Blame SOURCES/libvirt-qemu_hotplug-audit-all-auditable-device-types-in-qemuDomainRemoveAuditDevice.patch

0a7476
From e751617f83b01eab5799049bc080ab893ae213d9 Mon Sep 17 00:00:00 2001
0a7476
Message-Id: <e751617f83b01eab5799049bc080ab893ae213d9@dist-git>
0a7476
From: Laine Stump <laine@laine.org>
0a7476
Date: Thu, 11 Apr 2019 15:14:50 -0400
0a7476
Subject: [PATCH] qemu_hotplug: audit *all* auditable device types in
0a7476
 qemuDomainRemoveAuditDevice
0a7476
0a7476
Although all hotpluggable devices other than lease, controller,
0a7476
watchdof, and vsock can be audited, and *are* audited when an unplug
0a7476
is successful, only disk, net, and hostdev were actually being audited
0a7476
on failure.
0a7476
0a7476
This patch corrects that omission.
0a7476
0a7476
Signed-off-by: Laine Stump <laine@laine.org>
0a7476
ACKed-by: Peter Krempa <pkrempa@redhat.com>
0a7476
(cherry picked from commit 444c5e7c432961c7ecd59b2627dfb69ce787a22a)
0a7476
0a7476
Partially-Resolves: https://bugzilla.redhat.com/1658198
0a7476
Signed-off-by: Laine Stump <laine@redhat.com>
0a7476
Signed-off-by: Laine Stump <laine@laine.org>
0a7476
Message-Id: <20190411191453.24055-39-laine@redhat.com>
0a7476
Acked-by: Michal Privoznik <mprivozn@redhat.com>
0a7476
---
0a7476
 src/qemu/qemu_hotplug.c | 27 ++++++++++++++++++---------
0a7476
 1 file changed, 18 insertions(+), 9 deletions(-)
0a7476
0a7476
diff --git a/src/qemu/qemu_hotplug.c b/src/qemu/qemu_hotplug.c
0a7476
index 482111c46e..390fc36cf6 100644
0a7476
--- a/src/qemu/qemu_hotplug.c
0a7476
+++ b/src/qemu/qemu_hotplug.c
0a7476
@@ -4665,19 +4665,28 @@ qemuDomainRemoveAuditDevice(virDomainObjPtr vm,
0a7476
     case VIR_DOMAIN_DEVICE_HOSTDEV:
0a7476
         virDomainAuditHostdev(vm, detach->data.hostdev, "detach", success);
0a7476
         break;
0a7476
-
0a7476
     case VIR_DOMAIN_DEVICE_INPUT:
0a7476
+        virDomainAuditInput(vm, detach->data.input, "detach", success);
0a7476
+        break;
0a7476
     case VIR_DOMAIN_DEVICE_CHR:
0a7476
+        virDomainAuditChardev(vm, detach->data.chr, NULL, "detach", success);
0a7476
+        break;
0a7476
     case VIR_DOMAIN_DEVICE_RNG:
0a7476
-    case VIR_DOMAIN_DEVICE_MEMORY:
0a7476
-    case VIR_DOMAIN_DEVICE_SHMEM:
0a7476
-    case VIR_DOMAIN_DEVICE_REDIRDEV:
0a7476
-       /*
0a7476
-        * These devices are supposed to be audited, but current code
0a7476
-        * doesn't audit on failure to remove the device.
0a7476
-        */
0a7476
-       break;
0a7476
+        virDomainAuditRNG(vm, detach->data.rng, NULL, "detach", success);
0a7476
+        break;
0a7476
+    case VIR_DOMAIN_DEVICE_MEMORY: {
0a7476
+        unsigned long long oldmem = virDomainDefGetMemoryTotal(vm->def);
0a7476
+        unsigned long long newmem = oldmem - detach->data.memory->size;
0a7476
 
0a7476
+        virDomainAuditMemory(vm, oldmem, newmem, "update", success);
0a7476
+        break;
0a7476
+    }
0a7476
+    case VIR_DOMAIN_DEVICE_SHMEM:
0a7476
+        virDomainAuditShmem(vm, detach->data.shmem, "detach", success);
0a7476
+        break;
0a7476
+    case VIR_DOMAIN_DEVICE_REDIRDEV:
0a7476
+        virDomainAuditRedirdev(vm, detach->data.redirdev, "detach", success);
0a7476
+        break;
0a7476
 
0a7476
     case VIR_DOMAIN_DEVICE_LEASE:
0a7476
     case VIR_DOMAIN_DEVICE_CONTROLLER:
0a7476
-- 
0a7476
2.21.0
0a7476