Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at 6f1d4d2ecfcd1b577dc87350ea965fe81f272e83 212 lines 5.0 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-only */ 2/* 3 * AppArmor security module 4 * 5 * This file contains AppArmor auditing function definitions. 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 9 */ 10 11#ifndef __AA_AUDIT_H 12#define __AA_AUDIT_H 13 14#include <linux/audit.h> 15#include <linux/fs.h> 16#include <linux/lsm_audit.h> 17#include <linux/sched.h> 18#include <linux/slab.h> 19 20#include "file.h" 21#include "label.h" 22 23extern const char *const audit_mode_names[]; 24#define AUDIT_MAX_INDEX 5 25enum audit_mode { 26 AUDIT_NORMAL, /* follow normal auditing of accesses */ 27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */ 28 AUDIT_QUIET, /* quiet all messages */ 29 AUDIT_NOQUIET, /* do not quiet audit messages */ 30 AUDIT_ALL /* audit all accesses */ 31}; 32 33enum audit_type { 34 AUDIT_APPARMOR_AUDIT, 35 AUDIT_APPARMOR_ALLOWED, 36 AUDIT_APPARMOR_DENIED, 37 AUDIT_APPARMOR_HINT, 38 AUDIT_APPARMOR_STATUS, 39 AUDIT_APPARMOR_ERROR, 40 AUDIT_APPARMOR_KILL, 41 AUDIT_APPARMOR_AUTO 42}; 43 44#define OP_NULL NULL 45 46#define OP_SYSCTL "sysctl" 47#define OP_CAPABLE "capable" 48 49#define OP_UNLINK "unlink" 50#define OP_MKDIR "mkdir" 51#define OP_RMDIR "rmdir" 52#define OP_MKNOD "mknod" 53#define OP_TRUNC "truncate" 54#define OP_LINK "link" 55#define OP_SYMLINK "symlink" 56#define OP_RENAME_SRC "rename_src" 57#define OP_RENAME_DEST "rename_dest" 58#define OP_CHMOD "chmod" 59#define OP_CHOWN "chown" 60#define OP_GETATTR "getattr" 61#define OP_OPEN "open" 62 63#define OP_FRECEIVE "file_receive" 64#define OP_FPERM "file_perm" 65#define OP_FLOCK "file_lock" 66#define OP_FMMAP "file_mmap" 67#define OP_FMPROT "file_mprotect" 68#define OP_INHERIT "file_inherit" 69 70#define OP_PIVOTROOT "pivotroot" 71#define OP_MOUNT "mount" 72#define OP_UMOUNT "umount" 73 74#define OP_CREATE "create" 75#define OP_POST_CREATE "post_create" 76#define OP_BIND "bind" 77#define OP_CONNECT "connect" 78#define OP_LISTEN "listen" 79#define OP_ACCEPT "accept" 80#define OP_SENDMSG "sendmsg" 81#define OP_RECVMSG "recvmsg" 82#define OP_GETSOCKNAME "getsockname" 83#define OP_GETPEERNAME "getpeername" 84#define OP_GETSOCKOPT "getsockopt" 85#define OP_SETSOCKOPT "setsockopt" 86#define OP_SHUTDOWN "socket_shutdown" 87 88#define OP_PTRACE "ptrace" 89#define OP_SIGNAL "signal" 90 91#define OP_EXEC "exec" 92 93#define OP_CHANGE_HAT "change_hat" 94#define OP_CHANGE_PROFILE "change_profile" 95#define OP_CHANGE_ONEXEC "change_onexec" 96#define OP_STACK "stack" 97#define OP_STACK_ONEXEC "stack_onexec" 98 99#define OP_SETPROCATTR "setprocattr" 100#define OP_SETRLIMIT "setrlimit" 101 102#define OP_PROF_REPL "profile_replace" 103#define OP_PROF_LOAD "profile_load" 104#define OP_PROF_RM "profile_remove" 105 106#define OP_USERNS_CREATE "userns_create" 107 108#define OP_URING_OVERRIDE "uring_override" 109#define OP_URING_SQPOLL "uring_sqpoll" 110 111struct apparmor_audit_data { 112 int error; 113 int type; 114 u16 class; 115 const char *op; 116 const struct cred *subj_cred; 117 struct aa_label *subj_label; 118 const char *name; 119 const char *info; 120 u32 request; 121 u32 denied; 122 u32 tags; 123 124 union { 125 /* these entries require a custom callback fn */ 126 struct { 127 struct aa_label *peer; 128 union { 129 struct { 130 const char *target; 131 kuid_t ouid; 132 } fs; 133 struct { 134 int rlim; 135 unsigned long max; 136 } rlim; 137 struct { 138 int signal; 139 int unmappedsig; 140 }; 141 struct { 142 int type, protocol; 143 void *addr; 144 int addrlen; 145 struct { 146 void *addr; 147 int addrlen; 148 } peer; 149 } net; 150 }; 151 }; 152 struct { 153 struct aa_profile *profile; 154 const char *ns; 155 long pos; 156 } iface; 157 struct { 158 const char *src_name; 159 const char *type; 160 const char *trans; 161 const char *data; 162 unsigned long flags; 163 } mnt; 164 struct { 165 struct aa_label *target; 166 } uring; 167 }; 168 169 struct common_audit_data common; 170}; 171 172/* macros for dealing with apparmor_audit_data structure */ 173#define aad(SA) (container_of(SA, struct apparmor_audit_data, common)) 174#define aad_of_va(VA) aad((struct common_audit_data *)(VA)) 175 176#define DEFINE_AUDIT_DATA(NAME, T, C, X) \ 177 /* TODO: cleanup audit init so we don't need _aad = {0,} */ \ 178 struct apparmor_audit_data NAME = { \ 179 .class = (C), \ 180 .op = (X), \ 181 .common.type = (T), \ 182 .common.u.tsk = NULL, \ 183 .common.apparmor_audit_data = &NAME, \ 184 }; 185 186void aa_audit_msg(int type, struct apparmor_audit_data *ad, 187 void (*cb) (struct audit_buffer *, void *)); 188int aa_audit(int type, struct aa_profile *profile, 189 struct apparmor_audit_data *ad, 190 void (*cb) (struct audit_buffer *, void *)); 191 192#define aa_audit_error(ERROR, AD, CB) \ 193({ \ 194 (AD)->error = (ERROR); \ 195 aa_audit_msg(AUDIT_APPARMOR_ERROR, (AD), (CB)); \ 196 (AD)->error; \ 197}) 198 199 200static inline int complain_error(int error) 201{ 202 if (error == -EPERM || error == -EACCES) 203 return 0; 204 return error; 205} 206 207void aa_audit_rule_free(void *vrule); 208int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule, gfp_t gfp); 209int aa_audit_rule_known(struct audit_krule *rule); 210int aa_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule); 211 212#endif /* __AA_AUDIT_H */