMError();
        return NULL;
    }

    list[0] = mgr;
    list[1] = NULL;
    return list;
}
513 514 515 516 517 518 519 520 521 522

int virSecurityManagerSetHugepages(virSecurityManagerPtr mgr,
                                    virDomainDefPtr vm,
                                    const char *path)
{
    if (mgr->drv->domainSetSecurityHugepages)
        return mgr->drv->domainSetSecurityHugepages(mgr, vm, path);

    return 0;
}