audit_private.h (195925) | audit_private.h (195926) |
---|---|
1/*- 2 * Copyright (c) 1999-2009 Apple Inc. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 12 unchanged lines hidden (view full) --- 21 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * | 1/*- 2 * Copyright (c) 1999-2009 Apple Inc. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 12 unchanged lines hidden (view full) --- 21 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 25 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 26 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * |
29 * $FreeBSD: head/sys/security/audit/audit_private.h 195925 2009-07-28 21:39:58Z rwatson $ | 29 * $FreeBSD: head/sys/security/audit/audit_private.h 195926 2009-07-28 21:52:24Z rwatson $ |
30 */ 31 32/* 33 * This include file contains function prototypes and type definitions used 34 * within the audit implementation. 35 */ 36 37#ifndef _SECURITY_AUDIT_PRIVATE_H_ --- 197 unchanged lines hidden (view full) --- 235 * Arguments in the audit record are initially not defined; flags are set to 236 * indicate if they are present so they can be included in the audit log 237 * stream only if defined. 238 */ 239#define ARG_IS_VALID(kar, arg) ((kar)->k_ar.ar_valid_arg & (arg)) 240#define ARG_SET_VALID(kar, arg) do { \ 241 (kar)->k_ar.ar_valid_arg |= (arg); \ 242} while (0) | 30 */ 31 32/* 33 * This include file contains function prototypes and type definitions used 34 * within the audit implementation. 35 */ 36 37#ifndef _SECURITY_AUDIT_PRIVATE_H_ --- 197 unchanged lines hidden (view full) --- 235 * Arguments in the audit record are initially not defined; flags are set to 236 * indicate if they are present so they can be included in the audit log 237 * stream only if defined. 238 */ 239#define ARG_IS_VALID(kar, arg) ((kar)->k_ar.ar_valid_arg & (arg)) 240#define ARG_SET_VALID(kar, arg) do { \ 241 (kar)->k_ar.ar_valid_arg |= (arg); \ 242} while (0) |
243#define ARG_CLEAR_VALID(kar, arg) do { \ 244 (kar)->k_ar.ar_valid_arg &= ~(arg); \ 245} while (0) |
|
243 244/* 245 * In-kernel version of audit record; the basic record plus queue meta-data. 246 * This record can also have a pointer set to some opaque data that will be 247 * passed through to the audit writing mechanism. 248 */ 249struct kaudit_record { 250 struct audit_record k_ar; --- 116 unchanged lines hidden --- | 246 247/* 248 * In-kernel version of audit record; the basic record plus queue meta-data. 249 * This record can also have a pointer set to some opaque data that will be 250 * passed through to the audit writing mechanism. 251 */ 252struct kaudit_record { 253 struct audit_record k_ar; --- 116 unchanged lines hidden --- |