2 * Copyright (C) 2018 Red Hat, Inc.
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library. If not, see
16 * <http://www.gnu.org/licenses/>.
21 #include "qemusecuritytest.h"
22 #include "testutils.h"
23 #include "testutilsqemu.h"
24 #include "security/security_manager.h"
25 #include "security/security_util.h"
26 #include "conf/domain_conf.h"
27 #include "qemu/qemu_domain.h"
28 #include "qemu/qemu_security.h"
30 #define VIR_FROM_THIS VIR_FROM_NONE
33 virQEMUDriver
*driver
;
34 const char *file
; /* file name to load VM def XML from; qemuxmlconfdata/ */
39 prepareObjects(virQEMUDriver
*driver
,
41 virDomainObj
**vm_ret
)
43 qemuDomainObjPrivate
*priv
;
44 g_autoptr(virDomainObj
) vm
= NULL
;
45 g_autofree
char *filename
= NULL
;
46 g_autofree
char *domxml
= NULL
;
47 g_autofree
char *latestCapsFile
= NULL
;
49 filename
= g_strdup_printf("%s/qemuxmlconfdata/%s.xml", abs_srcdir
, xmlname
);
51 if (virTestLoadFile(filename
, &domxml
) < 0)
54 if (!(vm
= virDomainObjNew(driver
->xmlopt
)))
57 priv
= vm
->privateData
;
58 priv
->chardevStdioLogd
= false;
59 priv
->rememberOwner
= true;
61 if (!(latestCapsFile
= testQemuGetLatestCapsForArch("x86_64", "xml")))
64 if (!(priv
->qemuCaps
= qemuTestParseCapabilitiesArch(VIR_ARCH_X86_64
, latestCapsFile
)))
67 virFileCacheClear(driver
->qemuCapsCache
);
69 if (qemuTestCapsCacheInsert(driver
->qemuCapsCache
, priv
->qemuCaps
) < 0)
72 if (!(vm
->def
= virDomainDefParseString(domxml
,
78 if (virSecurityManagerGenLabel(driver
->securityManager
, vm
->def
) < 0)
81 *vm_ret
= g_steal_pointer(&vm
);
87 testDomain(const void *opaque
)
89 const struct testData
*data
= opaque
;
90 g_autoptr(virDomainObj
) vm
= NULL
;
91 g_autoptr(GHashTable
) notRestored
= virHashNew(NULL
);
95 if (prepareObjects(data
->driver
, data
->file
, &vm
) < 0)
98 for (i
= 0; i
< vm
->def
->ndisks
; i
++) {
99 virStorageSource
*src
= vm
->def
->disks
[i
]->src
;
105 if (virStorageSourceIsLocalStorage(src
) && src
->path
&&
106 (src
->shared
|| src
->readonly
))
107 g_hash_table_insert(notRestored
, g_strdup(src
->path
), NULL
);
109 for (n
= src
->backingStore
; virStorageSourceIsBacking(n
); n
= n
->backingStore
) {
110 if (virStorageSourceIsLocalStorage(n
) && n
->path
)
111 g_hash_table_insert(notRestored
, g_strdup(n
->path
), NULL
);
115 /* Mocking is enabled only when this env variable is set.
116 * See mock code for explanation. */
117 if (g_setenv(ENVVAR
, "1", FALSE
) == FALSE
)
120 if (qemuSecuritySetAllLabel(data
->driver
, vm
, NULL
, false) < 0)
123 qemuSecurityRestoreAllLabel(data
->driver
, vm
, false);
125 if (checkPaths(notRestored
) < 0)
139 virQEMUDriver driver
;
140 virSecurityManager
*stack
= NULL
;
141 virSecurityManager
*dac
= NULL
;
143 virSecurityManager
*selinux
= NULL
;
147 if (!virSecurityXATTRNamespaceDefined())
150 if (virInitialize() < 0 ||
151 qemuTestDriverInit(&driver
) < 0)
154 /* Now fix the secdriver */
155 virObjectUnref(driver
.securityManager
);
157 if (!(dac
= virSecurityManagerNewDAC("test", 1000, 1000,
158 VIR_SECURITY_MANAGER_PRIVILEGED
|
159 VIR_SECURITY_MANAGER_DYNAMIC_OWNERSHIP
,
161 fprintf(stderr
, "Cannot initialize DAC security driver");
166 if (!(stack
= virSecurityManagerNewStack(dac
))) {
167 fprintf(stderr
, "Cannot initialize stack security driver");
174 selinux
= virSecurityManagerNew("selinux", "test",
175 VIR_SECURITY_MANAGER_PRIVILEGED
|
176 VIR_SECURITY_MANAGER_DEFAULT_CONFINED
|
177 VIR_SECURITY_MANAGER_REQUIRE_CONFINED
);
179 fprintf(stderr
, "Cannot initialize selinux security driver");
184 if (virSecurityManagerStackAddNested(stack
, selinux
) < 0) {
185 fprintf(stderr
, "Cannot add selinux security driver onto stack");
192 driver
.securityManager
= g_steal_pointer(&stack
);
195 #define DO_TEST_DOMAIN(f) \
197 struct testData data = {.driver = &driver, .file = f}; \
198 if (virTestRun(f, testDomain, &data) < 0) \
202 DO_TEST_DOMAIN("acpi-table");
203 DO_TEST_DOMAIN("channel-unix-guestfwd");
204 DO_TEST_DOMAIN("console-virtio-unix");
205 DO_TEST_DOMAIN("controller-virtio-scsi");
206 DO_TEST_DOMAIN("disk-aio");
207 DO_TEST_DOMAIN("disk-backing-chains-noindex");
208 DO_TEST_DOMAIN("disk-cache");
209 DO_TEST_DOMAIN("disk-cdrom");
210 DO_TEST_DOMAIN("disk-cdrom-bus-other");
211 DO_TEST_DOMAIN("disk-cdrom-network");
212 DO_TEST_DOMAIN("disk-cdrom-tray");
213 DO_TEST_DOMAIN("disk-copy_on_read");
214 DO_TEST_DOMAIN("disk-detect-zeroes");
215 DO_TEST_DOMAIN("disk-error-policy");
216 DO_TEST_DOMAIN("disk-floppy");
217 DO_TEST_DOMAIN("disk-floppy-q35");
218 DO_TEST_DOMAIN("disk-network-gluster");
219 DO_TEST_DOMAIN("disk-network-iscsi");
220 DO_TEST_DOMAIN("disk-network-nbd");
221 DO_TEST_DOMAIN("disk-network-rbd");
222 DO_TEST_DOMAIN("disk-network-sheepdog");
223 DO_TEST_DOMAIN("disk-network-source-auth");
224 DO_TEST_DOMAIN("disk-network-tlsx509-nbd");
225 DO_TEST_DOMAIN("disk-readonly-disk");
226 DO_TEST_DOMAIN("disk-scsi");
227 DO_TEST_DOMAIN("disk-scsi-device-auto");
228 DO_TEST_DOMAIN("disk-shared");
229 DO_TEST_DOMAIN("disk-virtio");
230 DO_TEST_DOMAIN("disk-virtio-scsi-reservations");
231 DO_TEST_DOMAIN("graphics-vnc-tls-secret");
232 DO_TEST_DOMAIN("hugepages-nvdimm");
233 DO_TEST_DOMAIN("iothreads-virtio-scsi-pci");
234 DO_TEST_DOMAIN("memory-hotplug-nvdimm");
235 DO_TEST_DOMAIN("memory-hotplug-nvdimm-access");
236 DO_TEST_DOMAIN("memory-hotplug-nvdimm-align");
237 DO_TEST_DOMAIN("memory-hotplug-nvdimm-label");
238 DO_TEST_DOMAIN("memory-hotplug-nvdimm-pmem");
239 DO_TEST_DOMAIN("memory-hotplug-nvdimm-readonly");
240 DO_TEST_DOMAIN("net-vhostuser");
241 DO_TEST_DOMAIN("firmware-auto-bios");
242 DO_TEST_DOMAIN("firmware-auto-efi");
243 DO_TEST_DOMAIN("firmware-auto-efi-loader-secure");
244 DO_TEST_DOMAIN("pci-bridge-many-disks");
245 DO_TEST_DOMAIN("tseg-explicit-size");
246 DO_TEST_DOMAIN("usb-redir-unix");
247 DO_TEST_DOMAIN("virtio-non-transitional");
248 DO_TEST_DOMAIN("virtio-transitional");
249 DO_TEST_DOMAIN("x86_64-pc-graphics");
250 DO_TEST_DOMAIN("x86_64-pc-headless");
251 DO_TEST_DOMAIN("x86_64-q35-graphics");
252 DO_TEST_DOMAIN("x86_64-q35-headless");
255 qemuTestDriverFree(&driver
);
257 virObjectUnref(selinux
);
260 virObjectUnref(stack
);
261 return ret
== 0 ? EXIT_SUCCESS
: EXIT_FAILURE
;
264 VIR_TEST_MAIN_PRELOAD(mymain
,
265 VIR_TEST_MOCK("domaincaps"))