Lines Matching defs:kctx

96 	au_kcontext_t	*kctx = GET_KCTX_PZ;
110 !(kctx->auk_policy & AUDIT_PUBLIC)) {
140 !(kctx->auk_policy & AUDIT_PATH)) ||
280 au_kcontext_t *kctx = GET_KCTX_PZ;
304 !(kctx->auk_policy & AUDIT_PATH)) ||
351 au_kcontext_t *kctx = GET_KCTX_PZ;
375 !(kctx->auk_policy & AUDIT_PATH)) ||
429 au_kcontext_t *kctx = GET_KCTX_PZ;
431 if (!(kctx->auk_policy & AUDIT_PUBLIC) && (attr->va_uid == 0) &&
539 au_kcontext_t *kctx;
552 kctx = GET_KCTX_PZ;
556 estate = kctx->auk_ets[event];
558 if ((tad->tad_flag = auditme(kctx, tad, estate)) == 0)
567 if (!((kctx->auk_auditstate == AUC_AUDITING ||
568 kctx->auk_auditstate == AUC_INIT_AUDIT) ||
569 kctx->auk_auditstate == AUC_NOSPACE)) {
598 au_kcontext_t *kctx;
613 kctx = GET_KCTX_PZ;
616 if (flag = audit_success(kctx, tad, 0, NULL)) {
626 AUDIT_SETSUBJ(&(u_ad), cr, ainfo, kctx);
631 AS_INC(as_generated, 1, kctx);
632 AS_INC(as_kernel, 1, kctx);
636 au_close(kctx, &(u_ad), flag, tad->tad_event, tad->tad_evmod, NULL);
741 au_kcontext_t *kctx = GET_KCTX_PZ;
746 estate = kctx->auk_ets[AUE_CLOSE];
759 kctx->auk_auditstate : tad->tad_audit;
811 AUDIT_SETSUBJ((caddr_t *)&(ad), cr, ainfo, kctx);
816 AS_INC(as_generated, 1, kctx);
817 AS_INC(as_kernel, 1, kctx);
827 au_close(kctx, (caddr_t *)&(ad), AU_OK | AU_DEFER,
963 au_kcontext_t *kctx = GET_KCTX_PZ;
972 if (flag = audit_success(kctx, tad, 0, NULL)) {
982 AUDIT_SETSUBJ(&(u_ad), cr, ainfo, kctx);
987 AS_INC(as_generated, 1, kctx);
988 AS_INC(as_kernel, 1, kctx);
999 au_close(kctx, &(u_ad), flag | AU_DONTBLOCK,
1216 au_kcontext_t *kctx = GET_KCTX_PZ;
1265 if (pfcred != NULL || (kctx->auk_policy & AUDIT_ARGV) != 0)
1268 if (kctx->auk_policy & AUDIT_ARGE)
1436 au_kcontext_t *kctx;
1474 kctx = GET_KCTX_PZ;
1500 estate = kctx->auk_ets[AUE_SOCKCONNECT];
1513 estate = kctx->auk_ets[AUE_SOCKACCEPT];
1526 estate = kctx->auk_ets[AUE_SOCKSEND];
1539 estate = kctx->auk_ets[AUE_SOCKRECEIVE];
1866 au_kcontext_t *kctx = GET_KCTX_PZ;
1877 if (audit_success(kctx, tad, error, NULL) != AU_OK)
1881 AUDIT_SETSUBJ((caddr_t *)&(ad), cr, ainfo, kctx);
1998 AS_INC(as_generated, 1, kctx);
1999 AS_INC(as_kernel, 1, kctx);
2001 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CRYPTOADM, tad->tad_evmod,
2017 au_kcontext_t *kctx = GET_KCTX_PZ;
2026 if (audit_success(kctx, tad, error, NULL) != AU_OK)
2030 AUDIT_SETSUBJ((caddr_t *)&ad, cr, ainfo, kctx);
2071 AS_INC(as_generated, 1, kctx);
2072 AS_INC(as_kernel, 1, kctx);
2074 au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CONFIGKSSL, tad->tad_evmod,
2099 au_kcontext_t *kctx = GET_KCTX_PZ;
2153 if (flag = audit_success(kctx, tad, error, cred)) {
2198 ((cred != NULL) ? cred : CRED()), ainfo, kctx, pid);
2203 AS_INC(as_generated, 1, kctx);
2204 AS_INC(as_kernel, 1, kctx);
2207 au_close(kctx, (caddr_t *)&ad, flag, tad->tad_event, tad->tad_evmod,