domain_audit.c 31.3 KB
Newer Older
1
/*
2
 * domain_audit.c: Domain audit management
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

26 27
#include <sys/stat.h>

28 29 30 31 32 33
#ifdef MAJOR_IN_MKDEV
# include <sys/mkdev.h>
#elif MAJOR_IN_SYSMACROS
# include <sys/sysmacros.h>
#endif

34 35
#include <sys/types.h>

36
#include "domain_audit.h"
37
#include "viraudit.h"
38
#include "viruuid.h"
39
#include "virlog.h"
40
#include "viralloc.h"
41
#include "virstring.h"
42

43 44
VIR_LOG_INIT("conf.domain_audit");

45 46 47 48
/* Return nn:mm in hex for block and character devices, and NULL
 * for other file types, stat failure, or allocation failure.  */
#if defined major && defined minor
static char *
49
virDomainAuditGetRdev(const char *path)
50 51 52 53 54 55 56 57
{
    char *ret = NULL;
    struct stat sb;

    if (stat(path, &sb) == 0 &&
        (S_ISCHR(sb.st_mode) || S_ISBLK(sb.st_mode))) {
        int maj = major(sb.st_rdev);
        int min = minor(sb.st_rdev);
58
        ignore_value(virAsprintfQuiet(&ret, "%02X:%02X", maj, min));
59 60 61 62 63
    }
    return ret;
}
#else
static char *
64
virDomainAuditGetRdev(const char *path ATTRIBUTE_UNUSED)
65 66 67 68 69
{
    return NULL;
}
#endif

70 71 72 73 74 75 76

static const char *
virDomainAuditChardevPath(virDomainChrSourceDefPtr chr)
{
    if (!chr)
        return NULL;

77
    switch ((virDomainChrType) chr->type) {
78 79 80 81
    case VIR_DOMAIN_CHR_TYPE_PTY:
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
    case VIR_DOMAIN_CHR_TYPE_PIPE:
82
    case VIR_DOMAIN_CHR_TYPE_NMDM:
83 84 85 86 87 88 89 90 91 92 93
        return chr->data.file.path;

    case VIR_DOMAIN_CHR_TYPE_UNIX:
        return chr->data.nix.path;

    case VIR_DOMAIN_CHR_TYPE_TCP:
    case VIR_DOMAIN_CHR_TYPE_UDP:
    case VIR_DOMAIN_CHR_TYPE_NULL:
    case VIR_DOMAIN_CHR_TYPE_VC:
    case VIR_DOMAIN_CHR_TYPE_STDIO:
    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
94
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
95 96 97 98 99 100 101 102
    case VIR_DOMAIN_CHR_TYPE_LAST:
        return NULL;
    }

    return NULL;
}


103 104 105 106 107 108 109
static void
virDomainAuditGenericDev(virDomainObjPtr vm,
                         const char *type,
                         const char *oldsrcpath,
                         const char *newsrcpath,
                         const char *reason,
                         bool success)
110
{
111 112
    char *newdev = NULL;
    char *olddev = NULL;
113
    char uuidstr[VIR_UUID_STRING_BUFLEN];
114
    char *vmname = NULL;
115 116
    char *oldsrc = NULL;
    char *newsrc = NULL;
117
    const char *virt;
118

119 120
    /* if both new and old source aren't provided don't log anything */
    if (!newsrcpath && !oldsrcpath)
121
        return;
122 123 124 125 126 127 128 129 130 131 132

    if (virAsprintfQuiet(&newdev, "new-%s", type) < 0)
        goto no_memory;

    if (virAsprintfQuiet(&olddev, "old-%s", type) < 0)
        goto no_memory;

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name)))
        goto no_memory;
133

134
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
135 136
        VIR_WARN("Unexpected virt type %d while encoding audit message",
                 vm->def->virtType);
137 138 139
        virt = "?";
    }

140 141 142 143 144
    if (!(newsrc = virAuditEncode(newdev, VIR_AUDIT_STR(newsrcpath))))
        goto no_memory;

    if (!(oldsrc = virAuditEncode(olddev, VIR_AUDIT_STR(oldsrcpath))))
        goto no_memory;
145 146

    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
147 148
              "virt=%s resrc=%s reason=%s %s uuid=%s %s %s",
              virt, type, reason, vmname, uuidstr, oldsrc, newsrc);
149

150
 cleanup:
151 152
    VIR_FREE(newdev);
    VIR_FREE(olddev);
153 154 155
    VIR_FREE(vmname);
    VIR_FREE(oldsrc);
    VIR_FREE(newsrc);
156 157 158 159 160 161 162 163
    return;

 no_memory:
    VIR_WARN("OOM while encoding audit message");
    goto cleanup;
}


164 165 166 167 168 169 170 171 172 173 174
void
virDomainAuditChardev(virDomainObjPtr vm,
                      virDomainChrDefPtr oldDef,
                      virDomainChrDefPtr newDef,
                      const char *reason,
                      bool success)
{
    virDomainChrSourceDefPtr oldsrc = NULL;
    virDomainChrSourceDefPtr newsrc = NULL;

    if (oldDef)
175
        oldsrc = oldDef->source;
176 177

    if (newDef)
178
        newsrc = newDef->source;
179 180 181 182 183 184 185 186

    virDomainAuditGenericDev(vm, "chardev",
                             virDomainAuditChardevPath(oldsrc),
                             virDomainAuditChardevPath(newsrc),
                             reason, success);
}


P
Peter Krempa 已提交
187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220
static void
virDomainAuditSmartcard(virDomainObjPtr vm,
                        virDomainSmartcardDefPtr def,
                        const char *reason,
                        bool success)
{
    const char *database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
    size_t i;

    if (def) {
        switch ((virDomainSmartcardType) def->type) {
        case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
            virDomainAuditGenericDev(vm, "smartcard",
                                     NULL, "nss-smartcard-device",
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
            for (i = 0; i < VIR_DOMAIN_SMARTCARD_NUM_CERTIFICATES; i++) {
                virDomainAuditGenericDev(vm, "smartcard", NULL,
                                         def->data.cert.file[i],
                                         reason, success);
            }

            if (def->data.cert.database)
                database = def->data.cert.database;

            virDomainAuditGenericDev(vm, "smartcard",
                                     NULL, database,
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
            virDomainAuditGenericDev(vm, "smartcard", NULL,
221
                                     virDomainAuditChardevPath(def->data.passthru),
P
Peter Krempa 已提交
222 223 224 225 226 227 228 229 230 231
                                     reason, success);
            break;

        case VIR_DOMAIN_SMARTCARD_TYPE_LAST:
            break;
        }
    }
}


232 233
void
virDomainAuditDisk(virDomainObjPtr vm,
234 235 236 237
                   virStorageSourcePtr oldDef,
                   virStorageSourcePtr newDef,
                   const char *reason,
                   bool success)
238
{
239 240 241 242 243 244 245 246 247 248
    const char *oldsrc = NULL;
    const char *newsrc = NULL;

    if (oldDef && virStorageSourceIsLocalStorage(oldDef))
        oldsrc = oldDef->path;

    if (newDef && virStorageSourceIsLocalStorage(newDef))
        newsrc = newDef->path;

    virDomainAuditGenericDev(vm, "disk", oldsrc, newsrc, reason, success);
249 250 251
}


L
Luyao Huang 已提交
252
void
253
virDomainAuditRNG(virDomainObjPtr vm,
254
                  virDomainRNGDefPtr oldDef, virDomainRNGDefPtr newDef,
255 256 257 258 259 260
                  const char *reason, bool success)
{
    const char *newsrcpath = NULL;
    const char *oldsrcpath = NULL;

    if (newDef) {
261
        switch ((virDomainRNGBackend) newDef->backend) {
262
        case VIR_DOMAIN_RNG_BACKEND_RANDOM:
263
            newsrcpath = newDef->source.file;
264 265 266 267 268 269 270 271 272 273 274 275
            break;

        case VIR_DOMAIN_RNG_BACKEND_EGD:
            newsrcpath = virDomainAuditChardevPath(newDef->source.chardev);
            break;

        case VIR_DOMAIN_RNG_BACKEND_LAST:
            break;
        }
    }

    if (oldDef) {
276
        switch ((virDomainRNGBackend) oldDef->backend) {
277
        case VIR_DOMAIN_RNG_BACKEND_RANDOM:
278
            oldsrcpath = oldDef->source.file;
279 280 281 282 283 284 285 286 287 288 289
            break;

        case VIR_DOMAIN_RNG_BACKEND_EGD:
            oldsrcpath = virDomainAuditChardevPath(oldDef->source.chardev);
            break;

        case VIR_DOMAIN_RNG_BACKEND_LAST:
            break;
        }
    }

290
    virDomainAuditGenericDev(vm, "rng", oldsrcpath, newsrcpath, reason, success);
291 292 293
}


D
Daniel P. Berrange 已提交
294 295 296 297 298
void
virDomainAuditFS(virDomainObjPtr vm,
                 virDomainFSDefPtr oldDef, virDomainFSDefPtr newDef,
                 const char *reason, bool success)
{
299
    virDomainAuditGenericDev(vm, "fs",
300 301
                             oldDef ? oldDef->src->path : NULL,
                             newDef ? newDef->src->path : NULL,
302
                             reason, success);
D
Daniel P. Berrange 已提交
303 304 305
}


306
void
307 308 309
virDomainAuditNet(virDomainObjPtr vm,
                  virDomainNetDefPtr oldDef, virDomainNetDefPtr newDef,
                  const char *reason, bool success)
310 311 312 313 314
{
    char newMacstr[VIR_MAC_STRING_BUFLEN];
    char oldMacstr[VIR_MAC_STRING_BUFLEN];

    if (oldDef)
315
        virMacAddrFormat(&oldDef->mac, oldMacstr);
316

317
    if (newDef)
318
        virMacAddrFormat(&newDef->mac, newMacstr);
319

320 321 322 323
    virDomainAuditGenericDev(vm, "net",
                             oldDef ? oldMacstr : NULL,
                             newDef ? newMacstr : NULL,
                             reason, success);
324 325
}

326
/**
327
 * virDomainAuditNetDevice:
W
Wang Rui 已提交
328 329
 * @vmDef: the definition of the VM
 * @netDef: details of network device that fd will be tied to
330 331
 * @device: device being opened (such as /dev/vhost-net,
 * /dev/net/tun, /dev/tanN). Note that merely opening a device
332
 * does not mean that virDomain owns it; a followup virDomainAuditNet
333 334 335 336 337 338
 * shows whether the fd was passed on.
 * @success: true if the device was opened
 *
 * Log an audit message about an attempted network device open.
 */
void
339 340
virDomainAuditNetDevice(virDomainDefPtr vmDef, virDomainNetDefPtr netDef,
                        const char *device, bool success)
341 342 343 344
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char macstr[VIR_MAC_STRING_BUFLEN];
    char *vmname;
345
    char *dev_name = NULL;
346
    char *rdev;
347
    const char *virt;
348 349

    virUUIDFormat(vmDef->uuid, uuidstr);
350
    virMacAddrFormat(&netDef->mac, macstr);
351
    rdev = virDomainAuditGetRdev(device);
352 353

    if (!(vmname = virAuditEncode("vm", vmDef->name)) ||
354
        !(dev_name = virAuditEncode("path", device))) {
355
        VIR_WARN("OOM while encoding audit message");
356 357 358
        goto cleanup;
    }

359 360 361 362 363
    if (!(virt = virDomainVirtTypeToString(vmDef->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vmDef->virtType);
        virt = "?";
    }

364
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
365
              "virt=%s resrc=net reason=open %s uuid=%s net=%s %s rdev=%s",
366
              virt, vmname, uuidstr, macstr, dev_name, VIR_AUDIT_STR(rdev));
367

368
 cleanup:
369
    VIR_FREE(vmname);
370
    VIR_FREE(dev_name);
371 372
    VIR_FREE(rdev);
}
373

374
/**
375
 * virDomainAuditHostdev:
376 377
 * @vm: domain making a change in pass-through host device
 * @hostdev: device being attached or removed
378
 * @reason: one of "start", "attach", or "detach"
379 380 381 382 383
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
void
384 385
virDomainAuditHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev,
                      const char *reason, bool success)
386 387 388
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
389 390
    char *address = NULL;
    char *device = NULL;
391
    const char *virt;
392
    virDomainHostdevSubsysUSBPtr usbsrc = &hostdev->source.subsys.u.usb;
393
    virDomainHostdevSubsysPCIPtr pcisrc = &hostdev->source.subsys.u.pci;
394
    virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
395
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &hostdev->source.subsys.u.scsi_host;
396 397 398

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
399
        VIR_WARN("OOM while encoding audit message");
400 401 402
        return;
    }

403 404 405 406 407
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

408 409 410 411
    switch (hostdev->mode) {
    case VIR_DOMAIN_HOSTDEV_MODE_SUBSYS:
        switch (hostdev->source.subsys.type) {
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
412
            if (virAsprintfQuiet(&address, "%.4x:%.2x:%.2x.%.1x",
413 414 415 416
                                 pcisrc->addr.domain,
                                 pcisrc->addr.bus,
                                 pcisrc->addr.slot,
                                 pcisrc->addr.function) < 0) {
417 418 419 420 421
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }
            break;
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
422
            if (virAsprintfQuiet(&address, "%.3d.%.3d",
423
                                 usbsrc->bus, usbsrc->device) < 0) {
424 425
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
H
Han Cheng 已提交
426 427
            }
            break;
428
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
429 430 431 432 433
            if (scsisrc->protocol ==
                VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                /* Follow virDomainAuditDisk && virDomainAuditGenericDev
                 * and don't audit the networked device.
                 */
H
Han Cheng 已提交
434
                goto cleanup;
435 436 437
            } else {
                virDomainHostdevSubsysSCSIHostPtr scsihostsrc =
                    &scsisrc->u.host;
438
                if (virAsprintfQuiet(&address, "%s:%u:%u:%llu",
439 440 441 442 443 444
                                     scsihostsrc->adapter, scsihostsrc->bus,
                                     scsihostsrc->target,
                                     scsihostsrc->unit) < 0) {
                    VIR_WARN("OOM while encoding audit message");
                    goto cleanup;
                }
445 446
            }
            break;
447
        }
448 449 450 451 452 453
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST:
            if (VIR_STRDUP_QUIET(address, hostsrc->wwpn) < 0) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }
            break;
454 455 456 457 458 459 460
        default:
            VIR_WARN("Unexpected hostdev type while encoding audit message: %d",
                     hostdev->source.subsys.type);
            goto cleanup;
        }

        if (!(device = virAuditEncode("device", VIR_AUDIT_STR(address)))) {
461
            VIR_WARN("OOM while encoding audit message");
462 463
            goto cleanup;
        }
464 465 466 467 468 469

        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=dev reason=%s %s uuid=%s bus=%s %s",
                  virt, reason, vmname, uuidstr,
                  virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type),
                  device);
470
        break;
471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500

    case VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES:
        switch (hostdev->source.caps.type) {
        case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_STORAGE:
            if (!(device = virAuditEncode("disk",
                                          VIR_AUDIT_STR(hostdev->source.caps.u.storage.block)))) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }

            VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                      "virt=%s resrc=hostdev reason=%s %s uuid=%s %s",
                      virt, reason, vmname, uuidstr, device);
            break;

        case VIR_DOMAIN_HOSTDEV_CAPS_TYPE_MISC:
            if (!(device = virAuditEncode("chardev",
                                          VIR_AUDIT_STR(hostdev->source.caps.u.misc.chardev)))) {
                VIR_WARN("OOM while encoding audit message");
                goto cleanup;
            }

            VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                      "virt=%s resrc=hostdev reason=%s %s uuid=%s %s",
                      virt, reason, vmname, uuidstr, device);
            break;

        default:
            VIR_WARN("Unexpected hostdev type while encoding audit message: %d",
                     hostdev->source.caps.type);
501 502 503 504
            goto cleanup;
        }
        break;

505 506 507
    default:
        VIR_WARN("Unexpected hostdev mode while encoding audit message: %d",
                 hostdev->mode);
508 509 510
        goto cleanup;
    }

511
 cleanup:
512 513 514 515 516 517
    VIR_FREE(vmname);
    VIR_FREE(device);
    VIR_FREE(address);
}


518 519 520 521 522 523 524 525 526 527 528 529 530 531 532
/**
 * virDomainAuditRedirdev:
 * @vm: domain making a change in pass-through host device
 * @redirdev: device being attached or removed
 * @reason: one of "start", "attach", or "detach"
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
void
virDomainAuditRedirdev(virDomainObjPtr vm, virDomainRedirdevDefPtr redirdev,
                      const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
533 534
    char *address = NULL;
    char *device = NULL;
535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    switch (redirdev->bus) {
    case VIR_DOMAIN_REDIRDEV_BUS_USB:
550
        if (VIR_STRDUP_QUIET(address, "USB redirdev") < 0) {
551 552 553
            VIR_WARN("OOM while encoding audit message");
            goto cleanup;
        }
554
        break;
555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571
    default:
        VIR_WARN("Unexpected redirdev bus while encoding audit message: %d",
                 redirdev->bus);
        goto cleanup;
    }

    if (!(device = virAuditEncode("device", VIR_AUDIT_STR(address)))) {
        VIR_WARN("OOM while encoding audit message");
        goto cleanup;
    }

    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
              "virt=%s resrc=dev reason=%s %s uuid=%s bus=%s %s",
              virt, reason, vmname, uuidstr,
              virDomainRedirdevBusTypeToString(redirdev->bus),
              device);

572
 cleanup:
573 574 575 576 577 578
    VIR_FREE(vmname);
    VIR_FREE(device);
    VIR_FREE(address);
}


579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624
/**
 * virDomainAuditTPM:
 * @vm: domain making a change in pass-through host device
 * @tpm: TPM device being attached or removed
 * @reason: one of "start", "attach", or "detach"
 * @success: true if the device passthrough operation succeeded
 *
 * Log an audit message about an attempted device passthrough change.
 */
static void
virDomainAuditTPM(virDomainObjPtr vm, virDomainTPMDefPtr tpm,
                  const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
    char *path = NULL;
    char *device = NULL;
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
        path = tpm->data.passthrough.source.data.file.path;
        if (!(device = virAuditEncode("device", VIR_AUDIT_STR(path)))) {
            VIR_WARN("OOM while encoding audit message");
            goto cleanup;
        }

        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=dev reason=%s %s uuid=%s %s",
                  virt, reason, vmname, uuidstr, device);
        break;
    default:
        break;
    }

625
 cleanup:
626 627 628 629 630
    VIR_FREE(vmname);
    VIR_FREE(device);
}


631
/**
632
 * virDomainAuditCgroup:
633 634 635
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
636 637
 * @extra: additional details, in the form "all",
 * "major category=xyz maj=nn", or "path path=xyz dev=nn:mm" (the
638 639
 * latter two are generated by virDomainAuditCgroupMajor and
 * virDomainAuditCgroupPath).
640 641 642 643
 * @success: true if the cgroup operation succeeded
 *
 * Log an audit message about an attempted cgroup device ACL change.
 */
644
void
645 646
virDomainAuditCgroup(virDomainObjPtr vm, virCgroupPtr cgroup,
                     const char *reason, const char *extra, bool success)
647 648 649
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
650 651
    char *controller = NULL;
    char *detail;
652
    const char *virt;
653 654 655

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
656
        VIR_WARN("OOM while encoding audit message");
657 658
        return;
    }
659

660 661 662 663 664
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

E
Eric Blake 已提交
665 666 667
    ignore_value(virCgroupPathOfController(cgroup,
                                           VIR_CGROUP_CONTROLLER_DEVICES,
                                           NULL, &controller));
668 669
    detail = virAuditEncode("cgroup", VIR_AUDIT_STR(controller));

670
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
671 672
              "virt=%s resrc=cgroup reason=%s %s uuid=%s %s class=%s",
              virt, reason, vmname, uuidstr,
673
              detail ? detail : "cgroup=?", extra);
674 675

    VIR_FREE(vmname);
676 677
    VIR_FREE(controller);
    VIR_FREE(detail);
678 679 680
}

/**
681
 * virDomainAuditCgroupMajor:
682 683 684 685 686
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
 * @maj: the major number of the device category
 * @name: a textual name for that device category, alphabetic only
687
 * @perms: string containing "r", "w", and/or "m" as appropriate
688 689 690 691 692
 * @success: true if the cgroup operation succeeded
 *
 * Log an audit message about an attempted cgroup device ACL change.
 */
void
693 694 695
virDomainAuditCgroupMajor(virDomainObjPtr vm, virCgroupPtr cgroup,
                          const char *reason, int maj, const char *name,
                          const char *perms, bool success)
696 697 698
{
    char *extra;

699 700
    if (virAsprintfQuiet(&extra, "major category=%s maj=%02X acl=%s",
                         name, maj, perms) < 0) {
701
        VIR_WARN("OOM while encoding audit message");
702 703 704
        return;
    }

705
    virDomainAuditCgroup(vm, cgroup, reason, extra, success);
706 707 708 709 710

    VIR_FREE(extra);
}

/**
711
 * virDomainAuditCgroupPath:
712 713 714 715
 * @vm: domain making the cgroups ACL change
 * @cgroup: cgroup that manages the devices
 * @reason: either "allow" or "deny"
 * @path: the device being adjusted
716
 * @perms: string containing "r", "w", and/or "m" as appropriate
717 718 719 720 721 722
 * @rc: > 0 if not a device, 0 if success, < 0 if failure
 *
 * Log an audit message about an attempted cgroup device ACL change to
 * a specific device.
 */
void
723 724 725
virDomainAuditCgroupPath(virDomainObjPtr vm, virCgroupPtr cgroup,
                         const char *reason, const char *path, const char *perms,
                         int rc)
726 727 728
{
    char *detail;
    char *rdev;
729
    char *extra = NULL;
730 731 732 733 734

    /* Nothing to audit for regular files.  */
    if (rc > 0)
        return;

735
    rdev = virDomainAuditGetRdev(path);
736 737

    if (!(detail = virAuditEncode("path", path)) ||
738 739
        virAsprintfQuiet(&extra, "path %s rdev=%s acl=%s",
                         detail, VIR_AUDIT_STR(rdev), perms) < 0) {
740
        VIR_WARN("OOM while encoding audit message");
741 742 743
        goto cleanup;
    }

744
    virDomainAuditCgroup(vm, cgroup, reason, extra, rc == 0);
745

746
 cleanup:
747
    VIR_FREE(extra);
748
    VIR_FREE(detail);
749
    VIR_FREE(rdev);
750 751
}

752
/**
753
 * virDomainAuditResource:
754 755 756 757 758 759 760 761 762 763
 * @vm: domain making an integer resource change
 * @resource: name of the resource: "mem" or "vcpu"
 * @oldval: the old value of the resource
 * @newval: the new value of the resource
 * @reason: either "start" or "update"
 * @success: true if the resource change succeeded
 *
 * Log an audit message about an attempted resource change.
 */
static void
764 765 766
virDomainAuditResource(virDomainObjPtr vm, const char *resource,
                       unsigned long long oldval, unsigned long long newval,
                       const char *reason, bool success)
767 768 769
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
770
    const char *virt;
771 772 773

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
774
        VIR_WARN("OOM while encoding audit message");
775 776 777
        return;
    }

778 779 780 781 782
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

783
    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
784 785
              "virt=%s resrc=%s reason=%s %s uuid=%s old-%s=%lld new-%s=%lld",
              virt, resource, reason, vmname, uuidstr,
786 787 788 789 790 791
              resource, oldval, resource, newval);

    VIR_FREE(vmname);
}

void
792 793 794
virDomainAuditMemory(virDomainObjPtr vm,
                     unsigned long long oldmem, unsigned long long newmem,
                     const char *reason, bool success)
795
{
796
    return virDomainAuditResource(vm, "mem", oldmem, newmem, reason, success);
797 798 799
}

void
800 801 802
virDomainAuditVcpu(virDomainObjPtr vm,
                   unsigned int oldvcpu, unsigned int newvcpu,
                   const char *reason, bool success)
803
{
804
    return virDomainAuditResource(vm, "vcpu", oldvcpu, newvcpu, reason, success);
805 806
}

807 808 809 810 811 812 813 814 815
void
virDomainAuditIOThread(virDomainObjPtr vm,
                       unsigned int oldiothread, unsigned int newiothread,
                       const char *reason, bool success)
{
    return virDomainAuditResource(vm, "iothread", oldiothread, newiothread,
                                  reason, success);
}

816
static void
817 818
virDomainAuditLifecycle(virDomainObjPtr vm, const char *op,
                        const char *reason, bool success)
819 820 821
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
822
    const char *virt;
823 824 825 826

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
827
        VIR_WARN("OOM while encoding audit message");
828 829 830
        return;
    }

831 832 833 834 835
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

836
    VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_CONTROL, success,
837 838
              "virt=%s op=%s reason=%s %s uuid=%s vm-pid=%lld",
              virt, op, reason, vmname, uuidstr, (long long)vm->pid);
839 840 841 842 843

    VIR_FREE(vmname);
}


844
void
845
virDomainAuditStart(virDomainObjPtr vm, const char *reason, bool success)
846
{
847
    size_t i;
848

849 850
    for (i = 0; i < vm->def->ndisks; i++)
        virDomainAuditDisk(vm, NULL, vm->def->disks[i]->src, "start", true);
851

852
    for (i = 0; i < vm->def->nfss; i++) {
D
Daniel P. Berrange 已提交
853 854 855 856
        virDomainFSDefPtr fs = vm->def->fss[i];
        virDomainAuditFS(vm, NULL, fs, "start", true);
    }

857
    for (i = 0; i < vm->def->nnets; i++) {
858
        virDomainNetDefPtr net = vm->def->nets[i];
859
        virDomainAuditNet(vm, NULL, net, "start", true);
860 861
    }

862
    for (i = 0; i < vm->def->nhostdevs; i++) {
863
        virDomainHostdevDefPtr hostdev = vm->def->hostdevs[i];
864
        virDomainAuditHostdev(vm, hostdev, "start", true);
865 866
    }

867
    for (i = 0; i < vm->def->nredirdevs; i++) {
868 869 870 871
        virDomainRedirdevDefPtr redirdev = vm->def->redirdevs[i];
        virDomainAuditRedirdev(vm, redirdev, "start", true);
    }

872 873 874 875 876 877 878 879 880 881 882 883 884
    for (i = 0; i < vm->def->nserials; i++)
        virDomainAuditChardev(vm, NULL, vm->def->serials[i], "start", true);

    for (i = 0; i < vm->def->nparallels; i++)
        virDomainAuditChardev(vm, NULL, vm->def->parallels[i], "start", true);

    for (i = 0; i < vm->def->nchannels; i++)
        virDomainAuditChardev(vm, NULL, vm->def->channels[i], "start", true);

    for (i = 0; i < vm->def->nconsoles; i++) {
        if (i == 0 &&
            (vm->def->consoles[i]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL ||
             vm->def->consoles[i]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_NONE) &&
885
             vm->def->os.type == VIR_DOMAIN_OSTYPE_HVM)
886 887 888 889 890
            continue;

        virDomainAuditChardev(vm, NULL, vm->def->consoles[i], "start", true);
    }

P
Peter Krempa 已提交
891 892 893
    for (i = 0; i < vm->def->nsmartcards; i++)
        virDomainAuditSmartcard(vm, vm->def->smartcards[i], "start", true);

894 895
    for (i = 0; i < vm->def->nrngs; i++)
        virDomainAuditRNG(vm, NULL, vm->def->rngs[i], "start", true);
896

897 898 899
    if (vm->def->tpm)
        virDomainAuditTPM(vm, vm->def->tpm, "start", true);

900 901 902
    for (i = 0; i < vm->def->nshmems; i++)
        virDomainAuditShmem(vm, vm->def->shmems[i], "start", true);

903
    virDomainAuditMemory(vm, 0, virDomainDefGetMemoryTotal(vm->def),
904
                         "start", true);
905
    virDomainAuditVcpu(vm, 0, virDomainDefGetVcpus(vm->def), "start", true);
906 907
    if (vm->def->niothreadids)
        virDomainAuditIOThread(vm, 0, vm->def->niothreadids, "start", true);
908

909
    virDomainAuditLifecycle(vm, "start", reason, success);
910 911
}

912 913
void
virDomainAuditInit(virDomainObjPtr vm,
914 915
                   pid_t initpid,
                   ino_t pidns)
916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
    const char *virt;

    virUUIDFormat(vm->def->uuid, uuidstr);

    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
        VIR_WARN("OOM while encoding audit message");
        return;
    }

    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

    VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_CONTROL, true,
934 935 936
              "virt=%s op=init %s uuid=%s vm-pid=%lld init-pid=%lld pid-ns=%lld",
              virt, vmname, uuidstr, (long long)vm->pid, (long long)initpid,
              (long long)pidns);
937 938 939

    VIR_FREE(vmname);
}
940

941
void
942
virDomainAuditStop(virDomainObjPtr vm, const char *reason)
943
{
944
    virDomainAuditLifecycle(vm, "stop", reason, true);
945 946
}

947
void
948
virDomainAuditSecurityLabel(virDomainObjPtr vm, bool success)
949 950 951
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname;
952
    const char *virt;
953
    size_t i;
954 955 956

    virUUIDFormat(vm->def->uuid, uuidstr);
    if (!(vmname = virAuditEncode("vm", vm->def->name))) {
957
        VIR_WARN("OOM while encoding audit message");
958 959 960
        return;
    }

961 962 963 964 965
    if (!(virt = virDomainVirtTypeToString(vm->def->virtType))) {
        VIR_WARN("Unexpected virt type %d while encoding audit message", vm->def->virtType);
        virt = "?";
    }

966 967 968 969 970 971 972 973
    for (i = 0; i < vm->def->nseclabels; i++) {
        VIR_AUDIT(VIR_AUDIT_RECORD_MACHINE_ID, success,
                  "virt=%s %s uuid=%s vm-ctx=%s img-ctx=%s model=%s",
                  virt, vmname, uuidstr,
                  VIR_AUDIT_STR(vm->def->seclabels[i]->label),
                  VIR_AUDIT_STR(vm->def->seclabels[i]->imagelabel),
                  VIR_AUDIT_STR(vm->def->seclabels[i]->model));
    }
974 975 976

    VIR_FREE(vmname);
}
977 978 979 980 981 982 983 984 985 986

void
virDomainAuditShmem(virDomainObjPtr vm,
                    virDomainShmemDefPtr def,
                    const char *reason, bool success)
{
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    char *vmname = virAuditEncode("vm", vm->def->name);
    const char *srcpath = virDomainAuditChardevPath(&def->server.chr);
    const char *virt = virDomainVirtTypeToString(vm->def->virtType);
987
    char *shmpath = NULL;
988 989 990

    virUUIDFormat(vm->def->uuid, uuidstr);

991 992
    if (!vmname ||
        virAsprintfQuiet(&shmpath, "/dev/shm/%s", def->name) < 0) {
993 994 995 996 997 998 999 1000 1001 1002
        VIR_WARN("OOM while encoding audit message");
        goto cleanup;
    }

    if (!virt) {
        VIR_WARN("Unexpected virt type %d while encoding audit message",
                 vm->def->virtType);
        virt = "?";
    }

1003 1004 1005 1006 1007 1008 1009 1010 1011
    if (def->server.enabled) {
        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=ivshmem-socket reason=%s %s uuid=%s path=%s",
                  virt, reason, vmname, uuidstr, VIR_AUDIT_STR(srcpath));
    } else {
        VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
                  "virt=%s resrc=shmem reason=%s %s uuid=%s size=%llu path=%s",
                  virt, reason, vmname, uuidstr, def->size, VIR_AUDIT_STR(shmpath));
   }
1012 1013 1014

 cleanup:
    VIR_FREE(vmname);
1015
    VIR_FREE(shmpath);
1016 1017
    return;
}