1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 2005-2009 Apple Inc. 5 * Copyright (c) 2016 Robert N. M. Watson 6 * All rights reserved. 7 * 8 * Portions of this software were developed by BAE Systems, the University of 9 * Cambridge Computer Laboratory, and Memorial University under DARPA/AFRL 10 * contract FA8650-15-C-7558 ("CADETS"), as part of the DARPA Transparent 11 * Computing (TC) research program. 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 17 * 1. Redistributions of source code must retain the above copyright 18 * notice, this list of conditions and the following disclaimer. 19 * 2. Redistributions in binary form must reproduce the above copyright 20 * notice, this list of conditions and the following disclaimer in the 21 * documentation and/or other materials provided with the distribution. 22 * 3. Neither the name of Apple Inc. ("Apple") nor the names of 23 * its contributors may be used to endorse or promote products derived 24 * from this software without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY 27 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 28 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 29 * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY 30 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 31 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 32 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 33 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36 */ 37 38 #ifndef _BSM_AUDIT_H 39 #define _BSM_AUDIT_H 40 41 #include <sys/param.h> 42 #include <sys/types.h> 43 44 #define AUDIT_RECORD_MAGIC 0x828a0f1b 45 #define MAX_AUDIT_RECORDS 20 46 #define MAXAUDITDATA (0x8000 - 1) 47 #define MAX_AUDIT_RECORD_SIZE MAXAUDITDATA 48 #define MIN_AUDIT_FILE_SIZE (512 * 1024) 49 50 /* 51 * Minimum noumber of free blocks on the filesystem containing the audit 52 * log necessary to avoid a hard log rotation. DO NOT SET THIS VALUE TO 0 53 * as the kernel does an unsigned compare, plus we want to leave a few blocks 54 * free so userspace can terminate the log, etc. 55 */ 56 #define AUDIT_HARD_LIMIT_FREE_BLOCKS 4 57 58 /* 59 * Triggers for the audit daemon. 60 */ 61 #define AUDIT_TRIGGER_MIN 1 62 #define AUDIT_TRIGGER_LOW_SPACE 1 /* Below low watermark. */ 63 #define AUDIT_TRIGGER_ROTATE_KERNEL 2 /* Kernel requests rotate. */ 64 #define AUDIT_TRIGGER_READ_FILE 3 /* Re-read config file. */ 65 #define AUDIT_TRIGGER_CLOSE_AND_DIE 4 /* Terminate audit. */ 66 #define AUDIT_TRIGGER_NO_SPACE 5 /* Below min free space. */ 67 #define AUDIT_TRIGGER_ROTATE_USER 6 /* User requests rotate. */ 68 #define AUDIT_TRIGGER_INITIALIZE 7 /* User initialize of auditd. */ 69 #define AUDIT_TRIGGER_EXPIRE_TRAILS 8 /* User expiration of trails. */ 70 #define AUDIT_TRIGGER_MAX 8 71 72 /* 73 * The special device filename (FreeBSD). 74 */ 75 #define AUDITDEV_FILENAME "audit" 76 #define AUDIT_TRIGGER_FILE ("/dev/" AUDITDEV_FILENAME) 77 78 /* 79 * Pre-defined audit IDs 80 */ 81 #define AU_DEFAUDITID (uid_t)(-1) 82 #define AU_DEFAUDITSID 0 83 #define AU_ASSIGN_ASID -1 84 85 /* 86 * IPC types. 87 */ 88 #define AT_IPC_MSG ((u_char)1) /* Message IPC id. */ 89 #define AT_IPC_SEM ((u_char)2) /* Semaphore IPC id. */ 90 #define AT_IPC_SHM ((u_char)3) /* Shared mem IPC id. */ 91 92 /* 93 * Audit conditions. 94 */ 95 #define AUC_UNSET 0 96 #define AUC_AUDITING 1 97 #define AUC_NOAUDIT 2 98 #define AUC_DISABLED -1 99 100 /* 101 * auditon(2) commands. 102 */ 103 #define A_OLDGETPOLICY 2 104 #define A_OLDSETPOLICY 3 105 #define A_GETKMASK 4 106 #define A_SETKMASK 5 107 #define A_OLDGETQCTRL 6 108 #define A_OLDSETQCTRL 7 109 #define A_GETCWD 8 110 #define A_GETCAR 9 111 #define A_GETSTAT 12 112 #define A_SETSTAT 13 113 #define A_SETUMASK 14 114 #define A_SETSMASK 15 115 #define A_OLDGETCOND 20 116 #define A_OLDSETCOND 21 117 #define A_GETCLASS 22 118 #define A_SETCLASS 23 119 #define A_GETPINFO 24 120 #define A_SETPMASK 25 121 #define A_SETFSIZE 26 122 #define A_GETFSIZE 27 123 #define A_GETPINFO_ADDR 28 124 #define A_GETKAUDIT 29 125 #define A_SETKAUDIT 30 126 #define A_SENDTRIGGER 31 127 #define A_GETSINFO_ADDR 32 128 #define A_GETPOLICY 33 129 #define A_SETPOLICY 34 130 #define A_GETQCTRL 35 131 #define A_SETQCTRL 36 132 #define A_GETCOND 37 133 #define A_SETCOND 38 134 #define A_GETEVENT 39 /* Get audit event-to-name mapping. */ 135 #define A_SETEVENT 40 /* Set audit event-to-name mapping. */ 136 137 /* 138 * Audit policy controls. 139 */ 140 #define AUDIT_CNT 0x0001 141 #define AUDIT_AHLT 0x0002 142 #define AUDIT_ARGV 0x0004 143 #define AUDIT_ARGE 0x0008 144 #define AUDIT_SEQ 0x0010 145 #define AUDIT_WINDATA 0x0020 146 #define AUDIT_USER 0x0040 147 #define AUDIT_GROUP 0x0080 148 #define AUDIT_TRAIL 0x0100 149 #define AUDIT_PATH 0x0200 150 #define AUDIT_SCNT 0x0400 151 #define AUDIT_PUBLIC 0x0800 152 #define AUDIT_ZONENAME 0x1000 153 #define AUDIT_PERZONE 0x2000 154 155 /* 156 * Default audit queue control parameters. 157 */ 158 #define AQ_HIWATER 100 159 #define AQ_MAXHIGH 10000 160 #define AQ_LOWATER 10 161 #define AQ_BUFSZ MAXAUDITDATA 162 #define AQ_MAXBUFSZ 1048576 163 164 /* 165 * Default minimum percentage free space on file system. 166 */ 167 #define AU_FS_MINFREE 20 168 169 /* 170 * Type definitions used indicating the length of variable length addresses 171 * in tokens containing addresses, such as header fields. 172 */ 173 #define AU_IPv4 4 174 #define AU_IPv6 16 175 176 __BEGIN_DECLS 177 178 typedef uid_t au_id_t; 179 typedef pid_t au_asid_t; 180 typedef u_int16_t au_event_t; 181 typedef u_int16_t au_emod_t; 182 typedef u_int32_t au_class_t; 183 typedef u_int64_t au_asflgs_t __attribute__ ((aligned (8))); 184 185 struct au_tid { 186 u_int32_t port; /* XXX dev_t compatibility */ 187 u_int32_t machine; 188 }; 189 typedef struct au_tid au_tid_t; 190 191 struct au_tid_addr { 192 u_int32_t at_port; /* XXX dev_t compatibility */ 193 u_int32_t at_type; 194 u_int32_t at_addr[4]; 195 }; 196 typedef struct au_tid_addr au_tid_addr_t; 197 198 struct au_mask { 199 unsigned int am_success; /* Success bits. */ 200 unsigned int am_failure; /* Failure bits. */ 201 }; 202 typedef struct au_mask au_mask_t; 203 204 struct auditinfo { 205 au_id_t ai_auid; /* Audit user ID. */ 206 au_mask_t ai_mask; /* Audit masks. */ 207 au_tid_t ai_termid; /* Terminal ID. */ 208 au_asid_t ai_asid; /* Audit session ID. */ 209 }; 210 typedef struct auditinfo auditinfo_t; 211 212 struct auditinfo_addr { 213 au_id_t ai_auid; /* Audit user ID. */ 214 au_mask_t ai_mask; /* Audit masks. */ 215 au_tid_addr_t ai_termid; /* Terminal ID. */ 216 au_asid_t ai_asid; /* Audit session ID. */ 217 au_asflgs_t ai_flags; /* Audit session flags. */ 218 }; 219 typedef struct auditinfo_addr auditinfo_addr_t; 220 221 struct auditpinfo { 222 pid_t ap_pid; /* ID of target process. */ 223 au_id_t ap_auid; /* Audit user ID. */ 224 au_mask_t ap_mask; /* Audit masks. */ 225 au_tid_t ap_termid; /* Terminal ID. */ 226 au_asid_t ap_asid; /* Audit session ID. */ 227 }; 228 typedef struct auditpinfo auditpinfo_t; 229 230 struct auditpinfo_addr { 231 pid_t ap_pid; /* ID of target process. */ 232 au_id_t ap_auid; /* Audit user ID. */ 233 au_mask_t ap_mask; /* Audit masks. */ 234 au_tid_addr_t ap_termid; /* Terminal ID. */ 235 au_asid_t ap_asid; /* Audit session ID. */ 236 au_asflgs_t ap_flags; /* Audit session flags. */ 237 }; 238 typedef struct auditpinfo_addr auditpinfo_addr_t; 239 240 struct au_session { 241 auditinfo_addr_t *as_aia_p; /* Ptr to full audit info. */ 242 au_mask_t as_mask; /* Process Audit Masks. */ 243 }; 244 typedef struct au_session au_session_t; 245 246 /* 247 * Contents of token_t are opaque outside of libbsm. 248 */ 249 typedef struct au_token token_t; 250 251 /* 252 * Kernel audit queue control parameters: 253 * Default: Maximum: 254 * aq_hiwater: AQ_HIWATER (100) AQ_MAXHIGH (10000) 255 * aq_lowater: AQ_LOWATER (10) <aq_hiwater 256 * aq_bufsz: AQ_BUFSZ (32767) AQ_MAXBUFSZ (1048576) 257 * aq_delay: 20 20000 (not used) 258 */ 259 struct au_qctrl { 260 int aq_hiwater; /* Max # of audit recs in queue when */ 261 /* threads with new ARs get blocked. */ 262 263 int aq_lowater; /* # of audit recs in queue when */ 264 /* blocked threads get unblocked. */ 265 266 int aq_bufsz; /* Max size of audit record for audit(2). */ 267 int aq_delay; /* Queue delay (not used). */ 268 int aq_minfree; /* Minimum filesystem percent free space. */ 269 }; 270 typedef struct au_qctrl au_qctrl_t; 271 272 /* 273 * Structure for the audit statistics. 274 */ 275 struct audit_stat { 276 unsigned int as_version; 277 unsigned int as_numevent; 278 int as_generated; 279 int as_nonattrib; 280 int as_kernel; 281 int as_audit; 282 int as_auditctl; 283 int as_enqueue; 284 int as_written; 285 int as_wblocked; 286 int as_rblocked; 287 int as_dropped; 288 int as_totalsize; 289 unsigned int as_memused; 290 }; 291 typedef struct audit_stat au_stat_t; 292 293 /* 294 * Structure for the audit file statistics. 295 */ 296 struct audit_fstat { 297 u_int64_t af_filesz; 298 u_int64_t af_currsz; 299 }; 300 typedef struct audit_fstat au_fstat_t; 301 302 /* 303 * Audit to event class mapping. 304 */ 305 struct au_evclass_map { 306 au_event_t ec_number; 307 au_class_t ec_class; 308 }; 309 typedef struct au_evclass_map au_evclass_map_t; 310 311 /* 312 * Event-to-name mapping. 313 */ 314 #define EVNAMEMAP_NAME_SIZE 64 315 struct au_evname_map { 316 au_event_t en_number; 317 char en_name[EVNAMEMAP_NAME_SIZE]; 318 }; 319 typedef struct au_evname_map au_evname_map_t; 320 321 /* 322 * Audit system calls. 323 */ 324 #if !defined(_KERNEL) && !defined(KERNEL) 325 int audit(const void *, int); 326 int auditon(int, void *, int); 327 int auditctl(const char *); 328 int getauid(au_id_t *); 329 int setauid(const au_id_t *); 330 int getaudit(struct auditinfo *); 331 int setaudit(const struct auditinfo *); 332 int getaudit_addr(struct auditinfo_addr *, int); 333 int setaudit_addr(const struct auditinfo_addr *, int); 334 335 #ifdef __APPLE_API_PRIVATE 336 #include <mach/port.h> 337 mach_port_name_t audit_session_self(void); 338 au_asid_t audit_session_join(mach_port_name_t port); 339 #endif /* __APPLE_API_PRIVATE */ 340 341 #endif /* defined(_KERNEL) || defined(KERNEL) */ 342 343 __END_DECLS 344 345 #endif /* !_BSM_AUDIT_H */ 346