audit.h (247602) | audit.h (247667) |
---|---|
1/*- 2 * Copyright (c) 1999-2005 Apple Inc. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 12 unchanged lines hidden (view full) --- 21 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * | 1/*- 2 * Copyright (c) 1999-2005 Apple Inc. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 12 unchanged lines hidden (view full) --- 21 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * |
29 * $FreeBSD: head/sys/security/audit/audit.h 247602 2013-03-02 00:53:12Z pjd $ | 29 * $FreeBSD: head/sys/security/audit/audit.h 247667 2013-03-02 21:11:30Z pjd $ |
30 */ 31 32/* 33 * This header includes function prototypes and type definitions that are 34 * necessary for the kernel as a whole to interact with the audit subsystem. 35 */ 36 37#ifndef _SECURITY_AUDIT_KERNEL_H_ --- 52 unchanged lines hidden (view full) --- 90void audit_arg_mode(mode_t mode); 91void audit_arg_dev(int dev); 92void audit_arg_value(long value); 93void audit_arg_owner(uid_t uid, gid_t gid); 94void audit_arg_pid(pid_t pid); 95void audit_arg_process(struct proc *p); 96void audit_arg_signum(u_int signum); 97void audit_arg_socket(int sodomain, int sotype, int soprotocol); | 30 */ 31 32/* 33 * This header includes function prototypes and type definitions that are 34 * necessary for the kernel as a whole to interact with the audit subsystem. 35 */ 36 37#ifndef _SECURITY_AUDIT_KERNEL_H_ --- 52 unchanged lines hidden (view full) --- 90void audit_arg_mode(mode_t mode); 91void audit_arg_dev(int dev); 92void audit_arg_value(long value); 93void audit_arg_owner(uid_t uid, gid_t gid); 94void audit_arg_pid(pid_t pid); 95void audit_arg_process(struct proc *p); 96void audit_arg_signum(u_int signum); 97void audit_arg_socket(int sodomain, int sotype, int soprotocol); |
98void audit_arg_sockaddr(struct thread *td, struct sockaddr *sa); | 98void audit_arg_sockaddr(struct thread *td, int dirfd, struct sockaddr *sa); |
99void audit_arg_auid(uid_t auid); 100void audit_arg_auditinfo(struct auditinfo *au_info); 101void audit_arg_auditinfo_addr(struct auditinfo_addr *au_info); 102void audit_arg_upath1(struct thread *td, int dirfd, char *upath); 103void audit_arg_upath2(struct thread *td, int dirfd, char *upath); 104void audit_arg_vnode1(struct vnode *vp); 105void audit_arg_vnode2(struct vnode *vp); 106void audit_arg_text(char *text); --- 155 unchanged lines hidden (view full) --- 262 audit_arg_sgid((sgid)); \ 263} while (0) 264 265#define AUDIT_ARG_SOCKET(sodomain, sotype, soprotocol) do { \ 266 if (AUDITING_TD(curthread)) \ 267 audit_arg_socket((sodomain), (sotype), (soprotocol)); \ 268} while (0) 269 | 99void audit_arg_auid(uid_t auid); 100void audit_arg_auditinfo(struct auditinfo *au_info); 101void audit_arg_auditinfo_addr(struct auditinfo_addr *au_info); 102void audit_arg_upath1(struct thread *td, int dirfd, char *upath); 103void audit_arg_upath2(struct thread *td, int dirfd, char *upath); 104void audit_arg_vnode1(struct vnode *vp); 105void audit_arg_vnode2(struct vnode *vp); 106void audit_arg_text(char *text); --- 155 unchanged lines hidden (view full) --- 262 audit_arg_sgid((sgid)); \ 263} while (0) 264 265#define AUDIT_ARG_SOCKET(sodomain, sotype, soprotocol) do { \ 266 if (AUDITING_TD(curthread)) \ 267 audit_arg_socket((sodomain), (sotype), (soprotocol)); \ 268} while (0) 269 |
270#define AUDIT_ARG_SOCKADDR(td, sa) do { \ | 270#define AUDIT_ARG_SOCKADDR(td, dirfd, sa) do { \ |
271 if (AUDITING_TD(curthread)) \ | 271 if (AUDITING_TD(curthread)) \ |
272 audit_arg_sockaddr((td), (sa)); \ | 272 audit_arg_sockaddr((td), (dirfd), (sa)); \ |
273} while (0) 274 275#define AUDIT_ARG_SUID(suid) do { \ 276 if (AUDITING_TD(curthread)) \ 277 audit_arg_suid((suid)); \ 278} while (0) 279 280#define AUDIT_ARG_TEXT(text) do { \ --- 79 unchanged lines hidden (view full) --- 360#define AUDIT_ARG_PROCESS(p) 361#define AUDIT_ARG_RGID(rgid) 362#define AUDIT_ARG_RIGHTS(rights) 363#define AUDIT_ARG_FCNTL_RIGHTS(fcntlrights) 364#define AUDIT_ARG_RUID(ruid) 365#define AUDIT_ARG_SIGNUM(signum) 366#define AUDIT_ARG_SGID(sgid) 367#define AUDIT_ARG_SOCKET(sodomain, sotype, soprotocol) | 273} while (0) 274 275#define AUDIT_ARG_SUID(suid) do { \ 276 if (AUDITING_TD(curthread)) \ 277 audit_arg_suid((suid)); \ 278} while (0) 279 280#define AUDIT_ARG_TEXT(text) do { \ --- 79 unchanged lines hidden (view full) --- 360#define AUDIT_ARG_PROCESS(p) 361#define AUDIT_ARG_RGID(rgid) 362#define AUDIT_ARG_RIGHTS(rights) 363#define AUDIT_ARG_FCNTL_RIGHTS(fcntlrights) 364#define AUDIT_ARG_RUID(ruid) 365#define AUDIT_ARG_SIGNUM(signum) 366#define AUDIT_ARG_SGID(sgid) 367#define AUDIT_ARG_SOCKET(sodomain, sotype, soprotocol) |
368#define AUDIT_ARG_SOCKADDR(td, sa) | 368#define AUDIT_ARG_SOCKADDR(td, dirfd, sa) |
369#define AUDIT_ARG_SUID(suid) 370#define AUDIT_ARG_TEXT(text) 371#define AUDIT_ARG_UID(uid) 372#define AUDIT_ARG_UPATH1(td, dirfd, upath) 373#define AUDIT_ARG_UPATH2(td, dirfd, upath) 374#define AUDIT_ARG_VALUE(value) 375#define AUDIT_ARG_VNODE1(vp) 376#define AUDIT_ARG_VNODE2(vp) 377 378#define AUDIT_SYSCALL_ENTER(code, td) 379#define AUDIT_SYSCALL_EXIT(error, td) 380 381#define AUDIT_SYSCLOSE(p, fd) 382 383#endif /* AUDIT */ 384 385#endif /* !_SECURITY_AUDIT_KERNEL_H_ */ | 369#define AUDIT_ARG_SUID(suid) 370#define AUDIT_ARG_TEXT(text) 371#define AUDIT_ARG_UID(uid) 372#define AUDIT_ARG_UPATH1(td, dirfd, upath) 373#define AUDIT_ARG_UPATH2(td, dirfd, upath) 374#define AUDIT_ARG_VALUE(value) 375#define AUDIT_ARG_VNODE1(vp) 376#define AUDIT_ARG_VNODE2(vp) 377 378#define AUDIT_SYSCALL_ENTER(code, td) 379#define AUDIT_SYSCALL_EXIT(error, td) 380 381#define AUDIT_SYSCLOSE(p, fd) 382 383#endif /* AUDIT */ 384 385#endif /* !_SECURITY_AUDIT_KERNEL_H_ */ |