mirror of https://github.com/xqemu/xqemu.git
linux-user: add netlink audit
This is, for instance, needed to log in a container. Without this, the user cannot be identified and the console login fails with "Login incorrect". Signed-off-by: Laurent Vivier <laurent@vivier.eu> Signed-off-by: Riku Voipio <riku.voipio@linaro.org>
This commit is contained in:
parent
b265620bfb
commit
5ce9bb5937
|
@ -103,6 +103,7 @@ int __clone2(int (*fn)(void *), void *child_stack_base,
|
||||||
#include <linux/blkpg.h>
|
#include <linux/blkpg.h>
|
||||||
#include <linux/netlink.h>
|
#include <linux/netlink.h>
|
||||||
#include <linux/rtnetlink.h>
|
#include <linux/rtnetlink.h>
|
||||||
|
#include <linux/audit.h>
|
||||||
#include "linux_loop.h"
|
#include "linux_loop.h"
|
||||||
#include "uname.h"
|
#include "uname.h"
|
||||||
|
|
||||||
|
@ -2041,6 +2042,44 @@ static abi_long target_to_host_nlmsg_route(struct nlmsghdr *nlh, size_t len)
|
||||||
return target_to_host_for_each_nlmsg(nlh, len, target_to_host_data_route);
|
return target_to_host_for_each_nlmsg(nlh, len, target_to_host_data_route);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static abi_long host_to_target_data_audit(struct nlmsghdr *nlh)
|
||||||
|
{
|
||||||
|
switch (nlh->nlmsg_type) {
|
||||||
|
default:
|
||||||
|
gemu_log("Unknown host audit message type %d\n",
|
||||||
|
nlh->nlmsg_type);
|
||||||
|
return -TARGET_EINVAL;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline abi_long host_to_target_nlmsg_audit(struct nlmsghdr *nlh,
|
||||||
|
size_t len)
|
||||||
|
{
|
||||||
|
return host_to_target_for_each_nlmsg(nlh, len, host_to_target_data_audit);
|
||||||
|
}
|
||||||
|
|
||||||
|
static abi_long target_to_host_data_audit(struct nlmsghdr *nlh)
|
||||||
|
{
|
||||||
|
switch (nlh->nlmsg_type) {
|
||||||
|
case AUDIT_USER:
|
||||||
|
case AUDIT_FIRST_USER_MSG ... AUDIT_LAST_USER_MSG:
|
||||||
|
case AUDIT_FIRST_USER_MSG2 ... AUDIT_LAST_USER_MSG2:
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
gemu_log("Unknown target audit message type %d\n",
|
||||||
|
nlh->nlmsg_type);
|
||||||
|
return -TARGET_EINVAL;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static abi_long target_to_host_nlmsg_audit(struct nlmsghdr *nlh, size_t len)
|
||||||
|
{
|
||||||
|
return target_to_host_for_each_nlmsg(nlh, len, target_to_host_data_audit);
|
||||||
|
}
|
||||||
|
|
||||||
/* do_setsockopt() Must return target values and target errnos. */
|
/* do_setsockopt() Must return target values and target errnos. */
|
||||||
static abi_long do_setsockopt(int sockfd, int level, int optname,
|
static abi_long do_setsockopt(int sockfd, int level, int optname,
|
||||||
abi_ulong optval_addr, socklen_t optlen)
|
abi_ulong optval_addr, socklen_t optlen)
|
||||||
|
@ -2706,6 +2745,21 @@ static TargetFdTrans target_netlink_route_trans = {
|
||||||
.host_to_target_data = netlink_route_host_to_target,
|
.host_to_target_data = netlink_route_host_to_target,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static abi_long netlink_audit_target_to_host(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return target_to_host_nlmsg_audit(buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
static abi_long netlink_audit_host_to_target(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
return host_to_target_nlmsg_audit(buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
static TargetFdTrans target_netlink_audit_trans = {
|
||||||
|
.target_to_host_data = netlink_audit_target_to_host,
|
||||||
|
.host_to_target_data = netlink_audit_host_to_target,
|
||||||
|
};
|
||||||
|
|
||||||
/* do_socket() Must return target values and target errnos. */
|
/* do_socket() Must return target values and target errnos. */
|
||||||
static abi_long do_socket(int domain, int type, int protocol)
|
static abi_long do_socket(int domain, int type, int protocol)
|
||||||
{
|
{
|
||||||
|
@ -2719,7 +2773,8 @@ static abi_long do_socket(int domain, int type, int protocol)
|
||||||
|
|
||||||
if (domain == PF_NETLINK &&
|
if (domain == PF_NETLINK &&
|
||||||
!(protocol == NETLINK_ROUTE ||
|
!(protocol == NETLINK_ROUTE ||
|
||||||
protocol == NETLINK_KOBJECT_UEVENT)) {
|
protocol == NETLINK_KOBJECT_UEVENT ||
|
||||||
|
protocol == NETLINK_AUDIT)) {
|
||||||
return -EPFNOSUPPORT;
|
return -EPFNOSUPPORT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2744,6 +2799,9 @@ static abi_long do_socket(int domain, int type, int protocol)
|
||||||
case NETLINK_KOBJECT_UEVENT:
|
case NETLINK_KOBJECT_UEVENT:
|
||||||
/* nothing to do: messages are strings */
|
/* nothing to do: messages are strings */
|
||||||
break;
|
break;
|
||||||
|
case NETLINK_AUDIT:
|
||||||
|
fd_trans_register(ret, &target_netlink_audit_trans);
|
||||||
|
break;
|
||||||
default:
|
default:
|
||||||
g_assert_not_reached();
|
g_assert_not_reached();
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue