/freebsd-10.0-release/sys/security/mac/ |
H A D | mac_audit.c | 92 mac_cred_check_setauid(struct ucred *cred, uid_t auid) argument 96 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid); 97 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid);
|
H A D | mac_framework.h | 113 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
|
H A D | mac_policy.h | 141 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
|
/freebsd-10.0-release/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 237 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 245 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 248 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 266 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-10.0-release/sys/bsm/ |
H A D | audit_record.h | 241 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 245 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 247 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 252 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-10.0-release/usr.bin/su/ |
H A D | su.c | 172 au_id_t auid; local 222 if (getauid(&auid) < 0 && errno != ENOSYS) { 229 if (audit_submit(AUE_su, auid, 264 if (audit_submit(AUE_su, auid, EPERM, 1, 305 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", 314 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) 326 if (audit_submit(AUE_su, auid, EPERM, 1, 342 if (audit_submit(AUE_su, auid, EPERM, 1, 353 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", 368 if (audit_submit(AUE_su, auid, EPER [all...] |
/freebsd-10.0-release/sys/security/audit/ |
H A D | audit_pipe.c | 95 * and optionally expressing per-auid masks. The following data structure is 96 * the per-auid mask description. The global state is stored in the audit 100 * usage patterns for per-auid specifications are clear. 162 * interest specifications by auid. 274 * Find an audit pipe preselection specification for an auid, if any. 277 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) argument 284 if (app->app_auid == auid) 291 * Query the per-pipe mask for a specific auid. 294 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, argument 301 app = audit_pipe_preselect_find(ap, auid); 316 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) argument 343 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) argument 397 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 434 audit_pipe_preselect(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 510 audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_select, void *record, u_int record_len) argument 744 au_id_t auid; local [all...] |
H A D | bsm_token.c | 671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 680 ADD_U_INT32(dptr, auid); 701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 711 ADD_U_INT32(dptr, auid); 732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 771 ADD_U_INT32(dptr, auid); 791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 810 ADD_U_INT32(dptr, auid); 830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1100 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1123 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1147 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1170 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1205 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1242 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.c | 406 au_id_t auid; local 454 auid = ar->k_ar.ar_subj_auid; 461 if (audit_pipe_preselect(auid, event, class, sorf, 515 au_id_t auid; local 540 auid = td->td_ucred->cr_audit.ai_auid; 541 if (auid == AU_DEFAUDITID) 572 } else if (audit_pipe_preselect(auid, event, class, AU_PRS_BOTH, 0)) { 672 au_id_t auid; local 680 auid = cred->cr_audit.ai_auid; 681 if (auid [all...] |
H A D | audit_worker.c | 301 au_id_t auid; local 338 auid = ar->k_ar.ar_subj_auid; 368 audit_pipe_submit(auid, event, class, sorf,
|
H A D | audit_private.h | 425 int audit_pipe_preselect(au_id_t auid, au_event_t event, 427 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit.h | 99 void audit_arg_auid(uid_t auid);
|
H A D | audit_arg.c | 477 audit_arg_auid(uid_t auid) argument 485 ar->k_ar.ar_arg_auid = auid;
|
H A D | audit_syscalls.c | 572 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid, 586 error = copyin(uap->auid, &id, sizeof(id));
|
/freebsd-10.0-release/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 750 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 761 ADD_U_INT32(dptr, auid); 782 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 794 ADD_U_INT32(dptr, auid); 815 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 819 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 838 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 858 ADD_U_INT32(dptr, auid); 878 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 900 ADD_U_INT32(dptr, auid); 920 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1161 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1186 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1212 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1235 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1273 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1313 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 61 audit_submit(short au_event, au_id_t auid, char status, argument 140 token = au_to_subject32(auid, geteuid(), getegid(), 143 token = au_to_subject_ex(auid, geteuid(), getegid(), 353 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, argument 361 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 397 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, argument 404 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid);
|
H A D | bsm_io.c | 2520 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.auid, tok->len, err); 2567 print_user(fp, tok->tt.proc32.auid, oflags); 2594 print_user(fp, tok->tt.proc32.auid, oflags); 2632 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.auid, tok->len, err); 2678 print_user(fp, tok->tt.proc64.auid, oflags); 2705 print_user(fp, tok->tt.proc64.auid, oflags); 2744 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.auid, tok->len, err); 2805 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2833 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2873 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.auid, to [all...] |
/freebsd-10.0-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 459 u_int32_t auid; member in struct:__anon4053 470 u_int32_t auid; member in struct:__anon4054 494 u_int32_t auid; member in struct:__anon4055 505 u_int32_t auid; member in struct:__anon4056 609 u_int32_t auid; member in struct:__anon4065 620 u_int32_t auid; member in struct:__anon4066 644 u_int32_t auid; member in struct:__anon4067 655 u_int32_t auid; member in struct:__anon4068 784 int audit_submit(short au_event, au_id_t auid, 1109 * @param auid [all...] |
/freebsd-10.0-release/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 184 * Check if the given auid matches the selection criteria. 190 /* Check if we want to select on auid. */ 428 * auid, 441 if (!select_auid(tok.tt.proc32.auid)) 458 * auid, 471 if (!select_auid(tok.tt.subj32.auid))
|
/freebsd-10.0-release/sys/security/mac_stub/ |
H A D | mac_stub.c | 219 stub_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|
/freebsd-10.0-release/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 2333 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2340 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-10.0-release/sys/kern/ |
H A D | systrace_args.c | 2558 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2565 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-10.0-release/sys/security/mac_test/ |
H A D | mac_test.c | 251 test_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|
/freebsd-10.0-release/sys/sys/ |
H A D | sysproto.h | 1355 char auid_l_[PADL_(uid_t *)]; uid_t * auid; char auid_r_[PADR_(uid_t *)]; member in struct:getauid_args 1358 char auid_l_[PADL_(uid_t *)]; uid_t * auid; char auid_r_[PADR_(uid_t *)]; member in struct:setauid_args
|