• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/sys/security/audit/

Lines Matching refs:ar

75 	struct kaudit_record *ar;
77 ar = currecord();
78 if (ar == NULL)
81 ar->k_ar.ar_arg_addr = addr;
82 ARG_SET_VALID(ar, ARG_ADDR);
88 struct kaudit_record *ar;
90 ar = currecord();
91 if (ar == NULL)
94 ar->k_ar.ar_arg_exitstatus = status;
95 ar->k_ar.ar_arg_exitretval = retval;
96 ARG_SET_VALID(ar, ARG_EXIT);
102 struct kaudit_record *ar;
104 ar = currecord();
105 if (ar == NULL)
108 ar->k_ar.ar_arg_len = len;
109 ARG_SET_VALID(ar, ARG_LEN);
115 struct kaudit_record *ar;
117 ar = currecord();
118 if (ar == NULL)
121 ar->k_ar.ar_arg_atfd1 = atfd;
122 ARG_SET_VALID(ar, ARG_ATFD1);
128 struct kaudit_record *ar;
130 ar = currecord();
131 if (ar == NULL)
134 ar->k_ar.ar_arg_atfd2 = atfd;
135 ARG_SET_VALID(ar, ARG_ATFD2);
141 struct kaudit_record *ar;
143 ar = currecord();
144 if (ar == NULL)
147 ar->k_ar.ar_arg_fd = fd;
148 ARG_SET_VALID(ar, ARG_FD);
154 struct kaudit_record *ar;
156 ar = currecord();
157 if (ar == NULL)
160 ar->k_ar.ar_arg_fflags = fflags;
161 ARG_SET_VALID(ar, ARG_FFLAGS);
167 struct kaudit_record *ar;
169 ar = currecord();
170 if (ar == NULL)
173 ar->k_ar.ar_arg_gid = gid;
174 ARG_SET_VALID(ar, ARG_GID);
180 struct kaudit_record *ar;
182 ar = currecord();
183 if (ar == NULL)
186 ar->k_ar.ar_arg_uid = uid;
187 ARG_SET_VALID(ar, ARG_UID);
193 struct kaudit_record *ar;
195 ar = currecord();
196 if (ar == NULL)
199 ar->k_ar.ar_arg_egid = egid;
200 ARG_SET_VALID(ar, ARG_EGID);
206 struct kaudit_record *ar;
208 ar = currecord();
209 if (ar == NULL)
212 ar->k_ar.ar_arg_euid = euid;
213 ARG_SET_VALID(ar, ARG_EUID);
219 struct kaudit_record *ar;
221 ar = currecord();
222 if (ar == NULL)
225 ar->k_ar.ar_arg_rgid = rgid;
226 ARG_SET_VALID(ar, ARG_RGID);
232 struct kaudit_record *ar;
234 ar = currecord();
235 if (ar == NULL)
238 ar->k_ar.ar_arg_ruid = ruid;
239 ARG_SET_VALID(ar, ARG_RUID);
245 struct kaudit_record *ar;
247 ar = currecord();
248 if (ar == NULL)
251 ar->k_ar.ar_arg_sgid = sgid;
252 ARG_SET_VALID(ar, ARG_SGID);
258 struct kaudit_record *ar;
260 ar = currecord();
261 if (ar == NULL)
264 ar->k_ar.ar_arg_suid = suid;
265 ARG_SET_VALID(ar, ARG_SUID);
272 struct kaudit_record *ar;
277 ar = currecord();
278 if (ar == NULL)
281 if (ar->k_ar.ar_arg_groups.gidset == NULL)
282 ar->k_ar.ar_arg_groups.gidset = malloc(
286 ar->k_ar.ar_arg_groups.gidset[i] = gidset[i];
287 ar->k_ar.ar_arg_groups.gidset_size = gidset_size;
288 ARG_SET_VALID(ar, ARG_GROUPSET);
294 struct kaudit_record *ar;
296 ar = currecord();
297 if (ar == NULL)
300 strlcpy(ar->k_ar.ar_arg_login, login, MAXLOGNAME);
301 ARG_SET_VALID(ar, ARG_LOGIN);
307 struct kaudit_record *ar;
309 ar = currecord();
310 if (ar == NULL)
313 bcopy(name, &ar->k_ar.ar_arg_ctlname, namelen * sizeof(int));
314 ar->k_ar.ar_arg_len = namelen;
315 ARG_SET_VALID(ar, ARG_CTLNAME | ARG_LEN);
321 struct kaudit_record *ar;
323 ar = currecord();
324 if (ar == NULL)
327 ar->k_ar.ar_arg_mask = mask;
328 ARG_SET_VALID(ar, ARG_MASK);
334 struct kaudit_record *ar;
336 ar = currecord();
337 if (ar == NULL)
340 ar->k_ar.ar_arg_mode = mode;
341 ARG_SET_VALID(ar, ARG_MODE);
347 struct kaudit_record *ar;
349 ar = currecord();
350 if (ar == NULL)
353 ar->k_ar.ar_arg_dev = dev;
354 ARG_SET_VALID(ar, ARG_DEV);
360 struct kaudit_record *ar;
362 ar = currecord();
363 if (ar == NULL)
366 ar->k_ar.ar_arg_value = value;
367 ARG_SET_VALID(ar, ARG_VALUE);
373 struct kaudit_record *ar;
375 ar = currecord();
376 if (ar == NULL)
379 ar->k_ar.ar_arg_uid = uid;
380 ar->k_ar.ar_arg_gid = gid;
381 ARG_SET_VALID(ar, ARG_UID | ARG_GID);
387 struct kaudit_record *ar;
389 ar = currecord();
390 if (ar == NULL)
393 ar->k_ar.ar_arg_pid = pid;
394 ARG_SET_VALID(ar, ARG_PID);
400 struct kaudit_record *ar;
407 ar = currecord();
408 if (ar == NULL)
412 ar->k_ar.ar_arg_auid = cred->cr_audit.ai_auid;
413 ar->k_ar.ar_arg_euid = cred->cr_uid;
414 ar->k_ar.ar_arg_egid = cred->cr_groups[0];
415 ar->k_ar.ar_arg_ruid = cred->cr_ruid;
416 ar->k_ar.ar_arg_rgid = cred->cr_rgid;
417 ar->k_ar.ar_arg_asid = cred->cr_audit.ai_asid;
418 ar->k_ar.ar_arg_termid_addr = cred->cr_audit.ai_termid;
419 ar->k_ar.ar_arg_pid = p->p_pid;
420 ARG_SET_VALID(ar, ARG_AUID | ARG_EUID | ARG_EGID | ARG_RUID |
427 struct kaudit_record *ar;
429 ar = currecord();
430 if (ar == NULL)
433 ar->k_ar.ar_arg_signum = signum;
434 ARG_SET_VALID(ar, ARG_SIGNUM);
440 struct kaudit_record *ar;
442 ar = currecord();
443 if (ar == NULL)
446 ar->k_ar.ar_arg_sockinfo.so_domain = sodomain;
447 ar->k_ar.ar_arg_sockinfo.so_type = sotype;
448 ar->k_ar.ar_arg_sockinfo.so_protocol = soprotocol;
449 ARG_SET_VALID(ar, ARG_SOCKINFO);
455 struct kaudit_record *ar;
460 ar = currecord();
461 if (ar == NULL)
464 bcopy(sa, &ar->k_ar.ar_arg_sockaddr, sa->sa_len);
467 ARG_SET_VALID(ar, ARG_SADDRINET);
471 ARG_SET_VALID(ar, ARG_SADDRINET6);
479 ARG_SET_VALID(ar, ARG_SADDRUNIX);
488 struct kaudit_record *ar;
490 ar = currecord();
491 if (ar == NULL)
494 ar->k_ar.ar_arg_auid = auid;
495 ARG_SET_VALID(ar, ARG_AUID);
501 struct kaudit_record *ar;
503 ar = currecord();
504 if (ar == NULL)
507 ar->k_ar.ar_arg_auid = au_info->ai_auid;
508 ar->k_ar.ar_arg_asid = au_info->ai_asid;
509 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success;
510 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure;
511 ar->k_ar.ar_arg_termid.port = au_info->ai_termid.port;
512 ar->k_ar.ar_arg_termid.machine = au_info->ai_termid.machine;
513 ARG_SET_VALID(ar, ARG_AUID | ARG_ASID | ARG_AMASK | ARG_TERMID);
519 struct kaudit_record *ar;
521 ar = currecord();
522 if (ar == NULL)
525 ar->k_ar.ar_arg_auid = au_info->ai_auid;
526 ar->k_ar.ar_arg_asid = au_info->ai_asid;
527 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success;
528 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure;
529 ar->k_ar.ar_arg_termid_addr.at_type = au_info->ai_termid.at_type;
530 ar->k_ar.ar_arg_termid_addr.at_port = au_info->ai_termid.at_port;
531 ar->k_ar.ar_arg_termid_addr.at_addr[0] = au_info->ai_termid.at_addr[0];
532 ar->k_ar.ar_arg_termid_addr.at_addr[1] = au_info->ai_termid.at_addr[1];
533 ar->k_ar.ar_arg_termid_addr.at_addr[2] = au_info->ai_termid.at_addr[2];
534 ar->k_ar.ar_arg_termid_addr.at_addr[3] = au_info->ai_termid.at_addr[3];
535 ARG_SET_VALID(ar, ARG_AUID | ARG_ASID | ARG_AMASK | ARG_TERMID_ADDR);
541 struct kaudit_record *ar;
545 ar = currecord();
546 if (ar == NULL)
550 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_TEXT);
552 if (ar->k_ar.ar_arg_text == NULL)
553 ar->k_ar.ar_arg_text = malloc(MAXPATHLEN, M_AUDITTEXT,
556 strncpy(ar->k_ar.ar_arg_text, text, MAXPATHLEN);
557 ARG_SET_VALID(ar, ARG_TEXT);
563 struct kaudit_record *ar;
565 ar = currecord();
566 if (ar == NULL)
569 ar->k_ar.ar_arg_cmd = cmd;
570 ARG_SET_VALID(ar, ARG_CMD);
576 struct kaudit_record *ar;
578 ar = currecord();
579 if (ar == NULL)
582 ar->k_ar.ar_arg_svipc_cmd = cmd;
583 ARG_SET_VALID(ar, ARG_SVIPC_CMD);
589 struct kaudit_record *ar;
591 ar = currecord();
592 if (ar == NULL)
595 bcopy(perm, &ar->k_ar.ar_arg_svipc_perm,
596 sizeof(ar->k_ar.ar_arg_svipc_perm));
597 ARG_SET_VALID(ar, ARG_SVIPC_PERM);
603 struct kaudit_record *ar;
605 ar = currecord();
606 if (ar == NULL)
609 ar->k_ar.ar_arg_svipc_id = id;
610 ARG_SET_VALID(ar, ARG_SVIPC_ID);
616 struct kaudit_record *ar;
618 ar = currecord();
619 if (ar == NULL)
622 ar->k_ar.ar_arg_svipc_addr = addr;
623 ARG_SET_VALID(ar, ARG_SVIPC_ADDR);
629 struct kaudit_record *ar;
631 ar = currecord();
632 if (ar == NULL)
635 ar->k_ar.ar_arg_svipc_which = which;
636 ARG_SET_VALID(ar, ARG_SVIPC_WHICH);
642 struct kaudit_record *ar;
644 ar = currecord();
645 if (ar == NULL)
648 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid;
649 ar->k_ar.ar_arg_pipc_perm.pipc_gid = gid;
650 ar->k_ar.ar_arg_pipc_perm.pipc_mode = mode;
651 ARG_SET_VALID(ar, ARG_POSIX_IPC_PERM);
657 struct kaudit_record *ar;
659 ar = currecord();
660 if (ar == NULL)
663 bcopy((void *)udata, &ar->k_ar.ar_arg_auditon,
664 sizeof(ar->k_ar.ar_arg_auditon));
665 ARG_SET_VALID(ar, ARG_AUDITON);
675 struct kaudit_record *ar;
680 ar = currecord();
681 if (ar == NULL)
700 ar->k_ar.ar_arg_sockinfo.so_type =
702 ar->k_ar.ar_arg_sockinfo.so_domain =
704 ar->k_ar.ar_arg_sockinfo.so_protocol =
709 ar->k_ar.ar_arg_sockinfo.so_raddr =
711 ar->k_ar.ar_arg_sockinfo.so_laddr =
713 ar->k_ar.ar_arg_sockinfo.so_rport =
715 ar->k_ar.ar_arg_sockinfo.so_lport =
718 ARG_SET_VALID(ar, ARG_SOCKINFO);
747 struct kaudit_record *ar;
749 ar = currecord();
750 if (ar == NULL)
753 audit_arg_upath(td, dirfd, upath, &ar->k_ar.ar_arg_upath1);
754 ARG_SET_VALID(ar, ARG_UPATH1);
760 struct kaudit_record *ar;
762 ar = currecord();
763 if (ar == NULL)
766 audit_arg_upath(td, dirfd, upath, &ar->k_ar.ar_arg_upath2);
767 ARG_SET_VALID(ar, ARG_UPATH2);
784 struct kaudit_record *ar;
786 ar = currecord();
787 if (ar == NULL)
790 audit_arg_upath_vp(td, rdir, cdir, upath, &ar->k_ar.ar_arg_upath1);
791 ARG_SET_VALID(ar, ARG_UPATH1);
798 struct kaudit_record *ar;
800 ar = currecord();
801 if (ar == NULL)
804 audit_arg_upath_vp(td, rdir, cdir, upath, &ar->k_ar.ar_arg_upath2);
805 ARG_SET_VALID(ar, ARG_UPATH2);
827 struct kaudit_record *ar;
829 ar = currecord();
830 if (ar == NULL)
833 audit_arg_upath_canon(upath, &ar->k_ar.ar_arg_upath1);
834 ARG_SET_VALID(ar, ARG_UPATH1);
840 struct kaudit_record *ar;
842 ar = currecord();
843 if (ar == NULL)
846 audit_arg_upath_canon(upath, &ar->k_ar.ar_arg_upath2);
847 ARG_SET_VALID(ar, ARG_UPATH2);
895 struct kaudit_record *ar;
898 ar = currecord();
899 if (ar == NULL)
902 ARG_CLEAR_VALID(ar, ARG_VNODE1);
903 error = audit_arg_vnode(vp, &ar->k_ar.ar_arg_vnode1);
905 ARG_SET_VALID(ar, ARG_VNODE1);
911 struct kaudit_record *ar;
914 ar = currecord();
915 if (ar == NULL)
918 ARG_CLEAR_VALID(ar, ARG_VNODE2);
919 error = audit_arg_vnode(vp, &ar->k_ar.ar_arg_vnode2);
921 ARG_SET_VALID(ar, ARG_VNODE2);
930 struct kaudit_record *ar;
935 ar = currecord();
936 if (ar == NULL)
939 ar->k_ar.ar_arg_argv = malloc(length, M_AUDITTEXT, M_WAITOK);
940 bcopy(argv, ar->k_ar.ar_arg_argv, length);
941 ar->k_ar.ar_arg_argc = argc;
942 ARG_SET_VALID(ar, ARG_ARGV);
951 struct kaudit_record *ar;
956 ar = currecord();
957 if (ar == NULL)
960 ar->k_ar.ar_arg_envv = malloc(length, M_AUDITTEXT, M_WAITOK);
961 bcopy(envv, ar->k_ar.ar_arg_envv, length);
962 ar->k_ar.ar_arg_envc = envc;
963 ARG_SET_VALID(ar, ARG_ENVV);
969 struct kaudit_record *ar;
971 ar = currecord();
972 if (ar == NULL)
975 ar->k_ar.ar_arg_rights = *rightsp;
976 ARG_SET_VALID(ar, ARG_RIGHTS);
982 struct kaudit_record *ar;
984 ar = currecord();
985 if (ar == NULL)
988 ar->k_ar.ar_arg_fcntl_rights = fcntlrights;
989 ARG_SET_VALID(ar, ARG_FCNTL_RIGHTS);
1000 struct kaudit_record *ar;
1005 ar = currecord();
1006 if (ar == NULL)