/freebsd/sys/security/audit/ |
H A D | audit.c | 178 void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 449 au_id_t auid; in audit_commit() local 519 auid = ar->k_ar.ar_subj_auid; in audit_commit() 526 if (audit_pipe_preselect(auid, event, class, sorf, in audit_commit() 536 if (dtaudit_hook_commit(ar, auid, event, class, sorf) != 0) in audit_commit() 600 au_id_t auid; in audit_syscall_enter() local 626 auid = td->td_ucred->cr_audit.ai_auid; in audit_syscall_enter() 627 if (auid == AU_DEFAUDITID) in audit_syscall_enter() 796 au_id_t auid; in audit_proc_coredump() local 804 auid = cred->cr_audit.ai_auid; in audit_proc_coredump() [all …]
|
H A D | audit_pipe.c | 278 if (app->app_auid == auid) in audit_pipe_preselect_find() 288 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, in audit_pipe_preselect_get() argument 295 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_get() 320 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_set() 324 app->app_auid = auid; in audit_pipe_preselect_set() 343 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_delete() 403 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_check() 405 if (auid == AU_DEFAUDITID) in audit_pipe_preselect_check() 696 au_id_t auid; in audit_pipe_ioctl() local 819 auid = *(au_id_t *)data; in audit_pipe_ioctl() [all …]
|
H A D | bsm_token.c | 675 ADD_U_INT32(dptr, auid); in au_to_process32() 706 ADD_U_INT32(dptr, auid); in au_to_process64() 731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 766 ADD_U_INT32(dptr, auid); in au_to_process32_ex() 805 ADD_U_INT32(dptr, auid); in au_to_process64_ex() 825 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process_ex() argument 1104 ADD_U_INT32(dptr, auid); in au_to_subject32() 1128 ADD_U_INT32(dptr, auid); in au_to_subject64() 1146 return (au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_subject() 1182 ADD_U_INT32(dptr, auid); in au_to_subject32_ex() [all …]
|
H A D | audit_private.h | 430 extern void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 433 au_id_t auid, au_event_t event, au_class_t class, 435 extern void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid, 503 int audit_pipe_preselect(au_id_t auid, au_event_t event, 505 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit_worker.c | 336 au_id_t auid; in audit_worker_process_record() local 374 auid = ar->k_ar.ar_subj_auid; in audit_worker_process_record() 404 audit_pipe_submit(auid, event, class, sorf, in audit_worker_process_record() 414 dtaudit_hook_bsm(ar, auid, event, class, sorf, in audit_worker_process_record()
|
H A D | audit_dtrace.c | 174 dtaudit_preselect(au_id_t auid, au_event_t event, au_class_t class) in dtaudit_preselect() argument 214 dtaudit_commit(struct kaudit_record *kar, au_id_t auid, au_event_t event, in dtaudit_commit() argument 259 dtaudit_bsm(struct kaudit_record *kar, au_id_t auid, au_event_t event, in dtaudit_bsm() argument
|
H A D | audit_syscalls.c | 600 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid, in sys_getauid() 614 error = copyin(uap->auid, &id, sizeof(id)); in sys_setauid()
|
H A D | audit_arg.c | 483 audit_arg_auid(uid_t auid) in audit_arg_auid() argument 491 ar->k_ar.ar_arg_auid = auid; in audit_arg_auid()
|
H A D | audit.h | 114 void audit_arg_auid(uid_t auid);
|
/freebsd/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/usr.bin/su/ |
H A D | su.c | 159 au_id_t auid; in main() local 209 if (getauid(&auid) < 0 && errno != ENOSYS) { in main() 216 if (audit_submit(AUE_su, auid, in main() 251 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 292 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", in main() 301 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) in main() 313 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 329 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 340 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", in main() 355 if (audit_submit(AUE_su, auid, EPERM, 1, in main()
|
/freebsd/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 759 ADD_U_INT32(dptr, auid); in au_to_process32() 792 ADD_U_INT32(dptr, auid); in au_to_process64() 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 856 ADD_U_INT32(dptr, auid); in au_to_process32_ex() 898 ADD_U_INT32(dptr, auid); in au_to_process64_ex() 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process_ex() argument 1170 ADD_U_INT32(dptr, auid); in au_to_subject32() 1196 ADD_U_INT32(dptr, auid); in au_to_subject64() 1214 return (au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_subject() 1253 ADD_U_INT32(dptr, auid); in au_to_subject32_ex() [all …]
|
H A D | bsm_wrappers.c | 65 audit_submit(short au_event, au_id_t auid, char status, in audit_submit() argument 144 token = au_to_subject32(auid, geteuid(), getegid(), in audit_submit() 147 token = au_to_subject_ex(auid, geteuid(), getegid(), in audit_submit() 359 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, in audit_write_success() argument 367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in audit_write_success() 403 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, in audit_write_failure() argument 410 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); in audit_write_failure()
|
H A D | bsm_io.c | 2566 print_user(fp, tok->tt.proc32.auid, oflags); in print_process32_tok() 2593 print_user(fp, tok->tt.proc32.auid, oflags); in print_process32_tok() 2677 print_user(fp, tok->tt.proc64.auid, oflags); in print_process64_tok() 2704 print_user(fp, tok->tt.proc64.auid, oflags); in print_process64_tok() 2804 print_user(fp, tok->tt.proc32_ex.auid, oflags); in print_process32ex_tok() 2832 print_user(fp, tok->tt.proc32_ex.auid, oflags); in print_process32ex_tok() 2932 print_user(fp, tok->tt.proc64_ex.auid, oflags); in print_process64ex_tok() 3389 print_user(fp, tok->tt.subj32.auid, oflags); in print_subject32_tok() 3416 print_user(fp, tok->tt.subj32.auid, oflags); in print_subject32_tok() 3604 print_user(fp, tok->tt.subj64.auid, oflags); in print_subject64_tok() [all …]
|
/freebsd/contrib/openbsm/bsm/ |
H A D | libbsm.h | 460 u_int32_t auid; member 471 u_int32_t auid; member 495 u_int32_t auid; member 506 u_int32_t auid; member 610 u_int32_t auid; member 621 u_int32_t auid; member 645 u_int32_t auid; member 656 u_int32_t auid; member 785 int audit_submit(short au_event, au_id_t auid, 1117 int audit_write_success(short event_code, token_t *misctok, au_id_t auid, [all …]
|
/freebsd/sys/security/mac/ |
H A D | mac_audit.c | 87 mac_cred_check_setauid(struct ucred *cred, uid_t auid) in mac_cred_check_setauid() argument 91 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid); in mac_cred_check_setauid() 92 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid); in mac_cred_check_setauid()
|
H A D | mac_framework.h | 117 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
|
H A D | mac_policy.h | 146 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
|
/freebsd/tests/sys/audit/ |
H A D | administrative.c | 466 au_id_t auid; in ATF_TC_BODY() local 471 ATF_REQUIRE_EQ(0, getauid(&auid)); in ATF_TC_BODY() 514 au_id_t auid; in ATF_TC_BODY() local 517 ATF_REQUIRE_EQ(0, getauid(&auid)); in ATF_TC_BODY() 520 ATF_REQUIRE_EQ(0, setauid(&auid)); in ATF_TC_BODY()
|
/freebsd/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 455 if (!select_auid(tok.tt.proc32.auid)) in select_proc32() 485 if (!select_auid(tok.tt.subj32.auid)) in select_subj32()
|
/freebsd/lib/libsys/ |
H A D | _libsys.h | 733 int __sys_getauid(uid_t * auid); 734 int __sys_setauid(uid_t * auid);
|
/freebsd/sys/security/mac_stub/ |
H A D | mac_stub.c | 221 stub_cred_check_setauid(struct ucred *cred, uid_t auid) in stub_cred_check_setauid() argument
|
/freebsd/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 2136 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args() 2143 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args()
|
/freebsd/sys/kern/ |
H A D | systrace_args.c | 2278 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args() 2285 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args()
|