/freebsd-11-stable/sys/security/mac/ |
H A D | mac_audit.c | 90 mac_cred_check_setauid(struct ucred *cred, uid_t auid) argument 94 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid); 95 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid);
|
H A D | mac_framework.h | 113 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
|
H A D | mac_policy.h | 141 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
|
/freebsd-11-stable/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-11-stable/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 235 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 237 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 239 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 241 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 243 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 246 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 258 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 260 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 262 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 264 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-11-stable/usr.bin/su/ |
H A D | su.c | 172 au_id_t auid; local 222 if (getauid(&auid) < 0 && errno != ENOSYS) { 229 if (audit_submit(AUE_su, auid, 264 if (audit_submit(AUE_su, auid, EPERM, 1, 305 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", 314 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) 326 if (audit_submit(AUE_su, auid, EPERM, 1, 342 if (audit_submit(AUE_su, auid, EPERM, 1, 353 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", 368 if (audit_submit(AUE_su, auid, EPER [all...] |
/freebsd-11-stable/sys/security/audit/ |
H A D | audit_pipe.c | 95 * and optionally expressing per-auid masks. The following data structure is 96 * the per-auid mask description. The global state is stored in the audit 100 * usage patterns for per-auid specifications are clear. 161 * interest specifications by auid. 271 * Find an audit pipe preselection specification for an auid, if any. 274 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) argument 281 if (app->app_auid == auid) 288 * Query the per-pipe mask for a specific auid. 291 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, argument 298 app = audit_pipe_preselect_find(ap, auid); 313 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) argument 340 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) argument 394 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 431 audit_pipe_preselect(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 507 audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_select, void *record, u_int record_len) argument 699 au_id_t auid; local [all...] |
H A D | bsm_token.c | 669 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 678 ADD_U_INT32(dptr, auid); 699 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 709 ADD_U_INT32(dptr, auid); 730 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 734 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 753 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 769 ADD_U_INT32(dptr, auid); 789 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 808 ADD_U_INT32(dptr, auid); 828 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1098 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1121 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1145 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1168 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1203 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1240 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.c | 406 au_id_t auid; local 454 auid = ar->k_ar.ar_subj_auid; 461 if (audit_pipe_preselect(auid, event, class, sorf, 515 au_id_t auid; local 540 auid = td->td_ucred->cr_audit.ai_auid; 541 if (auid == AU_DEFAUDITID) 572 } else if (audit_pipe_preselect(auid, event, class, AU_PRS_BOTH, 0)) { 672 au_id_t auid; local 680 auid = cred->cr_audit.ai_auid; 681 if (auid [all...] |
H A D | audit_worker.c | 331 au_id_t auid; local 368 auid = ar->k_ar.ar_subj_auid; 398 audit_pipe_submit(auid, event, class, sorf,
|
H A D | audit_private.h | 425 int audit_pipe_preselect(au_id_t auid, au_event_t event, 427 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit.h | 99 void audit_arg_auid(uid_t auid);
|
H A D | audit_arg.c | 478 audit_arg_auid(uid_t auid) argument 486 ar->k_ar.ar_arg_auid = auid;
|
H A D | audit_syscalls.c | 572 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid, 586 error = copyin(uap->auid, &id, sizeof(id));
|
/freebsd-11-stable/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 759 ADD_U_INT32(dptr, auid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 792 ADD_U_INT32(dptr, auid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 856 ADD_U_INT32(dptr, auid); 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 898 ADD_U_INT32(dptr, auid); 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 59 audit_submit(short au_event, au_id_t auid, char status, argument 138 token = au_to_subject32(auid, geteuid(), getegid(), 141 token = au_to_subject_ex(auid, geteuid(), getegid(), 351 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, argument 359 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 395 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, argument 402 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid);
|
H A D | bsm_io.c | 2519 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.auid, tok->len, err); 2566 print_user(fp, tok->tt.proc32.auid, oflags); 2593 print_user(fp, tok->tt.proc32.auid, oflags); 2631 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.auid, tok->len, err); 2677 print_user(fp, tok->tt.proc64.auid, oflags); 2704 print_user(fp, tok->tt.proc64.auid, oflags); 2743 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.auid, tok->len, err); 2804 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2832 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2872 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.auid, to [all...] |
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 457 u_int32_t auid; member in struct:__anon3951 468 u_int32_t auid; member in struct:__anon3952 492 u_int32_t auid; member in struct:__anon3953 503 u_int32_t auid; member in struct:__anon3954 607 u_int32_t auid; member in struct:__anon3963 618 u_int32_t auid; member in struct:__anon3964 642 u_int32_t auid; member in struct:__anon3965 653 u_int32_t auid; member in struct:__anon3966 782 int audit_submit(short au_event, au_id_t auid, 1092 * @param auid [all...] |
/freebsd-11-stable/tests/sys/audit/ |
H A D | administrative.c | 460 au_id_t auid; local 465 ATF_REQUIRE_EQ(0, getauid(&auid)); 508 au_id_t auid; local 511 ATF_REQUIRE_EQ(0, getauid(&auid)); 514 ATF_REQUIRE_EQ(0, setauid(&auid));
|
/freebsd-11-stable/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 187 * Check if the given auid matches the selection criteria. 193 /* Check if we want to select on auid. */ 431 * auid, 444 if (!select_auid(tok.tt.proc32.auid)) 461 * auid, 474 if (!select_auid(tok.tt.subj32.auid))
|
/freebsd-11-stable/sys/security/mac_stub/ |
H A D | mac_stub.c | 219 stub_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|
/freebsd-11-stable/sys/kern/ |
H A D | systrace_args.c | 2462 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2469 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-11-stable/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 2300 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2307 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-11-stable/sys/security/mac_test/ |
H A D | mac_test.c | 251 test_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|
/freebsd-11-stable/sys/sys/ |
H A D | sysproto.h | 1303 char auid_l_[PADL_(uid_t *)]; uid_t * auid; char auid_r_[PADR_(uid_t *)]; member in struct:getauid_args 1306 char auid_l_[PADL_(uid_t *)]; uid_t * auid; char auid_r_[PADR_(uid_t *)]; member in struct:setauid_args
|