On 02/27/2017 08:19 AM, Michal Privoznik wrote: > When domain is being started up, we ought to relabel the host > side of NVDIMM so qemu has access to it. > > Signed-off-by: Michal Privoznik <mprivozn@xxxxxxxxxx> > --- > src/security/security_selinux.c | 66 +++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 66 insertions(+) > > diff --git a/src/security/security_selinux.c b/src/security/security_selinux.c > index e22de0653..223442105 100644 > --- a/src/security/security_selinux.c > +++ b/src/security/security_selinux.c > @@ -1381,6 +1381,62 @@ virSecuritySELinuxRestoreInputLabel(virSecurityManagerPtr mgr, > } > > > +static int > +virSecuritySELinuxSetMemoryLabel(virSecurityManagerPtr mgr, > + virDomainDefPtr def, > + virDomainMemoryDefPtr mem) > +{ > + virSecurityLabelDefPtr seclabel; > + > + seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_SELINUX_NAME); > + if (seclabel == NULL) > + return 0; Similar question to DAC - why not put the check in the NVDIMM case. > + > + switch ((virDomainMemoryModel) mem->model) { > + case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: > + if (virSecuritySELinuxSetFilecon(mgr, mem->path, > + seclabel->imagelabel) < 0) > + return -1; > + break; > + > + case VIR_DOMAIN_MEMORY_MODEL_NONE: > + case VIR_DOMAIN_MEMORY_MODEL_DIMM: > + case VIR_DOMAIN_MEMORY_MODEL_LAST: > + break; > + } > + > + return 0; > +} > + > + > +static int > +virSecuritySELinuxRestoreMemoryLabel(virSecurityManagerPtr mgr, > + virDomainDefPtr def, > + virDomainMemoryDefPtr mem) > +{ > + int ret = -1; > + virSecurityLabelDefPtr seclabel; > + > + seclabel = virDomainDefGetSecurityLabelDef(def, SECURITY_SELINUX_NAME); > + if (seclabel == NULL) > + return 0; Same here... ACK in principle though John > + > + switch ((virDomainMemoryModel) mem->model) { > + case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: > + ret = virSecuritySELinuxRestoreFileLabel(mgr, mem->path); > + break; > + > + case VIR_DOMAIN_MEMORY_MODEL_DIMM: > + case VIR_DOMAIN_MEMORY_MODEL_NONE: > + case VIR_DOMAIN_MEMORY_MODEL_LAST: > + ret = 0; > + break; > + } > + > + return ret; > +} > + > + > static int > virSecuritySELinuxSetTPMFileLabel(virSecurityManagerPtr mgr, > virDomainDefPtr def, > @@ -2325,6 +2381,11 @@ virSecuritySELinuxRestoreAllLabel(virSecurityManagerPtr mgr, > rc = -1; > } > > + for (i = 0; i < def->nmems; i++) { > + if (virSecuritySELinuxRestoreMemoryLabel(mgr, def, def->mems[i]) < 0) > + return -1; > + } > + > for (i = 0; i < def->ndisks; i++) { > virDomainDiskDefPtr disk = def->disks[i]; > > @@ -2711,6 +2772,11 @@ virSecuritySELinuxSetAllLabel(virSecurityManagerPtr mgr, > return -1; > } > > + for (i = 0; i < def->nmems; i++) { > + if (virSecuritySELinuxSetMemoryLabel(mgr, def, def->mems[i]) < 0) > + return -1; > + } > + > if (def->tpm) { > if (virSecuritySELinuxSetTPMFileLabel(mgr, def, def->tpm) < 0) > return -1; > -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list