mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-08 14:05:19 +00:00
ae368ebfcc
BZ:https://bugzilla.redhat.com/show_bug.cgi?id=851981 When using macvtap, a character device gets first created by kernel with name /dev/tapN, its selinux context is: system_u:object_r:device_t:s0 Shortly, when udev gets notification when new file is created in /dev, it will then jump in and relabel this file back to the expected default context: system_u:object_r:tun_tap_device_t:s0 There is a time gap happened. Sometimes, it will have migration failed, AVC error message: type=AVC msg=audit(1349858424.233:42507): avc: denied { read write } for pid=19926 comm="qemu-kvm" path="/dev/tap33" dev=devtmpfs ino=131524 scontext=unconfined_u:system_r:svirt_t:s0:c598,c908 tcontext=system_u:object_r:device_t:s0 tclass=chr_file This patch will label the tapfd device before qemu process starts: system_u:object_r:tun_tap_device_t:MCS(MCS from seclabel->label)
149 lines
7.1 KiB
C
149 lines
7.1 KiB
C
/*
|
|
* Copyright (C) 2008, 2010 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
* Authors:
|
|
* James Morris <jmorris@namei.org>
|
|
*
|
|
*/
|
|
#ifndef __VIR_SECURITY_H__
|
|
# define __VIR_SECURITY_H__
|
|
|
|
# include "internal.h"
|
|
# include "domain_conf.h"
|
|
|
|
# include "security_manager.h"
|
|
|
|
/*
|
|
* Return values for security driver probing: the driver will determine
|
|
* whether it should be enabled or disabled.
|
|
*/
|
|
typedef enum {
|
|
SECURITY_DRIVER_ENABLE = 0,
|
|
SECURITY_DRIVER_ERROR = -1,
|
|
SECURITY_DRIVER_DISABLE = -2,
|
|
} virSecurityDriverStatus;
|
|
|
|
typedef struct _virSecurityDriver virSecurityDriver;
|
|
typedef virSecurityDriver *virSecurityDriverPtr;
|
|
|
|
typedef virSecurityDriverStatus (*virSecurityDriverProbe) (const char *virtDriver);
|
|
typedef int (*virSecurityDriverOpen) (virSecurityManagerPtr mgr);
|
|
typedef int (*virSecurityDriverClose) (virSecurityManagerPtr mgr);
|
|
|
|
typedef const char *(*virSecurityDriverGetModel) (virSecurityManagerPtr mgr);
|
|
typedef const char *(*virSecurityDriverGetDOI) (virSecurityManagerPtr mgr);
|
|
|
|
typedef int (*virSecurityDomainRestoreImageLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
virDomainDiskDefPtr disk);
|
|
typedef int (*virSecurityDomainSetDaemonSocketLabel)(virSecurityManagerPtr mgr,
|
|
virDomainDefPtr vm);
|
|
typedef int (*virSecurityDomainSetSocketLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def);
|
|
typedef int (*virSecurityDomainClearSocketLabel)(virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def);
|
|
typedef int (*virSecurityDomainSetImageLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
virDomainDiskDefPtr disk);
|
|
typedef int (*virSecurityDomainRestoreHostdevLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
virDomainHostdevDefPtr dev);
|
|
typedef int (*virSecurityDomainSetHostdevLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
virDomainHostdevDefPtr dev);
|
|
typedef int (*virSecurityDomainSetSavedStateLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
const char *savefile);
|
|
typedef int (*virSecurityDomainRestoreSavedStateLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
const char *savefile);
|
|
typedef int (*virSecurityDomainGenLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr sec);
|
|
typedef int (*virSecurityDomainReserveLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr sec,
|
|
pid_t pid);
|
|
typedef int (*virSecurityDomainReleaseLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr sec);
|
|
typedef int (*virSecurityDomainSetAllLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr sec,
|
|
const char *stdin_path);
|
|
typedef int (*virSecurityDomainRestoreAllLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
int migrated);
|
|
typedef int (*virSecurityDomainGetProcessLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
pid_t pid,
|
|
virSecurityLabelPtr sec);
|
|
typedef int (*virSecurityDomainSetProcessLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def);
|
|
typedef int (*virSecurityDomainSecurityVerify) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def);
|
|
typedef int (*virSecurityDomainSetImageFDLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
int fd);
|
|
typedef int (*virSecurityDomainSetTapFDLabel) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def,
|
|
int fd);
|
|
typedef char *(*virSecurityDomainGetMountOptions) (virSecurityManagerPtr mgr,
|
|
virDomainDefPtr def);
|
|
|
|
struct _virSecurityDriver {
|
|
size_t privateDataLen;
|
|
const char *name;
|
|
virSecurityDriverProbe probe;
|
|
virSecurityDriverOpen open;
|
|
virSecurityDriverClose close;
|
|
|
|
virSecurityDriverGetModel getModel;
|
|
virSecurityDriverGetDOI getDOI;
|
|
|
|
virSecurityDomainSecurityVerify domainSecurityVerify;
|
|
|
|
virSecurityDomainSetImageLabel domainSetSecurityImageLabel;
|
|
virSecurityDomainRestoreImageLabel domainRestoreSecurityImageLabel;
|
|
|
|
virSecurityDomainSetDaemonSocketLabel domainSetSecurityDaemonSocketLabel;
|
|
virSecurityDomainSetSocketLabel domainSetSecuritySocketLabel;
|
|
virSecurityDomainClearSocketLabel domainClearSecuritySocketLabel;
|
|
|
|
virSecurityDomainGenLabel domainGenSecurityLabel;
|
|
virSecurityDomainReserveLabel domainReserveSecurityLabel;
|
|
virSecurityDomainReleaseLabel domainReleaseSecurityLabel;
|
|
|
|
virSecurityDomainGetProcessLabel domainGetSecurityProcessLabel;
|
|
virSecurityDomainSetProcessLabel domainSetSecurityProcessLabel;
|
|
|
|
virSecurityDomainSetAllLabel domainSetSecurityAllLabel;
|
|
virSecurityDomainRestoreAllLabel domainRestoreSecurityAllLabel;
|
|
|
|
virSecurityDomainSetHostdevLabel domainSetSecurityHostdevLabel;
|
|
virSecurityDomainRestoreHostdevLabel domainRestoreSecurityHostdevLabel;
|
|
|
|
virSecurityDomainSetSavedStateLabel domainSetSavedStateLabel;
|
|
virSecurityDomainRestoreSavedStateLabel domainRestoreSavedStateLabel;
|
|
|
|
virSecurityDomainSetImageFDLabel domainSetSecurityImageFDLabel;
|
|
virSecurityDomainSetTapFDLabel domainSetSecurityTapFDLabel;
|
|
|
|
virSecurityDomainGetMountOptions domainGetSecurityMountOptions;
|
|
};
|
|
|
|
virSecurityDriverPtr virSecurityDriverLookup(const char *name,
|
|
const char *virtDriver);
|
|
|
|
#endif /* __VIR_SECURITY_H__ */
|