Searched refs:audit_write (Results 1 - 3 of 3) sorted by relevance
/freebsd-11-stable/sys/security/audit/ |
H A D | audit_trigger.c | 124 audit_write(struct cdev *dev, struct uio *uio, int ioflag) function 156 .d_write = audit_write,
|
/freebsd-11-stable/contrib/openbsm/libbsm/ |
H A D | bsm_wrappers.c | 289 audit_write(short event_code, token_t *subject, token_t *misctok, char retval, function 293 char *func = "audit_write()"; 347 * Same caveats as audit_write(). In addition, this function explicitly 366 return (audit_write(event_code, subject, tok, 0, 0)); 370 * Same caveats as audit_write(). In addition, this function explicitly 384 return (audit_write(event_code, subject, tok, 0, 0)); 388 * Same caveats as audit_write(). In addition, this function explicitly 415 return (audit_write(event_code, subject, errtok, -1, errcode)); 419 * Same caveats as audit_write(). In addition, this function explicitly 441 return (audit_write(event_cod [all...] |
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 906 * Error return codes for audit_set_terminal_id(), audit_write() and its 955 * audit_write() does, in keeping with the existing memory management model 1032 * audit_write() 1034 * @summary - audit_write() is the basis for the other audit_write_*() 1040 * Note on memory management: audit_write() guarantees that the token_t *s 1069 int audit_write(short event_code, token_t *subject, token_t *misctok, 1078 * from the information passed in and uses that to invoke audit_write(). 1144 * from the information passed in and uses that to invoke audit_write().
|
Completed in 119 milliseconds