]> xenbits.xensource.com Git - libvirt.git/commitdiff
audit: Audit information about shmem devices
authorMartin Kletzander <mkletzan@redhat.com>
Thu, 11 Aug 2016 09:40:18 +0000 (11:40 +0200)
committerMartin Kletzander <mkletzan@redhat.com>
Mon, 12 Sep 2016 17:41:43 +0000 (19:41 +0200)
Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1218603

Signed-off-by: Martin Kletzander <mkletzan@redhat.com>
docs/auditlog.html.in
src/conf/domain_audit.c
src/conf/domain_audit.h
src/libvirt_private.syms

index 012d0680a87bc763dc1640e7f1675e91fcfb23cb..0c778aafeb0e798301a9cbc4ff23e172a979789b 100644 (file)
       <dd>The name of the cgroup controller</dd>
     </dl>
 
+
+    <h4><a name="typeresourceshmem">Shared memory</a></h4>
+    <p>
+      The <code>msg</code> field will include the following sub-fields
+    </p>
+
+    <dl>
+      <dt><code>resrc</code></dt>
+      <dd>The type of resource assigned. Set to <code>shmem</code></dd>
+      <dt><code>reason</code></dt>
+      <dd>The reason which caused the resource to be assigned to happen</dd>
+      <dt><code>size</code></dt>
+      <dd>The size of the shared memory region</dd>
+      <dt><code>shmem</code></dt>
+      <dd>Name of the shared memory region</dd>
+      <dt><code>source</code></dt>
+      <dd>Path of the backing character device for given emulated device</dd>
+    </dl>
+
   </body>
 </html>
index 52dea02554c7edec70b038394a8cc50d146b9736..fd20ace14cc8dbb63ab17b85c3667d61146cf324 100644 (file)
@@ -890,6 +890,9 @@ virDomainAuditStart(virDomainObjPtr vm, const char *reason, bool success)
     if (vm->def->tpm)
         virDomainAuditTPM(vm, vm->def->tpm, "start", true);
 
+    for (i = 0; i < vm->def->nshmems; i++)
+        virDomainAuditShmem(vm, vm->def->shmems[i], "start", true);
+
     virDomainAuditMemory(vm, 0, virDomainDefGetMemoryTotal(vm->def),
                          "start", true);
     virDomainAuditVcpu(vm, 0, virDomainDefGetVcpus(vm->def), "start", true);
@@ -964,3 +967,42 @@ virDomainAuditSecurityLabel(virDomainObjPtr vm, bool success)
 
     VIR_FREE(vmname);
 }
+
+void
+virDomainAuditShmem(virDomainObjPtr vm,
+                    virDomainShmemDefPtr def,
+                    const char *reason, bool success)
+{
+    char uuidstr[VIR_UUID_STRING_BUFLEN];
+    char *vmname = virAuditEncode("vm", vm->def->name);
+    const char *srcpath = virDomainAuditChardevPath(&def->server.chr);
+    char *src = virAuditEncode("server", VIR_AUDIT_STR(srcpath));
+    char *shmem = virAuditEncode("shmem", VIR_AUDIT_STR(def->name));
+    const char *virt = virDomainVirtTypeToString(vm->def->virtType);
+    char *size = NULL;
+
+    virUUIDFormat(vm->def->uuid, uuidstr);
+
+    if (!vmname || !src || !size || !shmem ||
+        virAsprintfQuiet(&size, "%llu", def->size) < 0) {
+        VIR_WARN("OOM while encoding audit message");
+        goto cleanup;
+    }
+
+    if (!virt) {
+        VIR_WARN("Unexpected virt type %d while encoding audit message",
+                 vm->def->virtType);
+        virt = "?";
+    }
+
+    VIR_AUDIT(VIR_AUDIT_RECORD_RESOURCE, success,
+              "virt=%s resrc=shmem reason=%s %s uuid=%s size=%s %s %s",
+              virt, reason, vmname, uuidstr, size ?: "?", shmem, src);
+
+ cleanup:
+    VIR_FREE(vmname);
+    VIR_FREE(src);
+    VIR_FREE(size);
+    VIR_FREE(shmem);
+    return;
+}
index 97dadca5aae72fefe11c10368d7486861bd167a4..8cb585dc7d9659dfa4a69c315734e7d0f272e397 100644 (file)
@@ -129,6 +129,10 @@ void virDomainAuditRNG(virDomainObjPtr vm,
                        const char *reason,
                        bool success)
     ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(4);
+void virDomainAuditShmem(virDomainObjPtr vm,
+                         virDomainShmemDefPtr def,
+                         const char *reason, bool success)
+    ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) ATTRIBUTE_NONNULL(3);
 
 
 #endif /* __VIR_DOMAIN_AUDIT_H__ */
index 6a77e469f1402b2659813a4c34637ebf75bf60c1..2569772ec22fe2402a8f5a8aaa9136e1a1704711 100644 (file)
@@ -146,6 +146,7 @@ virDomainAuditNetDevice;
 virDomainAuditRedirdev;
 virDomainAuditRNG;
 virDomainAuditSecurityLabel;
+virDomainAuditShmem;
 virDomainAuditStart;
 virDomainAuditStop;
 virDomainAuditVcpu;