Lines Matching defs:tad

95 	t_audit_data_t *tad;	/* current thread */
98 tad = U2A(u);
108 if (tad->tad_flag != 0 && flag == ENOENT && pvp != NULL &&
109 (tad->tad_ctrl & TAD_PUBLIC_EV) &&
116 tad->tad_ctrl |= TAD_NOAUDIT;
138 if ((tad->tad_flag == 0 && !(tad->tad_ctrl & TAD_SAVPATH)) ||
139 ((tad->tad_ctrl & TAD_PATHFND) &&
141 (tad->tad_ctrl & TAD_NOPATH)) {
145 tad->tad_ctrl |= TAD_NOPATH; /* prevent possible reentry */
154 if (tad->tad_flag) {
156 (tad->tad_scid == SYS_open ||
157 tad->tad_scid == SYS_open64 ||
158 tad->tad_scid == SYS_openat ||
159 tad->tad_scid == SYS_openat64)) {
160 tad->tad_ctrl |= TAD_TRUE_CREATE;
164 au_uwrite(au_to_path(tad->tad_aupath));
178 if (!flag && !(tad->tad_ctrl & TAD_NOATTRB))
184 if ((tad->tad_ctrl & TAD_SAVPATH) == 0) {
185 if (tad->tad_aupath != NULL) {
186 au_pathrele(tad->tad_aupath);
187 tad->tad_aupath = NULL;
190 if (tad->tad_ctrl & TAD_MLD)
191 tad->tad_ctrl |= TAD_PATHFND;
193 tad->tad_ctrl &= ~TAD_NOPATH; /* restore */
205 t_audit_data_t *tad; /* current thread */
208 tad = U2A(u);
209 ASSERT(tad != NULL);
218 if (tad->tad_aupath != NULL) {
219 pfxapp = tad->tad_aupath;
220 } else if ((tad->tad_ctrl & TAD_ATCALL) && pnp->pn_buf[0] != '/') {
221 ASSERT(tad->tad_atpath != NULL);
222 pfxapp = tad->tad_atpath;
223 } else if (tad->tad_ctrl & TAD_ABSPATH) {
232 newsect = tad->tad_ctrl & TAD_ATTPATH;
249 if (tad->tad_aupath)
250 au_pathrele(tad->tad_aupath);
251 tad->tad_aupath = newapp;
254 tad->tad_ctrl &= ~(TAD_ABSPATH | TAD_ATTPATH);
281 t_audit_data_t *tad;
283 tad = U2A(u);
302 if ((tad->tad_flag == 0 && !(tad->tad_ctrl & TAD_SAVPATH)) ||
303 ((tad->tad_ctrl & TAD_PATHFND) &&
305 (tad->tad_ctrl & TAD_NOPATH)) {
310 tad->tad_ctrl |= TAD_ABSPATH;
311 if (tad->tad_aupath != NULL) {
312 au_pathrele(tad->tad_aupath);
313 tad->tad_aupath = NULL;
350 t_audit_data_t *tad;
353 tad = U2A(u);
372 if ((tad->tad_flag == 0 &&
373 !(tad->tad_ctrl & TAD_SAVPATH)) ||
374 ((tad->tad_ctrl & TAD_PATHFND) &&
376 (tad->tad_ctrl & TAD_NOPATH)) {
455 struct t_audit_data *tad;
457 tad = U2A(u);
465 (tad->tad_ctrl & TAD_PUBLIC_EV)) {
471 * Flag it in the tad to prevent this audit at the end.
473 tad->tad_ctrl |= TAD_NOAUDIT;
494 struct t_audit_data *tad;
495 tad = U2A(u);
501 if (tad->tad_scid == SYS_exit) {
506 if (tad->tad_flag && tad->tad_event == AUE_EXIT)
514 if (tad->tad_flag) {
516 audit_finish(0, tad->tad_scid, 0, 0);
538 t_audit_data_t *tad;
541 tad = U2A(u);
543 ASSERT(tad != (t_audit_data_t *)0);
545 ASSERT(tad->tad_scid == 0);
546 ASSERT(tad->tad_event == 0);
547 ASSERT(tad->tad_evmod == 0);
548 ASSERT(tad->tad_ctrl == 0);
549 ASSERT(tad->tad_flag == 0);
550 ASSERT(tad->tad_aupath == NULL);
558 if ((tad->tad_flag = auditme(kctx, tad, estate)) == 0)
562 tad->tad_ctrl = TAD_CORE;
563 tad->tad_scid = 0;
570 tad->tad_flag = 0;
571 tad->tad_ctrl = 0;
575 tad->tad_event = event;
576 tad->tad_evmod = 0;
578 ASSERT(tad->tad_ad == NULL);
597 t_audit_data_t *tad;
600 tad = U2A(u);
602 ASSERT(tad != (t_audit_data_t *)0);
604 if ((flag = tad->tad_flag) == 0) {
605 tad->tad_event = 0;
606 tad->tad_evmod = 0;
607 tad->tad_ctrl = 0;
608 ASSERT(tad->tad_aupath == NULL);
611 tad->tad_flag = 0;
616 if (flag = audit_success(kctx, tad, 0, NULL)) {
629 add_return_token((caddr_t *)&(u_ad), tad->tad_scid, 0, 0);
636 au_close(kctx, &(u_ad), flag, tad->tad_event, tad->tad_evmod, NULL);
639 if (tad->tad_aupath != NULL) {
640 au_pathrele(tad->tad_aupath);
641 tad->tad_aupath = NULL;
643 tad->tad_event = 0;
644 tad->tad_evmod = 0;
645 tad->tad_ctrl = 0;
655 t_audit_data_t *tad = U2A(u);
657 ASSERT(tad != (t_audit_data_t *)0);
665 if (!tad->tad_flag) {
685 t_audit_data_t *tad = U2A(u);
687 ASSERT(tad != (t_audit_data_t *)0);
695 if (!tad->tad_flag) {
732 t_audit_data_t *tad;
747 tad = U2A(u);
751 if (tad->tad_event == AUE_CLOSE) {
753 tad->tad_evmod |= (au_emod_t)fad->fad_flags;
758 auditing = (tad->tad_audit == AUC_UNSET) ?
759 kctx->auk_auditstate : tad->tad_audit;
814 add_return_token((caddr_t *)&(ad), tad->tad_scid, 0, 0);
846 t_audit_data_t *tad;
851 tad = T2A(curthread);
854 if (!(tad->tad_scid == SYS_open ||
855 tad->tad_scid == SYS_open64 ||
856 tad->tad_scid == SYS_openat ||
857 tad->tad_scid == SYS_openat64))
861 if (tad->tad_aupath == 0)
866 * use tad hold
868 fad->fad_aupath = tad->tad_aupath;
869 tad->tad_aupath = NULL;
871 if (!(tad->tad_ctrl & TAD_TRUE_CREATE)) {
873 switch (tad->tad_event) {
875 tad->tad_event = AUE_OPEN_R;
876 tad->tad_ctrl |= TAD_PUBLIC_EV;
879 tad->tad_event = AUE_OPEN_RT;
882 tad->tad_event = AUE_OPEN_W;
885 tad->tad_event = AUE_OPEN_WT;
888 tad->tad_event = AUE_OPEN_RW;
891 tad->tad_event = AUE_OPEN_RWT;
962 t_audit_data_t *tad;
965 tad = U2A(u);
968 if (tad->tad_flag == 0)
972 if (flag = audit_success(kctx, tad, 0, NULL)) {
985 add_return_token((caddr_t *)&(u_ad), tad->tad_scid, 0, 0);
1000 tad->tad_event, tad->tad_evmod, NULL);
1009 t_audit_data_t *tad;
1025 tad = U2A(u);
1026 ASSERT(tad != NULL);
1028 switch (tad->tad_scid) {
1061 if (tad->tad_atpath != NULL) {
1062 au_pathrele(tad->tad_atpath);
1063 tad->tad_atpath = NULL;
1067 tad->tad_ctrl |= TAD_ATCALL;
1069 if (tad->tad_scid == SYS_openat ||
1070 tad->tad_scid == SYS_openat64) {
1073 tad->tad_ctrl |= TAD_ATTPATH;
1078 tad->tad_ctrl |= TAD_NOPATH;
1084 tad->tad_ctrl |= TAD_NOPATH;
1089 tad->tad_atpath = fad->fad_aupath;
1092 if (tad->tad_scid == SYS_open ||
1093 tad->tad_scid == SYS_open64) {
1096 tad->tad_ctrl |= TAD_ATTPATH;
1103 tad->tad_atpath = pad->pad_cwd;
1111 t_audit_data_t *tad;
1114 tad = U2A(u);
1117 if (tad->tad_flag == 0)
1145 t_audit_data_t *tad;
1147 tad = U2A(u);
1148 tad->tad_ctrl |= TAD_NOATTRB;
1162 t_audit_data_t *tad;
1167 tad = U2A(u);
1170 if (tad->tad_flag == 0)
1173 if (tad->tad_ctrl & TAD_TRUE_CREATE) {
1177 if (tad->tad_ctrl & TAD_CORE) {
1179 tad->tad_ctrl &= ~TAD_CORE;
1182 if (!error && ((tad->tad_event == AUE_MKNOD) ||
1183 (tad->tad_event == AUE_MKDIR))) {
1188 tad->tad_ctrl &= ~TAD_NOATTRB;
1215 t_audit_data_t *tad;
1218 tad = U2A(u);
1221 if (!tad->tad_flag)
1232 tad->tad_event = AUE_PFEXEC;
1363 t_audit_data_t *tad = T2A(curthread);
1369 if ((tad->tad_scid == SYS_chdir) || (tad->tad_scid == SYS_chroot)) {
1370 chdir = tad->tad_scid == SYS_chdir;
1371 if (tad->tad_aupath) {
1378 /* use tad hold */
1379 *appp = tad->tad_aupath;
1380 tad->tad_aupath = NULL;
1383 } else if ((tad->tad_scid == SYS_fchdir) ||
1384 (tad->tad_scid == SYS_fchroot)) {
1385 fchdir = tad->tad_scid == SYS_fchdir;
1399 if (tad->tad_flag) {
1432 t_audit_data_t *tad;
1472 tad = U2A(u);
1477 if (!tad->tad_flag)
1502 tad->tad_event = AUE_SOCKCONNECT;
1515 tad->tad_event = AUE_SOCKACCEPT;
1528 tad->tad_event = AUE_SOCKSEND;
1541 tad->tad_event = AUE_SOCKRECEIVE;
1555 tad->tad_event = AUE_GETMSG;
1563 au_write(&(tad->tad_ad), au_to_sock_inet(sock_data));
1566 tad->tad_event = AUE_GETMSG;
1606 t_audit_data_t *tad; /* current thread */
1611 tad = U2A(u);
1612 ASSERT(tad != (t_audit_data_t *)0);
1613 if (!tad->tad_flag)
1641 t_audit_data_t *tad;
1648 tad = U2A(u);
1650 if (tad->tad_flag == 0)
1653 target = flag ? &tad->tad_sprivs : &tad->tad_fprivs;
1657 if (!(tad->tad_evmod & sbit)) {
1660 tad->tad_evmod |= sbit;
1663 /* Save the privileges in the tad */
1683 t_audit_data_t *tad;
1688 tad = U2A(u);
1690 if (tad->tad_flag == 0)
1727 t_audit_data_t *tad;
1730 tad = U2A(u);
1732 if (tad->tad_flag == 0)
1756 t_audit_data_t *tad; /* current thread */
1761 tad = U2A(u);
1762 ASSERT(tad != (t_audit_data_t *)0);
1763 if (!tad->tad_flag)
1802 t_audit_data_t *tad;
1808 tad = U2A(u);
1809 if (tad == NULL)
1815 tad->tad_event = AUE_CRYPTOADM;
1817 if (audit_success(kctx, tad, error, NULL) != AU_OK)
1934 add_return_token((caddr_t *)&ad, tad->tad_scid, -1, error);
1936 add_return_token((caddr_t *)&ad, tad->tad_scid, 0, rv);
1941 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CRYPTOADM, tad->tad_evmod,
1954 t_audit_data_t *tad;
1959 tad = U2A(u);
1964 tad->tad_event = AUE_CONFIGKSSL;
1966 if (audit_success(kctx, tad, error, NULL) != AU_OK)
2009 add_return_token((caddr_t *)&ad, tad->tad_scid, error, 0);
2014 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CONFIGKSSL, tad->tad_evmod,
2037 t_audit_data_t *tad;
2043 tad = U2A(u);
2044 if (tad == NULL)
2058 tad->tad_event = AUE_PF_POLICY_ADDRULE;
2063 tad->tad_event = AUE_PF_POLICY_DELRULE;
2068 tad->tad_event = AUE_PF_POLICY_FLUSH;
2073 tad->tad_event = AUE_PF_POLICY_ALGS;
2078 tad->tad_event = AUE_PF_POLICY_CLONE;
2083 tad->tad_event = AUE_PF_POLICY_FLIP;
2088 tad->tad_event = AUE_NULL;
2091 tad->tad_evmod = 0;
2093 if (flag = audit_success(kctx, tad, error, cred)) {
2147 au_close(kctx, (caddr_t *)&ad, flag, tad->tad_event, tad->tad_evmod,
2154 tad->tad_scid = 0;
2155 tad->tad_event = 0;
2156 tad->tad_evmod = 0;
2157 tad->tad_ctrl = 0;