Lines Matching defs:from
127 * S2E_SP (TAD_SAVPATH) flag comes from audit_s2e[].au_ctrl. Used with
134 * S2E_NPT (TAD_NOPATH) flag comes from audit_s2e[].au_ctrl. Used with
291 * S2E_SP (TAD_SAVPATH) flag comes from audit_s2e[].au_ctrl. Used with
298 * S2E_NPT (TAD_NOPATH) flag comes from audit_s2e[].au_ctrl. Used with
361 * S2E_SP (TAD_SAVPATH) flag comes from audit_s2e[].au_ctrl. Used with
368 * S2E_NPT (TAD_NOPATH) flag comes from audit_s2e[].au_ctrl. Used with
504 * audit record generation (no return from system call).
661 /* lock stdata from audit_sock */
691 /* lock stdata from audit_sock */
1422 int from) /* timod or sockmod request */
1580 * from a kernel queue instead of from a direct system call.
2169 * from the administrative zone. If netstacks are expanded