xref: /f-stack/tools/compat/include/bsm/audit.h (revision 1eaf0ac3)
1*1eaf0ac3Slogwang /*-
2*1eaf0ac3Slogwang  * Copyright (c) 2005-2009 Apple Inc.
3*1eaf0ac3Slogwang  * All rights reserved.
4*1eaf0ac3Slogwang  *
5*1eaf0ac3Slogwang  * Redistribution and use in source and binary forms, with or without
6*1eaf0ac3Slogwang  * modification, are permitted provided that the following conditions
7*1eaf0ac3Slogwang  * are met:
8*1eaf0ac3Slogwang  *
9*1eaf0ac3Slogwang  * 1.  Redistributions of source code must retain the above copyright
10*1eaf0ac3Slogwang  *     notice, this list of conditions and the following disclaimer.
11*1eaf0ac3Slogwang  * 2.  Redistributions in binary form must reproduce the above copyright
12*1eaf0ac3Slogwang  *     notice, this list of conditions and the following disclaimer in the
13*1eaf0ac3Slogwang  *     documentation and/or other materials provided with the distribution.
14*1eaf0ac3Slogwang  * 3.  Neither the name of Apple Inc. ("Apple") nor the names of
15*1eaf0ac3Slogwang  *     its contributors may be used to endorse or promote products derived
16*1eaf0ac3Slogwang  *     from this software without specific prior written permission.
17*1eaf0ac3Slogwang  *
18*1eaf0ac3Slogwang  * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
19*1eaf0ac3Slogwang  * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20*1eaf0ac3Slogwang  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
21*1eaf0ac3Slogwang  * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
22*1eaf0ac3Slogwang  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
23*1eaf0ac3Slogwang  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
24*1eaf0ac3Slogwang  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
25*1eaf0ac3Slogwang  * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26*1eaf0ac3Slogwang  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27*1eaf0ac3Slogwang  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28*1eaf0ac3Slogwang  *
29*1eaf0ac3Slogwang  * $FreeBSD$
30*1eaf0ac3Slogwang  */
31*1eaf0ac3Slogwang 
32*1eaf0ac3Slogwang #ifndef	_BSM_AUDIT_H
33*1eaf0ac3Slogwang #define	_BSM_AUDIT_H
34*1eaf0ac3Slogwang 
35*1eaf0ac3Slogwang #include <sys/param.h>
36*1eaf0ac3Slogwang #include <sys/types.h>
37*1eaf0ac3Slogwang 
38*1eaf0ac3Slogwang #define	AUDIT_RECORD_MAGIC	0x828a0f1b
39*1eaf0ac3Slogwang #define	MAX_AUDIT_RECORDS	20
40*1eaf0ac3Slogwang #define	MAXAUDITDATA		(0x8000 - 1)
41*1eaf0ac3Slogwang #define	MAX_AUDIT_RECORD_SIZE	MAXAUDITDATA
42*1eaf0ac3Slogwang #define	MIN_AUDIT_FILE_SIZE	(512 * 1024)
43*1eaf0ac3Slogwang 
44*1eaf0ac3Slogwang /*
45*1eaf0ac3Slogwang  * Minimum noumber of free blocks on the filesystem containing the audit
46*1eaf0ac3Slogwang  * log necessary to avoid a hard log rotation. DO NOT SET THIS VALUE TO 0
47*1eaf0ac3Slogwang  * as the kernel does an unsigned compare, plus we want to leave a few blocks
48*1eaf0ac3Slogwang  * free so userspace can terminate the log, etc.
49*1eaf0ac3Slogwang  */
50*1eaf0ac3Slogwang #define	AUDIT_HARD_LIMIT_FREE_BLOCKS	4
51*1eaf0ac3Slogwang 
52*1eaf0ac3Slogwang /*
53*1eaf0ac3Slogwang  * Triggers for the audit daemon.
54*1eaf0ac3Slogwang  */
55*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_MIN		1
56*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_LOW_SPACE		1	/* Below low watermark. */
57*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_ROTATE_KERNEL	2	/* Kernel requests rotate. */
58*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_READ_FILE		3	/* Re-read config file. */
59*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_CLOSE_AND_DIE	4	/* Terminate audit. */
60*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_NO_SPACE		5	/* Below min free space. */
61*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_ROTATE_USER	6	/* User requests rotate. */
62*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_INITIALIZE	7	/* User initialize of auditd. */
63*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_EXPIRE_TRAILS	8	/* User expiration of trails. */
64*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_MAX		8
65*1eaf0ac3Slogwang 
66*1eaf0ac3Slogwang /*
67*1eaf0ac3Slogwang  * The special device filename (FreeBSD).
68*1eaf0ac3Slogwang  */
69*1eaf0ac3Slogwang #define	AUDITDEV_FILENAME	"audit"
70*1eaf0ac3Slogwang #define	AUDIT_TRIGGER_FILE	("/dev/" AUDITDEV_FILENAME)
71*1eaf0ac3Slogwang 
72*1eaf0ac3Slogwang /*
73*1eaf0ac3Slogwang  * Pre-defined audit IDs
74*1eaf0ac3Slogwang  */
75*1eaf0ac3Slogwang #define	AU_DEFAUDITID	(uid_t)(-1)
76*1eaf0ac3Slogwang #define	AU_DEFAUDITSID	 0
77*1eaf0ac3Slogwang #define	AU_ASSIGN_ASID	-1
78*1eaf0ac3Slogwang 
79*1eaf0ac3Slogwang /*
80*1eaf0ac3Slogwang  * IPC types.
81*1eaf0ac3Slogwang  */
82*1eaf0ac3Slogwang #define	AT_IPC_MSG	((u_char)1)	/* Message IPC id. */
83*1eaf0ac3Slogwang #define	AT_IPC_SEM	((u_char)2)	/* Semaphore IPC id. */
84*1eaf0ac3Slogwang #define	AT_IPC_SHM	((u_char)3)	/* Shared mem IPC id. */
85*1eaf0ac3Slogwang 
86*1eaf0ac3Slogwang /*
87*1eaf0ac3Slogwang  * Audit conditions.
88*1eaf0ac3Slogwang  */
89*1eaf0ac3Slogwang #define	AUC_UNSET		0
90*1eaf0ac3Slogwang #define	AUC_AUDITING		1
91*1eaf0ac3Slogwang #define	AUC_NOAUDIT		2
92*1eaf0ac3Slogwang #define	AUC_DISABLED		-1
93*1eaf0ac3Slogwang 
94*1eaf0ac3Slogwang /*
95*1eaf0ac3Slogwang  * auditon(2) commands.
96*1eaf0ac3Slogwang  */
97*1eaf0ac3Slogwang #define	A_OLDGETPOLICY	2
98*1eaf0ac3Slogwang #define	A_OLDSETPOLICY	3
99*1eaf0ac3Slogwang #define	A_GETKMASK	4
100*1eaf0ac3Slogwang #define	A_SETKMASK	5
101*1eaf0ac3Slogwang #define	A_OLDGETQCTRL	6
102*1eaf0ac3Slogwang #define	A_OLDSETQCTRL	7
103*1eaf0ac3Slogwang #define	A_GETCWD	8
104*1eaf0ac3Slogwang #define	A_GETCAR	9
105*1eaf0ac3Slogwang #define	A_GETSTAT	12
106*1eaf0ac3Slogwang #define	A_SETSTAT	13
107*1eaf0ac3Slogwang #define	A_SETUMASK	14
108*1eaf0ac3Slogwang #define	A_SETSMASK	15
109*1eaf0ac3Slogwang #define	A_OLDGETCOND	20
110*1eaf0ac3Slogwang #define	A_OLDSETCOND	21
111*1eaf0ac3Slogwang #define	A_GETCLASS	22
112*1eaf0ac3Slogwang #define	A_SETCLASS	23
113*1eaf0ac3Slogwang #define	A_GETPINFO	24
114*1eaf0ac3Slogwang #define	A_SETPMASK	25
115*1eaf0ac3Slogwang #define	A_SETFSIZE	26
116*1eaf0ac3Slogwang #define	A_GETFSIZE	27
117*1eaf0ac3Slogwang #define	A_GETPINFO_ADDR	28
118*1eaf0ac3Slogwang #define	A_GETKAUDIT	29
119*1eaf0ac3Slogwang #define	A_SETKAUDIT	30
120*1eaf0ac3Slogwang #define	A_SENDTRIGGER	31
121*1eaf0ac3Slogwang #define	A_GETSINFO_ADDR	32
122*1eaf0ac3Slogwang #define	A_GETPOLICY	33
123*1eaf0ac3Slogwang #define	A_SETPOLICY	34
124*1eaf0ac3Slogwang #define	A_GETQCTRL	35
125*1eaf0ac3Slogwang #define	A_SETQCTRL	36
126*1eaf0ac3Slogwang #define	A_GETCOND	37
127*1eaf0ac3Slogwang #define	A_SETCOND	38
128*1eaf0ac3Slogwang 
129*1eaf0ac3Slogwang /*
130*1eaf0ac3Slogwang  * Audit policy controls.
131*1eaf0ac3Slogwang  */
132*1eaf0ac3Slogwang #define	AUDIT_CNT	0x0001
133*1eaf0ac3Slogwang #define	AUDIT_AHLT	0x0002
134*1eaf0ac3Slogwang #define	AUDIT_ARGV	0x0004
135*1eaf0ac3Slogwang #define	AUDIT_ARGE	0x0008
136*1eaf0ac3Slogwang #define	AUDIT_SEQ	0x0010
137*1eaf0ac3Slogwang #define	AUDIT_WINDATA	0x0020
138*1eaf0ac3Slogwang #define	AUDIT_USER	0x0040
139*1eaf0ac3Slogwang #define	AUDIT_GROUP	0x0080
140*1eaf0ac3Slogwang #define	AUDIT_TRAIL	0x0100
141*1eaf0ac3Slogwang #define	AUDIT_PATH	0x0200
142*1eaf0ac3Slogwang #define	AUDIT_SCNT	0x0400
143*1eaf0ac3Slogwang #define	AUDIT_PUBLIC	0x0800
144*1eaf0ac3Slogwang #define	AUDIT_ZONENAME	0x1000
145*1eaf0ac3Slogwang #define	AUDIT_PERZONE	0x2000
146*1eaf0ac3Slogwang 
147*1eaf0ac3Slogwang /*
148*1eaf0ac3Slogwang  * Default audit queue control parameters.
149*1eaf0ac3Slogwang  */
150*1eaf0ac3Slogwang #define	AQ_HIWATER	100
151*1eaf0ac3Slogwang #define	AQ_MAXHIGH	10000
152*1eaf0ac3Slogwang #define	AQ_LOWATER	10
153*1eaf0ac3Slogwang #define	AQ_BUFSZ	MAXAUDITDATA
154*1eaf0ac3Slogwang #define	AQ_MAXBUFSZ	1048576
155*1eaf0ac3Slogwang 
156*1eaf0ac3Slogwang /*
157*1eaf0ac3Slogwang  * Default minimum percentage free space on file system.
158*1eaf0ac3Slogwang  */
159*1eaf0ac3Slogwang #define	AU_FS_MINFREE	20
160*1eaf0ac3Slogwang 
161*1eaf0ac3Slogwang /*
162*1eaf0ac3Slogwang  * Type definitions used indicating the length of variable length addresses
163*1eaf0ac3Slogwang  * in tokens containing addresses, such as header fields.
164*1eaf0ac3Slogwang  */
165*1eaf0ac3Slogwang #define	AU_IPv4		4
166*1eaf0ac3Slogwang #define	AU_IPv6		16
167*1eaf0ac3Slogwang 
168*1eaf0ac3Slogwang __BEGIN_DECLS
169*1eaf0ac3Slogwang 
170*1eaf0ac3Slogwang typedef	uid_t		au_id_t;
171*1eaf0ac3Slogwang typedef	pid_t		au_asid_t;
172*1eaf0ac3Slogwang typedef	u_int16_t	au_event_t;
173*1eaf0ac3Slogwang typedef	u_int16_t	au_emod_t;
174*1eaf0ac3Slogwang typedef	u_int32_t	au_class_t;
175*1eaf0ac3Slogwang typedef	u_int64_t	au_asflgs_t __attribute__ ((aligned (8)));
176*1eaf0ac3Slogwang 
177*1eaf0ac3Slogwang struct au_tid {
178*1eaf0ac3Slogwang 	dev_t		port;
179*1eaf0ac3Slogwang 	u_int32_t	machine;
180*1eaf0ac3Slogwang };
181*1eaf0ac3Slogwang typedef	struct au_tid	au_tid_t;
182*1eaf0ac3Slogwang 
183*1eaf0ac3Slogwang struct au_tid_addr {
184*1eaf0ac3Slogwang 	dev_t		at_port;
185*1eaf0ac3Slogwang 	u_int32_t	at_type;
186*1eaf0ac3Slogwang 	u_int32_t	at_addr[4];
187*1eaf0ac3Slogwang };
188*1eaf0ac3Slogwang typedef	struct au_tid_addr	au_tid_addr_t;
189*1eaf0ac3Slogwang 
190*1eaf0ac3Slogwang struct au_mask {
191*1eaf0ac3Slogwang 	unsigned int    am_success;     /* Success bits. */
192*1eaf0ac3Slogwang 	unsigned int    am_failure;     /* Failure bits. */
193*1eaf0ac3Slogwang };
194*1eaf0ac3Slogwang typedef	struct au_mask	au_mask_t;
195*1eaf0ac3Slogwang 
196*1eaf0ac3Slogwang struct auditinfo {
197*1eaf0ac3Slogwang 	au_id_t		ai_auid;	/* Audit user ID. */
198*1eaf0ac3Slogwang 	au_mask_t	ai_mask;	/* Audit masks. */
199*1eaf0ac3Slogwang 	au_tid_t	ai_termid;	/* Terminal ID. */
200*1eaf0ac3Slogwang 	au_asid_t	ai_asid;	/* Audit session ID. */
201*1eaf0ac3Slogwang };
202*1eaf0ac3Slogwang typedef	struct auditinfo	auditinfo_t;
203*1eaf0ac3Slogwang 
204*1eaf0ac3Slogwang struct auditinfo_addr {
205*1eaf0ac3Slogwang 	au_id_t		ai_auid;	/* Audit user ID. */
206*1eaf0ac3Slogwang 	au_mask_t	ai_mask;	/* Audit masks. */
207*1eaf0ac3Slogwang 	au_tid_addr_t	ai_termid;	/* Terminal ID. */
208*1eaf0ac3Slogwang 	au_asid_t	ai_asid;	/* Audit session ID. */
209*1eaf0ac3Slogwang 	au_asflgs_t	ai_flags;	/* Audit session flags. */
210*1eaf0ac3Slogwang };
211*1eaf0ac3Slogwang typedef	struct auditinfo_addr	auditinfo_addr_t;
212*1eaf0ac3Slogwang 
213*1eaf0ac3Slogwang struct auditpinfo {
214*1eaf0ac3Slogwang 	pid_t		ap_pid;		/* ID of target process. */
215*1eaf0ac3Slogwang 	au_id_t		ap_auid;	/* Audit user ID. */
216*1eaf0ac3Slogwang 	au_mask_t	ap_mask;	/* Audit masks. */
217*1eaf0ac3Slogwang 	au_tid_t	ap_termid;	/* Terminal ID. */
218*1eaf0ac3Slogwang 	au_asid_t	ap_asid;	/* Audit session ID. */
219*1eaf0ac3Slogwang };
220*1eaf0ac3Slogwang typedef	struct auditpinfo	auditpinfo_t;
221*1eaf0ac3Slogwang 
222*1eaf0ac3Slogwang struct auditpinfo_addr {
223*1eaf0ac3Slogwang 	pid_t		ap_pid;		/* ID of target process. */
224*1eaf0ac3Slogwang 	au_id_t		ap_auid;	/* Audit user ID. */
225*1eaf0ac3Slogwang 	au_mask_t	ap_mask;	/* Audit masks. */
226*1eaf0ac3Slogwang 	au_tid_addr_t	ap_termid;	/* Terminal ID. */
227*1eaf0ac3Slogwang 	au_asid_t	ap_asid;	/* Audit session ID. */
228*1eaf0ac3Slogwang 	au_asflgs_t	ap_flags;	/* Audit session flags. */
229*1eaf0ac3Slogwang };
230*1eaf0ac3Slogwang typedef	struct auditpinfo_addr	auditpinfo_addr_t;
231*1eaf0ac3Slogwang 
232*1eaf0ac3Slogwang struct au_session {
233*1eaf0ac3Slogwang 	auditinfo_addr_t	*as_aia_p;	/* Ptr to full audit info. */
234*1eaf0ac3Slogwang 	au_mask_t		 as_mask;	/* Process Audit Masks. */
235*1eaf0ac3Slogwang };
236*1eaf0ac3Slogwang typedef struct au_session       au_session_t;
237*1eaf0ac3Slogwang 
238*1eaf0ac3Slogwang /*
239*1eaf0ac3Slogwang  * Contents of token_t are opaque outside of libbsm.
240*1eaf0ac3Slogwang  */
241*1eaf0ac3Slogwang typedef	struct au_token	token_t;
242*1eaf0ac3Slogwang 
243*1eaf0ac3Slogwang /*
244*1eaf0ac3Slogwang  * Kernel audit queue control parameters:
245*1eaf0ac3Slogwang  * 			Default:		Maximum:
246*1eaf0ac3Slogwang  * 	aq_hiwater:	AQ_HIWATER (100)	AQ_MAXHIGH (10000)
247*1eaf0ac3Slogwang  * 	aq_lowater:	AQ_LOWATER (10)		<aq_hiwater
248*1eaf0ac3Slogwang  * 	aq_bufsz:	AQ_BUFSZ (32767)	AQ_MAXBUFSZ (1048576)
249*1eaf0ac3Slogwang  * 	aq_delay:	20			20000 (not used)
250*1eaf0ac3Slogwang  */
251*1eaf0ac3Slogwang struct au_qctrl {
252*1eaf0ac3Slogwang 	int	aq_hiwater;	/* Max # of audit recs in queue when */
253*1eaf0ac3Slogwang 				/* threads with new ARs get blocked. */
254*1eaf0ac3Slogwang 
255*1eaf0ac3Slogwang 	int	aq_lowater;	/* # of audit recs in queue when */
256*1eaf0ac3Slogwang 				/* blocked threads get unblocked. */
257*1eaf0ac3Slogwang 
258*1eaf0ac3Slogwang 	int	aq_bufsz;	/* Max size of audit record for audit(2). */
259*1eaf0ac3Slogwang 	int	aq_delay;	/* Queue delay (not used). */
260*1eaf0ac3Slogwang 	int	aq_minfree;	/* Minimum filesystem percent free space. */
261*1eaf0ac3Slogwang };
262*1eaf0ac3Slogwang typedef	struct au_qctrl	au_qctrl_t;
263*1eaf0ac3Slogwang 
264*1eaf0ac3Slogwang /*
265*1eaf0ac3Slogwang  * Structure for the audit statistics.
266*1eaf0ac3Slogwang  */
267*1eaf0ac3Slogwang struct audit_stat {
268*1eaf0ac3Slogwang 	unsigned int	as_version;
269*1eaf0ac3Slogwang 	unsigned int	as_numevent;
270*1eaf0ac3Slogwang 	int		as_generated;
271*1eaf0ac3Slogwang 	int		as_nonattrib;
272*1eaf0ac3Slogwang 	int		as_kernel;
273*1eaf0ac3Slogwang 	int		as_audit;
274*1eaf0ac3Slogwang 	int		as_auditctl;
275*1eaf0ac3Slogwang 	int		as_enqueue;
276*1eaf0ac3Slogwang 	int		as_written;
277*1eaf0ac3Slogwang 	int		as_wblocked;
278*1eaf0ac3Slogwang 	int		as_rblocked;
279*1eaf0ac3Slogwang 	int		as_dropped;
280*1eaf0ac3Slogwang 	int		as_totalsize;
281*1eaf0ac3Slogwang 	unsigned int	as_memused;
282*1eaf0ac3Slogwang };
283*1eaf0ac3Slogwang typedef	struct audit_stat	au_stat_t;
284*1eaf0ac3Slogwang 
285*1eaf0ac3Slogwang /*
286*1eaf0ac3Slogwang  * Structure for the audit file statistics.
287*1eaf0ac3Slogwang  */
288*1eaf0ac3Slogwang struct audit_fstat {
289*1eaf0ac3Slogwang 	u_int64_t	af_filesz;
290*1eaf0ac3Slogwang 	u_int64_t	af_currsz;
291*1eaf0ac3Slogwang };
292*1eaf0ac3Slogwang typedef	struct audit_fstat	au_fstat_t;
293*1eaf0ac3Slogwang 
294*1eaf0ac3Slogwang /*
295*1eaf0ac3Slogwang  * Audit to event class mapping.
296*1eaf0ac3Slogwang  */
297*1eaf0ac3Slogwang struct au_evclass_map {
298*1eaf0ac3Slogwang 	au_event_t	ec_number;
299*1eaf0ac3Slogwang 	au_class_t	ec_class;
300*1eaf0ac3Slogwang };
301*1eaf0ac3Slogwang typedef	struct au_evclass_map	au_evclass_map_t;
302*1eaf0ac3Slogwang 
303*1eaf0ac3Slogwang /*
304*1eaf0ac3Slogwang  * Audit system calls.
305*1eaf0ac3Slogwang  */
306*1eaf0ac3Slogwang #if !defined(_KERNEL) && !defined(KERNEL)
307*1eaf0ac3Slogwang int	audit(const void *, int);
308*1eaf0ac3Slogwang int	auditon(int, void *, int);
309*1eaf0ac3Slogwang int	auditctl(const char *);
310*1eaf0ac3Slogwang int	getauid(au_id_t *);
311*1eaf0ac3Slogwang int	setauid(const au_id_t *);
312*1eaf0ac3Slogwang int	getaudit(struct auditinfo *);
313*1eaf0ac3Slogwang int	setaudit(const struct auditinfo *);
314*1eaf0ac3Slogwang int	getaudit_addr(struct auditinfo_addr *, int);
315*1eaf0ac3Slogwang int	setaudit_addr(const struct auditinfo_addr *, int);
316*1eaf0ac3Slogwang 
317*1eaf0ac3Slogwang #ifdef __APPLE_API_PRIVATE
318*1eaf0ac3Slogwang #include <mach/port.h>
319*1eaf0ac3Slogwang mach_port_name_t audit_session_self(void);
320*1eaf0ac3Slogwang au_asid_t	 audit_session_join(mach_port_name_t port);
321*1eaf0ac3Slogwang #endif /* __APPLE_API_PRIVATE */
322*1eaf0ac3Slogwang 
323*1eaf0ac3Slogwang #endif /* defined(_KERNEL) || defined(KERNEL) */
324*1eaf0ac3Slogwang 
325*1eaf0ac3Slogwang __END_DECLS
326*1eaf0ac3Slogwang 
327*1eaf0ac3Slogwang #endif /* !_BSM_AUDIT_H */
328