Lines Matching +full:- +full:ar

1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
4 * Copyright (c) 1999-2005 Apple Inc.
5 * Copyright (c) 2016-2017 Robert N. M. Watson
10 * contract FA8650-15-C-7558 ("CADETS"), as part of the DARPA Transparent
64 * and pre-selection may not have allocated an audit record for this event.
72 struct kaudit_record *ar; in audit_arg_addr() local
74 ar = currecord(); in audit_arg_addr()
75 if (ar == NULL) in audit_arg_addr()
78 ar->k_ar.ar_arg_addr = addr; in audit_arg_addr()
79 ARG_SET_VALID(ar, ARG_ADDR); in audit_arg_addr()
85 struct kaudit_record *ar; in audit_arg_exit() local
87 ar = currecord(); in audit_arg_exit()
88 if (ar == NULL) in audit_arg_exit()
91 ar->k_ar.ar_arg_exitstatus = status; in audit_arg_exit()
92 ar->k_ar.ar_arg_exitretval = retval; in audit_arg_exit()
93 ARG_SET_VALID(ar, ARG_EXIT); in audit_arg_exit()
99 struct kaudit_record *ar; in audit_arg_len() local
101 ar = currecord(); in audit_arg_len()
102 if (ar == NULL) in audit_arg_len()
105 ar->k_ar.ar_arg_len = len; in audit_arg_len()
106 ARG_SET_VALID(ar, ARG_LEN); in audit_arg_len()
112 struct kaudit_record *ar; in audit_arg_atfd1() local
114 ar = currecord(); in audit_arg_atfd1()
115 if (ar == NULL) in audit_arg_atfd1()
118 ar->k_ar.ar_arg_atfd1 = atfd; in audit_arg_atfd1()
119 ARG_SET_VALID(ar, ARG_ATFD1); in audit_arg_atfd1()
125 struct kaudit_record *ar; in audit_arg_atfd2() local
127 ar = currecord(); in audit_arg_atfd2()
128 if (ar == NULL) in audit_arg_atfd2()
131 ar->k_ar.ar_arg_atfd2 = atfd; in audit_arg_atfd2()
132 ARG_SET_VALID(ar, ARG_ATFD2); in audit_arg_atfd2()
138 struct kaudit_record *ar; in audit_arg_fd() local
140 ar = currecord(); in audit_arg_fd()
141 if (ar == NULL) in audit_arg_fd()
144 ar->k_ar.ar_arg_fd = fd; in audit_arg_fd()
145 ARG_SET_VALID(ar, ARG_FD); in audit_arg_fd()
151 struct kaudit_record *ar; in audit_arg_fflags() local
153 ar = currecord(); in audit_arg_fflags()
154 if (ar == NULL) in audit_arg_fflags()
157 ar->k_ar.ar_arg_fflags = fflags; in audit_arg_fflags()
158 ARG_SET_VALID(ar, ARG_FFLAGS); in audit_arg_fflags()
164 struct kaudit_record *ar; in audit_arg_gid() local
166 ar = currecord(); in audit_arg_gid()
167 if (ar == NULL) in audit_arg_gid()
170 ar->k_ar.ar_arg_gid = gid; in audit_arg_gid()
171 ARG_SET_VALID(ar, ARG_GID); in audit_arg_gid()
177 struct kaudit_record *ar; in audit_arg_uid() local
179 ar = currecord(); in audit_arg_uid()
180 if (ar == NULL) in audit_arg_uid()
183 ar->k_ar.ar_arg_uid = uid; in audit_arg_uid()
184 ARG_SET_VALID(ar, ARG_UID); in audit_arg_uid()
190 struct kaudit_record *ar; in audit_arg_egid() local
192 ar = currecord(); in audit_arg_egid()
193 if (ar == NULL) in audit_arg_egid()
196 ar->k_ar.ar_arg_egid = egid; in audit_arg_egid()
197 ARG_SET_VALID(ar, ARG_EGID); in audit_arg_egid()
203 struct kaudit_record *ar; in audit_arg_euid() local
205 ar = currecord(); in audit_arg_euid()
206 if (ar == NULL) in audit_arg_euid()
209 ar->k_ar.ar_arg_euid = euid; in audit_arg_euid()
210 ARG_SET_VALID(ar, ARG_EUID); in audit_arg_euid()
216 struct kaudit_record *ar; in audit_arg_rgid() local
218 ar = currecord(); in audit_arg_rgid()
219 if (ar == NULL) in audit_arg_rgid()
222 ar->k_ar.ar_arg_rgid = rgid; in audit_arg_rgid()
223 ARG_SET_VALID(ar, ARG_RGID); in audit_arg_rgid()
229 struct kaudit_record *ar; in audit_arg_ruid() local
231 ar = currecord(); in audit_arg_ruid()
232 if (ar == NULL) in audit_arg_ruid()
235 ar->k_ar.ar_arg_ruid = ruid; in audit_arg_ruid()
236 ARG_SET_VALID(ar, ARG_RUID); in audit_arg_ruid()
242 struct kaudit_record *ar; in audit_arg_sgid() local
244 ar = currecord(); in audit_arg_sgid()
245 if (ar == NULL) in audit_arg_sgid()
248 ar->k_ar.ar_arg_sgid = sgid; in audit_arg_sgid()
249 ARG_SET_VALID(ar, ARG_SGID); in audit_arg_sgid()
255 struct kaudit_record *ar; in audit_arg_suid() local
257 ar = currecord(); in audit_arg_suid()
258 if (ar == NULL) in audit_arg_suid()
261 ar->k_ar.ar_arg_suid = suid; in audit_arg_suid()
262 ARG_SET_VALID(ar, ARG_SUID); in audit_arg_suid()
269 struct kaudit_record *ar; in audit_arg_groupset() local
274 ar = currecord(); in audit_arg_groupset()
275 if (ar == NULL) in audit_arg_groupset()
278 if (ar->k_ar.ar_arg_groups.gidset == NULL) in audit_arg_groupset()
279 ar->k_ar.ar_arg_groups.gidset = malloc( in audit_arg_groupset()
283 ar->k_ar.ar_arg_groups.gidset[i] = gidset[i]; in audit_arg_groupset()
284 ar->k_ar.ar_arg_groups.gidset_size = gidset_size; in audit_arg_groupset()
285 ARG_SET_VALID(ar, ARG_GROUPSET); in audit_arg_groupset()
291 struct kaudit_record *ar; in audit_arg_login() local
293 ar = currecord(); in audit_arg_login()
294 if (ar == NULL) in audit_arg_login()
297 strlcpy(ar->k_ar.ar_arg_login, login, MAXLOGNAME); in audit_arg_login()
298 ARG_SET_VALID(ar, ARG_LOGIN); in audit_arg_login()
304 struct kaudit_record *ar; in audit_arg_ctlname() local
306 ar = currecord(); in audit_arg_ctlname()
307 if (ar == NULL) in audit_arg_ctlname()
310 bcopy(name, &ar->k_ar.ar_arg_ctlname, namelen * sizeof(int)); in audit_arg_ctlname()
311 ar->k_ar.ar_arg_len = namelen; in audit_arg_ctlname()
312 ARG_SET_VALID(ar, ARG_CTLNAME | ARG_LEN); in audit_arg_ctlname()
318 struct kaudit_record *ar; in audit_arg_mask() local
320 ar = currecord(); in audit_arg_mask()
321 if (ar == NULL) in audit_arg_mask()
324 ar->k_ar.ar_arg_mask = mask; in audit_arg_mask()
325 ARG_SET_VALID(ar, ARG_MASK); in audit_arg_mask()
331 struct kaudit_record *ar; in audit_arg_mode() local
333 ar = currecord(); in audit_arg_mode()
334 if (ar == NULL) in audit_arg_mode()
337 ar->k_ar.ar_arg_mode = mode; in audit_arg_mode()
338 ARG_SET_VALID(ar, ARG_MODE); in audit_arg_mode()
344 struct kaudit_record *ar; in audit_arg_dev() local
346 ar = currecord(); in audit_arg_dev()
347 if (ar == NULL) in audit_arg_dev()
350 ar->k_ar.ar_arg_dev = dev; in audit_arg_dev()
351 ARG_SET_VALID(ar, ARG_DEV); in audit_arg_dev()
357 struct kaudit_record *ar; in audit_arg_value() local
359 ar = currecord(); in audit_arg_value()
360 if (ar == NULL) in audit_arg_value()
363 ar->k_ar.ar_arg_value = value; in audit_arg_value()
364 ARG_SET_VALID(ar, ARG_VALUE); in audit_arg_value()
370 struct kaudit_record *ar; in audit_arg_owner() local
372 ar = currecord(); in audit_arg_owner()
373 if (ar == NULL) in audit_arg_owner()
376 ar->k_ar.ar_arg_uid = uid; in audit_arg_owner()
377 ar->k_ar.ar_arg_gid = gid; in audit_arg_owner()
378 ARG_SET_VALID(ar, ARG_UID | ARG_GID); in audit_arg_owner()
384 struct kaudit_record *ar; in audit_arg_pid() local
386 ar = currecord(); in audit_arg_pid()
387 if (ar == NULL) in audit_arg_pid()
390 ar->k_ar.ar_arg_pid = pid; in audit_arg_pid()
391 ARG_SET_VALID(ar, ARG_PID); in audit_arg_pid()
397 struct kaudit_record *ar; in audit_arg_process() local
404 ar = currecord(); in audit_arg_process()
405 if (ar == NULL) in audit_arg_process()
408 cred = p->p_ucred; in audit_arg_process()
409 ar->k_ar.ar_arg_auid = cred->cr_audit.ai_auid; in audit_arg_process()
410 ar->k_ar.ar_arg_euid = cred->cr_uid; in audit_arg_process()
411 ar->k_ar.ar_arg_egid = cred->cr_groups[0]; in audit_arg_process()
412 ar->k_ar.ar_arg_ruid = cred->cr_ruid; in audit_arg_process()
413 ar->k_ar.ar_arg_rgid = cred->cr_rgid; in audit_arg_process()
414 ar->k_ar.ar_arg_asid = cred->cr_audit.ai_asid; in audit_arg_process()
415 ar->k_ar.ar_arg_termid_addr = cred->cr_audit.ai_termid; in audit_arg_process()
416 ar->k_ar.ar_arg_pid = p->p_pid; in audit_arg_process()
417 ARG_SET_VALID(ar, ARG_AUID | ARG_EUID | ARG_EGID | ARG_RUID | in audit_arg_process()
424 struct kaudit_record *ar; in audit_arg_signum() local
426 ar = currecord(); in audit_arg_signum()
427 if (ar == NULL) in audit_arg_signum()
430 ar->k_ar.ar_arg_signum = signum; in audit_arg_signum()
431 ARG_SET_VALID(ar, ARG_SIGNUM); in audit_arg_signum()
437 struct kaudit_record *ar; in audit_arg_socket() local
439 ar = currecord(); in audit_arg_socket()
440 if (ar == NULL) in audit_arg_socket()
443 ar->k_ar.ar_arg_sockinfo.so_domain = sodomain; in audit_arg_socket()
444 ar->k_ar.ar_arg_sockinfo.so_type = sotype; in audit_arg_socket()
445 ar->k_ar.ar_arg_sockinfo.so_protocol = soprotocol; in audit_arg_socket()
446 ARG_SET_VALID(ar, ARG_SOCKINFO); in audit_arg_socket()
452 struct kaudit_record *ar; in audit_arg_sockaddr() local
457 ar = currecord(); in audit_arg_sockaddr()
458 if (ar == NULL) in audit_arg_sockaddr()
461 bcopy(sa, &ar->k_ar.ar_arg_sockaddr, sa->sa_len); in audit_arg_sockaddr()
462 switch (sa->sa_family) { in audit_arg_sockaddr()
464 ARG_SET_VALID(ar, ARG_SADDRINET); in audit_arg_sockaddr()
468 ARG_SET_VALID(ar, ARG_SADDRINET6); in audit_arg_sockaddr()
475 ((struct sockaddr_un *)sa)->sun_path); in audit_arg_sockaddr()
476 ARG_SET_VALID(ar, ARG_SADDRUNIX); in audit_arg_sockaddr()
485 struct kaudit_record *ar; in audit_arg_auid() local
487 ar = currecord(); in audit_arg_auid()
488 if (ar == NULL) in audit_arg_auid()
491 ar->k_ar.ar_arg_auid = auid; in audit_arg_auid()
492 ARG_SET_VALID(ar, ARG_AUID); in audit_arg_auid()
498 struct kaudit_record *ar; in audit_arg_auditinfo() local
500 ar = currecord(); in audit_arg_auditinfo()
501 if (ar == NULL) in audit_arg_auditinfo()
504 ar->k_ar.ar_arg_auid = au_info->ai_auid; in audit_arg_auditinfo()
505 ar->k_ar.ar_arg_asid = au_info->ai_asid; in audit_arg_auditinfo()
506 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success; in audit_arg_auditinfo()
507 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure; in audit_arg_auditinfo()
508 ar->k_ar.ar_arg_termid.port = au_info->ai_termid.port; in audit_arg_auditinfo()
509 ar->k_ar.ar_arg_termid.machine = au_info->ai_termid.machine; in audit_arg_auditinfo()
510 ARG_SET_VALID(ar, ARG_AUID | ARG_ASID | ARG_AMASK | ARG_TERMID); in audit_arg_auditinfo()
516 struct kaudit_record *ar; in audit_arg_auditinfo_addr() local
518 ar = currecord(); in audit_arg_auditinfo_addr()
519 if (ar == NULL) in audit_arg_auditinfo_addr()
522 ar->k_ar.ar_arg_auid = au_info->ai_auid; in audit_arg_auditinfo_addr()
523 ar->k_ar.ar_arg_asid = au_info->ai_asid; in audit_arg_auditinfo_addr()
524 ar->k_ar.ar_arg_amask.am_success = au_info->ai_mask.am_success; in audit_arg_auditinfo_addr()
525 ar->k_ar.ar_arg_amask.am_failure = au_info->ai_mask.am_failure; in audit_arg_auditinfo_addr()
526 ar->k_ar.ar_arg_termid_addr.at_type = au_info->ai_termid.at_type; in audit_arg_auditinfo_addr()
527 ar->k_ar.ar_arg_termid_addr.at_port = au_info->ai_termid.at_port; in audit_arg_auditinfo_addr()
528 ar->k_ar.ar_arg_termid_addr.at_addr[0] = au_info->ai_termid.at_addr[0]; in audit_arg_auditinfo_addr()
529 ar->k_ar.ar_arg_termid_addr.at_addr[1] = au_info->ai_termid.at_addr[1]; in audit_arg_auditinfo_addr()
530 ar->k_ar.ar_arg_termid_addr.at_addr[2] = au_info->ai_termid.at_addr[2]; in audit_arg_auditinfo_addr()
531 ar->k_ar.ar_arg_termid_addr.at_addr[3] = au_info->ai_termid.at_addr[3]; in audit_arg_auditinfo_addr()
532 ARG_SET_VALID(ar, ARG_AUID | ARG_ASID | ARG_AMASK | ARG_TERMID_ADDR); in audit_arg_auditinfo_addr()
538 struct kaudit_record *ar; in audit_arg_text() local
542 ar = currecord(); in audit_arg_text()
543 if (ar == NULL) in audit_arg_text()
547 ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_TEXT); in audit_arg_text()
549 if (ar->k_ar.ar_arg_text == NULL) in audit_arg_text()
550 ar->k_ar.ar_arg_text = malloc(MAXPATHLEN, M_AUDITTEXT, in audit_arg_text()
553 strncpy(ar->k_ar.ar_arg_text, text, MAXPATHLEN); in audit_arg_text()
554 ARG_SET_VALID(ar, ARG_TEXT); in audit_arg_text()
560 struct kaudit_record *ar; in audit_arg_cmd() local
562 ar = currecord(); in audit_arg_cmd()
563 if (ar == NULL) in audit_arg_cmd()
566 ar->k_ar.ar_arg_cmd = cmd; in audit_arg_cmd()
567 ARG_SET_VALID(ar, ARG_CMD); in audit_arg_cmd()
573 struct kaudit_record *ar; in audit_arg_svipc_cmd() local
575 ar = currecord(); in audit_arg_svipc_cmd()
576 if (ar == NULL) in audit_arg_svipc_cmd()
579 ar->k_ar.ar_arg_svipc_cmd = cmd; in audit_arg_svipc_cmd()
580 ARG_SET_VALID(ar, ARG_SVIPC_CMD); in audit_arg_svipc_cmd()
586 struct kaudit_record *ar; in audit_arg_svipc_perm() local
588 ar = currecord(); in audit_arg_svipc_perm()
589 if (ar == NULL) in audit_arg_svipc_perm()
592 bcopy(perm, &ar->k_ar.ar_arg_svipc_perm, in audit_arg_svipc_perm()
593 sizeof(ar->k_ar.ar_arg_svipc_perm)); in audit_arg_svipc_perm()
594 ARG_SET_VALID(ar, ARG_SVIPC_PERM); in audit_arg_svipc_perm()
600 struct kaudit_record *ar; in audit_arg_svipc_id() local
602 ar = currecord(); in audit_arg_svipc_id()
603 if (ar == NULL) in audit_arg_svipc_id()
606 ar->k_ar.ar_arg_svipc_id = id; in audit_arg_svipc_id()
607 ARG_SET_VALID(ar, ARG_SVIPC_ID); in audit_arg_svipc_id()
613 struct kaudit_record *ar; in audit_arg_svipc_addr() local
615 ar = currecord(); in audit_arg_svipc_addr()
616 if (ar == NULL) in audit_arg_svipc_addr()
619 ar->k_ar.ar_arg_svipc_addr = addr; in audit_arg_svipc_addr()
620 ARG_SET_VALID(ar, ARG_SVIPC_ADDR); in audit_arg_svipc_addr()
626 struct kaudit_record *ar; in audit_arg_svipc_which() local
628 ar = currecord(); in audit_arg_svipc_which()
629 if (ar == NULL) in audit_arg_svipc_which()
632 ar->k_ar.ar_arg_svipc_which = which; in audit_arg_svipc_which()
633 ARG_SET_VALID(ar, ARG_SVIPC_WHICH); in audit_arg_svipc_which()
639 struct kaudit_record *ar; in audit_arg_posix_ipc_perm() local
641 ar = currecord(); in audit_arg_posix_ipc_perm()
642 if (ar == NULL) in audit_arg_posix_ipc_perm()
645 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid; in audit_arg_posix_ipc_perm()
646 ar->k_ar.ar_arg_pipc_perm.pipc_gid = gid; in audit_arg_posix_ipc_perm()
647 ar->k_ar.ar_arg_pipc_perm.pipc_mode = mode; in audit_arg_posix_ipc_perm()
648 ARG_SET_VALID(ar, ARG_POSIX_IPC_PERM); in audit_arg_posix_ipc_perm()
654 struct kaudit_record *ar; in audit_arg_auditon() local
656 ar = currecord(); in audit_arg_auditon()
657 if (ar == NULL) in audit_arg_auditon()
660 bcopy((void *)udata, &ar->k_ar.ar_arg_auditon, in audit_arg_auditon()
661 sizeof(ar->k_ar.ar_arg_auditon)); in audit_arg_auditon()
662 ARG_SET_VALID(ar, ARG_AUDITON); in audit_arg_auditon()
672 struct kaudit_record *ar; in audit_arg_file() local
677 ar = currecord(); in audit_arg_file()
678 if (ar == NULL) in audit_arg_file()
681 switch (fp->f_type) { in audit_arg_file()
687 vp = fp->f_vnode; in audit_arg_file()
694 so = (struct socket *)fp->f_data; in audit_arg_file()
697 ar->k_ar.ar_arg_sockinfo.so_type = in audit_arg_file()
698 so->so_type; in audit_arg_file()
699 ar->k_ar.ar_arg_sockinfo.so_domain = in audit_arg_file()
701 ar->k_ar.ar_arg_sockinfo.so_protocol = in audit_arg_file()
702 so->so_proto->pr_protocol; in audit_arg_file()
704 pcb = (struct inpcb *)so->so_pcb; in audit_arg_file()
706 ar->k_ar.ar_arg_sockinfo.so_raddr = in audit_arg_file()
707 pcb->inp_faddr.s_addr; in audit_arg_file()
708 ar->k_ar.ar_arg_sockinfo.so_laddr = in audit_arg_file()
709 pcb->inp_laddr.s_addr; in audit_arg_file()
710 ar->k_ar.ar_arg_sockinfo.so_rport = in audit_arg_file()
711 pcb->inp_fport; in audit_arg_file()
712 ar->k_ar.ar_arg_sockinfo.so_lport = in audit_arg_file()
713 pcb->inp_lport; in audit_arg_file()
715 ARG_SET_VALID(ar, ARG_SOCKINFO); in audit_arg_file()
744 struct kaudit_record *ar; in audit_arg_upath1() local
746 ar = currecord(); in audit_arg_upath1()
747 if (ar == NULL) in audit_arg_upath1()
750 audit_arg_upath(td, dirfd, upath, &ar->k_ar.ar_arg_upath1); in audit_arg_upath1()
751 ARG_SET_VALID(ar, ARG_UPATH1); in audit_arg_upath1()
757 struct kaudit_record *ar; in audit_arg_upath2() local
759 ar = currecord(); in audit_arg_upath2()
760 if (ar == NULL) in audit_arg_upath2()
763 audit_arg_upath(td, dirfd, upath, &ar->k_ar.ar_arg_upath2); in audit_arg_upath2()
764 ARG_SET_VALID(ar, ARG_UPATH2); in audit_arg_upath2()
781 struct kaudit_record *ar; in audit_arg_upath1_vp() local
783 ar = currecord(); in audit_arg_upath1_vp()
784 if (ar == NULL) in audit_arg_upath1_vp()
787 audit_arg_upath_vp(td, rdir, cdir, upath, &ar->k_ar.ar_arg_upath1); in audit_arg_upath1_vp()
788 ARG_SET_VALID(ar, ARG_UPATH1); in audit_arg_upath1_vp()
795 struct kaudit_record *ar; in audit_arg_upath2_vp() local
797 ar = currecord(); in audit_arg_upath2_vp()
798 if (ar == NULL) in audit_arg_upath2_vp()
801 audit_arg_upath_vp(td, rdir, cdir, upath, &ar->k_ar.ar_arg_upath2); in audit_arg_upath2_vp()
802 ARG_SET_VALID(ar, ARG_UPATH2); in audit_arg_upath2_vp()
807 * these are for use with filesystem-like subsystems that employ string names,
808 * but do not support a hierarchical namespace -- for example, POSIX IPC
824 struct kaudit_record *ar; in audit_arg_upath1_canon() local
826 ar = currecord(); in audit_arg_upath1_canon()
827 if (ar == NULL) in audit_arg_upath1_canon()
830 audit_arg_upath_canon(upath, &ar->k_ar.ar_arg_upath1); in audit_arg_upath1_canon()
831 ARG_SET_VALID(ar, ARG_UPATH1); in audit_arg_upath1_canon()
837 struct kaudit_record *ar; in audit_arg_upath2_canon() local
839 ar = currecord(); in audit_arg_upath2_canon()
840 if (ar == NULL) in audit_arg_upath2_canon()
843 audit_arg_upath_canon(upath, &ar->k_ar.ar_arg_upath2); in audit_arg_upath2_canon()
844 ARG_SET_VALID(ar, ARG_UPATH2); in audit_arg_upath2_canon()
874 error = VOP_GETATTR(vp, &vattr, curthread->td_ucred); in audit_arg_vnode()
880 vnp->vn_mode = vattr.va_mode; in audit_arg_vnode()
881 vnp->vn_uid = vattr.va_uid; in audit_arg_vnode()
882 vnp->vn_gid = vattr.va_gid; in audit_arg_vnode()
883 vnp->vn_dev = vattr.va_rdev; in audit_arg_vnode()
884 vnp->vn_fsid = vattr.va_fsid; in audit_arg_vnode()
885 vnp->vn_fileid = vattr.va_fileid; in audit_arg_vnode()
886 vnp->vn_gen = vattr.va_gen; in audit_arg_vnode()
893 struct kaudit_record *ar; in audit_arg_vnode1() local
896 ar = currecord(); in audit_arg_vnode1()
897 if (ar == NULL) in audit_arg_vnode1()
900 ARG_CLEAR_VALID(ar, ARG_VNODE1); in audit_arg_vnode1()
901 error = audit_arg_vnode(vp, &ar->k_ar.ar_arg_vnode1); in audit_arg_vnode1()
903 ARG_SET_VALID(ar, ARG_VNODE1); in audit_arg_vnode1()
909 struct kaudit_record *ar; in audit_arg_vnode2() local
912 ar = currecord(); in audit_arg_vnode2()
913 if (ar == NULL) in audit_arg_vnode2()
916 ARG_CLEAR_VALID(ar, ARG_VNODE2); in audit_arg_vnode2()
917 error = audit_arg_vnode(vp, &ar->k_ar.ar_arg_vnode2); in audit_arg_vnode2()
919 ARG_SET_VALID(ar, ARG_VNODE2); in audit_arg_vnode2()
928 struct kaudit_record *ar; in audit_arg_argv() local
933 ar = currecord(); in audit_arg_argv()
934 if (ar == NULL) in audit_arg_argv()
937 ar->k_ar.ar_arg_argv = malloc(length, M_AUDITTEXT, M_WAITOK); in audit_arg_argv()
938 bcopy(argv, ar->k_ar.ar_arg_argv, length); in audit_arg_argv()
939 ar->k_ar.ar_arg_argc = argc; in audit_arg_argv()
940 ARG_SET_VALID(ar, ARG_ARGV); in audit_arg_argv()
949 struct kaudit_record *ar; in audit_arg_envv() local
954 ar = currecord(); in audit_arg_envv()
955 if (ar == NULL) in audit_arg_envv()
958 ar->k_ar.ar_arg_envv = malloc(length, M_AUDITTEXT, M_WAITOK); in audit_arg_envv()
959 bcopy(envv, ar->k_ar.ar_arg_envv, length); in audit_arg_envv()
960 ar->k_ar.ar_arg_envc = envc; in audit_arg_envv()
961 ARG_SET_VALID(ar, ARG_ENVV); in audit_arg_envv()
967 struct kaudit_record *ar; in audit_arg_rights() local
969 ar = currecord(); in audit_arg_rights()
970 if (ar == NULL) in audit_arg_rights()
973 ar->k_ar.ar_arg_rights = *rightsp; in audit_arg_rights()
974 ARG_SET_VALID(ar, ARG_RIGHTS); in audit_arg_rights()
980 struct kaudit_record *ar; in audit_arg_fcntl_rights() local
982 ar = currecord(); in audit_arg_fcntl_rights()
983 if (ar == NULL) in audit_arg_fcntl_rights()
986 ar->k_ar.ar_arg_fcntl_rights = fcntlrights; in audit_arg_fcntl_rights()
987 ARG_SET_VALID(ar, ARG_FCNTL_RIGHTS); in audit_arg_fcntl_rights()
998 struct kaudit_record *ar; in audit_sysclose() local
1003 ar = currecord(); in audit_sysclose()
1004 if (ar == NULL) in audit_sysclose()
1009 vp = fp->f_vnode; in audit_sysclose()