Print this page
11037 SMB File access audit logging (reserve IDs)
Split |
Close |
Expand all |
Collapse all |
--- old/usr/src/uts/common/c2/audit_record.h
+++ new/usr/src/uts/common/c2/audit_record.h
1 1 /*
2 2 * CDDL HEADER START
3 3 *
4 4 * The contents of this file are subject to the terms of the
5 5 * Common Development and Distribution License (the "License").
6 6 * You may not use this file except in compliance with the License.
7 7 *
8 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 9 * or http://www.opensolaris.org/os/licensing.
10 10 * See the License for the specific language governing permissions
11 11 * and limitations under the License.
12 12 *
13 13 * When distributing Covered Code, include this CDDL HEADER in each
↓ open down ↓ |
13 lines elided |
↑ open up ↑ |
14 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 15 * If applicable, add the following below this CDDL HEADER, with the
16 16 * fields enclosed by brackets "[]" replaced with your own identifying
17 17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 18 *
19 19 * CDDL HEADER END
20 20 */
21 21 /*
22 22 * Copyright 2010 Sun Microsystems, Inc. All rights reserved.
23 23 * Use is subject to license terms.
24 + *
25 + * Copyright 2018 Nexenta Systems, Inc. All rights reserved.
24 26 */
25 27
26 28 #ifndef _BSM_AUDIT_RECORD_H
27 29 #define _BSM_AUDIT_RECORD_H
28 30
29 31
30 32 #ifdef _KERNEL
31 33 #include <sys/priv.h>
32 34 #else
33 35 #include <priv.h>
34 36 #endif
35 37 #include <sys/socket.h>
36 38 #include <sys/acl.h>
37 39
38 40 #include <sys/tsol/label.h>
39 41
40 42 #ifdef __cplusplus
41 43 extern "C" {
42 44 #endif
43 45
44 46 /*
45 47 * Version of audit attributes
46 48 *
47 49 * OS Release Version Number Comments
48 50 * ========== ============== ========
49 51 * SunOS 5.1 2 Unbundled Package
50 52 * SunOS 5.3 2 Bundled into the base OS
51 53 * SunOS 5.4-5.x 2
52 54 * Trusted Solaris 2.5 3 To distinguish potential new tokens
53 55 * Trusted Solaris 7-8 4 Redefine X tokens that overlap with
54 56 * SunOS 5.7
55 57 */
56 58
57 59 #define TOKEN_VERSION 2
58 60
59 61 /*
60 62 * Audit record token type codes
61 63 */
62 64
63 65 /*
64 66 * Control token types
65 67 */
66 68
67 69 #define AUT_INVALID ((char)0x00)
68 70 #define AUT_OTHER_FILE ((char)0x11)
69 71 #define AUT_OTHER_FILE32 AUT_OTHER_FILE
70 72 #define AUT_OHEADER ((char)0x12)
71 73 #define AUT_TRAILER ((char)0x13)
72 74 #define AUT_HEADER ((char)0x14)
73 75 #define AUT_HEADER32 AUT_HEADER
74 76 #define AUT_HEADER32_EX ((char)0x15)
75 77 #define AUT_TRAILER_MAGIC ((short)0xB105)
76 78
77 79 /*
78 80 * Data token types
79 81 */
80 82
81 83 #define AUT_FMRI ((char)0x20)
82 84 #define AUT_DATA ((char)0x21)
83 85 #define AUT_IPC ((char)0x22)
84 86 #define AUT_PATH ((char)0x23)
85 87 #define AUT_SUBJECT ((char)0x24)
86 88 #define AUT_SUBJECT32 AUT_SUBJECT
87 89 #define AUT_XATPATH ((char)0x25)
88 90 #define AUT_PROCESS ((char)0x26)
89 91 #define AUT_PROCESS32 AUT_PROCESS
90 92 #define AUT_RETURN ((char)0x27)
91 93 #define AUT_RETURN32 AUT_RETURN
92 94 #define AUT_TEXT ((char)0x28)
93 95 #define AUT_OPAQUE ((char)0x29)
94 96 #define AUT_IN_ADDR ((char)0x2A)
95 97 #define AUT_IP ((char)0x2B)
96 98 #define AUT_IPORT ((char)0x2C)
97 99 #define AUT_ARG ((char)0x2D)
98 100 #define AUT_ARG32 AUT_ARG
99 101 #define AUT_SOCKET ((char)0x2E)
100 102 #define AUT_SEQ ((char)0x2F)
101 103 #define AUT_USER ((char)0x36) /* out of order */
102 104 #define AUT_TID ((char)0x61) /* out of order */
103 105
104 106 /*
105 107 * Modifier token types
106 108 */
107 109
108 110 #define AUT_ACL ((char)0x30)
109 111 #define AUT_ATTR ((char)0x31)
110 112 #define AUT_IPC_PERM ((char)0x32)
111 113 #define AUT_LABEL ((char)0x33)
112 114 #define AUT_GROUPS ((char)0x34)
113 115 #define AUT_ACE ((char)0x35)
114 116 /* 0x37 unused */
115 117 #define AUT_PRIV ((char)0x38)
116 118 #define AUT_UPRIV ((char)0x39)
117 119 #define AUT_LIAISON ((char)0x3A)
118 120 #define AUT_NEWGROUPS ((char)0x3B)
119 121 #define AUT_EXEC_ARGS ((char)0x3C)
120 122 #define AUT_EXEC_ENV ((char)0x3D)
121 123 #define AUT_ATTR32 ((char)0x3E)
122 124 #define AUT_UAUTH ((char)0x3F)
123 125 #define AUT_ZONENAME ((char)0x60) /* out of order */
124 126 #define AUT_SECFLAGS ((char)0x62) /* out of order */
125 127
126 128 /*
127 129 * X windows token types
128 130 */
129 131
130 132 #define AUT_XATOM ((char)0x40)
131 133 #define AUT_XOBJ ((char)0x41)
132 134 #define AUT_XPROTO ((char)0x42)
133 135 #define AUT_XSELECT ((char)0x43)
134 136
135 137 #if TOKEN_VERSION != 3
136 138 #define AUT_XCOLORMAP ((char)0x44)
137 139 #define AUT_XCURSOR ((char)0x45)
138 140 #define AUT_XFONT ((char)0x46)
139 141 #define AUT_XGC ((char)0x47)
140 142 #define AUT_XPIXMAP ((char)0x48)
141 143 #define AUT_XPROPERTY ((char)0x49)
142 144 #define AUT_XWINDOW ((char)0x4A)
143 145 #define AUT_XCLIENT ((char)0x4B)
144 146 #else /* TOKEN_VERSION == 3 */
145 147 #define AUT_XCOLORMAP ((char)0x74)
146 148 #define AUT_XCURSOR ((char)0x75)
147 149 #define AUT_XFONT ((char)0x76)
148 150 #define AUT_XGC ((char)0x77)
149 151 #define AUT_XPIXMAP ((char)0x78)
150 152 #define AUT_XPROPERTY ((char)0x79)
151 153 #define AUT_XWINDOW ((char)0x7A)
152 154 #define AUT_XCLIENT ((char)0x7B)
153 155 #endif /* TOKEN_VERSION != 3 */
154 156
155 157 /*
156 158 * Command token types
157 159 */
158 160
159 161 #define AUT_CMD ((char)0x51)
160 162 #define AUT_EXIT ((char)0x52)
161 163
162 164 /*
163 165 * Miscellaneous token types
164 166 */
165 167
166 168 #define AUT_HOST ((char)0x70)
167 169
168 170 /*
169 171 * Solaris64 token types
170 172 */
171 173
172 174 #define AUT_ARG64 ((char)0x71)
173 175 #define AUT_RETURN64 ((char)0x72)
174 176 #define AUT_ATTR64 ((char)0x73)
175 177 #define AUT_HEADER64 ((char)0x74)
176 178 #define AUT_SUBJECT64 ((char)0x75)
177 179 #define AUT_PROCESS64 ((char)0x77)
178 180 #define AUT_OTHER_FILE64 ((char)0x78)
179 181
180 182 /*
181 183 * Extended network address token types
↓ open down ↓ |
148 lines elided |
↑ open up ↑ |
182 184 */
183 185
184 186 #define AUT_HEADER64_EX ((char)0x79)
185 187 #define AUT_SUBJECT32_EX ((char)0x7a)
186 188 #define AUT_PROCESS32_EX ((char)0x7b)
187 189 #define AUT_SUBJECT64_EX ((char)0x7c)
188 190 #define AUT_PROCESS64_EX ((char)0x7d)
189 191 #define AUT_IN_ADDR_EX ((char)0x7e)
190 192 #define AUT_SOCKET_EX ((char)0x7f)
191 193
194 +/*
195 + * Can't do >= 0x80 because these are chars. 0x16/0x17 seem to be free here,
196 + * but who knows if they have historical uses
197 + */
198 +#define AUT_ACCESS_MASK ((char)0x16)
199 +#define AUT_WSID ((char)0x17)
192 200
193 201 /*
194 202 * Audit print suggestion types.
195 203 */
196 204
197 205 #define AUP_BINARY ((char)0)
198 206 #define AUP_OCTAL ((char)1)
199 207 #define AUP_DECIMAL ((char)2)
200 208 #define AUP_HEX ((char)3)
201 209 #define AUP_STRING ((char)4)
202 210
203 211 /*
204 212 * Audit data member types.
205 213 */
206 214
207 215 #define AUR_BYTE ((char)0)
208 216 #define AUR_CHAR ((char)0)
209 217 #define AUR_SHORT ((char)1)
210 218 #define AUR_INT ((char)2)
211 219 #define AUR_INT32 ((char)2)
212 220 #define AUR_INT64 ((char)3)
213 221
214 222 /*
215 223 * Adr structures
216 224 */
217 225
218 226 struct adr_s {
219 227 char *adr_stream; /* The base of the stream */
220 228 char *adr_now; /* The location within the stream */
221 229 };
222 230
223 231 typedef struct adr_s adr_t;
224 232
225 233
226 234 #ifdef _KERNEL
227 235
228 236 #include <sys/param.h>
229 237 #include <sys/systm.h> /* for rval */
230 238 #include <sys/time.h>
231 239 #include <sys/types.h>
232 240 #include <sys/vnode.h>
233 241 #include <sys/mode.h>
234 242 #include <sys/user.h>
235 243 #include <sys/session.h>
236 244 #include <sys/ipc_impl.h>
237 245 #include <netinet/in_systm.h>
238 246 #include <netinet/in.h>
239 247 #include <netinet/ip.h>
240 248 #include <sys/socket.h>
241 249 #include <net/route.h>
242 250 #include <netinet/in_pcb.h>
243 251
244 252 /*
245 253 * au_close flag arguments
246 254 */
247 255
248 256 #define AU_OK 0x1 /* Good audit record */
249 257 #define AU_DONTBLOCK 0x2 /* Don't block or discard if queue full */
250 258 #define AU_DEFER 0x4 /* Defer record queueing to syscall end */
251 259
252 260 /*
253 261 * Audit token type is really an au_membuf pointer
254 262 */
255 263 typedef au_buff_t token_t;
256 264 /*
257 265 * token generation functions
258 266 */
259 267 token_t *au_append_token(token_t *, token_t *);
260 268 token_t *au_set(caddr_t, uint_t);
261 269
262 270 void au_free_rec(au_buff_t *);
263 271
264 272 #define au_getclr() ((token_t *)au_get_buff())
265 273 #define au_toss_token(tok) (au_free_rec((au_buff_t *)(tok)))
266 274
267 275 token_t *au_to_acl();
268 276 token_t *au_to_ace();
269 277 token_t *au_to_attr(struct vattr *);
270 278 token_t *au_to_data(char, char, char, char *);
271 279 token_t *au_to_header(int, au_event_t, au_emod_t);
272 280 token_t *au_to_header_ex(int, au_event_t, au_emod_t);
273 281 token_t *au_to_ipc(char, int);
274 282 token_t *au_to_ipc_perm(kipc_perm_t *);
275 283 token_t *au_to_iport(ushort_t);
276 284 token_t *au_to_in_addr(struct in_addr *);
277 285 token_t *au_to_in_addr_ex(int32_t *);
278 286 token_t *au_to_ip(struct ip *);
279 287 token_t *au_to_groups(const gid_t *, uint_t);
280 288 token_t *au_to_path(struct audit_path *);
281 289 token_t *au_to_seq();
282 290 token_t *au_to_process(uid_t, gid_t, uid_t, gid_t, pid_t,
283 291 au_id_t, au_asid_t, const au_tid_addr_t *);
284 292 token_t *au_to_subject(uid_t, gid_t, uid_t, gid_t, pid_t,
285 293 au_id_t, au_asid_t, const au_tid_addr_t *);
286 294 token_t *au_to_return32(int, int32_t);
287 295 token_t *au_to_return64(int, int64_t);
288 296 token_t *au_to_text(const char *);
289 297 /* token_t *au_to_tid(au_generic_tid_t *); no kernel implementation */
290 298 token_t *au_to_trailer(int);
291 299 token_t *au_to_uauth(char *);
292 300 size_t au_zonename_length(zone_t *);
293 301 token_t *au_to_zonename(size_t, zone_t *);
294 302 token_t *au_to_arg32(char, char *, uint32_t);
295 303 token_t *au_to_arg64(char, char *, uint64_t);
296 304 token_t *au_to_socket_ex(short, short, char *, char *);
297 305 token_t *au_to_sock_inet(struct sockaddr_in *);
298 306 token_t *au_to_exec_args(const char *, ssize_t);
299 307 token_t *au_to_exec_env(const char *, ssize_t);
300 308 token_t *au_to_label(bslabel_t *);
301 309 token_t *au_to_privset(const char *, const priv_set_t *, char, int);
302 310 token_t *au_to_secflags(const char *, secflagset_t);
303 311
304 312 void au_uwrite();
305 313 void au_close(au_kcontext_t *, caddr_t *, int, au_event_t, au_emod_t,
306 314 timestruc_t *);
307 315 void au_close_defer(token_t *, int, au_event_t, au_emod_t, timestruc_t *);
308 316 void au_close_time(au_kcontext_t *, token_t *, int, au_event_t, au_emod_t,
309 317 timestruc_t *);
310 318 void au_free_rec(au_buff_t *);
311 319 void au_write(caddr_t *, token_t *);
312 320 void au_mem_init(void);
313 321 void au_zone_setup();
314 322 void au_enqueue(au_kcontext_t *, au_buff_t *, adr_t *, adr_t *, int, int);
315 323 int au_doorio(au_kcontext_t *);
316 324 int au_doormsg(au_kcontext_t *, uint32_t, void *);
317 325 int au_token_size(token_t *);
318 326 int au_append_rec(au_buff_t *, au_buff_t *, int);
319 327 int au_append_buf(const char *, int, au_buff_t *);
320 328
321 329 #else /* !_KERNEL */
322 330
323 331 #include <limits.h>
324 332 #include <sys/types.h>
325 333 #include <sys/vnode.h>
326 334 #include <netinet/in_systm.h>
327 335 #include <netinet/in.h>
328 336 #include <netinet/ip.h>
329 337 #include <sys/ipc.h>
330 338
331 339 struct token_s {
332 340 struct token_s *tt_next; /* Next in the list */
333 341 short tt_size; /* Size of data */
334 342 char *tt_data; /* The data */
335 343 };
336 344 typedef struct token_s token_t;
337 345
338 346 /*
339 347 * Old socket structure definition, formerly in <sys/socketvar.h>
340 348 */
341 349 struct oldsocket {
342 350 short so_type; /* generic type, see socket.h */
343 351 short so_options; /* from socket call, see socket.h */
344 352 short so_linger; /* time to linger while closing */
345 353 short so_state; /* internal state flags SS_*, below */
346 354 struct inpcb *so_pcb; /* protocol control block */
347 355 struct protosw *so_proto; /* protocol handle */
348 356 /*
349 357 * Variables for connection queueing.
350 358 * Socket where accepts occur is so_head in all subsidiary sockets.
351 359 * If so_head is 0, socket is not related to an accept.
352 360 * For head socket so_q0 queues partially completed connections,
353 361 * while so_q is a queue of connections ready to be accepted.
354 362 * If a connection is aborted and it has so_head set, then
355 363 * it has to be pulled out of either so_q0 or so_q.
356 364 * We allow connections to queue up based on current queue lengths
357 365 * and limit on number of queued connections for this socket.
358 366 */
359 367 struct oldsocket *so_head; /* back pointer to accept socket */
360 368 struct oldsocket *so_q0; /* queue of partial connections */
361 369 struct oldsocket *so_q; /* queue of incoming connections */
362 370 short so_q0len; /* partials on so_q0 */
363 371 short so_qlen; /* number of connections on so_q */
364 372 short so_qlimit; /* max number queued connections */
365 373 short so_timeo; /* connection timeout */
366 374 ushort_t so_error; /* error affecting connection */
367 375 short so_pgrp; /* pgrp for signals */
368 376 ulong_t so_oobmark; /* chars to oob mark */
369 377 /*
370 378 * Variables for socket buffering.
371 379 */
372 380 struct sockbuf {
373 381 ulong_t sb_cc; /* actual chars in buffer */
374 382 ulong_t sb_hiwat; /* max actual char count */
375 383 ulong_t sb_mbcnt; /* chars of mbufs used */
376 384 ulong_t sb_mbmax; /* max chars of mbufs to use */
377 385 ulong_t sb_lowat; /* low water mark (not used yet) */
378 386 struct mbuf *sb_mb; /* the mbuf chain */
379 387 struct proc *sb_sel; /* process selecting read/write */
380 388 short sb_timeo; /* timeout (not used yet) */
381 389 short sb_flags; /* flags, see below */
382 390 } so_rcv, so_snd;
383 391 /*
384 392 * Hooks for alternative wakeup strategies.
385 393 * These are used by kernel subsystems wishing to access the socket
386 394 * abstraction. If so_wupfunc is nonnull, it is called in place of
387 395 * wakeup any time that wakeup would otherwise be called with an
388 396 * argument whose value is an address lying within a socket structure.
389 397 */
390 398 struct wupalt *so_wupalt;
391 399 };
392 400 extern token_t *au_to_arg32(char, char *, uint32_t);
393 401 extern token_t *au_to_arg64(char, char *, uint64_t);
394 402 extern token_t *au_to_acl(struct acl *);
395 403 extern token_t *au_to_attr(struct vattr *);
396 404 extern token_t *au_to_cmd(uint_t, char **, char **);
397 405 extern token_t *au_to_data(char, char, char, char *);
398 406 extern token_t *au_to_exec_args(char **);
399 407 extern token_t *au_to_exec_env(char **);
400 408 extern token_t *au_to_exit(int, int);
401 409 extern token_t *au_to_fmri(char *);
402 410 extern token_t *au_to_groups(int *);
403 411 extern token_t *au_to_newgroups(int, gid_t *);
404 412 extern token_t *au_to_header(au_event_t, au_emod_t);
405 413 extern token_t *au_to_header_ex(au_event_t, au_emod_t);
406 414 extern token_t *au_to_in_addr(struct in_addr *);
407 415 extern token_t *au_to_in_addr_ex(struct in6_addr *);
408 416 extern token_t *au_to_ipc(char, int);
409 417 extern token_t *au_to_ipc_perm(struct ipc_perm *);
410 418 extern token_t *au_to_iport(ushort_t);
411 419 extern token_t *au_to_me(void);
412 420 extern token_t *au_to_mylabel(void);
413 421 extern token_t *au_to_opaque(char *, short);
414 422 extern token_t *au_to_path(char *);
415 423 extern token_t *au_to_privset(const char *, const priv_set_t *);
416 424 extern token_t *au_to_process(au_id_t, uid_t, gid_t, uid_t, gid_t,
417 425 pid_t, au_asid_t, au_tid_t *);
418 426 extern token_t *au_to_process_ex(au_id_t, uid_t, gid_t, uid_t, gid_t,
419 427 pid_t, au_asid_t, au_tid_addr_t *);
420 428 extern token_t *au_to_return32(char, uint32_t);
421 429 extern token_t *au_to_return64(char, uint64_t);
422 430 extern token_t *au_to_seq(int);
423 431 extern token_t *au_to_label(m_label_t *);
424 432 extern token_t *au_to_socket(struct oldsocket *);
425 433 extern token_t *au_to_subject(au_id_t, uid_t, gid_t, uid_t, gid_t,
426 434 pid_t, au_asid_t, au_tid_t *);
427 435 extern token_t *au_to_subject_ex(au_id_t, uid_t, gid_t, uid_t, gid_t,
428 436 pid_t, au_asid_t, au_tid_addr_t *);
429 437 extern token_t *au_to_text(char *);
430 438 extern token_t *au_to_tid(au_generic_tid_t *);
431 439 extern token_t *au_to_trailer(void);
432 440 extern token_t *au_to_uauth(char *);
433 441 extern token_t *au_to_upriv(char, char *);
434 442 extern token_t *au_to_user(uid_t, char *);
435 443 extern token_t *au_to_xatom(char *);
436 444 extern token_t *au_to_xselect(char *, char *, char *);
437 445 extern token_t *au_to_xcolormap(int32_t, uid_t);
438 446 extern token_t *au_to_xcursor(int32_t, uid_t);
439 447 extern token_t *au_to_xfont(int32_t, uid_t);
440 448 extern token_t *au_to_xgc(int32_t, uid_t);
441 449 extern token_t *au_to_xpixmap(int32_t, uid_t);
442 450 extern token_t *au_to_xwindow(int32_t, uid_t);
443 451 extern token_t *au_to_xproperty(int32_t, uid_t, char *);
444 452 extern token_t *au_to_xclient(uint32_t);
445 453 extern token_t *au_to_zonename(char *);
446 454 #endif /* _KERNEL */
447 455
448 456 #ifdef _KERNEL
449 457
450 458 void adr_char(adr_t *, char *, int);
451 459 void adr_int32(adr_t *, int32_t *, int);
452 460 void adr_uint32(adr_t *, uint32_t *, int);
453 461 void adr_int64(adr_t *, int64_t *, int);
454 462 void adr_uint64(adr_t *, uint64_t *, int);
455 463 void adr_short(adr_t *, short *, int);
456 464 void adr_ushort(adr_t *, ushort_t *, int);
457 465 void adr_start(adr_t *, char *);
458 466
459 467 char *adr_getchar(adr_t *, char *);
460 468 char *adr_getshort(adr_t *, short *);
461 469 char *adr_getushort(adr_t *, ushort_t *);
462 470 char *adr_getint32(adr_t *, int32_t *);
463 471 char *adr_getuint32(adr_t *, uint32_t *);
464 472 char *adr_getint64(adr_t *, int64_t *);
465 473 char *adr_getuint64(adr_t *, uint64_t *);
466 474
467 475 int adr_count(adr_t *);
468 476
469 477 #endif /* _KERNEL */
470 478
471 479 #ifdef __cplusplus
472 480 }
473 481 #endif
474 482
475 483 #endif /* _BSM_AUDIT_RECORD_H */
↓ open down ↓ |
274 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX