Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
76a59906
Unverified
Commit
76a59906
authored
Aug 12, 2020
by
Stéphane Graber
Committed by
GitHub
Aug 12, 2020
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #3518 from brauner/2020-08-12/fixes
lsm: remove the need for atomic operations
parents
b7993256
af04d847
Hide whitespace changes
Inline
Side-by-side
Showing
11 changed files
with
174 additions
and
152 deletions
+174
-152
attach.c
src/lxc/attach.c
+5
-3
attach.h
src/lxc/attach.h
+1
-1
conf.c
src/lxc/conf.c
+3
-3
apparmor.c
src/lxc/lsm/apparmor.c
+80
-89
lsm.c
src/lxc/lsm/lsm.c
+2
-2
lsm.h
src/lxc/lsm/lsm.h
+18
-9
nop.c
src/lxc/lsm/nop.c
+25
-18
selinux.c
src/lxc/lsm/selinux.c
+30
-18
start.c
src/lxc/start.c
+3
-3
start.h
src/lxc/start.h
+2
-1
attach.c
src/tests/attach.c
+5
-5
No files found.
src/lxc/attach.c
View file @
76a59906
...
@@ -93,7 +93,7 @@ static struct lxc_proc_context_info *lxc_proc_get_context_info(pid_t pid)
...
@@ -93,7 +93,7 @@ static struct lxc_proc_context_info *lxc_proc_get_context_info(pid_t pid)
info
->
lsm_ops
=
lsm_init
();
info
->
lsm_ops
=
lsm_init
();
info
->
lsm_label
=
info
->
lsm_ops
->
process_label_get
(
pid
);
info
->
lsm_label
=
info
->
lsm_ops
->
process_label_get
(
info
->
lsm_ops
,
pid
);
info
->
ns_inherited
=
0
;
info
->
ns_inherited
=
0
;
for
(
int
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
for
(
int
i
=
0
;
i
<
LXC_NS_MAX
;
i
++
)
info
->
ns_fd
[
i
]
=
-
EBADF
;
info
->
ns_fd
[
i
]
=
-
EBADF
;
...
@@ -779,7 +779,8 @@ static int attach_child_main(struct attach_clone_payload *payload)
...
@@ -779,7 +779,8 @@ static int attach_child_main(struct attach_clone_payload *payload)
/* Change into our new LSM profile. */
/* Change into our new LSM profile. */
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
ret
=
init_ctx
->
lsm_ops
->
process_label_set_at
(
lsm_fd
,
init_ctx
->
lsm_label
,
on_exec
);
ret
=
init_ctx
->
lsm_ops
->
process_label_set_at
(
init_ctx
->
lsm_ops
,
lsm_fd
,
init_ctx
->
lsm_label
,
on_exec
);
close
(
lsm_fd
);
close
(
lsm_fd
);
if
(
ret
<
0
)
if
(
ret
<
0
)
goto
on_error
;
goto
on_error
;
...
@@ -1244,7 +1245,8 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
...
@@ -1244,7 +1245,8 @@ int lxc_attach(struct lxc_container *container, lxc_attach_exec_t exec_function,
ret
=
-
1
;
ret
=
-
1
;
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
on_exec
=
options
->
attach_flags
&
LXC_ATTACH_LSM_EXEC
?
true
:
false
;
labelfd
=
init_ctx
->
lsm_ops
->
process_label_fd_get
(
attached_pid
,
on_exec
);
labelfd
=
init_ctx
->
lsm_ops
->
process_label_fd_get
(
init_ctx
->
lsm_ops
,
attached_pid
,
on_exec
);
if
(
labelfd
<
0
)
if
(
labelfd
<
0
)
goto
close_mainloop
;
goto
close_mainloop
;
...
...
src/lxc/attach.h
View file @
76a59906
...
@@ -19,7 +19,7 @@ struct lxc_proc_context_info {
...
@@ -19,7 +19,7 @@ struct lxc_proc_context_info {
unsigned
long
long
capability_mask
;
unsigned
long
long
capability_mask
;
int
ns_inherited
;
int
ns_inherited
;
int
ns_fd
[
LXC_NS_MAX
];
int
ns_fd
[
LXC_NS_MAX
];
const
struct
lsm_ops
*
lsm_ops
;
struct
lsm_ops
*
lsm_ops
;
};
};
__hidden
extern
int
lxc_attach
(
struct
lxc_container
*
container
,
lxc_attach_exec_t
exec_function
,
__hidden
extern
int
lxc_attach
(
struct
lxc_container
*
container
,
lxc_attach_exec_t
exec_function
,
...
...
src/lxc/conf.c
View file @
76a59906
...
@@ -3211,15 +3211,15 @@ static int lxc_setup_boot_id(void)
...
@@ -3211,15 +3211,15 @@ static int lxc_setup_boot_id(void)
return
0
;
return
0
;
}
}
static
int
lxc_setup_keyring
(
const
struct
lsm_ops
*
lsm_ops
,
const
struct
lxc_conf
*
conf
)
static
int
lxc_setup_keyring
(
struct
lsm_ops
*
lsm_ops
,
const
struct
lxc_conf
*
conf
)
{
{
key_serial_t
keyring
;
key_serial_t
keyring
;
int
ret
=
0
;
int
ret
=
0
;
if
(
conf
->
lsm_se_keyring_context
)
if
(
conf
->
lsm_se_keyring_context
)
ret
=
lsm_ops
->
keyring_label_set
(
conf
->
lsm_se_keyring_context
);
ret
=
lsm_ops
->
keyring_label_set
(
lsm_ops
,
conf
->
lsm_se_keyring_context
);
else
if
(
conf
->
lsm_se_context
)
else
if
(
conf
->
lsm_se_context
)
ret
=
lsm_ops
->
keyring_label_set
(
conf
->
lsm_se_context
);
ret
=
lsm_ops
->
keyring_label_set
(
lsm_ops
,
conf
->
lsm_se_context
);
if
(
ret
<
0
)
if
(
ret
<
0
)
return
log_error_errno
(
-
1
,
errno
,
"Failed to set keyring context"
);
return
log_error_errno
(
-
1
,
errno
,
"Failed to set keyring context"
);
...
...
src/lxc/lsm/apparmor.c
View file @
76a59906
...
@@ -4,7 +4,6 @@
...
@@ -4,7 +4,6 @@
#define _GNU_SOURCE 1
#define _GNU_SOURCE 1
#endif
#endif
#include <errno.h>
#include <errno.h>
#include <stdatomic.h>
#include <stdio.h>
#include <stdio.h>
#include <stdlib.h>
#include <stdlib.h>
#include <sys/mount.h>
#include <sys/mount.h>
...
@@ -25,15 +24,6 @@
...
@@ -25,15 +24,6 @@
lxc_log_define
(
apparmor
,
lsm
);
lxc_log_define
(
apparmor
,
lsm
);
/* set by lsm_apparmor_ops_init if true */
static
atomic_int
aa_enabled
;
static
atomic_int
aa_parser_available
=
-
1
;
static
atomic_int
aa_supports_unix
;
static
atomic_int
aa_can_stack
;
static
atomic_int
aa_is_stacked
;
static
atomic_int
aa_admin
;
static
atomic_int
mount_features_enabled
;
#define AA_DEF_PROFILE "lxc-container-default"
#define AA_DEF_PROFILE "lxc-container-default"
#define AA_DEF_PROFILE_CGNS "lxc-container-default-cgns"
#define AA_DEF_PROFILE_CGNS "lxc-container-default-cgns"
#define AA_MOUNT_RESTR "/sys/kernel/security/apparmor/features/mount/mask"
#define AA_MOUNT_RESTR "/sys/kernel/security/apparmor/features/mount/mask"
...
@@ -373,23 +363,18 @@ static const char AA_PROFILE_UNPRIVILEGED[] =
...
@@ -373,23 +363,18 @@ static const char AA_PROFILE_UNPRIVILEGED[] =
" mount options=(ro,remount),
\n
"
" mount options=(ro,remount),
\n
"
;
;
static
bool
check_mount_feature_enabled
(
void
)
static
void
load_mount_features_enabled
(
struct
lsm_ops
*
ops
)
{
return
atomic_load
(
&
mount_features_enabled
);
}
static
void
load_mount_features_enabled
(
void
)
{
{
struct
stat
statbuf
;
struct
stat
statbuf
;
int
ret
;
int
ret
;
ret
=
stat
(
AA_MOUNT_RESTR
,
&
statbuf
);
ret
=
stat
(
AA_MOUNT_RESTR
,
&
statbuf
);
if
(
ret
==
0
)
if
(
ret
==
0
)
atomic_store
(
&
mount_features_enabled
,
1
)
;
ops
->
aa_mount_features_enabled
=
1
;
}
}
/* aa_getcon is not working right now. Use our hand-rolled version below */
/* aa_getcon is not working right now. Use our hand-rolled version below */
static
int
apparmor_enabled
(
void
)
static
int
apparmor_enabled
(
struct
lsm_ops
*
ops
)
{
{
__do_fclose
FILE
*
fin
=
NULL
;
__do_fclose
FILE
*
fin
=
NULL
;
char
e
;
char
e
;
...
@@ -398,16 +383,17 @@ static int apparmor_enabled(void)
...
@@ -398,16 +383,17 @@ static int apparmor_enabled(void)
fin
=
fopen_cloexec
(
AA_ENABLED_FILE
,
"r"
);
fin
=
fopen_cloexec
(
AA_ENABLED_FILE
,
"r"
);
if
(
!
fin
)
if
(
!
fin
)
return
0
;
return
0
;
ret
=
fscanf
(
fin
,
"%c"
,
&
e
);
ret
=
fscanf
(
fin
,
"%c"
,
&
e
);
if
(
ret
==
1
&&
e
==
'Y'
)
{
if
(
ret
==
1
&&
e
==
'Y'
)
{
load_mount_features_enabled
();
load_mount_features_enabled
(
ops
);
return
1
;
return
1
;
}
}
return
0
;
return
0
;
}
}
static
char
*
apparmor_process_label_get
(
pid_t
pid
)
static
char
*
apparmor_process_label_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
)
{
{
char
path
[
100
],
*
space
;
char
path
[
100
],
*
space
;
int
ret
;
int
ret
;
...
@@ -459,9 +445,9 @@ again:
...
@@ -459,9 +445,9 @@ again:
* Probably makes sense to reorganize these to only read
* Probably makes sense to reorganize these to only read
* the label once
* the label once
*/
*/
static
bool
apparmor_am_unconfined
(
void
)
static
bool
apparmor_am_unconfined
(
struct
lsm_ops
*
ops
)
{
{
char
*
p
=
apparmor_process_label_get
(
lxc_raw_getpid
());
char
*
p
=
apparmor_process_label_get
(
ops
,
lxc_raw_getpid
());
bool
ret
=
false
;
bool
ret
=
false
;
if
(
!
p
||
strcmp
(
p
,
"unconfined"
)
==
0
)
if
(
!
p
||
strcmp
(
p
,
"unconfined"
)
==
0
)
ret
=
true
;
ret
=
true
;
...
@@ -542,14 +528,18 @@ static inline char *apparmor_namespace(const char *ctname, const char *lxcpath)
...
@@ -542,14 +528,18 @@ static inline char *apparmor_namespace(const char *ctname, const char *lxcpath)
* do not have ERROR/... macros available, so there are some fprintf(stderr)s
* do not have ERROR/... macros available, so there are some fprintf(stderr)s
* in there.
* in there.
*/
*/
static
bool
check_apparmor_parser_version
()
static
bool
check_apparmor_parser_version
(
struct
lsm_ops
*
ops
)
{
{
int
major
=
0
,
minor
=
0
,
micro
=
0
,
ret
=
0
;
int
major
=
0
,
minor
=
0
,
micro
=
0
,
ret
=
0
;
struct
lxc_popen_FILE
*
parserpipe
;
struct
lxc_popen_FILE
*
parserpipe
;
int
rc
;
int
rc
;
if
(
atomic_load
(
&
aa_parser_available
)
>=
0
)
switch
(
ops
->
aa_parser_available
)
{
case
0
:
return
false
;
return
false
;
case
1
:
return
true
;
}
parserpipe
=
lxc_popen
(
"apparmor_parser --version"
);
parserpipe
=
lxc_popen
(
"apparmor_parser --version"
);
if
(
!
parserpipe
)
{
if
(
!
parserpipe
)
{
...
@@ -578,12 +568,12 @@ static bool check_apparmor_parser_version()
...
@@ -578,12 +568,12 @@ static bool check_apparmor_parser_version()
}
}
if
((
major
>
2
)
||
(
major
==
2
&&
minor
>
10
)
||
(
major
==
2
&&
minor
==
10
&&
micro
>=
95
))
if
((
major
>
2
)
||
(
major
==
2
&&
minor
>
10
)
||
(
major
==
2
&&
minor
==
10
&&
micro
>=
95
))
atomic_store
(
&
aa_supports_unix
,
1
)
;
ops
->
aa_supports_unix
=
1
;
ret
=
1
;
ret
=
1
;
out:
out:
atomic_store
(
&
aa_parser_available
,
ret
)
;
ops
->
aa_parser_available
=
ret
;
return
ret
==
1
;
return
ret
==
1
;
}
}
...
@@ -730,7 +720,7 @@ static void append_all_remount_rules(char **profile, size_t *size)
...
@@ -730,7 +720,7 @@ static void append_all_remount_rules(char **profile, size_t *size)
}
}
}
}
static
char
*
get_apparmor_profile_content
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
char
*
get_apparmor_profile_content
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
char
*
profile
,
*
profile_name_full
;
char
*
profile
,
*
profile_name_full
;
size_t
size
;
size_t
size
;
...
@@ -749,7 +739,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
...
@@ -749,7 +739,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
append_all_remount_rules
(
&
profile
,
&
size
);
append_all_remount_rules
(
&
profile
,
&
size
);
if
(
atomic_load
(
&
aa_supports_unix
)
)
if
(
ops
->
aa_supports_unix
)
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_UNIX_SOCKETS
,
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_UNIX_SOCKETS
,
STRARRAYLEN
(
AA_PROFILE_UNIX_SOCKETS
));
STRARRAYLEN
(
AA_PROFILE_UNIX_SOCKETS
));
...
@@ -757,7 +747,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
...
@@ -757,7 +747,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_CGROUP_NAMESPACES
,
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_CGROUP_NAMESPACES
,
STRARRAYLEN
(
AA_PROFILE_CGROUP_NAMESPACES
));
STRARRAYLEN
(
AA_PROFILE_CGROUP_NAMESPACES
));
if
(
atomic_load
(
&
aa_can_stack
)
&&
!
atomic_load
(
&
aa_is_stacked
)
)
{
if
(
ops
->
aa_can_stack
&&
!
ops
->
aa_is_stacked
)
{
char
*
namespace
,
*
temp
;
char
*
namespace
,
*
temp
;
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_STACKING_BASE
,
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_STACKING_BASE
,
...
@@ -780,7 +770,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
...
@@ -780,7 +770,7 @@ static char *get_apparmor_profile_content(struct lxc_conf *conf, const char *lxc
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_NESTING_BASE
,
must_append_sized
(
&
profile
,
&
size
,
AA_PROFILE_NESTING_BASE
,
STRARRAYLEN
(
AA_PROFILE_NESTING_BASE
));
STRARRAYLEN
(
AA_PROFILE_NESTING_BASE
));
if
(
!
atomic_load
(
&
aa_can_stack
)
||
atomic_load
(
&
aa_is_stacked
)
)
{
if
(
!
ops
->
aa_can_stack
||
ops
->
aa_is_stacked
)
{
char
*
temp
;
char
*
temp
;
temp
=
must_concat
(
NULL
,
" change_profile ->
\"
"
,
temp
=
must_concat
(
NULL
,
" change_profile ->
\"
"
,
...
@@ -837,11 +827,11 @@ static char *make_apparmor_namespace_path(const char *ctname, const char *lxcpat
...
@@ -837,11 +827,11 @@ static char *make_apparmor_namespace_path(const char *ctname, const char *lxcpat
return
ret
;
return
ret
;
}
}
static
bool
make_apparmor_namespace
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
bool
make_apparmor_namespace
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
char
*
path
;
char
*
path
;
if
(
!
atomic_load
(
&
aa_can_stack
)
||
atomic_load
(
&
aa_is_stacked
)
)
if
(
!
ops
->
aa_can_stack
||
ops
->
aa_is_stacked
)
return
true
;
return
true
;
path
=
make_apparmor_namespace_path
(
conf
->
name
,
lxcpath
);
path
=
make_apparmor_namespace_path
(
conf
->
name
,
lxcpath
);
...
@@ -921,7 +911,7 @@ static void remove_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
...
@@ -921,7 +911,7 @@ static void remove_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
free
(
path
);
free
(
path
);
}
}
static
int
load_apparmor_profile
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
int
load_apparmor_profile
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
struct
stat
profile_sb
;
struct
stat
profile_sb
;
size_t
content_len
;
size_t
content_len
;
...
@@ -930,7 +920,7 @@ static int load_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
...
@@ -930,7 +920,7 @@ static int load_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
char
*
profile_path
=
NULL
,
*
old_content
=
NULL
,
*
new_content
=
NULL
;
char
*
profile_path
=
NULL
,
*
old_content
=
NULL
,
*
new_content
=
NULL
;
int
profile_fd
=
-
1
;
int
profile_fd
=
-
1
;
if
(
!
make_apparmor_namespace
(
conf
,
lxcpath
))
if
(
!
make_apparmor_namespace
(
ops
,
conf
,
lxcpath
))
return
-
1
;
return
-
1
;
/* In order to avoid forcing a profile parse (potentially slow) on
/* In order to avoid forcing a profile parse (potentially slow) on
...
@@ -966,7 +956,7 @@ static int load_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
...
@@ -966,7 +956,7 @@ static int load_apparmor_profile(struct lxc_conf *conf, const char *lxcpath)
goto
out
;
goto
out
;
}
}
new_content
=
get_apparmor_profile_content
(
conf
,
lxcpath
);
new_content
=
get_apparmor_profile_content
(
ops
,
conf
,
lxcpath
);
if
(
!
new_content
)
if
(
!
new_content
)
goto
out
;
goto
out
;
...
@@ -1024,9 +1014,9 @@ out_ok:
...
@@ -1024,9 +1014,9 @@ out_ok:
* Ensure that the container's policy namespace is unloaded to free kernel
* Ensure that the container's policy namespace is unloaded to free kernel
* memory. This does not delete the policy from disk or cache.
* memory. This does not delete the policy from disk or cache.
*/
*/
static
void
apparmor_cleanup
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
void
apparmor_cleanup
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
if
(
!
atomic_load
(
&
aa_admin
)
)
if
(
!
ops
->
aa_admin
)
return
;
return
;
if
(
!
conf
->
lsm_aa_profile_created
)
if
(
!
conf
->
lsm_aa_profile_created
)
...
@@ -1038,16 +1028,14 @@ static void apparmor_cleanup(struct lxc_conf *conf, const char *lxcpath)
...
@@ -1038,16 +1028,14 @@ static void apparmor_cleanup(struct lxc_conf *conf, const char *lxcpath)
remove_apparmor_profile
(
conf
,
lxcpath
);
remove_apparmor_profile
(
conf
,
lxcpath
);
}
}
static
int
apparmor_prepare
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
int
apparmor_prepare
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
int
ret
=
-
1
;
int
ret
=
-
1
;
const
char
*
label
;
const
char
*
label
;
char
*
curlabel
=
NULL
,
*
genlabel
=
NULL
;
char
*
curlabel
=
NULL
,
*
genlabel
=
NULL
;
if
(
!
atomic_load
(
&
aa_enabled
))
{
if
(
!
ops
->
aa_enabled
)
ERROR
(
"AppArmor not enabled"
);
return
log_error
(
-
1
,
"AppArmor not enabled"
);
return
-
1
;
}
label
=
conf
->
lsm_aa_profile
;
label
=
conf
->
lsm_aa_profile
;
...
@@ -1059,13 +1047,13 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
...
@@ -1059,13 +1047,13 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
}
}
if
(
label
&&
strcmp
(
label
,
AA_GENERATED
)
==
0
)
{
if
(
label
&&
strcmp
(
label
,
AA_GENERATED
)
==
0
)
{
if
(
!
check_apparmor_parser_version
())
{
if
(
!
check_apparmor_parser_version
(
ops
))
{
ERROR
(
"Cannot use generated profile: apparmor_parser not available"
);
ERROR
(
"Cannot use generated profile: apparmor_parser not available"
);
goto
out
;
goto
out
;
}
}
/* auto-generate profile based on available/requested security features */
/* auto-generate profile based on available/requested security features */
if
(
load_apparmor_profile
(
conf
,
lxcpath
)
!=
0
)
{
if
(
load_apparmor_profile
(
ops
,
conf
,
lxcpath
)
!=
0
)
{
ERROR
(
"Failed to load generated AppArmor profile"
);
ERROR
(
"Failed to load generated AppArmor profile"
);
goto
out
;
goto
out
;
}
}
...
@@ -1076,7 +1064,7 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
...
@@ -1076,7 +1064,7 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
goto
out
;
goto
out
;
}
}
if
(
atomic_load
(
&
aa_can_stack
)
&&
!
atomic_load
(
&
aa_is_stacked
)
)
{
if
(
ops
->
aa_can_stack
&&
!
ops
->
aa_is_stacked
)
{
char
*
namespace
=
apparmor_namespace
(
conf
->
name
,
lxcpath
);
char
*
namespace
=
apparmor_namespace
(
conf
->
name
,
lxcpath
);
size_t
llen
=
strlen
(
genlabel
);
size_t
llen
=
strlen
(
genlabel
);
must_append_sized
(
&
genlabel
,
&
llen
,
"//&:"
,
STRARRAYLEN
(
"//&:"
));
must_append_sized
(
&
genlabel
,
&
llen
,
"//&:"
,
STRARRAYLEN
(
"//&:"
));
...
@@ -1088,9 +1076,9 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
...
@@ -1088,9 +1076,9 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
label
=
genlabel
;
label
=
genlabel
;
}
}
curlabel
=
apparmor_process_label_get
(
lxc_raw_getpid
());
curlabel
=
apparmor_process_label_get
(
ops
,
lxc_raw_getpid
());
if
(
!
atomic_load
(
&
aa_can_stack
)
&&
aa_needs_transition
(
curlabel
))
{
if
(
!
ops
->
aa_can_stack
&&
aa_needs_transition
(
curlabel
))
{
/* we're already confined, and stacking isn't supported */
/* we're already confined, and stacking isn't supported */
if
(
!
label
||
strcmp
(
curlabel
,
label
)
==
0
)
{
if
(
!
label
||
strcmp
(
curlabel
,
label
)
==
0
)
{
...
@@ -1110,7 +1098,7 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
...
@@ -1110,7 +1098,7 @@ static int apparmor_prepare(struct lxc_conf *conf, const char *lxcpath)
label
=
AA_DEF_PROFILE
;
label
=
AA_DEF_PROFILE
;
}
}
if
(
!
check_mount_feature_enabled
()
&&
strcmp
(
label
,
"unconfined"
)
!=
0
)
{
if
(
!
ops
->
aa_mount_features_enabled
&&
strcmp
(
label
,
"unconfined"
)
!=
0
)
{
WARN
(
"Incomplete AppArmor support in your kernel"
);
WARN
(
"Incomplete AppArmor support in your kernel"
);
if
(
!
conf
->
lsm_aa_allow_incomplete
)
{
if
(
!
conf
->
lsm_aa_allow_incomplete
)
{
ERROR
(
"If you really want to start this container, set"
);
ERROR
(
"If you really want to start this container, set"
);
...
@@ -1127,18 +1115,18 @@ out:
...
@@ -1127,18 +1115,18 @@ out:
if
(
genlabel
)
{
if
(
genlabel
)
{
free
(
genlabel
);
free
(
genlabel
);
if
(
ret
!=
0
)
if
(
ret
!=
0
)
apparmor_cleanup
(
conf
,
lxcpath
);
apparmor_cleanup
(
ops
,
conf
,
lxcpath
);
}
}
free
(
curlabel
);
free
(
curlabel
);
return
ret
;
return
ret
;
}
}
static
int
apparmor_keyring_label_set
(
const
char
*
label
)
static
int
apparmor_keyring_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
label
)
{
{
return
0
;
return
0
;
}
}
static
int
apparmor_process_label_fd_get
(
pid_t
pid
,
bool
on_exec
)
static
int
apparmor_process_label_fd_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
,
bool
on_exec
)
{
{
int
ret
=
-
1
;
int
ret
=
-
1
;
int
labelfd
;
int
labelfd
;
...
@@ -1158,7 +1146,7 @@ static int apparmor_process_label_fd_get(pid_t pid, bool on_exec)
...
@@ -1158,7 +1146,7 @@ static int apparmor_process_label_fd_get(pid_t pid, bool on_exec)
return
labelfd
;
return
labelfd
;
}
}
static
int
apparmor_process_label_set_at
(
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
static
int
apparmor_process_label_set_at
(
struct
lsm_ops
*
ops
,
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
{
{
int
ret
=
-
1
;
int
ret
=
-
1
;
size_t
len
;
size_t
len
;
...
@@ -1194,17 +1182,15 @@ static int apparmor_process_label_set_at(int label_fd, const char *label, bool o
...
@@ -1194,17 +1182,15 @@ static int apparmor_process_label_set_at(int label_fd, const char *label, bool o
*
*
* Notes: This relies on /proc being available.
* Notes: This relies on /proc being available.
*/
*/
static
int
apparmor_process_label_set
(
const
char
*
inlabel
,
struct
lxc_conf
*
conf
,
static
int
apparmor_process_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
inlabel
,
bool
on_exec
)
struct
lxc_conf
*
conf
,
bool
on_exec
)
{
{
int
label_fd
,
ret
;
int
label_fd
,
ret
;
pid_t
tid
;
pid_t
tid
;
const
char
*
label
;
const
char
*
label
;
if
(
!
atomic_load
(
&
aa_enabled
))
{
if
(
!
ops
->
aa_enabled
)
ERROR
(
"AppArmor not enabled"
);
return
log_error
(
-
1
,
"AppArmor not enabled"
);
return
-
1
;
}
label
=
inlabel
?
inlabel
:
conf
->
lsm_aa_profile_computed
;
label
=
inlabel
?
inlabel
:
conf
->
lsm_aa_profile_computed
;
if
(
!
label
)
{
if
(
!
label
)
{
...
@@ -1218,18 +1204,18 @@ static int apparmor_process_label_set(const char *inlabel, struct lxc_conf *conf
...
@@ -1218,18 +1204,18 @@ static int apparmor_process_label_set(const char *inlabel, struct lxc_conf *conf
return
0
;
return
0
;
}
}
if
(
strcmp
(
label
,
"unconfined"
)
==
0
&&
apparmor_am_unconfined
())
{
if
(
strcmp
(
label
,
"unconfined"
)
==
0
&&
apparmor_am_unconfined
(
ops
))
{
INFO
(
"AppArmor profile unchanged"
);
INFO
(
"AppArmor profile unchanged"
);
return
0
;
return
0
;
}
}
tid
=
lxc_raw_gettid
();
tid
=
lxc_raw_gettid
();
label_fd
=
apparmor_process_label_fd_get
(
tid
,
on_exec
);
label_fd
=
apparmor_process_label_fd_get
(
ops
,
tid
,
on_exec
);
if
(
label_fd
<
0
)
{
if
(
label_fd
<
0
)
{
SYSERROR
(
"Failed to change AppArmor profile to %s"
,
label
);
SYSERROR
(
"Failed to change AppArmor profile to %s"
,
label
);
return
-
1
;
return
-
1
;
}
}
ret
=
apparmor_process_label_set_at
(
label_fd
,
label
,
on_exec
);
ret
=
apparmor_process_label_set_at
(
ops
,
label_fd
,
label
,
on_exec
);
close
(
label_fd
);
close
(
label_fd
);
if
(
ret
<
0
)
{
if
(
ret
<
0
)
{
ERROR
(
"Failed to change AppArmor profile to %s"
,
label
);
ERROR
(
"Failed to change AppArmor profile to %s"
,
label
);
...
@@ -1241,44 +1227,49 @@ static int apparmor_process_label_set(const char *inlabel, struct lxc_conf *conf
...
@@ -1241,44 +1227,49 @@ static int apparmor_process_label_set(const char *inlabel, struct lxc_conf *conf
}
}
static
struct
lsm_ops
apparmor_ops
=
{
static
struct
lsm_ops
apparmor_ops
=
{
.
name
=
"AppArmor"
,
.
name
=
"AppArmor"
,
.
cleanup
=
apparmor_cleanup
,
.
aa_admin
=
-
1
,
.
enabled
=
apparmor_enabled
,
.
aa_can_stack
=
-
1
,
.
keyring_label_set
=
apparmor_keyring_label_set
,
.
aa_enabled
=
-
1
,
.
prepare
=
apparmor_prepare
,
.
aa_is_stacked
=
-
1
,
.
process_label_fd_get
=
apparmor_process_label_fd_get
,
.
aa_mount_features_enabled
=
-
1
,
.
process_label_get
=
apparmor_process_label_get
,
.
aa_parser_available
=
-
1
,
.
process_label_set
=
apparmor_process_label_set
,
.
aa_supports_unix
=
-
1
,
.
process_label_set_at
=
apparmor_process_label_set_at
,
.
cleanup
=
apparmor_cleanup
,
.
enabled
=
apparmor_enabled
,
.
keyring_label_set
=
apparmor_keyring_label_set
,
.
prepare
=
apparmor_prepare
,
.
process_label_fd_get
=
apparmor_process_label_fd_get
,
.
process_label_get
=
apparmor_process_label_get
,
.
process_label_set
=
apparmor_process_label_set
,
.
process_label_set_at
=
apparmor_process_label_set_at
,
};
};
const
struct
lsm_ops
*
lsm_apparmor_ops_init
(
void
)
struct
lsm_ops
*
lsm_apparmor_ops_init
(
void
)
{
{
bool
have_mac_admin
=
false
;
apparmor_ops
.
aa_admin
=
0
;
bool
can_stack
,
is_stacked
;
apparmor_ops
.
aa_can_stack
=
0
;
apparmor_ops
.
aa_enabled
=
0
;
if
(
!
apparmor_enabled
())
apparmor_ops
.
aa_is_stacked
=
0
;
apparmor_ops
.
aa_mount_features_enabled
=
0
;
apparmor_ops
.
aa_parser_available
=
-
1
;
apparmor_ops
.
aa_supports_unix
=
0
;
if
(
!
apparmor_enabled
(
&
apparmor_ops
))
return
NULL
;
return
NULL
;
can_stack
=
apparmor_can_stack
();
apparmor_ops
.
aa_can_stack
=
apparmor_can_stack
();
if
(
can_stack
)
{
if
(
apparmor_ops
.
aa_can_stack
)
atomic_store
(
&
aa_can_stack
,
1
);
apparmor_ops
.
aa_is_stacked
=
file_is_yes
(
"/sys/kernel/security/apparmor/.ns_stacked"
);
is_stacked
=
file_is_yes
(
"/sys/kernel/security/apparmor/.ns_stacked"
);
if
(
is_stacked
)
atomic_store
(
&
aa_is_stacked
,
1
);
}
#if HAVE_LIBCAP
#if HAVE_LIBCAP
have_mac
_admin
=
lxc_proc_cap_is_set
(
CAP_SETGID
,
CAP_EFFECTIVE
);
apparmor_ops
.
aa
_admin
=
lxc_proc_cap_is_set
(
CAP_SETGID
,
CAP_EFFECTIVE
);
#endif
#endif
if
(
!
apparmor_ops
.
aa_admin
)
if
(
!
have_mac_admin
)
WARN
(
"Per-container AppArmor profiles are disabled because the mac_admin capability is missing"
);
WARN
(
"Per-container AppArmor profiles are disabled because the mac_admin capability is missing"
);
else
if
(
am_host_unpriv
()
&&
!
a
tomic_load
(
&
aa_is_stacked
)
)
else
if
(
am_host_unpriv
()
&&
!
a
pparmor_ops
.
aa_is_stacked
)
WARN
(
"Per-container AppArmor profiles are disabled because LXC is running in an unprivileged container without stacking"
);
WARN
(
"Per-container AppArmor profiles are disabled because LXC is running in an unprivileged container without stacking"
);
else
atomic_store
(
&
aa_admin
,
1
);
a
tomic_store
(
&
aa_enabled
,
1
)
;
a
pparmor_ops
.
aa_enabled
=
1
;
return
&
apparmor_ops
;
return
&
apparmor_ops
;
}
}
src/lxc/lsm/lsm.c
View file @
76a59906
...
@@ -21,9 +21,9 @@ __hidden extern struct lsm_ops *lsm_apparmor_ops_init(void);
...
@@ -21,9 +21,9 @@ __hidden extern struct lsm_ops *lsm_apparmor_ops_init(void);
__hidden
extern
struct
lsm_ops
*
lsm_selinux_ops_init
(
void
);
__hidden
extern
struct
lsm_ops
*
lsm_selinux_ops_init
(
void
);
__hidden
extern
struct
lsm_ops
*
lsm_nop_ops_init
(
void
);
__hidden
extern
struct
lsm_ops
*
lsm_nop_ops_init
(
void
);
const
struct
lsm_ops
*
lsm_init
(
void
)
struct
lsm_ops
*
lsm_init
(
void
)
{
{
const
struct
lsm_ops
*
ops
=
NULL
;
struct
lsm_ops
*
ops
=
NULL
;
#if HAVE_APPARMOR
#if HAVE_APPARMOR
ops
=
lsm_apparmor_ops_init
();
ops
=
lsm_apparmor_ops_init
();
...
...
src/lxc/lsm/lsm.h
View file @
76a59906
...
@@ -14,16 +14,25 @@ struct lxc_conf;
...
@@ -14,16 +14,25 @@ struct lxc_conf;
struct
lsm_ops
{
struct
lsm_ops
{
const
char
*
name
;
const
char
*
name
;
int
(
*
enabled
)(
void
);
/* AppArmor specific fields. */
char
*
(
*
process_label_get
)(
pid_t
pid
);
int
aa_enabled
;
int
(
*
process_label_set
)(
const
char
*
label
,
struct
lxc_conf
*
conf
,
bool
on_exec
);
int
aa_parser_available
;
int
(
*
keyring_label_set
)(
const
char
*
label
);
int
aa_supports_unix
;
int
(
*
prepare
)(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
);
int
aa_can_stack
;
void
(
*
cleanup
)(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
);
int
aa_is_stacked
;
int
(
*
process_label_fd_get
)(
pid_t
pid
,
bool
on_exec
);
int
aa_admin
;
int
(
*
process_label_set_at
)(
int
label_fd
,
const
char
*
label
,
bool
on_exec
);
int
aa_mount_features_enabled
;
int
(
*
enabled
)(
struct
lsm_ops
*
ops
);
char
*
(
*
process_label_get
)(
struct
lsm_ops
*
ops
,
pid_t
pid
);
int
(
*
process_label_set
)(
struct
lsm_ops
*
ops
,
const
char
*
label
,
struct
lxc_conf
*
conf
,
bool
on_exec
);
int
(
*
keyring_label_set
)(
struct
lsm_ops
*
ops
,
const
char
*
label
);
int
(
*
prepare
)(
struct
lsm_ops
*
ops
,
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
);
void
(
*
cleanup
)(
struct
lsm_ops
*
ops
,
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
);
int
(
*
process_label_fd_get
)(
struct
lsm_ops
*
ops
,
pid_t
pid
,
bool
on_exec
);
int
(
*
process_label_set_at
)(
struct
lsm_ops
*
ops
,
int
label_fd
,
const
char
*
label
,
bool
on_exec
);
};
};
__hidden
extern
const
struct
lsm_ops
*
lsm_init
(
void
);
__hidden
extern
struct
lsm_ops
*
lsm_init
(
void
);
#endif
/* __LXC_LSM_H */
#endif
/* __LXC_LSM_H */
src/lxc/lsm/nop.c
View file @
76a59906
...
@@ -8,59 +8,66 @@
...
@@ -8,59 +8,66 @@
#include "config.h"
#include "config.h"
#include "lsm/lsm.h"
#include "lsm/lsm.h"
static
char
*
nop_process_label_get
(
pid_t
pid
)
static
char
*
nop_process_label_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
)
{
{
return
NULL
;
return
NULL
;
}
}
static
int
nop_process_label_set
(
const
char
*
label
,
struct
lxc_conf
*
conf
,
static
int
nop_process_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
label
,
struct
lxc_conf
*
conf
,
bool
on_exec
)
bool
on_exec
)
{
{
return
0
;
return
0
;
}
}
static
int
nop_enabled
(
void
)
static
int
nop_enabled
(
struct
lsm_ops
*
ops
)
{
{
return
0
;
return
0
;
}
}
static
int
nop_keyring_label_set
(
const
char
*
label
)
static
int
nop_keyring_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
label
)
{
{
return
0
;
return
0
;
}
}
static
int
nop_prepare
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
int
nop_prepare
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
return
0
;
return
0
;
}
}
static
void
nop_cleanup
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
void
nop_cleanup
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
}
}
static
int
nop_process_label_fd_get
(
pid_t
pid
,
bool
on_exec
)
static
int
nop_process_label_fd_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
,
bool
on_exec
)
{
{
return
0
;
return
0
;
}
}
static
int
nop_process_label_set_at
(
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
static
int
nop_process_label_set_at
(
struct
lsm_ops
*
ops
,
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
{
{
return
0
;
return
0
;
}
}
static
struct
lsm_ops
nop_ops
=
{
static
struct
lsm_ops
nop_ops
=
{
.
name
=
"nop"
,
.
name
=
"nop"
,
.
cleanup
=
nop_cleanup
,
.
aa_admin
=
-
1
,
.
enabled
=
nop_enabled
,
.
aa_can_stack
=
-
1
,
.
keyring_label_set
=
nop_keyring_label_set
,
.
aa_enabled
=
-
1
,
.
prepare
=
nop_prepare
,
.
aa_is_stacked
=
-
1
,
.
process_label_fd_get
=
nop_process_label_fd_get
,
.
aa_mount_features_enabled
=
-
1
,
.
process_label_get
=
nop_process_label_get
,
.
aa_parser_available
=
-
1
,
.
process_label_set
=
nop_process_label_set
,
.
aa_supports_unix
=
-
1
,
.
process_label_set_at
=
nop_process_label_set_at
,
.
cleanup
=
nop_cleanup
,
.
enabled
=
nop_enabled
,
.
keyring_label_set
=
nop_keyring_label_set
,
.
prepare
=
nop_prepare
,
.
process_label_fd_get
=
nop_process_label_fd_get
,
.
process_label_get
=
nop_process_label_get
,
.
process_label_set
=
nop_process_label_set
,
.
process_label_set_at
=
nop_process_label_set_at
,
};
};
const
struct
lsm_ops
*
lsm_nop_ops_init
(
void
)
struct
lsm_ops
*
lsm_nop_ops_init
(
void
)
{
{
return
&
nop_ops
;
return
&
nop_ops
;
}
}
src/lxc/lsm/selinux.c
View file @
76a59906
...
@@ -30,7 +30,7 @@ lxc_log_define(selinux, lsm);
...
@@ -30,7 +30,7 @@ lxc_log_define(selinux, lsm);
*
*
* Note that this relies on /proc being available.
* Note that this relies on /proc being available.
*/
*/
static
char
*
selinux_process_label_get
(
pid_t
pid
)
static
char
*
selinux_process_label_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
)
{
{
char
*
label
;
char
*
label
;
...
@@ -52,8 +52,8 @@ static char *selinux_process_label_get(pid_t pid)
...
@@ -52,8 +52,8 @@ static char *selinux_process_label_get(pid_t pid)
*
*
* Notes: This relies on /proc being available.
* Notes: This relies on /proc being available.
*/
*/
static
int
selinux_process_label_set
(
const
char
*
inlabel
,
struct
lxc_conf
*
conf
,
static
int
selinux_process_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
inlabel
,
bool
on_exec
)
struct
lxc_conf
*
conf
,
bool
on_exec
)
{
{
int
ret
;
int
ret
;
const
char
*
label
;
const
char
*
label
;
...
@@ -84,21 +84,21 @@ static int selinux_process_label_set(const char *inlabel, struct lxc_conf *conf,
...
@@ -84,21 +84,21 @@ static int selinux_process_label_set(const char *inlabel, struct lxc_conf *conf,
*
*
* Returns 0 on success, < 0 on failure
* Returns 0 on success, < 0 on failure
*/
*/
static
int
selinux_keyring_label_set
(
const
char
*
label
)
static
int
selinux_keyring_label_set
(
struct
lsm_ops
*
ops
,
const
char
*
label
)
{
{
return
setkeycreatecon_raw
(
label
);
return
setkeycreatecon_raw
(
label
);
}
}
static
int
selinux_prepare
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
int
selinux_prepare
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
return
0
;
return
0
;
}
}
static
void
selinux_cleanup
(
struct
lxc_conf
*
conf
,
const
char
*
lxcpath
)
static
void
selinux_cleanup
(
struct
l
sm_ops
*
ops
,
struct
l
xc_conf
*
conf
,
const
char
*
lxcpath
)
{
{
}
}
static
int
selinux_process_label_fd_get
(
pid_t
pid
,
bool
on_exec
)
static
int
selinux_process_label_fd_get
(
struct
lsm_ops
*
ops
,
pid_t
pid
,
bool
on_exec
)
{
{
int
ret
=
-
1
;
int
ret
=
-
1
;
int
labelfd
;
int
labelfd
;
...
@@ -118,7 +118,7 @@ static int selinux_process_label_fd_get(pid_t pid, bool on_exec)
...
@@ -118,7 +118,7 @@ static int selinux_process_label_fd_get(pid_t pid, bool on_exec)
return
labelfd
;
return
labelfd
;
}
}
static
int
selinux_process_label_set_at
(
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
static
int
selinux_process_label_set_at
(
struct
lsm_ops
*
ops
,
int
label_fd
,
const
char
*
label
,
bool
on_exec
)
{
{
int
ret
;
int
ret
;
...
@@ -133,19 +133,31 @@ static int selinux_process_label_set_at(int label_fd, const char *label, bool on
...
@@ -133,19 +133,31 @@ static int selinux_process_label_set_at(int label_fd, const char *label, bool on
return
0
;
return
0
;
}
}
static
int
selinux_enabled
(
struct
lsm_ops
*
ops
)
{
return
is_selinux_enabled
();
}
static
struct
lsm_ops
selinux_ops
=
{
static
struct
lsm_ops
selinux_ops
=
{
.
name
=
"SELinux"
,
.
name
=
"SELinux"
,
.
cleanup
=
selinux_cleanup
,
.
aa_admin
=
-
1
,
.
enabled
=
is_selinux_enabled
,
.
aa_can_stack
=
-
1
,
.
keyring_label_set
=
selinux_keyring_label_set
,
.
aa_enabled
=
-
1
,
.
prepare
=
selinux_prepare
,
.
aa_is_stacked
=
-
1
,
.
process_label_fd_get
=
selinux_process_label_fd_get
,
.
aa_mount_features_enabled
=
-
1
,
.
process_label_get
=
selinux_process_label_get
,
.
aa_parser_available
=
-
1
,
.
process_label_set
=
selinux_process_label_set
,
.
aa_supports_unix
=
-
1
,
.
process_label_set_at
=
selinux_process_label_set_at
,
.
cleanup
=
selinux_cleanup
,
.
enabled
=
selinux_enabled
,
.
keyring_label_set
=
selinux_keyring_label_set
,
.
prepare
=
selinux_prepare
,
.
process_label_fd_get
=
selinux_process_label_fd_get
,
.
process_label_get
=
selinux_process_label_get
,
.
process_label_set
=
selinux_process_label_set
,
.
process_label_set_at
=
selinux_process_label_set_at
,
};
};
const
struct
lsm_ops
*
lsm_selinux_ops_init
(
void
)
struct
lsm_ops
*
lsm_selinux_ops_init
(
void
)
{
{
if
(
!
is_selinux_enabled
())
if
(
!
is_selinux_enabled
())
return
NULL
;
return
NULL
;
...
...
src/lxc/start.c
View file @
76a59906
...
@@ -827,7 +827,7 @@ int lxc_init(const char *name, struct lxc_handler *handler)
...
@@ -827,7 +827,7 @@ int lxc_init(const char *name, struct lxc_handler *handler)
return
log_error
(
-
1
,
"Failed loading seccomp policy"
);
return
log_error
(
-
1
,
"Failed loading seccomp policy"
);
TRACE
(
"Read seccomp policy"
);
TRACE
(
"Read seccomp policy"
);
ret
=
handler
->
lsm_ops
->
prepare
(
conf
,
handler
->
lxcpath
);
ret
=
handler
->
lsm_ops
->
prepare
(
handler
->
lsm_ops
,
conf
,
handler
->
lxcpath
);
if
(
ret
<
0
)
{
if
(
ret
<
0
)
{
ERROR
(
"Failed to initialize LSM"
);
ERROR
(
"Failed to initialize LSM"
);
goto
out_delete_terminal
;
goto
out_delete_terminal
;
...
@@ -918,7 +918,7 @@ void lxc_end(struct lxc_handler *handler)
...
@@ -918,7 +918,7 @@ void lxc_end(struct lxc_handler *handler)
while
(
namespace_count
--
)
while
(
namespace_count
--
)
free
(
namespaces
[
namespace_count
]);
free
(
namespaces
[
namespace_count
]);
handler
->
lsm_ops
->
cleanup
(
handler
->
conf
,
handler
->
lxcpath
);
handler
->
lsm_ops
->
cleanup
(
handler
->
lsm_ops
,
handler
->
conf
,
handler
->
lxcpath
);
if
(
cgroup_ops
)
{
if
(
cgroup_ops
)
{
cgroup_ops
->
payload_destroy
(
cgroup_ops
,
handler
);
cgroup_ops
->
payload_destroy
(
cgroup_ops
,
handler
);
...
@@ -1269,7 +1269,7 @@ static int do_start(void *data)
...
@@ -1269,7 +1269,7 @@ static int do_start(void *data)
}
}
/* Set the label to change to when we exec(2) the container's init. */
/* Set the label to change to when we exec(2) the container's init. */
ret
=
handler
->
lsm_ops
->
process_label_set
(
NULL
,
handler
->
conf
,
true
);
ret
=
handler
->
lsm_ops
->
process_label_set
(
handler
->
lsm_ops
,
NULL
,
handler
->
conf
,
true
);
if
(
ret
<
0
)
if
(
ret
<
0
)
goto
out_warn_father
;
goto
out_warn_father
;
...
...
src/lxc/start.h
View file @
76a59906
...
@@ -128,7 +128,8 @@ struct lxc_handler {
...
@@ -128,7 +128,8 @@ struct lxc_handler {
/* Internal fds that always need to stay open. */
/* Internal fds that always need to stay open. */
int
keep_fds
[
3
];
int
keep_fds
[
3
];
const
struct
lsm_ops
*
lsm_ops
;
/* Static memory, don't free. */
struct
lsm_ops
*
lsm_ops
;
};
};
struct
execute_args
{
struct
execute_args
{
...
...
src/tests/attach.c
View file @
76a59906
...
@@ -47,11 +47,11 @@
...
@@ -47,11 +47,11 @@
static
const
char
*
lsm_config_key
=
NULL
;
static
const
char
*
lsm_config_key
=
NULL
;
static
const
char
*
lsm_label
=
NULL
;
static
const
char
*
lsm_label
=
NULL
;
const
struct
lsm_ops
*
lsm_ops
;
struct
lsm_ops
*
lsm_ops
;
static
void
test_lsm_detect
(
void
)
static
void
test_lsm_detect
(
void
)
{
{
if
(
lsm_ops
->
enabled
())
{
if
(
lsm_ops
->
enabled
(
lsm_ops
))
{
if
(
!
strcmp
(
lsm_ops
->
name
,
"SELinux"
))
{
if
(
!
strcmp
(
lsm_ops
->
name
,
"SELinux"
))
{
lsm_config_key
=
"lxc.selinux.context"
;
lsm_config_key
=
"lxc.selinux.context"
;
lsm_label
=
"unconfined_u:unconfined_r:lxc_t:s0-s0:c0.c1023"
;
lsm_label
=
"unconfined_u:unconfined_r:lxc_t:s0-s0:c0.c1023"
;
...
@@ -80,7 +80,7 @@ static void test_attach_lsm_set_config(struct lxc_container *ct)
...
@@ -80,7 +80,7 @@ static void test_attach_lsm_set_config(struct lxc_container *ct)
static
int
test_attach_lsm_func_func
(
void
*
payload
)
static
int
test_attach_lsm_func_func
(
void
*
payload
)
{
{
TSTOUT
(
"%s"
,
lsm_ops
->
process_label_get
(
syscall
(
SYS_getpid
)));
TSTOUT
(
"%s"
,
lsm_ops
->
process_label_get
(
lsm_ops
,
syscall
(
SYS_getpid
)));
return
0
;
return
0
;
}
}
...
@@ -330,7 +330,7 @@ static struct lxc_container *test_ct_create(const char *lxcpath,
...
@@ -330,7 +330,7 @@ static struct lxc_container *test_ct_create(const char *lxcpath,
goto
out2
;
goto
out2
;
}
}
if
(
lsm_ops
->
enabled
())
if
(
lsm_ops
->
enabled
(
lsm_ops
))
test_attach_lsm_set_config
(
ct
);
test_attach_lsm_set_config
(
ct
);
ct
->
want_daemonize
(
ct
,
true
);
ct
->
want_daemonize
(
ct
,
true
);
...
@@ -370,7 +370,7 @@ static int test_attach(const char *lxcpath, const char *name, const char *templa
...
@@ -370,7 +370,7 @@ static int test_attach(const char *lxcpath, const char *name, const char *templa
goto
err2
;
goto
err2
;
}
}
if
(
lsm_ops
->
enabled
())
{
if
(
lsm_ops
->
enabled
(
lsm_ops
))
{
ret
=
test_attach_lsm_cmd
(
ct
);
ret
=
test_attach_lsm_cmd
(
ct
);
if
(
ret
<
0
)
{
if
(
ret
<
0
)
{
TSTERR
(
"attach lsm cmd test failed"
);
TSTERR
(
"attach lsm cmd test failed"
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment