PERFORCE change 90639 for review
Robert Watson
rwatson at FreeBSD.org
Sun Jan 29 12:39:44 PST 2006
http://perforce.freebsd.org/chv.cgi?CH=90639
Change 90639 by rwatson at rwatson_peppercorn on 2006/01/29 20:38:59
style(9).
Affected files ...
.. //depot/projects/trustedbsd/openbsm/bsm/audit.h#14 edit
Differences ...
==== //depot/projects/trustedbsd/openbsm/bsm/audit.h#14 (text+ko) ====
@@ -30,37 +30,37 @@
*
* @APPLE_BSD_LICENSE_HEADER_END@
*
- * $P4: //depot/projects/trustedbsd/openbsm/bsm/audit.h#13 $
+ * $P4: //depot/projects/trustedbsd/openbsm/bsm/audit.h#14 $
*/
#ifndef _BSM_AUDIT_H
#define _BSM_AUDIT_H
#define AUDIT_RECORD_MAGIC 0x828a0f1b
-#define MAX_AUDIT_RECORDS 20
-#define MAX_AUDIT_RECORD_SIZE 4096
-#define MIN_AUDIT_FILE_SIZE (512 * 1024)
+#define MAX_AUDIT_RECORDS 20
+#define MAX_AUDIT_RECORD_SIZE 4096
+#define MIN_AUDIT_FILE_SIZE (512 * 1024)
/*
* Triggers for the audit daemon
*/
-#define AUDIT_TRIGGER_MIN 1
-#define AUDIT_TRIGGER_LOW_SPACE 1
-#define AUDIT_TRIGGER_OPEN_NEW 2
-#define AUDIT_TRIGGER_READ_FILE 3
-#define AUDIT_TRIGGER_CLOSE_AND_DIE 4
-#define AUDIT_TRIGGER_NO_SPACE 5
-#define AUDIT_TRIGGER_MAX 5
+#define AUDIT_TRIGGER_MIN 1
+#define AUDIT_TRIGGER_LOW_SPACE 1
+#define AUDIT_TRIGGER_OPEN_NEW 2
+#define AUDIT_TRIGGER_READ_FILE 3
+#define AUDIT_TRIGGER_CLOSE_AND_DIE 4
+#define AUDIT_TRIGGER_NO_SPACE 5
+#define AUDIT_TRIGGER_MAX 5
/*
* File that will be read for trigger events from the kernel
*/
-#define AUDIT_TRIGGER_FILE "/dev/audit"
+#define AUDIT_TRIGGER_FILE "/dev/audit"
/*
* Pre-defined audit IDs
*/
-#define AU_DEFAUDITID -1
+#define AU_DEFAUDITID -1
/*
* Define the masks for the classes of audit events.
@@ -103,71 +103,74 @@
/*
* IPC types
*/
-#define AT_IPC_MSG ((u_char)1) /* message IPC id */
-#define AT_IPC_SEM ((u_char)2) /* semaphore IPC id */
-#define AT_IPC_SHM ((u_char)3) /* shared mem IPC id */
+#define AT_IPC_MSG ((u_char)1) /* Message IPC id. */
+#define AT_IPC_SEM ((u_char)2) /* Semaphore IPC id. */
+#define AT_IPC_SHM ((u_char)3) /* Shared mem IPC id. */
/*
* Audit conditions.
*/
-#define AUC_UNSET 0
-#define AUC_AUDITING 1
-#define AUC_NOAUDIT 2
-#define AUC_DISABLED -1
+#define AUC_UNSET 0
+#define AUC_AUDITING 1
+#define AUC_NOAUDIT 2
+#define AUC_DISABLED -1
/*
* auditon(2) commands.
*/
-#define A_GETPOLICY 2
-#define A_SETPOLICY 3
-#define A_GETKMASK 4
-#define A_SETKMASK 5
+#define A_GETPOLICY 2
+#define A_SETPOLICY 3
+#define A_GETKMASK 4
+#define A_SETKMASK 5
#define A_GETQCTRL 6
-#define A_SETQCTRL 7
-#define A_GETCWD 8
-#define A_GETCAR 9
-#define A_GETSTAT 12
-#define A_SETSTAT 13
+#define A_SETQCTRL 7
+#define A_GETCWD 8
+#define A_GETCAR 9
+#define A_GETSTAT 12
+#define A_SETSTAT 13
#define A_SETUMASK 14
-#define A_SETSMASK 15
-#define A_GETCOND 20
-#define A_SETCOND 21
-#define A_GETCLASS 22
-#define A_SETCLASS 23
-#define A_GETPINFO 24
-#define A_SETPMASK 25
-#define A_SETFSIZE 26
-#define A_GETFSIZE 27
-#define A_GETPINFO_ADDR 28
-#define A_GETKAUDIT 29
-#define A_SETKAUDIT 30
-#define A_SENDTRIGGER 31
+#define A_SETSMASK 15
+#define A_GETCOND 20
+#define A_SETCOND 21
+#define A_GETCLASS 22
+#define A_SETCLASS 23
+#define A_GETPINFO 24
+#define A_SETPMASK 25
+#define A_SETFSIZE 26
+#define A_GETFSIZE 27
+#define A_GETPINFO_ADDR 28
+#define A_GETKAUDIT 29
+#define A_SETKAUDIT 30
+#define A_SENDTRIGGER 31
/*
* Audit policy controls.
*/
-#define AUDIT_CNT 0x0001
-#define AUDIT_AHLT 0x0002
-#define AUDIT_ARGV 0x0004
-#define AUDIT_ARGE 0x0008
-#define AUDIT_PASSWD 0x0010
-#define AUDIT_SEQ 0x0020
-#define AUDIT_WINDATA 0x0040
-#define AUDIT_USER 0x0080
-#define AUDIT_GROUP 0x0100
-#define AUDIT_TRAIL 0x0200
-#define AUDIT_PATH 0x0400
+#define AUDIT_CNT 0x0001
+#define AUDIT_AHLT 0x0002
+#define AUDIT_ARGV 0x0004
+#define AUDIT_ARGE 0x0008
+#define AUDIT_PASSWD 0x0010
+#define AUDIT_SEQ 0x0020
+#define AUDIT_WINDATA 0x0040
+#define AUDIT_USER 0x0080
+#define AUDIT_GROUP 0x0100
+#define AUDIT_TRAIL 0x0200
+#define AUDIT_PATH 0x0400
/*
* Audit queue control parameters
*/
-#define AQ_HIWATER 100
-#define AQ_MAXHIGH 10000
-#define AQ_LOWATER 10
-#define AQ_BUFSZ 1024
-#define AQ_MAXBUFSZ 1048576
+#define AQ_HIWATER 100
+#define AQ_MAXHIGH 10000
+#define AQ_LOWATER 10
+#define AQ_BUFSZ 1024
+#define AQ_MAXBUFSZ 1048576
-#define AU_FS_MINFREE 20 /* default min filesystem freespace, in percent */
+/*
+ * Default minimum percentage free space on file system.
+ */
+#define AU_FS_MINFREE 20
/*
* Type definitions used indicating the length of variable length addresses
@@ -178,83 +181,83 @@
__BEGIN_DECLS
-typedef uid_t au_id_t;
-typedef pid_t au_asid_t;
-typedef u_int16_t au_event_t;
-typedef u_int16_t au_emod_t;
-typedef u_int32_t au_class_t;
+typedef uid_t au_id_t;
+typedef pid_t au_asid_t;
+typedef u_int16_t au_event_t;
+typedef u_int16_t au_emod_t;
+typedef u_int32_t au_class_t;
struct au_tid {
- dev_t port;
- u_int32_t machine;
+ dev_t port;
+ u_int32_t machine;
};
-typedef struct au_tid au_tid_t;
+typedef struct au_tid au_tid_t;
struct au_tid_addr {
- dev_t at_port;
- u_int32_t at_type;
- u_int32_t at_addr[4];
+ dev_t at_port;
+ u_int32_t at_type;
+ u_int32_t at_addr[4];
};
-typedef struct au_tid_addr au_tid_addr_t;
+typedef struct au_tid_addr au_tid_addr_t;
struct au_mask {
- unsigned int am_success; /* success bits */
- unsigned int am_failure; /* failure bits */
+ unsigned int am_success; /* Success bits. */
+ unsigned int am_failure; /* Failure bits. */
};
-typedef struct au_mask au_mask_t;
+typedef struct au_mask au_mask_t;
struct auditinfo {
- au_id_t ai_auid; /* Audit user ID */
- au_mask_t ai_mask; /* Audit masks */
- au_tid_t ai_termid; /* Terminal ID */
- au_asid_t ai_asid; /* Audit session ID */
+ au_id_t ai_auid; /* Audit user ID. */
+ au_mask_t ai_mask; /* Audit masks. */
+ au_tid_t ai_termid; /* Terminal ID. */
+ au_asid_t ai_asid; /* Audit session ID. */
};
-typedef struct auditinfo auditinfo_t;
+typedef struct auditinfo auditinfo_t;
struct auditinfo_addr {
- au_id_t ai_auid; /* Audit user ID */
- au_mask_t ai_mask; /* Audit masks */
- au_tid_addr_t ai_termid; /* Terminal ID */
- au_asid_t ai_asid; /* Audit session ID */
+ au_id_t ai_auid; /* Audit user ID. */
+ au_mask_t ai_mask; /* Audit masks. */
+ au_tid_addr_t ai_termid; /* Terminal ID. */
+ au_asid_t ai_asid; /* Audit session ID. */
};
-typedef struct auditinfo_addr auditinfo_addr_t;
+typedef struct auditinfo_addr auditinfo_addr_t;
struct auditpinfo {
- pid_t ap_pid; /* ID of target process */
- au_id_t ap_auid; /* Audit user ID */
- au_mask_t ap_mask; /* Audit masks */
- au_tid_t ap_termid; /* Terminal ID */
- au_asid_t ap_asid; /* Audit session ID */
+ pid_t ap_pid; /* ID of target process. */
+ au_id_t ap_auid; /* Audit user ID. */
+ au_mask_t ap_mask; /* Audit masks. */
+ au_tid_t ap_termid; /* Terminal ID. */
+ au_asid_t ap_asid; /* Audit session ID. */
};
-typedef struct auditpinfo auditpinfo_t;
+typedef struct auditpinfo auditpinfo_t;
struct auditpinfo_addr {
- pid_t ap_pid; /* ID of target process */
- au_id_t ap_auid; /* Audit user ID */
- au_mask_t ap_mask; /* Audit masks */
- au_tid_addr_t ap_termid; /* Terminal ID */
- au_asid_t ap_asid; /* Audit session ID */
+ pid_t ap_pid; /* ID of target process. */
+ au_id_t ap_auid; /* Audit user ID. */
+ au_mask_t ap_mask; /* Audit masks. */
+ au_tid_addr_t ap_termid; /* Terminal ID. */
+ au_asid_t ap_asid; /* Audit session ID. */
};
-typedef struct auditpinfo_addr auditpinfo_addr_t;
+typedef struct auditpinfo_addr auditpinfo_addr_t;
-/* Token and record structures */
+/* Token and record structures. */
struct au_token {
- u_char *t_data;
- size_t len;
- TAILQ_ENTRY(au_token) tokens;
+ u_char *t_data;
+ size_t len;
+ TAILQ_ENTRY(au_token) tokens;
};
-typedef struct au_token token_t;
+typedef struct au_token token_t;
struct au_record {
- char used; /* Is this record currently being used */
- int desc; /* The descriptor associated with this record */
- TAILQ_HEAD(, au_token) token_q; /* queue of BSM tokens */
- u_char *data;
- size_t len;
- LIST_ENTRY(au_record) au_rec_q;
+ char used; /* Record currently in use? */
+ int desc; /* Descriptor for record. */
+ TAILQ_HEAD(, au_token) token_q; /* Queue of BSM tokens. */
+ u_char *data;
+ size_t len;
+ LIST_ENTRY(au_record) au_rec_q;
};
-typedef struct au_record au_record_t;
+typedef struct au_record au_record_t;
/*
* Kernel audit queue control parameters.
@@ -264,59 +267,59 @@
size_t aq_lowater;
size_t aq_bufsz;
clock_t aq_delay;
- int aq_minfree; /* minimum filesystem percent free space */
+ int aq_minfree; /* Minimum filesystem percent free space. */
};
-typedef struct au_qctrl au_qctrl_t;
+typedef struct au_qctrl au_qctrl_t;
/*
* Structure for the audit statistics.
*/
struct audit_stat {
- unsigned int as_version;
- unsigned int as_numevent;
- int as_generated;
- int as_nonattring;
- int as_kernel;
- int as_audit;
- int as_auditctl;
- int as_enqueu;
- int as_written;
- int as_wblocked;
- int as_rblocked;
- int as_dropped;
- int as_totalsize;
- unsigned int as_memused;
+ unsigned int as_version;
+ unsigned int as_numevent;
+ int as_generated;
+ int as_nonattring;
+ int as_kernel;
+ int as_audit;
+ int as_auditctl;
+ int as_enqueu;
+ int as_written;
+ int as_wblocked;
+ int as_rblocked;
+ int as_dropped;
+ int as_totalsize;
+ unsigned int as_memused;
};
-typedef struct audit_stat au_stat_t;
+typedef struct audit_stat au_stat_t;
/*
* Structure for the audit file statistics.
*/
struct audit_fstat {
- u_quad_t af_filesz;
- u_quad_t af_currsz;
+ u_quad_t af_filesz;
+ u_quad_t af_currsz;
};
-typedef struct audit_fstat au_fstat_t;
+typedef struct audit_fstat au_fstat_t;
/*
* Audit to event class mapping.
*/
struct au_evclass_map {
- au_event_t ec_number;
- au_class_t ec_class;
+ au_event_t ec_number;
+ au_class_t ec_class;
};
-typedef struct au_evclass_map au_evclass_map_t;
+typedef struct au_evclass_map au_evclass_map_t;
#if !defined(_KERNEL) && !defined(KERNEL)
-int audit(const void *, int);
-int auditon(int, void *, int);
-int auditctl(const char *);
-int getauid(au_id_t *);
-int setauid(const au_id_t *);
-int getaudit(struct auditinfo *);
-int setaudit(const struct auditinfo *);
-int getaudit_addr(struct auditinfo_addr *, int);
-int setaudit_addr(const struct auditinfo_addr *, int);
+int audit(const void *, int);
+int auditon(int, void *, int);
+int auditctl(const char *);
+int getauid(au_id_t *);
+int setauid(const au_id_t *);
+int getaudit(struct auditinfo *);
+int setaudit(const struct auditinfo *);
+int getaudit_addr(struct auditinfo_addr *, int);
+int setaudit_addr(const struct auditinfo_addr *, int);
#endif /* defined(_KERNEL) || defined(KERNEL) */
__END_DECLS
More information about the p4-projects
mailing list