blob: 18519a4eb67e3cc46c729dd4baba2571fac42cba [file] [log] [blame]
Thomas Gleixnerb886d83c2019-06-01 10:08:55 +02001/* SPDX-License-Identifier: GPL-2.0-only */
John Johansen67012e82010-07-29 14:47:58 -07002/*
3 * AppArmor security module
4 *
5 * This file contains AppArmor auditing function definitions.
6 *
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
John Johansen67012e82010-07-29 14:47:58 -07009 */
10
11#ifndef __AA_AUDIT_H
12#define __AA_AUDIT_H
13
14#include <linux/audit.h>
15#include <linux/fs.h>
16#include <linux/lsm_audit.h>
17#include <linux/sched.h>
18#include <linux/slab.h>
19
20#include "file.h"
John Johansen637f6882017-06-09 08:14:28 -070021#include "label.h"
John Johansen67012e82010-07-29 14:47:58 -070022
Jan Engelhardt2d4cee72012-03-14 13:30:36 +010023extern const char *const audit_mode_names[];
John Johansen67012e82010-07-29 14:47:58 -070024#define AUDIT_MAX_INDEX 5
John Johansen67012e82010-07-29 14:47:58 -070025enum audit_mode {
26 AUDIT_NORMAL, /* follow normal auditing of accesses */
27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */
28 AUDIT_QUIET, /* quiet all messages */
29 AUDIT_NOQUIET, /* do not quiet audit messages */
30 AUDIT_ALL /* audit all accesses */
31};
32
33enum audit_type {
34 AUDIT_APPARMOR_AUDIT,
35 AUDIT_APPARMOR_ALLOWED,
36 AUDIT_APPARMOR_DENIED,
37 AUDIT_APPARMOR_HINT,
38 AUDIT_APPARMOR_STATUS,
39 AUDIT_APPARMOR_ERROR,
John Johansenade3ddc2012-02-22 00:20:26 -080040 AUDIT_APPARMOR_KILL,
41 AUDIT_APPARMOR_AUTO
John Johansen67012e82010-07-29 14:47:58 -070042};
43
John Johansen47f6e5c2017-01-16 00:43:01 -080044#define OP_NULL NULL
John Johansen67012e82010-07-29 14:47:58 -070045
John Johansen47f6e5c2017-01-16 00:43:01 -080046#define OP_SYSCTL "sysctl"
47#define OP_CAPABLE "capable"
John Johansen67012e82010-07-29 14:47:58 -070048
John Johansen47f6e5c2017-01-16 00:43:01 -080049#define OP_UNLINK "unlink"
50#define OP_MKDIR "mkdir"
51#define OP_RMDIR "rmdir"
52#define OP_MKNOD "mknod"
53#define OP_TRUNC "truncate"
54#define OP_LINK "link"
55#define OP_SYMLINK "symlink"
56#define OP_RENAME_SRC "rename_src"
57#define OP_RENAME_DEST "rename_dest"
58#define OP_CHMOD "chmod"
59#define OP_CHOWN "chown"
60#define OP_GETATTR "getattr"
61#define OP_OPEN "open"
John Johansen67012e82010-07-29 14:47:58 -070062
John Johansen064dc942017-06-09 17:15:56 -070063#define OP_FRECEIVE "file_receive"
John Johansen47f6e5c2017-01-16 00:43:01 -080064#define OP_FPERM "file_perm"
65#define OP_FLOCK "file_lock"
66#define OP_FMMAP "file_mmap"
67#define OP_FMPROT "file_mprotect"
John Johansen192ca6b2017-06-09 11:58:42 -070068#define OP_INHERIT "file_inherit"
John Johansen67012e82010-07-29 14:47:58 -070069
John Johansen2ea3ffb2017-07-18 23:04:47 -070070#define OP_PIVOTROOT "pivotroot"
71#define OP_MOUNT "mount"
72#define OP_UMOUNT "umount"
73
John Johansen47f6e5c2017-01-16 00:43:01 -080074#define OP_CREATE "create"
75#define OP_POST_CREATE "post_create"
76#define OP_BIND "bind"
77#define OP_CONNECT "connect"
78#define OP_LISTEN "listen"
79#define OP_ACCEPT "accept"
80#define OP_SENDMSG "sendmsg"
81#define OP_RECVMSG "recvmsg"
82#define OP_GETSOCKNAME "getsockname"
83#define OP_GETPEERNAME "getpeername"
84#define OP_GETSOCKOPT "getsockopt"
85#define OP_SETSOCKOPT "setsockopt"
86#define OP_SHUTDOWN "socket_shutdown"
John Johansen67012e82010-07-29 14:47:58 -070087
John Johansen47f6e5c2017-01-16 00:43:01 -080088#define OP_PTRACE "ptrace"
John Johansencd1dbf72017-07-18 22:56:22 -070089#define OP_SIGNAL "signal"
John Johansen67012e82010-07-29 14:47:58 -070090
John Johansen47f6e5c2017-01-16 00:43:01 -080091#define OP_EXEC "exec"
John Johansen67012e82010-07-29 14:47:58 -070092
John Johansen47f6e5c2017-01-16 00:43:01 -080093#define OP_CHANGE_HAT "change_hat"
94#define OP_CHANGE_PROFILE "change_profile"
95#define OP_CHANGE_ONEXEC "change_onexec"
John Johansen40cde7f2017-06-09 17:11:17 -070096#define OP_STACK "stack"
97#define OP_STACK_ONEXEC "stack_onexec"
John Johansen67012e82010-07-29 14:47:58 -070098
John Johansen47f6e5c2017-01-16 00:43:01 -080099#define OP_SETPROCATTR "setprocattr"
100#define OP_SETRLIMIT "setrlimit"
101
102#define OP_PROF_REPL "profile_replace"
103#define OP_PROF_LOAD "profile_load"
104#define OP_PROF_RM "profile_remove"
John Johansen67012e82010-07-29 14:47:58 -0700105
106
Eric Paris3b3b0e42012-04-03 09:37:02 -0700107struct apparmor_audit_data {
108 int error;
Eric Paris3b3b0e42012-04-03 09:37:02 -0700109 int type;
John Johansen637f6882017-06-09 08:14:28 -0700110 const char *op;
111 struct aa_label *label;
Eric Paris3b3b0e42012-04-03 09:37:02 -0700112 const char *name;
113 const char *info;
John Johansenaa9aeea2017-05-29 12:16:04 -0700114 u32 request;
115 u32 denied;
Eric Paris3b3b0e42012-04-03 09:37:02 -0700116 union {
John Johansenef88a7a2017-01-16 00:43:02 -0800117 /* these entries require a custom callback fn */
Eric Paris3b3b0e42012-04-03 09:37:02 -0700118 struct {
John Johansen637f6882017-06-09 08:14:28 -0700119 struct aa_label *peer;
John Johansenb12cbb22017-11-22 07:33:38 -0800120 union {
121 struct {
122 const char *target;
123 kuid_t ouid;
124 } fs;
John Johansenb5beb072018-02-09 04:57:39 -0800125 struct {
126 int rlim;
127 unsigned long max;
128 } rlim;
John Johansen3acfd5f2018-02-01 12:32:02 +0100129 struct {
130 int signal;
131 int unmappedsig;
132 };
John Johansen56974a62017-07-18 23:18:33 -0700133 struct {
134 int type, protocol;
135 struct sock *peer_sk;
136 void *addr;
137 int addrlen;
138 } net;
John Johansenb12cbb22017-11-22 07:33:38 -0800139 };
John Johansenef88a7a2017-01-16 00:43:02 -0800140 };
141 struct {
John Johansen2410aa92017-07-18 23:37:18 -0700142 struct aa_profile *profile;
John Johansenfc1c9fd2017-01-16 00:42:54 -0800143 const char *ns;
John Johansen2410aa92017-07-18 23:37:18 -0700144 long pos;
Eric Paris3b3b0e42012-04-03 09:37:02 -0700145 } iface;
Linus Torvalds80c094a2017-10-26 19:35:35 +0200146 struct {
John Johansen2ea3ffb2017-07-18 23:04:47 -0700147 const char *src_name;
148 const char *type;
149 const char *trans;
150 const char *data;
151 unsigned long flags;
152 } mnt;
Eric Paris3b3b0e42012-04-03 09:37:02 -0700153 };
154};
155
John Johansenef88a7a2017-01-16 00:43:02 -0800156/* macros for dealing with apparmor_audit_data structure */
157#define aad(SA) ((SA)->apparmor_audit_data)
158#define DEFINE_AUDIT_DATA(NAME, T, X) \
159 /* TODO: cleanup audit init so we don't need _aad = {0,} */ \
160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
161 struct common_audit_data NAME = \
162 { \
163 .type = (T), \
164 .u.tsk = NULL, \
165 }; \
166 NAME.apparmor_audit_data = &(NAME ## _aad)
John Johansen67012e82010-07-29 14:47:58 -0700167
168void aa_audit_msg(int type, struct common_audit_data *sa,
169 void (*cb) (struct audit_buffer *, void *));
John Johansenef88a7a2017-01-16 00:43:02 -0800170int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa,
John Johansen67012e82010-07-29 14:47:58 -0700171 void (*cb) (struct audit_buffer *, void *));
172
John Johansenef88a7a2017-01-16 00:43:02 -0800173#define aa_audit_error(ERROR, SA, CB) \
174({ \
175 aad((SA))->error = (ERROR); \
176 aa_audit_msg(AUDIT_APPARMOR_ERROR, (SA), (CB)); \
177 aad((SA))->error; \
178})
179
180
John Johansen67012e82010-07-29 14:47:58 -0700181static inline int complain_error(int error)
182{
183 if (error == -EPERM || error == -EACCES)
184 return 0;
185 return error;
186}
187
Matthew Garrette79c26d2018-04-16 11:23:58 -0700188void aa_audit_rule_free(void *vrule);
189int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
190int aa_audit_rule_known(struct audit_krule *rule);
Richard Guy Briggs90462a52019-01-31 11:52:11 -0500191int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
Matthew Garrette79c26d2018-04-16 11:23:58 -0700192
John Johansen67012e82010-07-29 14:47:58 -0700193#endif /* __AA_AUDIT_H */