• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /xnu-2422.115.4/bsd/security/audit/

Lines Matching defs:se

136 	struct au_sentry	 se;
156 au_history_record(au_sentry_t *se, au_history_event_t event)
166 bcopy(se, &p->se, sizeof(p->se));
168 p->ptr = se;
171 #define au_history_record(se, event) do {} while (0)
176 static void audit_ref_session(au_sentry_t *se);
177 static void audit_unref_session(au_sentry_t *se);
439 au_sentry_t *se;
448 se = AU_SENTRY_PTR(aia_p);
449 if (se->se_refcnt != sdtp->se_refcnt) {
451 (int64_t)se->se_refcnt;
453 if (se->se_procnt != sdtp->se_procnt) {
455 (int64_t)se->se_procnt;
477 au_sentry_t *se;
494 LIST_FOREACH(se, &au_sentry_bucket[i], se_link)
495 if (se != NULL)
541 LIST_FOREACH(se, &au_sentry_bucket[i], se_link) {
542 if (se != NULL) {
543 next_sed->se_auinfo = se->se_auinfo;
544 next_sed->se_refcnt = (int64_t)se->se_refcnt;
545 next_sed->se_procnt = (int64_t)se->se_procnt;
569 * Create and commit a session audit event. The proc and se arguments needs to
671 audit_session_remove(au_sentry_t *se)
676 au_history_record(se, AU_HISTORY_EVENT_DEATH);
677 KASSERT(se->se_refcnt == 0, ("audit_session_remove: ref count != 0"));
678 KASSERT(se != &audit_default_se,
681 hkey = HASH_ASID(se->se_asid);
687 if (se->se_refcnt != 0) {
692 audit_session_portdestroy(&se->se_port);
694 if (found_se == se) {
717 audit_ref_session(au_sentry_t *se)
721 if (se == NULL || se == &audit_default_se)
724 au_history_record(se, AU_HISTORY_EVENT_REF);
726 old_val = OSAddAtomicLong(1, &se->se_refcnt);
735 audit_unref_session(au_sentry_t *se)
739 if (se == NULL || se == &audit_default_se)
742 au_history_record(se, AU_HISTORY_EVENT_UNREF);
744 old_val = OSAddAtomicLong(-1, &se->se_refcnt);
746 audit_session_remove(se);
755 audit_inc_procount(au_sentry_t *se)
759 if (se == NULL || se == &audit_default_se)
762 old_val = OSAddAtomicLong(1, &se->se_procnt);
772 audit_dec_procount(au_sentry_t *se)
776 if (se == NULL || se == &audit_default_se)
779 old_val = OSAddAtomicLong(-1, &se->se_procnt);
785 audit_session_event(AUE_SESSION_END, &se->se_auinfo);
797 audit_update_sentry(au_sentry_t *se, auditinfo_addr_t *new_aia)
799 auditinfo_addr_t *aia = &se->se_auinfo;
843 au_sentry_t *se = NULL;
854 se = malloc(sizeof(au_sentry_t), M_AU_SESSION, M_WAITOK | M_ZERO);
887 free(se, M_AU_SESSION);
909 se->se_refcnt = se->se_procnt = 1;
915 se->se_port = IPC_PORT_NULL;
916 aia = &se->se_auinfo;
926 LIST_INSERT_HEAD(&au_sentry_bucket[HASH_ASID(new_asid)], se, se_link);
933 au_history_record(se, AU_HISTORY_EVENT_BIRTH);
944 au_sentry_t *se = NULL;
949 if ((se = audit_session_find(asid)) == NULL) {
956 bcopy(&se->se_auinfo, ret_aia, sizeof(*ret_aia));
957 audit_unref_session(se);
1225 au_sentry_t *se;
1241 se = AU_SENTRY_PTR(aia_p);
1247 if (se->se_port == IPC_PORT_NULL)
1248 bcopy(&cred->cr_audit.as_mask, &se->se_mask,
1249 sizeof(se->se_mask));
1255 sendport = audit_session_mksend(aia_p, &se->se_port);
1294 au_sentry_t *se = NULL;
1327 se = AU_SENTRY_PTR(aia_p);
1328 audit_ref_session(se);
1334 se = audit_session_find(uap->asid);
1336 if (NULL == se) {
1340 aia_p = &se->se_auinfo;
1350 if (se->se_port == IPC_PORT_NULL)
1351 bcopy(&cred->cr_audit.as_mask, &se->se_mask,
1352 sizeof(se->se_mask));
1359 sendport = audit_session_mksend(aia_p, &se->se_port);
1369 if (NULL != se)
1370 audit_unref_session(se);