blob: 82c73c36b3a6df7c11e5ce899393cc0692469819 [file] [log] [blame]
// SPDX-License-Identifier: MIT
// Build:
//
// ```
// cd netlink-sys
// cargo build --example audit_events
// ```
//
// Run *as root*:
//
// ```
// ../target/debug/examples/audit_events
// ```
use std::process;
use netlink_packet_audit::{
AuditMessage, NetlinkBuffer, NetlinkMessage, StatusMessage, NLM_F_ACK,
NLM_F_REQUEST,
};
use netlink_sys::{protocols::NETLINK_AUDIT, Socket, SocketAddr};
pub const AUDIT_STATUS_ENABLED: u32 = 1;
pub const AUDIT_STATUS_PID: u32 = 4;
fn main() {
let kernel_unicast: SocketAddr = SocketAddr::new(0, 0);
let socket = Socket::new(NETLINK_AUDIT).unwrap();
let mut status = StatusMessage::new();
status.enabled = 1;
status.pid = process::id();
status.mask = AUDIT_STATUS_ENABLED | AUDIT_STATUS_PID;
let payload = AuditMessage::SetStatus(status);
let mut nl_msg = NetlinkMessage::from(payload);
nl_msg.header.flags = NLM_F_REQUEST | NLM_F_ACK;
nl_msg.finalize();
let mut buf = vec![0; 1024 * 8];
nl_msg.serialize(&mut buf[..nl_msg.buffer_len()]);
socket
.send_to(&buf[..nl_msg.buffer_len()], &kernel_unicast, 0)
.unwrap();
let mut buf = vec![0; 1024 * 8];
loop {
let (n, _addr) = socket.recv_from(&mut buf, 0).unwrap();
// This dance with the NetlinkBuffer should not be
// necessary. It is here to work around a netlink bug. See:
// https://github.com/mozilla/libaudit-go/issues/24
// https://github.com/linux-audit/audit-userspace/issues/78
{
let mut nl_buf = NetlinkBuffer::new(&mut buf[0..n]);
if n != nl_buf.length() as usize {
nl_buf.set_length(n as u32);
}
}
let parsed =
NetlinkMessage::<AuditMessage>::deserialize(&buf[0..n]).unwrap();
println!("<<< {parsed:?}");
}
}