LIST_HEAD_INIT(audit_filter_list[4]),
        LIST_HEAD_INIT(audit_filter_list[5]),
        LIST_HEAD_INIT(audit_filter_list[6]),
-#if AUDIT_NR_FILTERS != 7
+       LIST_HEAD_INIT(audit_filter_list[7]),
+#if AUDIT_NR_FILTERS != 8
 #error Fix audit_filter_list initialiser
 #endif
 };
        LIST_HEAD_INIT(audit_rules_list[4]),
        LIST_HEAD_INIT(audit_rules_list[5]),
        LIST_HEAD_INIT(audit_rules_list[6]),
+       LIST_HEAD_INIT(audit_rules_list[7]),
 };
 
 DEFINE_MUTEX(audit_filter_mutex);
 static inline int audit_to_inode(struct audit_krule *krule,
                                 struct audit_field *f)
 {
-       if (krule->listnr != AUDIT_FILTER_EXIT ||
+       if ((krule->listnr != AUDIT_FILTER_EXIT &&
+            krule->listnr != AUDIT_FILTER_URING_EXIT) ||
            krule->inode_f || krule->watch || krule->tree ||
            (f->op != Audit_equal && f->op != Audit_not_equal))
                return -EINVAL;
                pr_err("AUDIT_FILTER_ENTRY is deprecated\n");
                goto exit_err;
        case AUDIT_FILTER_EXIT:
+       case AUDIT_FILTER_URING_EXIT:
        case AUDIT_FILTER_TASK:
 #endif
        case AUDIT_FILTER_USER:
                if (entry->rule.listnr != AUDIT_FILTER_FS)
                        return -EINVAL;
                break;
+       case AUDIT_PERM:
+               if (entry->rule.listnr == AUDIT_FILTER_URING_EXIT)
+                       return -EINVAL;
+               break;
        }
 
        switch (entry->rule.listnr) {
        }
 
        entry->rule.prio = ~0ULL;
-       if (entry->rule.listnr == AUDIT_FILTER_EXIT) {
+       if (entry->rule.listnr == AUDIT_FILTER_EXIT ||
+           entry->rule.listnr == AUDIT_FILTER_URING_EXIT) {
                if (entry->rule.flags & AUDIT_FILTER_PREPEND)
                        entry->rule.prio = ++prio_high;
                else
 
        return rule->mask[word] & bit;
 }
 
+/**
+ * audit_filter_uring - apply filters to an io_uring operation
+ * @tsk: associated task
+ * @ctx: audit context
+ */
+static void audit_filter_uring(struct task_struct *tsk,
+                              struct audit_context *ctx)
+{
+       struct audit_entry *e;
+       enum audit_state state;
+
+       if (auditd_test_task(tsk))
+               return;
+
+       rcu_read_lock();
+       list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_URING_EXIT],
+                               list) {
+               if (audit_in_mask(&e->rule, ctx->uring_op) &&
+                   audit_filter_rules(tsk, &e->rule, ctx, NULL, &state,
+                                      false)) {
+                       rcu_read_unlock();
+                       ctx->current_state = state;
+                       return;
+               }
+       }
+       rcu_read_unlock();
+}
+
 /* At syscall exit time, this filter is called if the audit_state is
  * not low enough that auditing cannot take place, but is also not
  * high enough that we already know we have to write an audit record
  * __audit_free - free a per-task audit context
  * @tsk: task whose audit context block to free
  *
- * Called from copy_process and do_exit
+ * Called from copy_process, do_exit, and the io_uring code
  */
 void __audit_free(struct task_struct *tsk)
 {
         * random task_struct that doesn't doesn't have any meaningful data we
         * need to log via audit_log_exit().
         */
-       if (tsk == current && !context->dummy &&
-           context->context == AUDIT_CTX_SYSCALL) {
+       if (tsk == current && !context->dummy) {
                context->return_valid = AUDITSC_INVALID;
                context->return_code = 0;
-
-               audit_filter_syscall(tsk, context);
-               audit_filter_inodes(tsk, context);
-               if (context->current_state == AUDIT_STATE_RECORD)
-                       audit_log_exit();
+               if (context->context == AUDIT_CTX_SYSCALL) {
+                       audit_filter_syscall(tsk, context);
+                       audit_filter_inodes(tsk, context);
+                       if (context->current_state == AUDIT_STATE_RECORD)
+                               audit_log_exit();
+               } else if (context->context == AUDIT_CTX_URING) {
+                       /* TODO: verify this case is real and valid */
+                       audit_filter_uring(tsk, context);
+                       audit_filter_inodes(tsk, context);
+                       if (context->current_state == AUDIT_STATE_RECORD)
+                               audit_log_uring(context);
+               }
        }
 
        audit_set_context(tsk, NULL);
 {
        struct audit_context *ctx = audit_context();
 
-       /*
-        * TODO: At some point we will likely want to filter on io_uring ops
-        *       and other things similar to what we do for syscalls, but that
-        *       is something for another day; just record what we can here.
-        */
-
        if (ctx->context == AUDIT_CTX_SYSCALL) {
                /*
                 * NOTE: See the note in __audit_uring_entry() about the case
                 * the behavior here.
                 */
                audit_filter_syscall(current, ctx);
+               if (ctx->current_state != AUDIT_STATE_RECORD)
+                       audit_filter_uring(current, ctx);
                audit_filter_inodes(current, ctx);
                if (ctx->current_state != AUDIT_STATE_RECORD)
                        return;
        if (!list_empty(&ctx->killed_trees))
                audit_kill_trees(ctx);
 
+       /* run through both filters to ensure we set the filterkey properly */
+       audit_filter_uring(current, ctx);
        audit_filter_inodes(current, ctx);
        if (ctx->current_state != AUDIT_STATE_RECORD)
                goto out;