This test checks if security label remembering works correctly.
It uses qemuSecurity* APIs to do that. And some mocking (even
though it's not real mocking as we are used to from other tests
like virpcitest). So far, only DAC driver is tested.
Signed-off-by: Michal Privoznik <mprivozn(a)redhat.com>
---
cfg.mk | 4 +-
src/util/virfile.h | 15 +-
tests/Makefile.am | 10 +
tests/qemusecuritymock.c | 480 +++++++++++++++++++++++++++++++++++++++
tests/qemusecuritytest.c | 173 ++++++++++++++
tests/qemusecuritytest.h | 28 +++
6 files changed, 703 insertions(+), 7 deletions(-)
create mode 100644 tests/qemusecuritymock.c
create mode 100644 tests/qemusecuritytest.c
create mode 100644 tests/qemusecuritytest.h
diff --git a/cfg.mk b/cfg.mk
index c468d153eb..bd67cfd940 100644
--- a/cfg.mk
+++ b/cfg.mk
@@ -1178,7 +1178,7 @@ exclude_file_name_regexp--sc_copyright_usage = \
^COPYING(|\.LESSER)$$
exclude_file_name_regexp--sc_flags_usage = \
-
^(cfg\.mk|docs/|src/util/virnetdevtap\.c$$|tests/((vir(cgroup|pci|test|usb)|nss|qemuxml2argv)mock|virfilewrapper)\.c$$)
+
^(cfg\.mk|docs/|src/util/virnetdevtap\.c$$|tests/((vir(cgroup|pci|test|usb)|nss|qemuxml2argv|qemusecurity)mock|virfilewrapper)\.c$$)
exclude_file_name_regexp--sc_libvirt_unmarked_diagnostics = \
^(src/rpc/gendispatch\.pl$$|tests/)
@@ -1201,7 +1201,7 @@ exclude_file_name_regexp--sc_prohibit_strdup = \
^(docs/|examples/|src/util/virstring\.c|tests/vir(netserverclient|cgroup)mock.c|tests/commandhelper\.c$$)
exclude_file_name_regexp--sc_prohibit_close = \
-
(\.p[yl]$$|\.spec\.in$$|^docs/|^(src/util/virfile\.c|src/libvirt-stream\.c|tests/vir.+mock\.c|tests/commandhelper\.c)$$)
+
(\.p[yl]$$|\.spec\.in$$|^docs/|^(src/util/virfile\.c|src/libvirt-stream\.c|tests/(vir.+mock\.c|commandhelper\.c|qemusecuritymock\.c))$$)
exclude_file_name_regexp--sc_prohibit_empty_lines_at_EOF = \
(^tests/(virhostcpu|virpcitest)data/|docs/js/.*\.js|docs/fonts/.*\.woff|\.diff|tests/virconfdata/no-newline\.conf$$)
diff --git a/src/util/virfile.h b/src/util/virfile.h
index aa4c29dc40..9304d69349 100644
--- a/src/util/virfile.h
+++ b/src/util/virfile.h
@@ -115,8 +115,10 @@ int virFileWrapperFdClose(virFileWrapperFdPtr dfd);
void virFileWrapperFdFree(virFileWrapperFdPtr dfd);
-int virFileLock(int fd, bool shared, off_t start, off_t len, bool waitForLock);
-int virFileUnlock(int fd, off_t start, off_t len);
+int virFileLock(int fd, bool shared, off_t start, off_t len, bool waitForLock)
+ ATTRIBUTE_NOINLINE;
+int virFileUnlock(int fd, off_t start, off_t len)
+ ATTRIBUTE_NOINLINE;
int virFileFlock(int fd, bool lock, bool shared);
@@ -385,13 +387,16 @@ VIR_DEFINE_AUTOPTR_FUNC(virFileWrapperFd, virFileWrapperFdFree)
int virFileGetXAttr(const char *path,
const char *name,
- char **value);
+ char **value)
+ ATTRIBUTE_NOINLINE;
int virFileSetXAttr(const char *path,
const char *name,
- const char *value);
+ const char *value)
+ ATTRIBUTE_NOINLINE;
int virFileRemoveXAttr(const char *path,
- const char *name);
+ const char *name)
+ ATTRIBUTE_NOINLINE;
#endif /* __VIR_FILE_H */
diff --git a/tests/Makefile.am b/tests/Makefile.am
index d7ec7e3a6f..fbecf4179d 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -289,6 +289,7 @@ test_programs += qemuxml2argvtest qemuxml2xmltest \
qemucommandutiltest \
qemublocktest \
qemumigparamstest \
+ qemusecuritytest \
$(NULL)
test_helpers += qemucapsprobe
test_libraries += libqemumonitortestutils.la \
@@ -683,6 +684,13 @@ qemumigparamstest_SOURCES = \
qemumigparamstest_LDADD = libqemumonitortestutils.la \
$(qemu_LDADDS) $(LDADDS)
+qemusecuritytest_SOURCES = \
+ qemusecuritytest.c qemusecuritytest.h \
+ qemusecuritymock.c \
+ testutils.h testutils.c \
+ testutilsqemu.h testutilsqemu.c
+qemusecuritytest_LDADD = $(qemu_LDADDS) $(LDADDS)
+
else ! WITH_QEMU
EXTRA_DIST += qemuxml2argvtest.c qemuxml2xmltest.c qemuargv2xmltest.c \
domainsnapshotxml2xmltest.c \
@@ -694,6 +702,8 @@ EXTRA_DIST += qemuxml2argvtest.c qemuxml2xmltest.c qemuargv2xmltest.c
\
qemumemlocktest.c qemucpumock.c testutilshostcpus.h \
qemublocktest.c \
qemumigparamstest.c \
+ qemusecuritytest.c qemusecuritytest.h \
+ qemusecuritymock.c \
$(QEMUMONITORTESTUTILS_SOURCES)
endif ! WITH_QEMU
diff --git a/tests/qemusecuritymock.c b/tests/qemusecuritymock.c
new file mode 100644
index 0000000000..6148d02cb0
--- /dev/null
+++ b/tests/qemusecuritymock.c
@@ -0,0 +1,480 @@
+/*
+ * Copyright (C) 2018 Red Hat, Inc.
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library. If not, see
+ * <
http://www.gnu.org/licenses/>.
+ *
+ * Author: Michal Privoznik <mprivozn(a)redhat.com>
+ */
+
+#include <config.h>
+
+#include <string.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <unistd.h>
+#include <fcntl.h>
+
+#include "virmock.h"
+#include "virfile.h"
+#include "virthread.h"
+#include "virhash.h"
+#include "virstring.h"
+#include "qemusecuritytest.h"
+#include "security/security_manager.h"
+
+#define VIR_FROM_THIS VIR_FROM_NONE
+
+/* Okay, here's the deal. The qemusecuritytest calls several
+ * virSecurityManager public APIs in order to check if XATTRs
+ * work as expected. Therefore there is a lot we have to mock
+ * (chown, stat, XATTR APIs, etc.). Since the test won't run as
+ * root chown() would fail, therefore we have to keep everything
+ * in memory. By default, all files are owned by 1:2.
+ * By the way, since there are some cases where real stat needs
+ * to be called, the mocked functions are effective only if
+ * $ENVVAR is set.
+ */
+
+#define DEFAULT_UID 1
+#define DEFAULT_GID 2
+
+
+static int (*real_chown)(const char *path, uid_t uid, gid_t gid);
+static int (*real_lstat)(const char *path, struct stat *sb);
+static int (*real___lxstat)(int ver, const char *path, struct stat *sb);
+static int (*real_stat)(const char *path, struct stat *sb);
+static int (*real___xstat)(int ver, const char *path, struct stat *sb);
+static int (*real_open)(const char *path, int flags, ...);
+static int (*real_close)(int fd);
+
+
+/* Global mutex to avoid races */
+virMutex m = VIR_MUTEX_INITIALIZER;
+
+/* Hash table to store XATTRs for paths. For simplicity, key is
+ * "$path:$name" and value is just XATTR "$value". We don't need
+ * to list XATTRs a path has, therefore we don't need something
+ * more clever. */
+virHashTablePtr xattr_paths = NULL;
+
+
+/* The UID:GID is stored in a hash table. Again, for simplicity,
+ * the path is the key and the value is an uint32_t , where
+ * the lower half is UID and the higher is GID. */
+virHashTablePtr chown_paths = NULL;
+
+
+static void
+init_hash(void)
+{
+ /* The reason the init is split is that virHash calls
+ * virRandomBits() which in turn calls a gnutls function.
+ * However, when gnutls is initializing itself it calls
+ * stat() so we would call a gnutls function before it is
+ * initialized which will lead to a crash.
+ */
+
+ if (xattr_paths)
+ return;
+
+ if (!(xattr_paths = virHashCreate(10, virHashValueFree))) {
+ fprintf(stderr, "Unable to create hash table for XATTR paths\n");
+ abort();
+ }
+
+ if (!(chown_paths = virHashCreate(10, virHashValueFree))) {
+ fprintf(stderr, "Unable to create hash table for chowned paths\n");
+ abort();
+ }
+}
+
+
+static void
+init_syms(void)
+{
+ if (real_chown)
+ return;
+
+ VIR_MOCK_REAL_INIT(chown);
+ VIR_MOCK_REAL_INIT_ALT(lstat, __lxstat);
+ VIR_MOCK_REAL_INIT_ALT(stat, __xstat);
+ VIR_MOCK_REAL_INIT(open);
+ VIR_MOCK_REAL_INIT(close);
+
+ /* Intentionally not calling init_hash() here */
+}
+
+
+static char *
+get_key(const char *path,
+ const char *name)
+{
+ char *ret;
+
+ if (virAsprintf(&ret, "%s:%s", path, name) < 0) {
+ fprintf(stderr, "Unable to create hash table key\n");
+ abort();
+ }
+
+ return ret;
+}
+
+
+int
+virFileGetXAttr(const char *path,
+ const char *name,
+ char **value)
+{
+ int ret = -1;
+ char *key;
+ char *val;
+
+ key = get_key(path, name);
+
+ virMutexLock(&m);
+ init_syms();
+ init_hash();
+
+ if (!(val = virHashLookup(xattr_paths, key))) {
+ errno = ENODATA;
+ goto cleanup;
+ }
+
+ if (VIR_STRDUP(*value, val) < 0)
+ goto cleanup;
+
+ ret = 0;
+ cleanup:
+ virMutexUnlock(&m);
+ VIR_FREE(key);
+ return ret;
+}
+
+
+int virFileSetXAttr(const char *path,
+ const char *name,
+ const char *value)
+{
+ int ret = -1;
+ char *key;
+ char *val;
+
+ key = get_key(path, name);
+ if (VIR_STRDUP(val, value) < 0)
+ return -1;
+
+ virMutexLock(&m);
+ init_syms();
+ init_hash();
+
+ if (virHashUpdateEntry(xattr_paths, key, val) < 0)
+ goto cleanup;
+ val = NULL;
+
+ ret = 0;
+ cleanup:
+ virMutexUnlock(&m);
+ VIR_FREE(val);
+ VIR_FREE(key);
+ return ret;
+}
+
+
+int virFileRemoveXAttr(const char *path,
+ const char *name)
+{
+ int ret = -1;
+ char *key;
+
+ key = get_key(path, name);
+
+ virMutexLock(&m);
+ init_syms();
+ init_hash();
+
+ if ((ret = virHashRemoveEntry(xattr_paths, key)) < 0)
+ errno = ENODATA;
+
+ virMutexUnlock(&m);
+ VIR_FREE(key);
+ return ret;
+}
+
+
+static int
+mock_stat(const char *path,
+ struct stat *sb)
+{
+ uint32_t *val;
+
+ virMutexLock(&m);
+ init_hash();
+
+ memset(sb, 0, sizeof(*sb));
+
+ sb->st_mode = S_IFREG | 0666;
+ sb->st_size = 123456;
+ sb->st_ino = 1;
+
+ if (!(val = virHashLookup(chown_paths, path))) {
+ /* New path. Set the defaults */
+ sb->st_uid = DEFAULT_UID;
+ sb->st_gid = DEFAULT_GID;
+ } else {
+ /* Known path. Set values passed to chown() earlier */
+ sb->st_uid = *val % 16;
+ sb->st_gid = *val >> 16;
+ }
+
+ virMutexUnlock(&m);
+
+ return 0;
+}
+
+
+static int
+mock_chown(const char *path,
+ uid_t uid,
+ gid_t gid)
+{
+ uint32_t *val = NULL;
+ int ret = -1;
+
+ if (gid >> 16 || uid >> 16) {
+ fprintf(stderr, "Attempt to set too high UID or GID: %lld %lld",
+ (unsigned long long) uid, (unsigned long long) gid);
+ abort();
+ }
+
+ if (VIR_ALLOC(val) < 0)
+ return -1;
+
+ *val = (gid << 16) + uid;
+
+ virMutexLock(&m);
+ init_hash();
+
+ if (virHashUpdateEntry(chown_paths, path, val) < 0)
+ goto cleanup;
+ val = NULL;
+
+ ret = 0;
+ cleanup:
+ virMutexUnlock(&m);
+ VIR_FREE(val);
+ return ret;
+}
+
+
+#ifdef HAVE___LXSTAT
+int
+__lxstat(int ver, const char *path, struct stat *sb)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR))
+ ret = mock_stat(path, sb);
+ else
+ ret = real___lxstat(ver, path, sb);
+
+ return ret;
+}
+#endif /* HAVE___LXSTAT */
+
+int
+lstat(const char *path, struct stat *sb)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR))
+ ret = mock_stat(path, sb);
+ else
+ ret = real_lstat(path, sb);
+
+ return ret;
+}
+
+#ifdef HAVE___XSTAT
+int
+__xstat(int ver, const char *path, struct stat *sb)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR))
+ ret = mock_stat(path, sb);
+ else
+ ret = real___xstat(ver, path, sb);
+
+ return ret;
+}
+#endif /* HAVE___XSTAT */
+
+int
+stat(const char *path, struct stat *sb)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR))
+ ret = mock_stat(path, sb);
+ else
+ ret = real_stat(path, sb);
+
+ return ret;
+}
+
+
+int
+chown(const char *path, uid_t uid, gid_t gid)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR))
+ ret = mock_chown(path, uid, gid);
+ else
+ ret = real_chown(path, uid, gid);
+
+ return ret;
+}
+
+
+int
+open(const char *path, int flags, ...)
+{
+ int ret;
+
+ init_syms();
+
+ if (getenv(ENVVAR)) {
+ ret = 42; /* Some dummy FD */
+ } else if (flags & O_CREAT) {
+ va_list ap;
+ mode_t mode;
+ va_start(ap, flags);
+ mode = (mode_t) va_arg(ap, int);
+ va_end(ap);
+ ret = real_open(path, flags, mode);
+ } else {
+ ret = real_open(path, flags);
+ }
+
+ return ret;
+}
+
+
+int
+close(int fd)
+{
+ int ret;
+
+ if (fd == 42 && getenv(ENVVAR))
+ ret = 0;
+ else
+ ret = real_close(fd);
+
+ return ret;
+}
+
+
+int virFileLock(int fd ATTRIBUTE_UNUSED,
+ bool shared ATTRIBUTE_UNUSED,
+ off_t start ATTRIBUTE_UNUSED,
+ off_t len ATTRIBUTE_UNUSED,
+ bool waitForLock ATTRIBUTE_UNUSED)
+{
+ return 0;
+}
+
+
+int virFileUnlock(int fd ATTRIBUTE_UNUSED,
+ off_t start ATTRIBUTE_UNUSED,
+ off_t len ATTRIBUTE_UNUSED)
+{
+ return 0;
+}
+
+
+static int
+checkOwner(void *payload,
+ const void *name,
+ void *data)
+{
+ bool *chown_fail = data;
+ uint32_t owner = *((uint32_t*) payload);
+
+ if (owner % 16 != DEFAULT_UID ||
+ owner >> 16 != DEFAULT_GID) {
+ fprintf(stderr,
+ "Path %s wasn't restored back to its original owner\n",
+ (const char *) name);
+ *chown_fail = false;
+ }
+
+ return 0;
+}
+
+
+static int
+printXATTR(void *payload,
+ const void *name,
+ void *data)
+{
+ bool *xattr_fail = data;
+
+ /* The fact that we are in this function means that there are
+ * some XATTRs left behind. This is enough to claim an error. */
+ *xattr_fail = false;
+
+ /* Hash table key consists of "$path:$xattr_name", xattr
+ * value is then the value stored in the hash table. */
+ printf("key=%s val=%s\n", (const char *) name, (const char *) payload);
+ return 0;
+}
+
+
+int checkPaths(void)
+{
+ int ret = -1;
+ bool chown_fail = false;
+ bool xattr_fail = false;
+
+ virMutexLock(&m);
+ init_hash();
+
+ if ((virHashForEach(chown_paths, checkOwner, &chown_fail)) < 0)
+ goto cleanup;
+
+ if ((virHashForEach(xattr_paths, printXATTR, &xattr_fail)) < 0)
+ goto cleanup;
+
+ if (chown_fail || xattr_fail)
+ goto cleanup;
+
+ ret = 0;
+ cleanup:
+ virHashRemoveAll(chown_paths);
+ virHashRemoveAll(xattr_paths);
+ virMutexUnlock(&m);
+ return ret;
+}
diff --git a/tests/qemusecuritytest.c b/tests/qemusecuritytest.c
new file mode 100644
index 0000000000..4d835f83e1
--- /dev/null
+++ b/tests/qemusecuritytest.c
@@ -0,0 +1,173 @@
+/*
+ * Copyright (C) 2018 Red Hat, Inc.
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library. If not, see
+ * <
http://www.gnu.org/licenses/>.
+ *
+ * Author: Michal Privoznik <mprivozn(a)redhat.com>
+ */
+
+#include <config.h>
+
+#include "qemusecuritytest.h"
+#include "testutils.h"
+#include "testutilsqemu.h"
+#include "security/security_manager.h"
+#include "conf/domain_conf.h"
+#include "qemu/qemu_domain.h"
+#include "qemu/qemu_security.h"
+
+#define VIR_FROM_THIS VIR_FROM_NONE
+
+struct testData {
+ virQEMUDriverPtr driver;
+ const char *file; /* file name to load VM def XML from; qemuxml2argvdata/ */
+};
+
+
+static int
+prepareObjects(virQEMUDriverPtr driver,
+ const char *xmlname,
+ virDomainObjPtr *vm)
+{
+ qemuDomainObjPrivatePtr priv;
+ char *filename = NULL;
+ char *domxml = NULL;
+ int ret = -1;
+
+ if (virAsprintf(&filename, "%s/qemuxml2argvdata/%s.xml", abs_srcdir,
xmlname) < 0)
+ return -1;
+
+ if (virTestLoadFile(filename, &domxml) < 0)
+ goto cleanup;
+
+ if (!(*vm = virDomainObjNew(driver->xmlopt)))
+ goto cleanup;
+
+ (*vm)->pid = -1;
+ priv = (*vm)->privateData;
+ priv->chardevStdioLogd = false;
+ priv->rememberOwner = true;
+
+ if (!(priv->qemuCaps = virQEMUCapsNew()))
+ goto cleanup;
+
+ virQEMUCapsSetList(priv->qemuCaps,
+ QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
+ QEMU_CAPS_DEVICE_DMI_TO_PCI_BRIDGE,
+ QEMU_CAPS_DEVICE_IOH3420,
+ QEMU_CAPS_DEVICE_PCI_BRIDGE,
+ QEMU_CAPS_DEVICE_PCI_BRIDGE,
+ QEMU_CAPS_DEVICE_VIRTIO_MMIO,
+ QEMU_CAPS_DEVICE_VIRTIO_RNG,
+ QEMU_CAPS_OBJECT_GPEX,
+ QEMU_CAPS_OBJECT_RNG_RANDOM,
+ QEMU_CAPS_VIRTIO_SCSI,
+ QEMU_CAPS_LAST);
+
+ if (qemuTestCapsCacheInsert(driver->qemuCapsCache, priv->qemuCaps) < 0)
+ goto cleanup;
+
+ if (!((*vm)->def = virDomainDefParseString(domxml,
+ driver->caps,
+ driver->xmlopt,
+ NULL,
+ 0)))
+ goto cleanup;
+
+ ret = 0;
+ cleanup:
+ if (ret < 0) {
+ virObjectUnref(*vm);
+ *vm = NULL;
+ }
+ VIR_FREE(domxml);
+ VIR_FREE(filename);
+ return ret;
+}
+
+
+static int
+testDomain(const void *opaque)
+{
+ const struct testData *data = opaque;
+ virSecurityManagerPtr securityManager = NULL;
+ virDomainObjPtr vm = NULL;
+ int ret = -1;
+
+ if (prepareObjects(data->driver, data->file, &vm) < 0)
+ return -1;
+
+ /* Mocking is enabled only when this env variable is set.
+ * See mock code for explanation. */
+ if (setenv(ENVVAR, "1", 0) < 0)
+ goto cleanup;
+
+ if (qemuSecuritySetAllLabel(data->driver, vm, NULL) < 0)
+ goto cleanup;
+
+ qemuSecurityRestoreAllLabel(data->driver, vm, false);
+
+ if (checkPaths() < 0)
+ goto cleanup;
+
+ ret = 0;
+ cleanup:
+ unsetenv(ENVVAR);
+ virObjectUnref(vm);
+ virObjectUnref(securityManager);
+ return ret;
+}
+
+
+static int
+mymain(void)
+{
+ virQEMUDriver driver;
+ int ret = 0;
+
+ if (virInitialize() < 0 ||
+ qemuTestDriverInit(&driver) < 0)
+ return -1;
+
+ /* Now fix the secdriver */
+ virObjectUnref(driver.securityManager);
+ if (!(driver.securityManager = virSecurityManagerNewDAC("test", 1000,
1000,
+
VIR_SECURITY_MANAGER_PRIVILEGED |
+
VIR_SECURITY_MANAGER_DYNAMIC_OWNERSHIP,
+ NULL))) {
+ virFilePrintf(stderr, "Cannot initialize DAC security driver");
+ ret = -1;
+ goto cleanup;
+ }
+
+#define DO_TEST_DOMAIN(f) \
+ do { \
+ struct testData data = {.driver = &driver, .file = f}; \
+ if (virTestRun(f, testDomain, &data) < 0) \
+ ret = -1; \
+ } while (0)
+
+ DO_TEST_DOMAIN("disk-virtio");
+ DO_TEST_DOMAIN("pci-bridge-many-disks");
+ DO_TEST_DOMAIN("arm-virt-virtio");
+ DO_TEST_DOMAIN("aarch64-virtio-pci-manual-addresses");
+ DO_TEST_DOMAIN("acpi-table");
+
+ cleanup:
+ qemuTestDriverFree(&driver);
+ return ret;
+}
+
+VIR_TEST_MAIN(mymain)
diff --git a/tests/qemusecuritytest.h b/tests/qemusecuritytest.h
new file mode 100644
index 0000000000..235e05fec7
--- /dev/null
+++ b/tests/qemusecuritytest.h
@@ -0,0 +1,28 @@
+/*
+ * Copyright (C) 2018 Red Hat, Inc.
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library. If not, see
+ * <
http://www.gnu.org/licenses/>.
+ *
+ * Author: Michal Privoznik <mprivozn(a)redhat.com>
+ */
+
+#ifndef __QEMU_SECURITY_TEST_H__
+# define __QEMU_SECURITY_TEST_H__
+
+# define ENVVAR "LIBVIRT_QEMU_SECURITY_TEST"
+
+extern int checkPaths(void);
+
+#endif /* __QEMU_SECURITY_TEST_H__ */
--
2.19.2