xref: /OK3568_Linux_fs/kernel/security/apparmor/include/audit.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0-only */
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * AppArmor security module
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * This file contains AppArmor auditing function definitions.
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  * Copyright (C) 1998-2008 Novell/SUSE
8*4882a593Smuzhiyun  * Copyright 2009-2010 Canonical Ltd.
9*4882a593Smuzhiyun  */
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #ifndef __AA_AUDIT_H
12*4882a593Smuzhiyun #define __AA_AUDIT_H
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun #include <linux/audit.h>
15*4882a593Smuzhiyun #include <linux/fs.h>
16*4882a593Smuzhiyun #include <linux/lsm_audit.h>
17*4882a593Smuzhiyun #include <linux/sched.h>
18*4882a593Smuzhiyun #include <linux/slab.h>
19*4882a593Smuzhiyun 
20*4882a593Smuzhiyun #include "file.h"
21*4882a593Smuzhiyun #include "label.h"
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun extern const char *const audit_mode_names[];
24*4882a593Smuzhiyun #define AUDIT_MAX_INDEX 5
25*4882a593Smuzhiyun enum audit_mode {
26*4882a593Smuzhiyun 	AUDIT_NORMAL,		/* follow normal auditing of accesses */
27*4882a593Smuzhiyun 	AUDIT_QUIET_DENIED,	/* quiet all denied access messages */
28*4882a593Smuzhiyun 	AUDIT_QUIET,		/* quiet all messages */
29*4882a593Smuzhiyun 	AUDIT_NOQUIET,		/* do not quiet audit messages */
30*4882a593Smuzhiyun 	AUDIT_ALL		/* audit all accesses */
31*4882a593Smuzhiyun };
32*4882a593Smuzhiyun 
33*4882a593Smuzhiyun enum audit_type {
34*4882a593Smuzhiyun 	AUDIT_APPARMOR_AUDIT,
35*4882a593Smuzhiyun 	AUDIT_APPARMOR_ALLOWED,
36*4882a593Smuzhiyun 	AUDIT_APPARMOR_DENIED,
37*4882a593Smuzhiyun 	AUDIT_APPARMOR_HINT,
38*4882a593Smuzhiyun 	AUDIT_APPARMOR_STATUS,
39*4882a593Smuzhiyun 	AUDIT_APPARMOR_ERROR,
40*4882a593Smuzhiyun 	AUDIT_APPARMOR_KILL,
41*4882a593Smuzhiyun 	AUDIT_APPARMOR_AUTO
42*4882a593Smuzhiyun };
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun #define OP_NULL NULL
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun #define OP_SYSCTL "sysctl"
47*4882a593Smuzhiyun #define OP_CAPABLE "capable"
48*4882a593Smuzhiyun 
49*4882a593Smuzhiyun #define OP_UNLINK "unlink"
50*4882a593Smuzhiyun #define OP_MKDIR "mkdir"
51*4882a593Smuzhiyun #define OP_RMDIR "rmdir"
52*4882a593Smuzhiyun #define OP_MKNOD "mknod"
53*4882a593Smuzhiyun #define OP_TRUNC "truncate"
54*4882a593Smuzhiyun #define OP_LINK "link"
55*4882a593Smuzhiyun #define OP_SYMLINK "symlink"
56*4882a593Smuzhiyun #define OP_RENAME_SRC "rename_src"
57*4882a593Smuzhiyun #define OP_RENAME_DEST "rename_dest"
58*4882a593Smuzhiyun #define OP_CHMOD "chmod"
59*4882a593Smuzhiyun #define OP_CHOWN "chown"
60*4882a593Smuzhiyun #define OP_GETATTR "getattr"
61*4882a593Smuzhiyun #define OP_OPEN "open"
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun #define OP_FRECEIVE "file_receive"
64*4882a593Smuzhiyun #define OP_FPERM "file_perm"
65*4882a593Smuzhiyun #define OP_FLOCK "file_lock"
66*4882a593Smuzhiyun #define OP_FMMAP "file_mmap"
67*4882a593Smuzhiyun #define OP_FMPROT "file_mprotect"
68*4882a593Smuzhiyun #define OP_INHERIT "file_inherit"
69*4882a593Smuzhiyun 
70*4882a593Smuzhiyun #define OP_PIVOTROOT "pivotroot"
71*4882a593Smuzhiyun #define OP_MOUNT "mount"
72*4882a593Smuzhiyun #define OP_UMOUNT "umount"
73*4882a593Smuzhiyun 
74*4882a593Smuzhiyun #define OP_CREATE "create"
75*4882a593Smuzhiyun #define OP_POST_CREATE "post_create"
76*4882a593Smuzhiyun #define OP_BIND "bind"
77*4882a593Smuzhiyun #define OP_CONNECT "connect"
78*4882a593Smuzhiyun #define OP_LISTEN "listen"
79*4882a593Smuzhiyun #define OP_ACCEPT "accept"
80*4882a593Smuzhiyun #define OP_SENDMSG "sendmsg"
81*4882a593Smuzhiyun #define OP_RECVMSG "recvmsg"
82*4882a593Smuzhiyun #define OP_GETSOCKNAME "getsockname"
83*4882a593Smuzhiyun #define OP_GETPEERNAME "getpeername"
84*4882a593Smuzhiyun #define OP_GETSOCKOPT "getsockopt"
85*4882a593Smuzhiyun #define OP_SETSOCKOPT "setsockopt"
86*4882a593Smuzhiyun #define OP_SHUTDOWN "socket_shutdown"
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun #define OP_PTRACE "ptrace"
89*4882a593Smuzhiyun #define OP_SIGNAL "signal"
90*4882a593Smuzhiyun 
91*4882a593Smuzhiyun #define OP_EXEC "exec"
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun #define OP_CHANGE_HAT "change_hat"
94*4882a593Smuzhiyun #define OP_CHANGE_PROFILE "change_profile"
95*4882a593Smuzhiyun #define OP_CHANGE_ONEXEC "change_onexec"
96*4882a593Smuzhiyun #define OP_STACK "stack"
97*4882a593Smuzhiyun #define OP_STACK_ONEXEC "stack_onexec"
98*4882a593Smuzhiyun 
99*4882a593Smuzhiyun #define OP_SETPROCATTR "setprocattr"
100*4882a593Smuzhiyun #define OP_SETRLIMIT "setrlimit"
101*4882a593Smuzhiyun 
102*4882a593Smuzhiyun #define OP_PROF_REPL "profile_replace"
103*4882a593Smuzhiyun #define OP_PROF_LOAD "profile_load"
104*4882a593Smuzhiyun #define OP_PROF_RM "profile_remove"
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun 
107*4882a593Smuzhiyun struct apparmor_audit_data {
108*4882a593Smuzhiyun 	int error;
109*4882a593Smuzhiyun 	int type;
110*4882a593Smuzhiyun 	const char *op;
111*4882a593Smuzhiyun 	struct aa_label *label;
112*4882a593Smuzhiyun 	const char *name;
113*4882a593Smuzhiyun 	const char *info;
114*4882a593Smuzhiyun 	u32 request;
115*4882a593Smuzhiyun 	u32 denied;
116*4882a593Smuzhiyun 	union {
117*4882a593Smuzhiyun 		/* these entries require a custom callback fn */
118*4882a593Smuzhiyun 		struct {
119*4882a593Smuzhiyun 			struct aa_label *peer;
120*4882a593Smuzhiyun 			union {
121*4882a593Smuzhiyun 				struct {
122*4882a593Smuzhiyun 					const char *target;
123*4882a593Smuzhiyun 					kuid_t ouid;
124*4882a593Smuzhiyun 				} fs;
125*4882a593Smuzhiyun 				struct {
126*4882a593Smuzhiyun 					int rlim;
127*4882a593Smuzhiyun 					unsigned long max;
128*4882a593Smuzhiyun 				} rlim;
129*4882a593Smuzhiyun 				struct {
130*4882a593Smuzhiyun 					int signal;
131*4882a593Smuzhiyun 					int unmappedsig;
132*4882a593Smuzhiyun 				};
133*4882a593Smuzhiyun 				struct {
134*4882a593Smuzhiyun 					int type, protocol;
135*4882a593Smuzhiyun 					struct sock *peer_sk;
136*4882a593Smuzhiyun 					void *addr;
137*4882a593Smuzhiyun 					int addrlen;
138*4882a593Smuzhiyun 				} net;
139*4882a593Smuzhiyun 			};
140*4882a593Smuzhiyun 		};
141*4882a593Smuzhiyun 		struct {
142*4882a593Smuzhiyun 			struct aa_profile *profile;
143*4882a593Smuzhiyun 			const char *ns;
144*4882a593Smuzhiyun 			long pos;
145*4882a593Smuzhiyun 		} iface;
146*4882a593Smuzhiyun 		struct {
147*4882a593Smuzhiyun 			const char *src_name;
148*4882a593Smuzhiyun 			const char *type;
149*4882a593Smuzhiyun 			const char *trans;
150*4882a593Smuzhiyun 			const char *data;
151*4882a593Smuzhiyun 			unsigned long flags;
152*4882a593Smuzhiyun 		} mnt;
153*4882a593Smuzhiyun 	};
154*4882a593Smuzhiyun };
155*4882a593Smuzhiyun 
156*4882a593Smuzhiyun /* macros for dealing with  apparmor_audit_data structure */
157*4882a593Smuzhiyun #define aad(SA) ((SA)->apparmor_audit_data)
158*4882a593Smuzhiyun #define DEFINE_AUDIT_DATA(NAME, T, X)					\
159*4882a593Smuzhiyun 	/* TODO: cleanup audit init so we don't need _aad = {0,} */	\
160*4882a593Smuzhiyun 	struct apparmor_audit_data NAME ## _aad = { .op = (X), };	\
161*4882a593Smuzhiyun 	struct common_audit_data NAME =					\
162*4882a593Smuzhiyun 	{								\
163*4882a593Smuzhiyun 	.type = (T),							\
164*4882a593Smuzhiyun 	.u.tsk = NULL,							\
165*4882a593Smuzhiyun 	};								\
166*4882a593Smuzhiyun 	NAME.apparmor_audit_data = &(NAME ## _aad)
167*4882a593Smuzhiyun 
168*4882a593Smuzhiyun void aa_audit_msg(int type, struct common_audit_data *sa,
169*4882a593Smuzhiyun 		  void (*cb) (struct audit_buffer *, void *));
170*4882a593Smuzhiyun int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa,
171*4882a593Smuzhiyun 	     void (*cb) (struct audit_buffer *, void *));
172*4882a593Smuzhiyun 
173*4882a593Smuzhiyun #define aa_audit_error(ERROR, SA, CB)				\
174*4882a593Smuzhiyun ({								\
175*4882a593Smuzhiyun 	aad((SA))->error = (ERROR);				\
176*4882a593Smuzhiyun 	aa_audit_msg(AUDIT_APPARMOR_ERROR, (SA), (CB));		\
177*4882a593Smuzhiyun 	aad((SA))->error;					\
178*4882a593Smuzhiyun })
179*4882a593Smuzhiyun 
180*4882a593Smuzhiyun 
complain_error(int error)181*4882a593Smuzhiyun static inline int complain_error(int error)
182*4882a593Smuzhiyun {
183*4882a593Smuzhiyun 	if (error == -EPERM || error == -EACCES)
184*4882a593Smuzhiyun 		return 0;
185*4882a593Smuzhiyun 	return error;
186*4882a593Smuzhiyun }
187*4882a593Smuzhiyun 
188*4882a593Smuzhiyun void aa_audit_rule_free(void *vrule);
189*4882a593Smuzhiyun int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
190*4882a593Smuzhiyun int aa_audit_rule_known(struct audit_krule *rule);
191*4882a593Smuzhiyun int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
192*4882a593Smuzhiyun 
193*4882a593Smuzhiyun #endif /* __AA_AUDIT_H */
194