domain_audit.c 32.2 KB
Newer Older
1
/*
2
 * domain_audit.c: Domain audit management
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

26 27
#include <sys/stat.h>

28 29 30 31 32 33
#ifdef MAJOR_IN_MKDEV
# include <sys/mkdev.h>
#elif MAJOR_IN_SYSMACROS
# include <sys/sysmacros.h>
#endif

34 35
#include <sys/types.h>

36
#include "domain_audit.h"
37
#include "viraudit.h"
38
#include "viruuid.h"
39
#include "virlog.h"
40
#include "viralloc.h"
41
#include "virstring.h"
42

43 44
VIR_LOG_INIT("conf.domain_audit");

45 46 47 48
/* Return nn:mm in hex for block and character devices, and NULL
 * for other file types, stat failure, or allocation failure.  */
#if defined major && defined minor
static char *
49
virDomainAuditGetRdev(const char *path)
50 51 52 53 54 55 56 57
{
    char *ret = NULL;
    struct stat sb;

    if (stat(path, &sb) == 0 &&
        (S_ISCHR(sb.st_mode) || S_ISBLK(sb.st_mode))) {
        int maj = major(sb.st_rdev);
        int min = minor(sb.st_rdev);
58
        ignore_value(virAsprintfQuiet(&ret, "%02X:%02X", maj, min));
59 60 61 62 63
    }
    return ret;
}
#else
static char *
64
virDomainAuditGetRdev(const char *path ATTRIBUTE_UNUSED)
65 66 67 68 69
{
    return NULL;
}
#endif

70

71 72 73 74 75 76 77
static void
virDomainAuditGenericDev(virDomainObjPtr vm,
                         const char *type,
                         const char *oldsrcpath,
                         const char *newsrcpath,
                         const char *reason,
                         bool success)
78
{
79 80
    char *newdev = NULL;
    char *olddev = NULL;
81
    char uuidstr[VIR_UUID_STRING_BUFLEN];
82
    char *vmname = NULL;
83 84
    char *oldsrc = NULL;
    char *newsrc = NULL;
85
    const char *virt;
86

87 88
    /* if both new and old source aren't provided don't log anything */
    if (!newsrcpath && !oldsrcpath)
89
        return;
90 91 92 93 94 95 96 97 98 99 100

    if (virAsprintfQuiet(&newdev, "new-%s", type) < 0)
        goto no_memory;

    if (virAsprintfQuiet(&olddev, "old-%s", type) < 0)
        goto no_memory;

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name)))
        goto no_memory;
101

102
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
103 104
        VIR_WARN("Unexpected virt type %d while encoding audit message",
                 vm->def->virtType);
105 106 107
        virt = "?";
    }

108 109 110 111 112
    if (!(newsrc = virAuditEncode(newdev, VIR_AUDIT_STR(newsrcpath))))
        goto no_memory;

    if (!(oldsrc = virAuditEncode(olddev, VIR_AUDIT_STR(oldsrcpath))))
        goto no_memory;
113 114

    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
115 116
              "virt=%s resrc=%s reason=%s %s uuid=%s %s %s",
              virt, type, reason, vmname, uuidstr, oldsrc, newsrc);
117

118
 cleanup:
119 120
    VIR_FREE(newdev);
    VIR_FREE(olddev);
121 122 123
    VIR_FREE(vmname);
    VIR_FREE(oldsrc);
    VIR_FREE(newsrc);
124 125 126 127 128 129 130 131
    return;

 no_memory:
    VIR_WARN("OOM while encoding audit message");
    goto cleanup;
}


132 133 134 135 136 137 138 139 140 141 142
void
virDomainAuditChardev(virDomainObjPtr vm,
                      virDomainChrDefPtr oldDef,
                      virDomainChrDefPtr newDef,
                      const char *reason,
                      bool success)
{
    virDomainChrSourceDefPtr oldsrc = NULL;
    virDomainChrSourceDefPtr newsrc = NULL;

    if (oldDef)
143
        oldsrc = oldDef->source;
144 145

    if (newDef)
146
        newsrc = newDef->source;
147 148

    virDomainAuditGenericDev(vm, "chardev",
149 150
                             virDomainChrSourceDefGetPath(oldsrc),
                             virDomainChrSourceDefGetPath(newsrc),
151 152 153 154
                             reason, success);
}


P
Peter Krempa 已提交
155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
static void
virDomainAuditSmartcard(virDomainObjPtr vm,
                        virDomainSmartcardDefPtr def,
                        const char *reason,
                        bool success)
{
    const char *database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
    size_t i;

    if (def) {
        switch ((virDomainSmartcardType) def->type) {
        case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
            virDomainAuditGenericDev(vm, "smartcard",
                                     NULL, "nss-smartcard-device",
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
            for (i = 0; i < VIR_DOMAIN_SMARTCARD_NUM_CERTIFICATES; i++) {
                virDomainAuditGenericDev(vm, "smartcard", NULL,
                                         def->data.cert.file[i],
                                         reason, success);
            }

            if (def->data.cert.database)
                database = def->data.cert.database;

            virDomainAuditGenericDev(vm, "smartcard",
                                     NULL, database,
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
            virDomainAuditGenericDev(vm, "smartcard", NULL,
189
                                     virDomainChrSourceDefGetPath(def->data.passthru),
P
Peter Krempa 已提交
190 191 192 193 194 195 196 197 198 199
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_LAST:
            break;
        }
    }
}


200 201
void
virDomainAuditDisk(virDomainObjPtr vm,
202 203 204 205
                   virStorageSourcePtr oldDef,
                   virStorageSourcePtr newDef,
                   const char *reason,
                   bool success)
206
{
207 208 209 210 211 212 213 214 215 216
    const char *oldsrc = NULL;
    const char *newsrc = NULL;

    if (oldDef && virStorageSourceIsLocalStorage(oldDef))
        oldsrc = oldDef->path;

    if (newDef && virStorageSourceIsLocalStorage(newDef))
        newsrc = newDef->path;

    virDomainAuditGenericDev(vm, "disk", oldsrc, newsrc, reason, success);
217 218 219
}


L
Luyao Huang 已提交
220
void
221
virDomainAuditRNG(virDomainObjPtr vm,
222
                  virDomainRNGDefPtr oldDef, virDomainRNGDefPtr newDef,
223 224 225 226 227 228
                  const char *reason, bool success)
{
    const char *newsrcpath = NULL;
    const char *oldsrcpath = NULL;

    if (newDef) {
229
        switch ((virDomainRNGBackend) newDef->backend) {
230
        case VIR_DOMAIN_RNG_BACKEND_RANDOM:
231
            newsrcpath = newDef->source.file;
232 233 234
            break;

        case VIR_DOMAIN_RNG_BACKEND_EGD:
235
            newsrcpath = virDomainChrSourceDefGetPath(newDef->source.chardev);
236 237 238 239 240 241 242 243
            break;

        case VIR_DOMAIN_RNG_BACKEND_LAST:
            break;
        }
    }

    if (oldDef) {
244
        switch ((virDomainRNGBackend) oldDef->backend) {
245
        case VIR_DOMAIN_RNG_BACKEND_RANDOM:
246
            oldsrcpath = oldDef->source.file;
247 248 249
            break;

        case VIR_DOMAIN_RNG_BACKEND_EGD:
250
            oldsrcpath = virDomainChrSourceDefGetPath(oldDef->source.chardev);
251 252 253 254 255 256 257
            break;

        case VIR_DOMAIN_RNG_BACKEND_LAST:
            break;
        }
    }

258
    virDomainAuditGenericDev(vm, "rng", oldsrcpath, newsrcpath, reason, success);
259 260 261
}


D
Daniel P. Berrange 已提交
262 263 264 265 266
void
virDomainAuditFS(virDomainObjPtr vm,
                 virDomainFSDefPtr oldDef, virDomainFSDefPtr newDef,
                 const char *reason, bool success)
{
267
    virDomainAuditGenericDev(vm, "fs",
268 269
                             oldDef ? oldDef->src->path : NULL,
                             newDef ? newDef->src->path : NULL,
270
                             reason, success);
D
Daniel P. Berrange 已提交
271 272 273
}


274
void
275 276 277
virDomainAuditNet(virDomainObjPtr vm,
                  virDomainNetDefPtr oldDef, virDomainNetDefPtr newDef,
                  const char *reason, bool success)
278 279 280 281 282
{
    char newMacstr[VIR_MAC_STRING_BUFLEN];
    char oldMacstr[VIR_MAC_STRING_BUFLEN];

    if (oldDef)
283
        virMacAddrFormat(&oldDef->mac, oldMacstr);
284

285
    if (newDef)
286
        virMacAddrFormat(&newDef->mac, newMacstr);
287

288 289 290 291
    virDomainAuditGenericDev(vm, "net",
                             oldDef ? oldMacstr : NULL,
                             newDef ? newMacstr : NULL,
                             reason, success);
292 293
}

294
/**
295
 * virDomainAuditNetDevice:
W
Wang Rui 已提交
296 297
 * @vmDef: the definition of the VM
 * @netDef: details of network device that fd will be tied to
298 299
 * @device: device being opened (such as /dev/vhost-net,
 * /dev/net/tun, /dev/tanN). Note that merely opening a device
300
 * does not mean that virDomain owns it; a followup virDomainAuditNet
301 302 303 304 305 306
 * shows whether the fd was passed on.
 * @success: true if the device was opened
 *
 * Log an audit message about an attempted network device open.
 */
void
307 308
virDomainAuditNetDevice(virDomainDefPtr vmDef, virDomainNetDefPtr netDef,
                        const char *device, bool success)
309 310 311 312
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char macstr[VIR_MAC_STRING_BUFLEN];
    char *vmname;
313
    char *dev_name = NULL;
314
    char *rdev;
315
    const char *virt;
316 317

    virUUIDFormat(vmDef->uuid, uuidstr);
318
    virMacAddrFormat(&netDef->mac, macstr);
319
    rdev = virDomainAuditGetRdev(device);
320 321

    if (!(vmname = virAuditEncode("vm", vmDef->name)) ||
322
        !(dev_name = virAuditEncode("path", device))) {
323
        VIR_WARN("OOM while encoding audit message");
324 325 326
        goto cleanup;
    }

327 328 329 330 331
    if (!(virt = virDomainVirtTypeToString(vmDef->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vmDef->virtType);
        virt = "?";
    }

332
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
333
              "virt=%s resrc=net reason=open %s uuid=%s net=%s %s rdev=%s",
334
              virt, vmname, uuidstr, macstr, dev_name, VIR_AUDIT_STR(rdev));
335

336
 cleanup:
337
    VIR_FREE(vmname);
338
    VIR_FREE(dev_name);
339 340
    VIR_FREE(rdev);
}
341

342
/**
343
 * virDomainAuditHostdev:
344 345
 * @vm: domain making a change in pass-through host device
 * @hostdev: device being attached or removed
346
 * @reason: one of "start", "attach", or "detach"
347 348 349 350 351
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
void
352 353
virDomainAuditHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev,
                      const char *reason, bool success)
354 355 356
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
357 358
    char *address = NULL;
    char *device = NULL;
359
    const char *virt;
360
    virDomainHostdevSubsysUSBPtr usbsrc = &hostdev->source.subsys.u.usb;
361
    virDomainHostdevSubsysPCIPtr pcisrc = &hostdev->source.subsys.u.pci;
362
    virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
363
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &hostdev->source.subsys.u.scsi_host;
364
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &hostdev->source.subsys.u.mdev;
365 366 367

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
368
        VIR_WARN("OOM while encoding audit message");
369 370 371
        return;
    }

372 373 374 375 376
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

377
    switch ((virDomainHostdevMode) hostdev->mode) {
378
    case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
379
        switch ((virDomainHostdevSubsysType) hostdev->source.subsys.type) {
380
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
381
            if (virAsprintfQuiet(&address, "%.4x:%.2x:%.2x.%.1x",
382 383 384 385
                                 pcisrc->addr.domain,
                                 pcisrc->addr.bus,
                                 pcisrc->addr.slot,
                                 pcisrc->addr.function) < 0) {
386 387 388 389 390
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }
            break;
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
391
            if (virAsprintfQuiet(&address, "%.3d.%.3d",
392
                                 usbsrc->bus, usbsrc->device) < 0) {
393 394
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
H
Han Cheng 已提交
395 396
            }
            break;
397
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
398 399 400 401 402
            if (scsisrc->protocol ==
                VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                /* Follow virDomainAuditDisk && virDomainAuditGenericDev
                 * and don't audit the networked device.
                 */
H
Han Cheng 已提交
403
                goto cleanup;
404 405 406
            } else {
                virDomainHostdevSubsysSCSIHostPtr scsihostsrc =
                    &scsisrc->u.host;
407
                if (virAsprintfQuiet(&address, "%s:%u:%u:%llu",
408 409 410 411 412 413
                                     scsihostsrc->adapter, scsihostsrc->bus,
                                     scsihostsrc->target,
                                     scsihostsrc->unit) < 0) {
                    VIR_WARN("OOM while encoding audit message");
                    goto cleanup;
                }
414 415
            }
            break;
416
        }
417 418 419 420 421 422
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST:
            if (VIR_STRDUP_QUIET(address, hostsrc->wwpn) < 0) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }
            break;
423 424 425 426 427 428 429
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV:
            if (VIR_STRDUP_QUIET(address, mdevsrc->uuidstr) < 0) {
                VIR_WARN("OOM while enconding audit message");
                goto cleanup;
            }
            break;
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
430 431 432 433 434 435 436
        default:
            VIR_WARN("Unexpected hostdev type while encoding audit message: %d",
                     hostdev->source.subsys.type);
            goto cleanup;
        }

        if (!(device = virAuditEncode("device", VIR_AUDIT_STR(address)))) {
437
            VIR_WARN("OOM while encoding audit message");
438 439
            goto cleanup;
        }
440 441 442 443 444 445

        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=dev reason=%s %s uuid=%s bus=%s %s",
                  virt, reason, vmname, uuidstr,
                  virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type),
                  device);
446
        break;
447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476

    case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
        switch (hostdev->source.caps.type) {
        case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_STORAGE:
            if (!(device = virAuditEncode("disk",
                                          VIR_AUDIT_STR(hostdev->source.caps.u.storage.block)))) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }

            VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                      "virt=%s resrc=hostdev reason=%s %s uuid=%s %s",
                      virt, reason, vmname, uuidstr, device);
            break;

        case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_MISC:
            if (!(device = virAuditEncode("chardev",
                                          VIR_AUDIT_STR(hostdev->source.caps.u.misc.chardev)))) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }

            VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                      "virt=%s resrc=hostdev reason=%s %s uuid=%s %s",
                      virt, reason, vmname, uuidstr, device);
            break;

        default:
            VIR_WARN("Unexpected hostdev type while encoding audit message: %d",
                     hostdev->source.caps.type);
477 478 479 480
            goto cleanup;
        }
        break;

481
    case VIR_DOMAIN_HOSTDEV_MODE_LAST:
482 483 484
    default:
        VIR_WARN("Unexpected hostdev mode while encoding audit message: %d",
                 hostdev->mode);
485 486 487
        goto cleanup;
    }

488
 cleanup:
489 490 491 492 493 494
    VIR_FREE(vmname);
    VIR_FREE(device);
    VIR_FREE(address);
}


495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
/**
 * virDomainAuditRedirdev:
 * @vm: domain making a change in pass-through host device
 * @redirdev: device being attached or removed
 * @reason: one of "start", "attach", or "detach"
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
void
virDomainAuditRedirdev(virDomainObjPtr vm, virDomainRedirdevDefPtr redirdev,
                      const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
510 511
    char *address = NULL;
    char *device = NULL;
512 513 514 515 516 517 518 519 520 521 522 523 524 525 526
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    switch (redirdev->bus) {
    case VIR_DOMAIN_REDIRDEV_BUS_USB:
527
        if (VIR_STRDUP_QUIET(address, "USB redirdev") < 0) {
528 529 530
            VIR_WARN("OOM while encoding audit message");
            goto cleanup;
        }
531
        break;
532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548
    default:
        VIR_WARN("Unexpected redirdev bus while encoding audit message: %d",
                 redirdev->bus);
        goto cleanup;
    }

    if (!(device = virAuditEncode("device", VIR_AUDIT_STR(address)))) {
        VIR_WARN("OOM while encoding audit message");
        goto cleanup;
    }

    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
              "virt=%s resrc=dev reason=%s %s uuid=%s bus=%s %s",
              virt, reason, vmname, uuidstr,
              virDomainRedirdevBusTypeToString(redirdev->bus),
              device);

549
 cleanup:
550 551 552 553 554 555
    VIR_FREE(vmname);
    VIR_FREE(device);
    VIR_FREE(address);
}


556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597
/**
 * virDomainAuditTPM:
 * @vm: domain making a change in pass-through host device
 * @tpm: TPM device being attached or removed
 * @reason: one of "start", "attach", or "detach"
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
static void
virDomainAuditTPM(virDomainObjPtr vm, virDomainTPMDefPtr tpm,
                  const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
    char *path = NULL;
    char *device = NULL;
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
        path = tpm->data.passthrough.source.data.file.path;
        if (!(device = virAuditEncode("device", VIR_AUDIT_STR(path)))) {
            VIR_WARN("OOM while encoding audit message");
            goto cleanup;
        }

        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=dev reason=%s %s uuid=%s %s",
                  virt, reason, vmname, uuidstr, device);
        break;
598 599
    case VIR_DOMAIN_TPM_TYPE_EMULATOR:
        break;
600
    case VIR_DOMAIN_TPM_TYPE_LAST:
601 602 603 604
    default:
        break;
    }

605
 cleanup:
606 607 608 609 610
    VIR_FREE(vmname);
    VIR_FREE(device);
}


611
/**
612
 * virDomainAuditCgroup:
613 614 615
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
616 617
 * @extra: additional details, in the form "all",
 * "major category=xyz maj=nn", or "path path=xyz dev=nn:mm" (the
618 619
 * latter two are generated by virDomainAuditCgroupMajor and
 * virDomainAuditCgroupPath).
620 621 622 623
 * @success: true if the cgroup operation succeeded
 *
 * Log an audit message about an attempted cgroup device ACL change.
 */
624
void
625 626
virDomainAuditCgroup(virDomainObjPtr vm, virCgroupPtr cgroup,
                     const char *reason, const char *extra, bool success)
627 628 629
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
630 631
    char *controller = NULL;
    char *detail;
632
    const char *virt;
633 634 635

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
636
        VIR_WARN("OOM while encoding audit message");
637 638
        return;
    }
639

640 641 642 643 644
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

E
Eric Blake 已提交
645 646 647
    ignore_value(virCgroupPathOfController(cgroup,
                                           VIR_CGROUP_CONTROLLER_DEVICES,
                                           NULL, &controller));
648 649
    detail = virAuditEncode("cgroup", VIR_AUDIT_STR(controller));

650
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
651 652
              "virt=%s resrc=cgroup reason=%s %s uuid=%s %s class=%s",
              virt, reason, vmname, uuidstr,
653
              detail ? detail : "cgroup=?", extra);
654 655

    VIR_FREE(vmname);
656 657
    VIR_FREE(controller);
    VIR_FREE(detail);
658 659 660
}

/**
661
 * virDomainAuditCgroupMajor:
662 663 664 665 666
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
 * @maj: the major number of the device category
 * @name: a textual name for that device category, alphabetic only
667
 * @perms: string containing "r", "w", and/or "m" as appropriate
668 669 670 671 672
 * @success: true if the cgroup operation succeeded
 *
 * Log an audit message about an attempted cgroup device ACL change.
 */
void
673 674 675
virDomainAuditCgroupMajor(virDomainObjPtr vm, virCgroupPtr cgroup,
                          const char *reason, int maj, const char *name,
                          const char *perms, bool success)
676 677 678
{
    char *extra;

679 680
    if (virAsprintfQuiet(&extra, "major category=%s maj=%02X acl=%s",
                         name, maj, perms) < 0) {
681
        VIR_WARN("OOM while encoding audit message");
682 683 684
        return;
    }

685
    virDomainAuditCgroup(vm, cgroup, reason, extra, success);
686 687 688 689 690

    VIR_FREE(extra);
}

/**
691
 * virDomainAuditCgroupPath:
692 693 694 695
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
 * @path: the device being adjusted
696
 * @perms: string containing "r", "w", and/or "m" as appropriate
697 698 699 700 701 702
 * @rc: > 0 if not a device, 0 if success, < 0 if failure
 *
 * Log an audit message about an attempted cgroup device ACL change to
 * a specific device.
 */
void
703 704 705
virDomainAuditCgroupPath(virDomainObjPtr vm, virCgroupPtr cgroup,
                         const char *reason, const char *path, const char *perms,
                         int rc)
706 707 708
{
    char *detail;
    char *rdev;
709
    char *extra = NULL;
710 711 712 713 714

    /* Nothing to audit for regular files.  */
    if (rc > 0)
        return;

715
    rdev = virDomainAuditGetRdev(path);
716 717

    if (!(detail = virAuditEncode("path", path)) ||
718 719
        virAsprintfQuiet(&extra, "path %s rdev=%s acl=%s",
                         detail, VIR_AUDIT_STR(rdev), perms) < 0) {
720
        VIR_WARN("OOM while encoding audit message");
721 722 723
        goto cleanup;
    }

724
    virDomainAuditCgroup(vm, cgroup, reason, extra, rc == 0);
725

726
 cleanup:
727
    VIR_FREE(extra);
728
    VIR_FREE(detail);
729
    VIR_FREE(rdev);
730 731
}

732
/**
733
 * virDomainAuditResource:
734 735 736 737 738 739 740 741 742 743
 * @vm: domain making an integer resource change
 * @resource: name of the resource: "mem" or "vcpu"
 * @oldval: the old value of the resource
 * @newval: the new value of the resource
 * @reason: either "start" or "update"
 * @success: true if the resource change succeeded
 *
 * Log an audit message about an attempted resource change.
 */
static void
744 745 746
virDomainAuditResource(virDomainObjPtr vm, const char *resource,
                       unsigned long long oldval, unsigned long long newval,
                       const char *reason, bool success)
747 748 749
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
750
    const char *virt;
751 752 753

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
754
        VIR_WARN("OOM while encoding audit message");
755 756 757
        return;
    }

758 759 760 761 762
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

763
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
764 765
              "virt=%s resrc=%s reason=%s %s uuid=%s old-%s=%lld new-%s=%lld",
              virt, resource, reason, vmname, uuidstr,
766 767 768 769 770 771
              resource, oldval, resource, newval);

    VIR_FREE(vmname);
}

void
772 773 774
virDomainAuditMemory(virDomainObjPtr vm,
                     unsigned long long oldmem, unsigned long long newmem,
                     const char *reason, bool success)
775
{
776
    return virDomainAuditResource(vm, "mem", oldmem, newmem, reason, success);
777 778 779
}

void
780 781 782
virDomainAuditVcpu(virDomainObjPtr vm,
                   unsigned int oldvcpu, unsigned int newvcpu,
                   const char *reason, bool success)
783
{
784
    return virDomainAuditResource(vm, "vcpu", oldvcpu, newvcpu, reason, success);
785 786
}

787 788 789 790 791 792 793 794 795
void
virDomainAuditIOThread(virDomainObjPtr vm,
                       unsigned int oldiothread, unsigned int newiothread,
                       const char *reason, bool success)
{
    return virDomainAuditResource(vm, "iothread", oldiothread, newiothread,
                                  reason, success);
}

796
static void
797 798
virDomainAuditLifecycle(virDomainObjPtr vm, const char *op,
                        const char *reason, bool success)
799 800 801
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
802
    const char *virt;
803 804 805 806

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
807
        VIR_WARN("OOM while encoding audit message");
808 809 810
        return;
    }

811 812 813 814 815
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

816
    VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_CONTROL, success,
817 818
              "virt=%s op=%s reason=%s %s uuid=%s vm-pid=%lld",
              virt, op, reason, vmname, uuidstr, (long long)vm->pid);
819 820 821 822 823

    VIR_FREE(vmname);
}


824
void
825
virDomainAuditStart(virDomainObjPtr vm, const char *reason, bool success)
826
{
827
    size_t i;
828

829 830
    for (i = 0; i < vm->def->ndisks; i++)
        virDomainAuditDisk(vm, NULL, vm->def->disks[i]->src, "start", true);
831

832
    for (i = 0; i < vm->def->nfss; i++) {
D
Daniel P. Berrange 已提交
833 834 835 836
        virDomainFSDefPtr fs = vm->def->fss[i];
        virDomainAuditFS(vm, NULL, fs, "start", true);
    }

837
    for (i = 0; i < vm->def->nnets; i++) {
838
        virDomainNetDefPtr net = vm->def->nets[i];
839
        virDomainAuditNet(vm, NULL, net, "start", true);
840 841
    }

842
    for (i = 0; i < vm->def->nhostdevs; i++) {
843
        virDomainHostdevDefPtr hostdev = vm->def->hostdevs[i];
844
        virDomainAuditHostdev(vm, hostdev, "start", true);
845 846
    }

847
    for (i = 0; i < vm->def->nredirdevs; i++) {
848 849 850 851
        virDomainRedirdevDefPtr redirdev = vm->def->redirdevs[i];
        virDomainAuditRedirdev(vm, redirdev, "start", true);
    }

852 853 854 855 856 857 858 859 860 861 862 863 864
    for (i = 0; i < vm->def->nserials; i++)
        virDomainAuditChardev(vm, NULL, vm->def->serials[i], "start", true);

    for (i = 0; i < vm->def->nparallels; i++)
        virDomainAuditChardev(vm, NULL, vm->def->parallels[i], "start", true);

    for (i = 0; i < vm->def->nchannels; i++)
        virDomainAuditChardev(vm, NULL, vm->def->channels[i], "start", true);

    for (i = 0; i < vm->def->nconsoles; i++) {
        if (i == 0 &&
            (vm->def->consoles[i]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL ||
             vm->def->consoles[i]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_NONE) &&
865
             vm->def->os.type == VIR_DOMAIN_OSTYPE_HVM)
866 867 868 869 870
            continue;

        virDomainAuditChardev(vm, NULL, vm->def->consoles[i], "start", true);
    }

P
Peter Krempa 已提交
871 872 873
    for (i = 0; i < vm->def->nsmartcards; i++)
        virDomainAuditSmartcard(vm, vm->def->smartcards[i], "start", true);

874 875
    for (i = 0; i < vm->def->nrngs; i++)
        virDomainAuditRNG(vm, NULL, vm->def->rngs[i], "start", true);
876

877 878 879
    if (vm->def->tpm)
        virDomainAuditTPM(vm, vm->def->tpm, "start", true);

880 881 882
    for (i = 0; i < vm->def->nshmems; i++)
        virDomainAuditShmem(vm, vm->def->shmems[i], "start", true);

883 884 885
    for (i = 0; i < vm->def->ninputs; i++)
        virDomainAuditInput(vm, vm->def->inputs[i], "start", true);

886
    virDomainAuditMemory(vm, 0, virDomainDefGetMemoryTotal(vm->def),
887
                         "start", true);
888
    virDomainAuditVcpu(vm, 0, virDomainDefGetVcpus(vm->def), "start", true);
889 890
    if (vm->def->niothreadids)
        virDomainAuditIOThread(vm, 0, vm->def->niothreadids, "start", true);
891

892
    virDomainAuditLifecycle(vm, "start", reason, success);
893 894
}

895 896
void
virDomainAuditInit(virDomainObjPtr vm,
897 898
                   pid_t initpid,
                   ino_t pidns)
899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_CONTROL, true,
917 918 919
              "virt=%s op=init %s uuid=%s vm-pid=%lld init-pid=%lld pid-ns=%lld",
              virt, vmname, uuidstr, (long long)vm->pid, (long long)initpid,
              (long long)pidns);
920 921 922

    VIR_FREE(vmname);
}
923

924
void
925
virDomainAuditStop(virDomainObjPtr vm, const char *reason)
926
{
927
    virDomainAuditLifecycle(vm, "stop", reason, true);
928 929
}

930
void
931
virDomainAuditSecurityLabel(virDomainObjPtr vm, bool success)
932 933 934
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
935
    const char *virt;
936
    size_t i;
937 938 939

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
940
        VIR_WARN("OOM while encoding audit message");
941 942 943
        return;
    }

944 945 946 947 948
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

949 950 951 952 953 954 955 956
    for (i = 0; i < vm->def->nseclabels; i++) {
        VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_ID, success,
                  "virt=%s %s uuid=%s vm-ctx=%s img-ctx=%s model=%s",
                  virt, vmname, uuidstr,
                  VIR_AUDIT_STR(vm->def->seclabels[i]->label),
                  VIR_AUDIT_STR(vm->def->seclabels[i]->imagelabel),
                  VIR_AUDIT_STR(vm->def->seclabels[i]->model));
    }
957 958 959

    VIR_FREE(vmname);
}
960 961 962 963 964 965 966 967

void
virDomainAuditShmem(virDomainObjPtr vm,
                    virDomainShmemDefPtr def,
                    const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname = virAuditEncode("vm", vm->def->name);
968
    const char *srcpath = virDomainChrSourceDefGetPath(&def->server.chr);
969
    const char *virt = virDomainVirtTypeToString(vm->def->virtType);
970
    char *shmpath = NULL;
971 972 973

    virUUIDFormat(vm->def->uuid, uuidstr);

974 975
    if (!vmname ||
        virAsprintfQuiet(&shmpath, "/dev/shm/%s", def->name) < 0) {
976 977 978 979 980 981 982 983 984 985
        VIR_WARN("OOM while encoding audit message");
        goto cleanup;
    }

    if (!virt) {
        VIR_WARN("Unexpected virt type %d while encoding audit message",
                 vm->def->virtType);
        virt = "?";
    }

986 987 988 989 990 991 992 993 994
    if (def->server.enabled) {
        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=ivshmem-socket reason=%s %s uuid=%s path=%s",
                  virt, reason, vmname, uuidstr, VIR_AUDIT_STR(srcpath));
    } else {
        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=shmem reason=%s %s uuid=%s size=%llu path=%s",
                  virt, reason, vmname, uuidstr, def->size, VIR_AUDIT_STR(shmpath));
   }
995 996 997

 cleanup:
    VIR_FREE(vmname);
998
    VIR_FREE(shmpath);
999 1000
    return;
}
1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041


void
virDomainAuditInput(virDomainObjPtr vm,
                    virDomainInputDefPtr input,
                    const char *reason,
                    bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
    const char *virt = virDomainVirtTypeToString(vm->def->virtType);

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name)))
        goto no_memory;

    switch ((virDomainInputType) input->type) {
    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
    case VIR_DOMAIN_INPUT_TYPE_KBD:
        break;

    case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=evdev reason=%s %s uuid=%s path=%s",
                  virt, reason, vmname, uuidstr, VIR_AUDIT_STR(input->source.evdev));
        break;

    case VIR_DOMAIN_INPUT_TYPE_LAST:
        break;
    }

 cleanup:
    VIR_FREE(vmname);
    return;

 no_memory:
    VIR_WARN("OOM while encoding audit message");
    goto cleanup;
}