1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22#include <linux/fs.h>
23#include <linux/audit.h>
24#include <linux/skbuff.h>
25
26
27
28
29
30#define AUDIT_DEBUG 0
31
32
33
34
35enum audit_state {
36 AUDIT_DISABLED,
37
38
39 AUDIT_SETUP_CONTEXT,
40
41
42
43 AUDIT_BUILD_CONTEXT,
44
45
46
47
48
49 AUDIT_RECORD_CONTEXT
50
51
52
53};
54
55
56struct audit_parent;
57
58struct audit_watch {
59 atomic_t count;
60 char *path;
61 dev_t dev;
62 unsigned long ino;
63 struct audit_parent *parent;
64 struct list_head wlist;
65 struct list_head rules;
66};
67
68struct audit_field {
69 u32 type;
70 u32 val;
71 u32 op;
72 char *se_str;
73 struct selinux_audit_rule *se_rule;
74};
75
76struct audit_tree;
77struct audit_chunk;
78
79struct audit_krule {
80 int vers_ops;
81 u32 flags;
82 u32 listnr;
83 u32 action;
84 u32 mask[AUDIT_BITMASK_SIZE];
85 u32 buflen;
86 u32 field_count;
87 char *filterkey;
88 struct audit_field *fields;
89 struct audit_field *arch_f;
90 struct audit_field *inode_f;
91 struct audit_watch *watch;
92 struct audit_tree *tree;
93 struct list_head rlist;
94};
95
96struct audit_entry {
97 struct list_head list;
98 struct rcu_head rcu;
99 struct audit_krule rule;
100};
101
102extern int audit_pid;
103
104#define AUDIT_INODE_BUCKETS 32
105extern struct list_head audit_inode_hash[AUDIT_INODE_BUCKETS];
106
107static inline int audit_hash_ino(u32 ino)
108{
109 return (ino & (AUDIT_INODE_BUCKETS-1));
110}
111
112extern int audit_match_class(int class, unsigned syscall);
113extern int audit_comparator(const u32 left, const u32 op, const u32 right);
114extern int audit_compare_dname_path(const char *dname, const char *path,
115 int *dirlen);
116extern struct sk_buff * audit_make_reply(int pid, int seq, int type,
117 int done, int multi,
118 void *payload, int size);
119extern void audit_send_reply(int pid, int seq, int type,
120 int done, int multi,
121 void *payload, int size);
122extern void audit_panic(const char *message);
123
124struct audit_netlink_list {
125 int pid;
126 struct sk_buff_head q;
127};
128
129int audit_send_list(void *);
130
131struct inotify_watch;
132extern void audit_free_parent(struct inotify_watch *);
133extern void audit_handle_ievent(struct inotify_watch *, u32, u32, u32,
134 const char *, struct inode *);
135extern int selinux_audit_rule_update(void);
136
137extern struct mutex audit_filter_mutex;
138extern void audit_free_rule_rcu(struct rcu_head *);
139
140#ifdef CONFIG_AUDIT_TREE
141extern struct audit_chunk *audit_tree_lookup(const struct inode *);
142extern void audit_put_chunk(struct audit_chunk *);
143extern int audit_tree_match(struct audit_chunk *, struct audit_tree *);
144extern int audit_make_tree(struct audit_krule *, char *, u32);
145extern int audit_add_tree_rule(struct audit_krule *);
146extern int audit_remove_tree_rule(struct audit_krule *);
147extern void audit_trim_trees(void);
148extern int audit_tag_tree(char *old, char *new);
149extern void audit_schedule_prune(void);
150extern void audit_prune_trees(void);
151extern const char *audit_tree_path(struct audit_tree *);
152extern void audit_put_tree(struct audit_tree *);
153#else
154#define audit_remove_tree_rule(rule) BUG()
155#define audit_add_tree_rule(rule) -EINVAL
156#define audit_make_tree(rule, str, op) -EINVAL
157#define audit_trim_trees() (void)0
158#define audit_put_tree(tree) (void)0
159#define audit_tag_tree(old, new) -EINVAL
160#define audit_tree_path(rule) ""
161#endif
162
163extern char *audit_unpack_string(void **, size_t *, size_t);
164
165#ifdef CONFIG_AUDITSYSCALL
166extern int __audit_signal_info(int sig, struct task_struct *t);
167static inline int audit_signal_info(int sig, struct task_struct *t)
168{
169 if (unlikely((audit_pid && t->tgid == audit_pid) ||
170 (audit_signals && !audit_dummy_context())))
171 return __audit_signal_info(sig, t);
172 return 0;
173}
174extern enum audit_state audit_filter_inodes(struct task_struct *,
175 struct audit_context *);
176extern void audit_set_auditable(struct audit_context *);
177#else
178#define audit_signal_info(s,t) AUDIT_DISABLED
179#define audit_filter_inodes(t,c) AUDIT_DISABLED
180#define audit_set_auditable(c)
181#endif
182