• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/kern/

Lines Matching refs:in

7  * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
29 * NOTICE: This file was modified by McAfee Research in 2004 to introduce
31 * is included in support of clause 2.2 (b) of the Apple Public License,
87 #include <netinet/in.h>
137 * not yet in the queue, which is needed to estimate the total
138 * size of the combined set of records outstanding in the system.
152 * either new records are in the queue, or a log replacement is taking
170 * one can have the replacement "in progress" at any given moment. If
172 * is already in progress (i.e., audit_replacement_flag != 0), then it
217 * Flags controlling behavior in low storage situations.
227 * When in a fail-stop mode, threads will drop into this wait queue
390 * If the estimated amount of audit data in the audit event queue
393 * audit fail stop state, in which we do not permit the
399 * in CAPP.
464 * check to see if we're in a failure mode, and if so, whether
542 * start any other replacements started in parallel. We can
543 * continue about our business in the mean time. We
748 * has been replaced in, so we can return successfully.
794 * record to the kernel for inclusion in the audit log. This function
1060 * we are modifying the audit info in a credential so we need a new
1062 * matches our new one). We must do this because the audit info in the
1064 * in the target process and take a reference while we muck with it.
1075 * in; if there is a change, we drop the reference on
1076 * the credential we passed in. The subsequent
1201 * we are modifying the audit info in a credential so we need a new
1203 * matches our new one). We must do this because the audit info in the
1205 * in the target process and take a reference while we muck with it.
1214 * we get back the same credential we passed in; if there is
1216 * passed in. The subsequent compare is safe, because it is
1311 * we are modifying the audit info in a credential so we need a new
1313 * matches our new one). We must do this because the audit info in the
1315 * in the target process and take a reference while we muck with it.
1323 * we get back the same credential we passed in; if there is
1325 * passed in. The subsequent compare is safe, because it is
1421 * Accessibility of the vnode was determined in
1480 * correspond to changes in the audit state. The dummy
1482 * be used in the final version (with modified event numbers).
1501 * calls in the kernel.
1744 * in the BSD thread for later use.
1816 * point result in the audit record being committed.
1817 * This suppression behavior will probably go away in
1884 * Allocate an audit record, if desired, and store in the BSD
2179 * is absolute. This results in the real (non-chroot) path being recorded
2180 * in the audit record.
2410 * '/' into account for chroot if the path is absolute. This results in the
2411 * real (non-chroot) path being recorded in the audit record.
2467 * XXX: Error handling in this function is poor.
2522 * If vn_getpath() succeeds, place it in a string buffer