xref: /freebsd/sys/bsm/audit.h (revision 525fe93dc7487a1e63a90f6a2b956abc601963c1)
1 /*-
2  * SPDX-License-Identifier: BSD-3-Clause
3  *
4  * Copyright (c) 2005-2009 Apple Inc.
5  * Copyright (c) 2016 Robert N. M. Watson
6  * All rights reserved.
7  *
8  * Portions of this software were developed by BAE Systems, the University of
9  * Cambridge Computer Laboratory, and Memorial University under DARPA/AFRL
10  * contract FA8650-15-C-7558 ("CADETS"), as part of the DARPA Transparent
11  * Computing (TC) research program.
12  *
13  * Redistribution and use in source and binary forms, with or without
14  * modification, are permitted provided that the following conditions
15  * are met:
16  *
17  * 1.  Redistributions of source code must retain the above copyright
18  *     notice, this list of conditions and the following disclaimer.
19  * 2.  Redistributions in binary form must reproduce the above copyright
20  *     notice, this list of conditions and the following disclaimer in the
21  *     documentation and/or other materials provided with the distribution.
22  * 3.  Neither the name of Apple Inc. ("Apple") nor the names of
23  *     its contributors may be used to endorse or promote products derived
24  *     from this software without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
27  * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
28  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
29  * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
30  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
31  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
32  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
33  * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36  */
37 
38 #ifndef	_BSM_AUDIT_H
39 #define	_BSM_AUDIT_H
40 
41 #include <sys/param.h>
42 #include <sys/types.h>
43 
44 #define	AUDIT_RECORD_MAGIC	0x828a0f1b
45 #define	MAX_AUDIT_RECORDS	20
46 #define	MAXAUDITDATA		(0x8000 - 1)
47 #define	MAX_AUDIT_RECORD_SIZE	MAXAUDITDATA
48 #define	MIN_AUDIT_FILE_SIZE	(512 * 1024)
49 
50 /*
51  * Minimum noumber of free blocks on the filesystem containing the audit
52  * log necessary to avoid a hard log rotation. DO NOT SET THIS VALUE TO 0
53  * as the kernel does an unsigned compare, plus we want to leave a few blocks
54  * free so userspace can terminate the log, etc.
55  */
56 #define	AUDIT_HARD_LIMIT_FREE_BLOCKS	4
57 
58 /*
59  * Triggers for the audit daemon.
60  */
61 #define	AUDIT_TRIGGER_MIN		1
62 #define	AUDIT_TRIGGER_LOW_SPACE		1	/* Below low watermark. */
63 #define	AUDIT_TRIGGER_ROTATE_KERNEL	2	/* Kernel requests rotate. */
64 #define	AUDIT_TRIGGER_READ_FILE		3	/* Re-read config file. */
65 #define	AUDIT_TRIGGER_CLOSE_AND_DIE	4	/* Terminate audit. */
66 #define	AUDIT_TRIGGER_NO_SPACE		5	/* Below min free space. */
67 #define	AUDIT_TRIGGER_ROTATE_USER	6	/* User requests rotate. */
68 #define	AUDIT_TRIGGER_INITIALIZE	7	/* User initialize of auditd. */
69 #define	AUDIT_TRIGGER_EXPIRE_TRAILS	8	/* User expiration of trails. */
70 #define	AUDIT_TRIGGER_MAX		8
71 
72 /*
73  * The special device filename (FreeBSD).
74  */
75 #define	AUDITDEV_FILENAME	"audit"
76 #define	AUDIT_TRIGGER_FILE	("/dev/" AUDITDEV_FILENAME)
77 
78 /*
79  * Pre-defined audit IDs
80  */
81 #define	AU_DEFAUDITID	(uid_t)(-1)
82 #define	AU_DEFAUDITSID	 0
83 #define	AU_ASSIGN_ASID	-1
84 
85 /*
86  * IPC types.
87  */
88 #define	AT_IPC_MSG	((u_char)1)	/* Message IPC id. */
89 #define	AT_IPC_SEM	((u_char)2)	/* Semaphore IPC id. */
90 #define	AT_IPC_SHM	((u_char)3)	/* Shared mem IPC id. */
91 
92 /*
93  * Audit conditions.
94  */
95 #define	AUC_UNSET		0
96 #define	AUC_AUDITING		1
97 #define	AUC_NOAUDIT		2
98 #define	AUC_DISABLED		-1
99 
100 /*
101  * auditon(2) commands.
102  */
103 #define	A_OLDGETPOLICY	2
104 #define	A_OLDSETPOLICY	3
105 #define	A_GETKMASK	4
106 #define	A_SETKMASK	5
107 #define	A_OLDGETQCTRL	6
108 #define	A_OLDSETQCTRL	7
109 #define	A_GETCWD	8
110 #define	A_GETCAR	9
111 #define	A_GETSTAT	12
112 #define	A_SETSTAT	13
113 #define	A_SETUMASK	14
114 #define	A_SETSMASK	15
115 #define	A_OLDGETCOND	20
116 #define	A_OLDSETCOND	21
117 #define	A_GETCLASS	22
118 #define	A_SETCLASS	23
119 #define	A_GETPINFO	24
120 #define	A_SETPMASK	25
121 #define	A_SETFSIZE	26
122 #define	A_GETFSIZE	27
123 #define	A_GETPINFO_ADDR	28
124 #define	A_GETKAUDIT	29
125 #define	A_SETKAUDIT	30
126 #define	A_SENDTRIGGER	31
127 #define	A_GETSINFO_ADDR	32
128 #define	A_GETPOLICY	33
129 #define	A_SETPOLICY	34
130 #define	A_GETQCTRL	35
131 #define	A_SETQCTRL	36
132 #define	A_GETCOND	37
133 #define	A_SETCOND	38
134 #define	A_GETEVENT	39	/* Get audit event-to-name mapping. */
135 #define	A_SETEVENT	40	/* Set audit event-to-name mapping. */
136 
137 /*
138  * Audit policy controls.
139  */
140 #define	AUDIT_CNT	0x0001
141 #define	AUDIT_AHLT	0x0002
142 #define	AUDIT_ARGV	0x0004
143 #define	AUDIT_ARGE	0x0008
144 #define	AUDIT_SEQ	0x0010
145 #define	AUDIT_WINDATA	0x0020
146 #define	AUDIT_USER	0x0040
147 #define	AUDIT_GROUP	0x0080
148 #define	AUDIT_TRAIL	0x0100
149 #define	AUDIT_PATH	0x0200
150 #define	AUDIT_SCNT	0x0400
151 #define	AUDIT_PUBLIC	0x0800
152 #define	AUDIT_ZONENAME	0x1000
153 #define	AUDIT_PERZONE	0x2000
154 
155 /*
156  * Default audit queue control parameters.
157  */
158 #define	AQ_HIWATER	100
159 #define	AQ_MAXHIGH	10000
160 #define	AQ_LOWATER	10
161 #define	AQ_BUFSZ	MAXAUDITDATA
162 #define	AQ_MAXBUFSZ	1048576
163 
164 /*
165  * Default minimum percentage free space on file system.
166  */
167 #define	AU_FS_MINFREE	20
168 
169 /*
170  * Type definitions used indicating the length of variable length addresses
171  * in tokens containing addresses, such as header fields.
172  */
173 #define	AU_IPv4		4
174 #define	AU_IPv6		16
175 
176 __BEGIN_DECLS
177 
178 typedef	uid_t		au_id_t;
179 typedef	pid_t		au_asid_t;
180 typedef	u_int16_t	au_event_t;
181 typedef	u_int16_t	au_emod_t;
182 typedef	u_int32_t	au_class_t;
183 typedef	u_int64_t	au_asflgs_t __attribute__ ((aligned (8)));
184 
185 struct au_tid {
186 	u_int32_t	port;		/* XXX dev_t compatibility */
187 	u_int32_t	machine;
188 };
189 typedef	struct au_tid	au_tid_t;
190 
191 struct au_tid_addr {
192 	u_int32_t	at_port;	/* XXX dev_t compatibility */
193 	u_int32_t	at_type;
194 	u_int32_t	at_addr[4];
195 };
196 typedef	struct au_tid_addr	au_tid_addr_t;
197 
198 struct au_mask {
199 	unsigned int    am_success;     /* Success bits. */
200 	unsigned int    am_failure;     /* Failure bits. */
201 };
202 typedef	struct au_mask	au_mask_t;
203 
204 struct auditinfo {
205 	au_id_t		ai_auid;	/* Audit user ID. */
206 	au_mask_t	ai_mask;	/* Audit masks. */
207 	au_tid_t	ai_termid;	/* Terminal ID. */
208 	au_asid_t	ai_asid;	/* Audit session ID. */
209 };
210 typedef	struct auditinfo	auditinfo_t;
211 
212 struct auditinfo_addr {
213 	au_id_t		ai_auid;	/* Audit user ID. */
214 	au_mask_t	ai_mask;	/* Audit masks. */
215 	au_tid_addr_t	ai_termid;	/* Terminal ID. */
216 	au_asid_t	ai_asid;	/* Audit session ID. */
217 	au_asflgs_t	ai_flags;	/* Audit session flags. */
218 };
219 typedef	struct auditinfo_addr	auditinfo_addr_t;
220 
221 struct auditpinfo {
222 	pid_t		ap_pid;		/* ID of target process. */
223 	au_id_t		ap_auid;	/* Audit user ID. */
224 	au_mask_t	ap_mask;	/* Audit masks. */
225 	au_tid_t	ap_termid;	/* Terminal ID. */
226 	au_asid_t	ap_asid;	/* Audit session ID. */
227 };
228 typedef	struct auditpinfo	auditpinfo_t;
229 
230 struct auditpinfo_addr {
231 	pid_t		ap_pid;		/* ID of target process. */
232 	au_id_t		ap_auid;	/* Audit user ID. */
233 	au_mask_t	ap_mask;	/* Audit masks. */
234 	au_tid_addr_t	ap_termid;	/* Terminal ID. */
235 	au_asid_t	ap_asid;	/* Audit session ID. */
236 	au_asflgs_t	ap_flags;	/* Audit session flags. */
237 };
238 typedef	struct auditpinfo_addr	auditpinfo_addr_t;
239 
240 struct au_session {
241 	auditinfo_addr_t	*as_aia_p;	/* Ptr to full audit info. */
242 	au_mask_t		 as_mask;	/* Process Audit Masks. */
243 };
244 typedef struct au_session       au_session_t;
245 
246 /*
247  * Contents of token_t are opaque outside of libbsm.
248  */
249 typedef	struct au_token	token_t;
250 
251 /*
252  * Kernel audit queue control parameters:
253  * 			Default:		Maximum:
254  * 	aq_hiwater:	AQ_HIWATER (100)	AQ_MAXHIGH (10000)
255  * 	aq_lowater:	AQ_LOWATER (10)		<aq_hiwater
256  * 	aq_bufsz:	AQ_BUFSZ (32767)	AQ_MAXBUFSZ (1048576)
257  * 	aq_delay:	20			20000 (not used)
258  */
259 struct au_qctrl {
260 	int	aq_hiwater;	/* Max # of audit recs in queue when */
261 				/* threads with new ARs get blocked. */
262 
263 	int	aq_lowater;	/* # of audit recs in queue when */
264 				/* blocked threads get unblocked. */
265 
266 	int	aq_bufsz;	/* Max size of audit record for audit(2). */
267 	int	aq_delay;	/* Queue delay (not used). */
268 	int	aq_minfree;	/* Minimum filesystem percent free space. */
269 };
270 typedef	struct au_qctrl	au_qctrl_t;
271 
272 /*
273  * Structure for the audit statistics.
274  */
275 struct audit_stat {
276 	unsigned int	as_version;
277 	unsigned int	as_numevent;
278 	int		as_generated;
279 	int		as_nonattrib;
280 	int		as_kernel;
281 	int		as_audit;
282 	int		as_auditctl;
283 	int		as_enqueue;
284 	int		as_written;
285 	int		as_wblocked;
286 	int		as_rblocked;
287 	int		as_dropped;
288 	int		as_totalsize;
289 	unsigned int	as_memused;
290 };
291 typedef	struct audit_stat	au_stat_t;
292 
293 /*
294  * Structure for the audit file statistics.
295  */
296 struct audit_fstat {
297 	u_int64_t	af_filesz;
298 	u_int64_t	af_currsz;
299 };
300 typedef	struct audit_fstat	au_fstat_t;
301 
302 /*
303  * Audit to event class mapping.
304  */
305 struct au_evclass_map {
306 	au_event_t	ec_number;
307 	au_class_t	ec_class;
308 };
309 typedef	struct au_evclass_map	au_evclass_map_t;
310 
311 /*
312  * Event-to-name mapping.
313  */
314 #define	EVNAMEMAP_NAME_SIZE	64
315 struct au_evname_map {
316 	au_event_t	en_number;
317 	char		en_name[EVNAMEMAP_NAME_SIZE];
318 };
319 typedef struct au_evname_map	au_evname_map_t;
320 
321 /*
322  * Audit system calls.
323  */
324 #if !defined(_KERNEL) && !defined(KERNEL)
325 int	audit(const void *, int);
326 int	auditon(int, void *, int);
327 int	auditctl(const char *);
328 int	getauid(au_id_t *);
329 int	setauid(const au_id_t *);
330 int	getaudit(struct auditinfo *);
331 int	setaudit(const struct auditinfo *);
332 int	getaudit_addr(struct auditinfo_addr *, int);
333 int	setaudit_addr(const struct auditinfo_addr *, int);
334 
335 #ifdef __APPLE_API_PRIVATE
336 #include <mach/port.h>
337 mach_port_name_t audit_session_self(void);
338 au_asid_t	 audit_session_join(mach_port_name_t port);
339 #endif /* __APPLE_API_PRIVATE */
340 
341 #endif /* defined(_KERNEL) || defined(KERNEL) */
342 
343 __END_DECLS
344 
345 #endif /* !_BSM_AUDIT_H */
346