mirror of
https://github.com/mborgerson/xemu.git
synced 2025-12-01 16:10:01 +00:00
virtiofsd: Add an option to enable/disable security label
Provide an option "-o security_label/no_security_label" to enable/disable security label functionality. By default these are turned off. If enabled, server will indicate to client that it is capable of handling one security label during file creation. Typically this is expected to be a SELinux label. File server will set this label on the file. It will try to set it atomically wherever possible. But its not possible in all the cases. Signed-off-by: Vivek Goyal <vgoyal@redhat.com> Message-Id: <20220208204813.682906-11-vgoyal@redhat.com> Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
This commit is contained in:
committed by
Dr. David Alan Gilbert
parent
a675c9a600
commit
963061dc11
@ -187,6 +187,7 @@ void fuse_cmdline_help(void)
|
||||
" default: no_allow_direct_io\n"
|
||||
" -o announce_submounts Announce sub-mount points to the guest\n"
|
||||
" -o posix_acl/no_posix_acl Enable/Disable posix_acl. (default: disabled)\n"
|
||||
" -o security_label/no_security_label Enable/Disable security label. (default: disabled)\n"
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
@ -181,6 +181,7 @@ struct lo_data {
|
||||
int user_posix_acl, posix_acl;
|
||||
/* Keeps track if /proc/<pid>/attr/fscreate should be used or not */
|
||||
bool use_fscreate;
|
||||
int user_security_label;
|
||||
};
|
||||
|
||||
static const struct fuse_opt lo_opts[] = {
|
||||
@ -215,6 +216,8 @@ static const struct fuse_opt lo_opts[] = {
|
||||
{ "no_killpriv_v2", offsetof(struct lo_data, user_killpriv_v2), 0 },
|
||||
{ "posix_acl", offsetof(struct lo_data, user_posix_acl), 1 },
|
||||
{ "no_posix_acl", offsetof(struct lo_data, user_posix_acl), 0 },
|
||||
{ "security_label", offsetof(struct lo_data, user_security_label), 1 },
|
||||
{ "no_security_label", offsetof(struct lo_data, user_security_label), 0 },
|
||||
FUSE_OPT_END
|
||||
};
|
||||
static bool use_syslog = false;
|
||||
@ -808,6 +811,17 @@ static void lo_init(void *userdata, struct fuse_conn_info *conn)
|
||||
fuse_log(FUSE_LOG_DEBUG, "lo_init: disabling posix_acl\n");
|
||||
conn->want &= ~FUSE_CAP_POSIX_ACL;
|
||||
}
|
||||
|
||||
if (lo->user_security_label == 1) {
|
||||
if (!(conn->capable & FUSE_CAP_SECURITY_CTX)) {
|
||||
fuse_log(FUSE_LOG_ERR, "lo_init: Can not enable security label."
|
||||
" kernel does not support FUSE_SECURITY_CTX capability.\n");
|
||||
}
|
||||
conn->want |= FUSE_CAP_SECURITY_CTX;
|
||||
} else {
|
||||
fuse_log(FUSE_LOG_DEBUG, "lo_init: disabling security label\n");
|
||||
conn->want &= ~FUSE_CAP_SECURITY_CTX;
|
||||
}
|
||||
}
|
||||
|
||||
static void lo_getattr(fuse_req_t req, fuse_ino_t ino,
|
||||
@ -4288,6 +4302,7 @@ int main(int argc, char *argv[])
|
||||
.proc_self_task = -1,
|
||||
.user_killpriv_v2 = -1,
|
||||
.user_posix_acl = -1,
|
||||
.user_security_label = -1,
|
||||
};
|
||||
struct lo_map_elem *root_elem;
|
||||
struct lo_map_elem *reserve_elem;
|
||||
|
||||
Reference in New Issue
Block a user