qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Corey Bryant <coreyb@linux.vnet.ibm.com>
To: Anthony Liguori <anthony@codemonkey.ws>
Cc: pmoore@redhat.com, qemu-devel@nongnu.org,
	Eduardo Otubo <otubo@linux.vnet.ibm.com>
Subject: Re: [Qemu-devel] [PATCHv3 2/5] seccomp: setting "-sandbox on" as deafult
Date: Tue, 27 Nov 2012 14:07:31 -0500	[thread overview]
Message-ID: <50B50F73.9090002@linux.vnet.ibm.com> (raw)
In-Reply-To: <87obii6fa5.fsf@codemonkey.ws>



On 11/27/2012 02:01 PM, Anthony Liguori wrote:
> Eduardo Otubo <otubo@linux.vnet.ibm.com> writes:
>
>> Now the seccomp filter will be set to "on" even if no argument
>> "-sandbox" is given.
>>
>> v3: * Introduced seccomp_states enum and new functions named
>>        seccomp_set_state() and seccomp_get_state()
>>       (pbonzini@redhat.com).
>>      * Merged seccomp_start() and install_seccomp_filter(),
>>        moved install_seccomp_filter() to qemu-seccomp.c,
>>        and renamed it.
>>      * Moved CONFIG_SECCOMP pre-processor checks from Makefile.objs
>>        to qemu-seccomp.c.
>>      * Replace qerror_report with fprintf(stderr, "..") in main()
>>        (lcapitulino@redhat.com).
>
> There's no way this can go for 1.3.  Can we just do 1/5 to fix the
> libvirt problem for 1.3, and leave the rest for 1.4?
>
> Regards,
>
> Anthony Liguori
>

Unfortunately I think that's our only option at this point.  I believe 
we've determined the syscalls to add to patch 1/5 to fix the issue Paul 
was hitting.  (They are syscalls that are being called in spice server 
code.)  Eduardo will be submitting a new patch soon.

-- 
Regards,
Corey Bryant

>>
>> Note: This support requires libseccomp.  If you don't have access
>> to libseccomp packages, you can manually build with the following
>> steps:
>>
>>    1) git clone git://git.code.sf.net/p/libseccomp/libseccomp
>>    2) cd libseccomp
>>    3) ./configure
>>    4) make
>>    5) make install
>>    6) export PKG_CONFIG_PATH="/usr/local/lib/pkgconfig/"
>>
>> Signed-off-by: Eduardo Otubo <otubo@linux.vnet.ibm.com>
>> Signed-off-by: Corey Bryant <coreyb@linux.vnet.ibm.com>
>> ---
>>   Makefile.objs  |    2 --
>>   configure      |    2 +-
>>   qemu-seccomp.c |   26 ++++++++++++++++++++++++--
>>   qemu-seccomp.h |   13 +++++++++++--
>>   vl.c           |   31 ++++++++++++++++---------------
>>   5 files changed, 52 insertions(+), 22 deletions(-)
>>
>> diff --git a/Makefile.objs b/Makefile.objs
>> index 593a592..682b1e6 100644
>> --- a/Makefile.objs
>> +++ b/Makefile.objs
>> @@ -103,9 +103,7 @@ common-obj-$(CONFIG_SLIRP) += slirp/
>>
>>   ######################################################################
>>   # libseccomp
>> -ifeq ($(CONFIG_SECCOMP),y)
>>   common-obj-y += qemu-seccomp.o
>> -endif
>>
>>   ######################################################################
>>   # libuser
>> diff --git a/configure b/configure
>> index 7290f50..d28f8d5 100755
>> --- a/configure
>> +++ b/configure
>> @@ -221,7 +221,7 @@ guest_agent="yes"
>>   want_tools="yes"
>>   libiscsi=""
>>   coroutine=""
>> -seccomp=""
>> +seccomp="yes"
>>   glusterfs=""
>>
>>   # parse CC options first
>> diff --git a/qemu-seccomp.c b/qemu-seccomp.c
>> index b06a2c6..2386996 100644
>> --- a/qemu-seccomp.c
>> +++ b/qemu-seccomp.c
>> @@ -12,10 +12,28 @@
>>    * Contributions after 2012-01-13 are licensed under the terms of the
>>    * GNU GPL, version 2 or (at your option) any later version.
>>    */
>> +#include "config-host.h"
>>   #include <stdio.h>
>> -#include <seccomp.h>
>> +#include "osdep.h"
>>   #include "qemu-seccomp.h"
>>
>> +#ifdef CONFIG_SECCOMP
>> +int seccomp_state = SECCOMP_ON;
>> +#else
>> +int seccomp_state = SECCOMP_OFF;
>> +#endif
>> +
>> +void seccomp_set_state(int state)
>> +{
>> +    seccomp_state = state;
>> +}
>> +
>> +int seccomp_get_state(void)
>> +{
>> +    return seccomp_state;
>> +}
>> +
>> +#ifdef CONFIG_SECCOMP
>>   struct QemuSeccompSyscall {
>>       int32_t num;
>>       uint8_t priority;
>> @@ -223,15 +241,18 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
>>       { SCMP_SYS(prlimit64), 241 },
>>       { SCMP_SYS(waitid), 241 }
>>   };
>> +#endif
>>
>> -int seccomp_start(void)
>> +int seccomp_install_filter(void)
>>   {
>>       int rc = 0;
>> +#ifdef CONFIG_SECCOMP
>>       unsigned int i = 0;
>>       scmp_filter_ctx ctx;
>>
>>       ctx = seccomp_init(SCMP_ACT_KILL);
>>       if (ctx == NULL) {
>> +        rc = -1;
>>           goto seccomp_return;
>>       }
>>
>> @@ -251,5 +272,6 @@ int seccomp_start(void)
>>
>>     seccomp_return:
>>       seccomp_release(ctx);
>> +#endif
>>       return rc;
>>   }
>> diff --git a/qemu-seccomp.h b/qemu-seccomp.h
>> index b2fc3f8..fa26d70 100644
>> --- a/qemu-seccomp.h
>> +++ b/qemu-seccomp.h
>> @@ -15,8 +15,17 @@
>>   #ifndef QEMU_SECCOMP_H
>>   #define QEMU_SECCOMP_H
>>
>> +#ifdef CONFIG_SECCOMP
>>   #include <seccomp.h>
>> -#include "osdep.h"
>> +#endif
>> +
>> +enum seccomp_states {
>> +    SECCOMP_OFF,
>> +    SECCOMP_ON
>> +};
>> +
>> +void seccomp_set_state(int);
>> +int seccomp_get_state(void);
>> +int seccomp_install_filter(void);
>>
>> -int seccomp_start(void);
>>   #endif
>> diff --git a/vl.c b/vl.c
>> index 4f03a72..cb3d85e 100644
>> --- a/vl.c
>> +++ b/vl.c
>> @@ -64,9 +64,7 @@
>>   #include <linux/parport.h>
>>   #endif
>>
>> -#ifdef CONFIG_SECCOMP
>>   #include "qemu-seccomp.h"
>> -#endif
>>
>>   #ifdef __sun__
>>   #include <sys/stat.h>
>> @@ -772,22 +770,17 @@ static int bt_parse(const char *opt)
>>
>>   static int parse_sandbox(QemuOpts *opts, void *opaque)
>>   {
>> -    /* FIXME: change this to true for 1.3 */
>> -    if (qemu_opt_get_bool(opts, "enable", false)) {
>>   #ifdef CONFIG_SECCOMP
>> -        if (seccomp_start() < 0) {
>> -            qerror_report(ERROR_CLASS_GENERIC_ERROR,
>> -                          "failed to install seccomp syscall filter in the kernel");
>> -            return -1;
>> -        }
>> -#else
>> -        qerror_report(ERROR_CLASS_GENERIC_ERROR,
>> -                      "sandboxing request but seccomp is not compiled into this build");
>> -        return -1;
>> -#endif
>> +    /* seccomp sandboxing is on by default */
>> +    if (!qemu_opt_get_bool(opts, "enable", true)) {
>> +        seccomp_set_state(SECCOMP_OFF);
>>       }
>> -
>>       return 0;
>> +#else
>> +    fprintf(stderr, "sandbox option specified but seccomp is not compiled "
>> +                    "into this build\n");
>> +    return -1;
>> +#endif
>>   }
>>
>>   /*********QEMU USB setting******/
>> @@ -3489,6 +3482,14 @@ int main(int argc, char **argv, char **envp)
>>           exit(1);
>>       }
>>
>> +    if (seccomp_get_state() == SECCOMP_ON) {
>> +        if (seccomp_install_filter() < 0) {
>> +            fprintf(stderr, "failed to install seccomp syscall "
>> +                            "initialization filter\n");
>> +            exit(1);
>> +        }
>> +    }
>> +
>>   #ifndef _WIN32
>>       if (qemu_opts_foreach(qemu_find_opts("add-fd"), parse_add_fd, NULL, 1)) {
>>           exit(1);
>> --
>> 1.7.10.4
>

  reply	other threads:[~2012-11-27 19:08 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-11-12 19:48 [Qemu-devel] [PATCHv3 1/5] seccomp: adding new syscalls (bugzilla 855162) Eduardo Otubo
2012-11-12 19:48 ` [Qemu-devel] [PATCHv3 2/5] seccomp: setting "-sandbox on" as deafult Eduardo Otubo
2012-11-21 15:20   ` Andreas Färber
2012-11-27 19:01   ` Anthony Liguori
2012-11-27 19:07     ` Corey Bryant [this message]
2012-11-12 19:48 ` [Qemu-devel] [PATCHv3 3/5] net: Disallow device hotplug that causes execve() Eduardo Otubo
2012-11-12 19:48 ` [Qemu-devel] [PATCHv3 4/5] seccomp: double whitelist support Eduardo Otubo
2012-11-12 19:48 ` [Qemu-devel] [PATCHv3 5/5] seccomp: adding debug mode Eduardo Otubo
2012-11-21 13:20 ` [Qemu-devel] [PATCHv3 1/5] seccomp: adding new syscalls (bugzilla 855162) Eduardo Otubo
2012-11-21 15:24   ` Paul Moore
2012-11-26 16:41     ` Corey Bryant
2012-11-26 17:08       ` Paul Moore
2012-11-26 19:59         ` Corey Bryant
2012-11-26 20:41           ` Paul Moore
2012-11-26 21:48             ` Paul Moore
2012-11-27 16:11               ` Corey Bryant
2012-11-27 16:15                 ` Paul Moore
2012-11-21 15:30   ` Andreas Färber

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=50B50F73.9090002@linux.vnet.ibm.com \
    --to=coreyb@linux.vnet.ibm.com \
    --cc=anthony@codemonkey.ws \
    --cc=otubo@linux.vnet.ibm.com \
    --cc=pmoore@redhat.com \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).