• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /xnu-2782.1.97/bsd/security/audit/

Lines Matching refs:k_ar

110 	ar->k_ar.ar_arg_addr = addr;
125 ar->k_ar.ar_arg_exitstatus = status;
126 ar->k_ar.ar_arg_exitretval = retval;
134 ar->k_ar.ar_arg_len = len;
142 ar->k_ar.ar_arg_fd = fd;
150 ar->k_ar.ar_arg_fflags = fflags;
158 ar->k_ar.ar_arg_gid = gid;
166 ar->k_ar.ar_arg_uid = uid;
174 ar->k_ar.ar_arg_egid = egid;
182 ar->k_ar.ar_arg_euid = euid;
190 ar->k_ar.ar_arg_rgid = rgid;
198 ar->k_ar.ar_arg_ruid = ruid;
206 ar->k_ar.ar_arg_sgid = sgid;
214 ar->k_ar.ar_arg_suid = suid;
224 ar->k_ar.ar_arg_groups.gidset[i] = gidset[i];
225 ar->k_ar.ar_arg_groups.gidset_size = gidset_size;
233 strlcpy(ar->k_ar.ar_arg_login, login, MAXLOGNAME);
241 bcopy(name, &ar->k_ar.ar_arg_ctlname, namelen * sizeof(int));
242 ar->k_ar.ar_arg_len = namelen;
250 ar->k_ar.ar_arg_mask = mask;
258 ar->k_ar.ar_arg_mode = mode;
266 ar->k_ar.ar_arg_value32 = value32;
274 ar->k_ar.ar_arg_value64 = value64;
282 ar->k_ar.ar_arg_uid = uid;
283 ar->k_ar.ar_arg_gid = gid;
291 ar->k_ar.ar_arg_pid = pid;
306 ar->k_ar.ar_arg_auid = my_cred->cr_audit.as_aia_p->ai_auid;
307 ar->k_ar.ar_arg_asid = my_cred->cr_audit.as_aia_p->ai_asid;
309 &ar->k_ar.ar_arg_termid_addr, sizeof(au_tid_addr_t));
310 ar->k_ar.ar_arg_euid = kauth_cred_getuid(my_cred);
311 ar->k_ar.ar_arg_egid = kauth_cred_getgid(my_cred);
312 ar->k_ar.ar_arg_ruid = kauth_cred_getruid(my_cred);
313 ar->k_ar.ar_arg_rgid = kauth_cred_getrgid(my_cred);
315 ar->k_ar.ar_arg_pid = p->p_pid;
324 ar->k_ar.ar_arg_signum = signum;
333 ar->k_ar.ar_arg_sockinfo.sai_domain = sodomain;
334 ar->k_ar.ar_arg_sockinfo.sai_type = sotype;
335 ar->k_ar.ar_arg_sockinfo.sai_protocol = soprotocol;
359 bcopy(sa, &ar->k_ar.ar_arg_sockaddr, sa->sa_len);
396 ar->k_ar.ar_arg_auid = auid;
404 ar->k_ar.ar_arg_auid = au_info->ai_auid;
405 ar->k_ar.ar_arg_asid = au_info->ai_asid;
406 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success;
407 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure;
408 ar->k_ar.ar_arg_termid.port = au_info->ai_termid.port;
409 ar->k_ar.ar_arg_termid.machine = au_info->ai_termid.machine;
418 ar->k_ar.ar_arg_auid = au_info->ai_auid;
419 ar->k_ar.ar_arg_asid = au_info->ai_asid;
420 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success;
421 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure;
422 ar->k_ar.ar_arg_termid_addr.at_type = au_info->ai_termid.at_type;
423 ar->k_ar.ar_arg_termid_addr.at_port = au_info->ai_termid.at_port;
424 ar->k_ar.ar_arg_termid_addr.at_addr[0] = au_info->ai_termid.at_addr[0];
425 ar->k_ar.ar_arg_termid_addr.at_addr[1] = au_info->ai_termid.at_addr[1];
426 ar->k_ar.ar_arg_termid_addr.at_addr[2] = au_info->ai_termid.at_addr[2];
427 ar->k_ar.ar_arg_termid_addr.at_addr[3] = au_info->ai_termid.at_addr[3];
438 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_TEXT);
442 if (ar->k_ar.ar_arg_text == NULL)
443 ar->k_ar.ar_arg_text = malloc(MAXPATHLEN, M_AUDITTEXT,
446 strncpy(ar->k_ar.ar_arg_text, text, MAXPATHLEN);
460 if (ar->k_ar.ar_arg_opaque == NULL)
461 ar->k_ar.ar_arg_opaque = malloc(size, M_AUDITDATA, M_WAITOK);
465 memcpy(ar->k_ar.ar_arg_opaque, data, size);
466 ar->k_ar.ar_arg_opq_size = (u_int16_t) size;
487 if (ar->k_ar.ar_arg_data == NULL)
488 ar->k_ar.ar_arg_data = malloc(sz, M_AUDITDATA, M_WAITOK);
492 memcpy(ar->k_ar.ar_arg_data, data, sz);
496 ar->k_ar.ar_arg_data_type = AUR_BYTE;
500 ar->k_ar.ar_arg_data_type = AUR_SHORT;
504 ar->k_ar.ar_arg_data_type = AUR_INT32;
508 ar->k_ar.ar_arg_data_type = AUR_INT64;
512 free(ar->k_ar.ar_arg_data, M_AUDITDATA);
513 ar->k_ar.ar_arg_data = NULL;
517 ar->k_ar.ar_arg_data_count = (u_char)number;
526 ar->k_ar.ar_arg_cmd = cmd;
534 ar->k_ar.ar_arg_svipc_cmd = cmd;
542 bcopy(perm, &ar->k_ar.ar_arg_svipc_perm,
543 sizeof(ar->k_ar.ar_arg_svipc_perm));
551 ar->k_ar.ar_arg_svipc_id = id;
559 ar->k_ar.ar_arg_svipc_addr = addr;
568 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid;
569 ar->k_ar.ar_arg_pipc_perm.pipc_gid = gid;
570 ar->k_ar.ar_arg_pipc_perm.pipc_mode = mode;
578 bcopy((void *)udata, &ar->k_ar.ar_arg_auditon,
579 sizeof(ar->k_ar.ar_arg_auditon));
608 ar->k_ar.ar_arg_sockinfo.sai_type =
610 ar->k_ar.ar_arg_sockinfo.sai_domain = SOCK_DOM(so);
611 ar->k_ar.ar_arg_sockinfo.sai_protocol = SOCK_PROTO(so);
614 &ar->k_ar.ar_arg_sockinfo.sai_faddr;
618 &ar->k_ar.ar_arg_sockinfo.sai_laddr;
626 ar->k_ar.ar_arg_sockinfo.sai_type =
628 ar->k_ar.ar_arg_sockinfo.sai_domain = SOCK_DOM(so);
629 ar->k_ar.ar_arg_sockinfo.sai_protocol = SOCK_PROTO(so);
632 &ar->k_ar.ar_arg_sockinfo.sai_faddr;
636 &ar->k_ar.ar_arg_sockinfo.sai_laddr;
675 pathp = &ar->k_ar.ar_arg_upath1;
677 pathp = &ar->k_ar.ar_arg_upath2;
736 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_KPATH1);
737 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_VNODE1);
738 pathp = &ar->k_ar.ar_arg_kpath1;
739 vnp = &ar->k_ar.ar_arg_vnode1;
741 vnode_mac_labelp = &ar->k_ar.ar_vnode1_mac_labels;
744 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_KPATH2);
745 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_VNODE2);
746 pathp = &ar->k_ar.ar_arg_kpath2;
747 vnp = &ar->k_ar.ar_arg_vnode2;
749 vnode_mac_labelp = &ar->k_ar.ar_vnode2_mac_labels;
828 ar->k_ar.ar_arg_mach_port1 = port;
836 ar->k_ar.ar_arg_mach_port2 = port;
851 if (ar->k_ar.ar_arg_argv == NULL)
852 ar->k_ar.ar_arg_argv = malloc(length, M_AUDITTEXT, M_WAITOK);
853 bcopy(argv, ar->k_ar.ar_arg_argv, length);
854 ar->k_ar.ar_arg_argc = argc;
868 if (ar->k_ar.ar_arg_envv == NULL)
869 ar->k_ar.ar_arg_envv = malloc(length, M_AUDITTEXT, M_WAITOK);
870 bcopy(envv, ar->k_ar.ar_arg_envv, length);
871 ar->k_ar.ar_arg_envc = envc;