mirror of
				https://gitlab.com/libvirt/libvirt.git
				synced 2025-10-30 20:24:58 +03:00 
			
		
		
		
	The allocation of the object itself can't fail. What can fail is the creation of the class on a programming error. Rather than punting the error up the stack abort() directly on the first occurence as the error can't be fixed during runtime. Signed-off-by: Peter Krempa <pkrempa@redhat.com> Reviewed-by: Ján Tomko <jtomko@redhat.com>
		
			
				
	
	
		
			352 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			352 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (C) 2011-2014 Red Hat, Inc.
 | |
|  *
 | |
|  * This library is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation; either
 | |
|  * version 2.1 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * This library is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with this library; if not, write to the Free Software
 | |
|  * License along with this library;  If not, see
 | |
|  * <http://www.gnu.org/licenses/>.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| 
 | |
| #include <config.h>
 | |
| 
 | |
| #include <time.h>
 | |
| 
 | |
| #include <selinux/selinux.h>
 | |
| #include <selinux/context.h>
 | |
| #include <sys/xattr.h>
 | |
| 
 | |
| #include "internal.h"
 | |
| #include "testutils.h"
 | |
| #include "testutilsqemu.h"
 | |
| #include "viralloc.h"
 | |
| #include "virerror.h"
 | |
| #include "virfile.h"
 | |
| #include "virlog.h"
 | |
| #include "security/security_manager.h"
 | |
| 
 | |
| #define VIR_FROM_THIS VIR_FROM_NONE
 | |
| 
 | |
| VIR_LOG_INIT("tests.securityselinuxlabeltest");
 | |
| 
 | |
| static virQEMUDriver driver;
 | |
| 
 | |
| static virSecurityManager *mgr;
 | |
| 
 | |
| typedef struct testSELinuxFile testSELinuxFile;
 | |
| 
 | |
| struct testSELinuxFile {
 | |
|     char *file;
 | |
|     char *context;
 | |
| };
 | |
| 
 | |
| static int
 | |
| testUserXattrEnabled(void)
 | |
| {
 | |
|     int ret = -1;
 | |
|     ssize_t len;
 | |
|     const char *con_value = "system_u:object_r:svirt_image_t:s0:c41,c264";
 | |
|     g_autofree char *path = NULL;
 | |
|     path = g_strdup_printf("%s/securityselinuxlabeldata/testxattr", abs_builddir);
 | |
| 
 | |
|     if (g_mkdir_with_parents(abs_builddir "/securityselinuxlabeldata", 0777) < 0 ||
 | |
|         virFileTouch(path, 0600) < 0)
 | |
|         goto cleanup;
 | |
| 
 | |
|     len = setxattr(path, "user.libvirt.selinux", con_value,
 | |
|                    strlen(con_value), 0);
 | |
|     if (len < 0) {
 | |
|         if (errno == EOPNOTSUPP)
 | |
|             ret = 0;
 | |
|         goto cleanup;
 | |
|     }
 | |
| 
 | |
|     ret = 1;
 | |
| 
 | |
|  cleanup:
 | |
|     unlink(path);
 | |
|     rmdir(abs_builddir "/securityselinuxlabeldata");
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static void
 | |
| testSELinuxMungePath(char **path)
 | |
| {
 | |
|     char *tmp = g_strdup_printf("%s/securityselinuxlabeldata%s", abs_builddir, *path);
 | |
| 
 | |
|     g_free(*path);
 | |
|     *path = tmp;
 | |
| }
 | |
| 
 | |
| static int
 | |
| testSELinuxLoadFileList(const char *testname,
 | |
|                         testSELinuxFile **files,
 | |
|                         size_t *nfiles)
 | |
| {
 | |
|     g_autofree char *path = NULL;
 | |
|     g_autoptr(FILE) fp = NULL;
 | |
|     g_autofree char *line = NULL;
 | |
| 
 | |
|     *files = NULL;
 | |
|     *nfiles = 0;
 | |
| 
 | |
|     path = g_strdup_printf("%s/securityselinuxlabeldata/%s.txt", abs_srcdir,
 | |
|                            testname);
 | |
| 
 | |
|     if (!(fp = fopen(path, "r")))
 | |
|         return -1;
 | |
| 
 | |
|     line = g_new0(char, 1024);
 | |
| 
 | |
|     while (!feof(fp)) {
 | |
|         char *file = NULL, *context = NULL, *tmp;
 | |
|         if (!fgets(line, 1024, fp)) {
 | |
|             if (!feof(fp))
 | |
|                 return -1;
 | |
|             break;
 | |
|         }
 | |
| 
 | |
|         tmp = strchr(line, ';');
 | |
|         if (!tmp) {
 | |
|             virReportError(VIR_ERR_INTERNAL_ERROR,
 | |
|                            "unexpected format for line '%s'",
 | |
|                            line);
 | |
|             return -1;
 | |
|         }
 | |
|         *tmp = '\0';
 | |
|         tmp++;
 | |
| 
 | |
|         file = g_strdup_printf("%s/securityselinuxlabeldata%s", abs_builddir,
 | |
|                                line);
 | |
|         if (*tmp != '\0' && *tmp != '\n') {
 | |
|             context = g_strdup(tmp);
 | |
| 
 | |
|             tmp = strchr(context, '\n');
 | |
|             if (tmp)
 | |
|                 *tmp = '\0';
 | |
|         }
 | |
| 
 | |
|         VIR_EXPAND_N(*files, *nfiles, 1);
 | |
|         (*files)[(*nfiles)-1].file = file;
 | |
|         (*files)[(*nfiles)-1].context = context;
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static virDomainDef *
 | |
| testSELinuxLoadDef(const char *testname)
 | |
| {
 | |
|     g_autofree char *xmlfile = NULL;
 | |
|     virDomainDef *def = NULL;
 | |
|     size_t i;
 | |
| 
 | |
|     xmlfile = g_strdup_printf("%s/securityselinuxlabeldata/%s.xml", abs_srcdir,
 | |
|                               testname);
 | |
| 
 | |
|     if (!(def = virDomainDefParseFile(xmlfile, driver.xmlopt,
 | |
|                                       NULL, 0)))
 | |
|         return NULL;
 | |
| 
 | |
|     for (i = 0; i < def->ndisks; i++) {
 | |
|         if (def->disks[i]->src->type != VIR_STORAGE_TYPE_FILE &&
 | |
|             def->disks[i]->src->type != VIR_STORAGE_TYPE_BLOCK)
 | |
|             continue;
 | |
| 
 | |
|         testSELinuxMungePath(&def->disks[i]->src->path);
 | |
|     }
 | |
| 
 | |
|     for (i = 0; i < def->nserials; i++) {
 | |
|         if (def->serials[i]->source->type != VIR_DOMAIN_CHR_TYPE_FILE &&
 | |
|             def->serials[i]->source->type != VIR_DOMAIN_CHR_TYPE_PIPE &&
 | |
|             def->serials[i]->source->type != VIR_DOMAIN_CHR_TYPE_DEV &&
 | |
|             def->serials[i]->source->type != VIR_DOMAIN_CHR_TYPE_UNIX)
 | |
|             continue;
 | |
| 
 | |
|         if (def->serials[i]->source->type == VIR_DOMAIN_CHR_TYPE_UNIX) {
 | |
|             testSELinuxMungePath(&def->serials[i]->source->data.nix.path);
 | |
|         } else {
 | |
|             testSELinuxMungePath(&def->serials[i]->source->data.file.path);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (def->os.kernel)
 | |
|         testSELinuxMungePath(&def->os.kernel);
 | |
|     if (def->os.initrd)
 | |
|         testSELinuxMungePath(&def->os.initrd);
 | |
| 
 | |
|     return def;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int
 | |
| testSELinuxCreateDisks(testSELinuxFile *files, size_t nfiles)
 | |
| {
 | |
|     size_t i;
 | |
| 
 | |
|     if (g_mkdir_with_parents(abs_builddir "/securityselinuxlabeldata/nfs", 0777) < 0)
 | |
|         return -1;
 | |
| 
 | |
|     for (i = 0; i < nfiles; i++) {
 | |
|         if (virFileTouch(files[i].file, 0600) < 0)
 | |
|             return -1;
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| testSELinuxDeleteDisks(testSELinuxFile *files, size_t nfiles)
 | |
| {
 | |
|     size_t i;
 | |
| 
 | |
|     for (i = 0; i < nfiles; i++) {
 | |
|         if (unlink(files[i].file) < 0)
 | |
|             return -1;
 | |
|     }
 | |
|     if (rmdir(abs_builddir "/securityselinuxlabeldata/nfs") < 0)
 | |
|         return -1;
 | |
|     /* Ignore failure to remove non-empty directory with in-tree build */
 | |
|     rmdir(abs_builddir "/securityselinuxlabeldata");
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| testSELinuxCheckLabels(testSELinuxFile *files, size_t nfiles)
 | |
| {
 | |
|     size_t i;
 | |
| 
 | |
|     for (i = 0; i < nfiles; i++) {
 | |
|         g_autofree char *ctx = NULL;
 | |
|         if (getfilecon(files[i].file, &ctx) < 0) {
 | |
|             if (errno == ENODATA) {
 | |
|                 /* nothing to do */
 | |
|             } else if (errno == EOPNOTSUPP) {
 | |
|                 ctx = g_strdup("EOPNOTSUPP");
 | |
|             } else {
 | |
|                 virReportSystemError(errno,
 | |
|                                      "Cannot read label on %s",
 | |
|                                      files[i].file);
 | |
|                 return -1;
 | |
|             }
 | |
|         }
 | |
|         if (STRNEQ_NULLABLE(files[i].context, ctx)) {
 | |
|             virReportError(VIR_ERR_INTERNAL_ERROR,
 | |
|                            "File %s context '%s' did not match expected '%s'",
 | |
|                            files[i].file, ctx, files[i].context);
 | |
|             return -1;
 | |
|         }
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| testSELinuxLabeling(const void *opaque)
 | |
| {
 | |
|     const char *testname = opaque;
 | |
|     int ret = -1;
 | |
|     testSELinuxFile *files = NULL;
 | |
|     size_t nfiles = 0;
 | |
|     size_t i;
 | |
|     g_autoptr(virDomainDef) def = NULL;
 | |
| 
 | |
|     if (testSELinuxLoadFileList(testname, &files, &nfiles) < 0)
 | |
|         goto cleanup;
 | |
| 
 | |
|     if (testSELinuxCreateDisks(files, nfiles) < 0)
 | |
|         goto cleanup;
 | |
| 
 | |
|     if (!(def = testSELinuxLoadDef(testname)))
 | |
|         goto cleanup;
 | |
| 
 | |
|     if (virSecurityManagerSetAllLabel(mgr, def, NULL, false, false) < 0)
 | |
|         goto cleanup;
 | |
| 
 | |
|     if (testSELinuxCheckLabels(files, nfiles) < 0)
 | |
|         goto cleanup;
 | |
| 
 | |
|     ret = 0;
 | |
| 
 | |
|  cleanup:
 | |
|     if (testSELinuxDeleteDisks(files, nfiles) < 0)
 | |
|         VIR_WARN("unable to fully clean up");
 | |
| 
 | |
|     for (i = 0; i < nfiles; i++) {
 | |
|         VIR_FREE(files[i].file);
 | |
|         VIR_FREE(files[i].context);
 | |
|     }
 | |
|     VIR_FREE(files);
 | |
|     if (ret < 0)
 | |
|         VIR_TEST_VERBOSE("%s", virGetLastErrorMessage());
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| static int
 | |
| mymain(void)
 | |
| {
 | |
|     int ret = 0;
 | |
|     int rc = testUserXattrEnabled();
 | |
|     g_autoptr(virQEMUCaps) qemuCaps = NULL;
 | |
| 
 | |
|     if (rc < 0) {
 | |
|         VIR_TEST_VERBOSE("failed to determine xattr support");
 | |
|         return EXIT_FAILURE;
 | |
|     }
 | |
| 
 | |
|     if (rc == 0) {
 | |
|         VIR_TEST_VERBOSE("xattr unsupported");
 | |
|         return EXIT_AM_SKIP;
 | |
|     }
 | |
| 
 | |
|     if (!(mgr = virSecurityManagerNew("selinux", "QEMU",
 | |
|                                       VIR_SECURITY_MANAGER_DEFAULT_CONFINED |
 | |
|                                       VIR_SECURITY_MANAGER_PRIVILEGED))) {
 | |
|         VIR_TEST_VERBOSE("Unable to initialize security driver: %s",
 | |
|                          virGetLastErrorMessage());
 | |
|         return EXIT_FAILURE;
 | |
|     }
 | |
| 
 | |
|     if (qemuTestDriverInit(&driver) < 0)
 | |
|         return EXIT_FAILURE;
 | |
| 
 | |
|     qemuCaps = virQEMUCapsNew();
 | |
| 
 | |
|     virQEMUCapsSet(qemuCaps, QEMU_CAPS_DEVICE_CIRRUS_VGA);
 | |
|     virQEMUCapsSet(qemuCaps, QEMU_CAPS_VNC);
 | |
| 
 | |
|     if (qemuTestCapsCacheInsert(driver.qemuCapsCache, qemuCaps) < 0)
 | |
|         return EXIT_FAILURE;
 | |
| 
 | |
| #define DO_TEST_LABELING(name) \
 | |
|     if (virTestRun("Labelling " # name, testSELinuxLabeling, name) < 0) \
 | |
|         ret = -1;
 | |
| 
 | |
|     setcon("system_r:system_u:libvirtd_t:s0:c0.c1023");
 | |
| 
 | |
|     DO_TEST_LABELING("disks");
 | |
|     DO_TEST_LABELING("kernel");
 | |
|     DO_TEST_LABELING("chardev");
 | |
|     DO_TEST_LABELING("nfs");
 | |
| 
 | |
|     qemuTestDriverFree(&driver);
 | |
| 
 | |
|     return (ret == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
 | |
| }
 | |
| 
 | |
| VIR_TEST_MAIN_PRELOAD(mymain,
 | |
|                       VIR_TEST_MOCK("domaincaps"),
 | |
|                       abs_builddir "/libsecurityselinuxhelper.so")
 |