Searched refs:auid (Results 1 - 25 of 26) sorted by relevance

12

/freebsd-12-stable/sys/security/mac/
H A Dmac_audit.c90 mac_cred_check_setauid(struct ucred *cred, uid_t auid) argument
94 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid);
95 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid);
H A Dmac_framework.h113 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
H A Dmac_policy.h141 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
/freebsd-12-stable/contrib/openbsm/sys/bsm/
H A Daudit_record.h242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
271 token_t *au_to_subject_ex(au_id_t auid, uid_
[all...]
/freebsd-12-stable/sys/bsm/
H A Daudit_record.h249 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
251 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
253 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
255 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
257 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid,
260 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
273 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
275 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
277 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid,
279 token_t *au_to_subject_ex(au_id_t auid, uid_
[all...]
/freebsd-12-stable/sys/security/audit/
H A Daudit.c180 void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event,
182 int (*dtaudit_hook_commit)(struct kaudit_record *kar, au_id_t auid,
184 void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid,
451 au_id_t auid; local
521 auid = ar->k_ar.ar_subj_auid;
528 if (audit_pipe_preselect(auid, event, class, sorf,
538 if (dtaudit_hook_commit(ar, auid, event, class, sorf) != 0)
602 au_id_t auid; local
628 auid = td->td_ucred->cr_audit.ai_auid;
629 if (auid
798 au_id_t auid; local
[all...]
H A Daudit_pipe.c95 * and optionally expressing per-auid masks. The following data structure is
96 * the per-auid mask description. The global state is stored in the audit
100 * usage patterns for per-auid specifications are clear.
161 * interest specifications by auid.
271 * Find an audit pipe preselection specification for an auid, if any.
274 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) argument
281 if (app->app_auid == auid)
288 * Query the per-pipe mask for a specific auid.
291 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, argument
298 app = audit_pipe_preselect_find(ap, auid);
313 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) argument
340 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) argument
394 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument
431 audit_pipe_preselect(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument
507 audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_select, void *record, u_int record_len) argument
699 au_id_t auid; local
[all...]
H A Dbsm_token.c671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
680 ADD_U_INT32(dptr, auid);
701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
711 ADD_U_INT32(dptr, auid);
732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
771 ADD_U_INT32(dptr, auid);
791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
810 ADD_U_INT32(dptr, auid);
830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1100 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1123 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1147 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1170 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1205 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1242 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
H A Daudit_private.h432 extern void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event,
435 au_id_t auid, au_event_t event, au_class_t class,
437 extern void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid,
503 int audit_pipe_preselect(au_id_t auid, au_event_t event,
505 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
H A Daudit_worker.c339 au_id_t auid; local
377 auid = ar->k_ar.ar_subj_auid;
407 audit_pipe_submit(auid, event, class, sorf,
417 dtaudit_hook_bsm(ar, auid, event, class, sorf,
H A Daudit_dtrace.c177 dtaudit_preselect(au_id_t auid, au_event_t event, au_class_t class) argument
217 dtaudit_commit(struct kaudit_record *kar, au_id_t auid, au_event_t event, argument
262 dtaudit_bsm(struct kaudit_record *kar, au_id_t auid, au_event_t event, argument
H A Daudit.h116 void audit_arg_auid(uid_t auid);
H A Daudit_arg.c486 audit_arg_auid(uid_t auid) argument
494 ar->k_ar.ar_arg_auid = auid;
H A Daudit_syscalls.c604 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid,
618 error = copyin(uap->auid, &id, sizeof(id));
/freebsd-12-stable/usr.bin/su/
H A Dsu.c174 au_id_t auid; local
224 if (getauid(&auid) < 0 && errno != ENOSYS) {
231 if (audit_submit(AUE_su, auid,
266 if (audit_submit(AUE_su, auid, EPERM, 1,
307 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s",
316 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication"))
328 if (audit_submit(AUE_su, auid, EPERM, 1,
344 if (audit_submit(AUE_su, auid, EPERM, 1,
355 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s",
370 if (audit_submit(AUE_su, auid, EPER
[all...]
/freebsd-12-stable/contrib/openbsm/libbsm/
H A Dbsm_token.c748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
759 ADD_U_INT32(dptr, auid);
780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
792 ADD_U_INT32(dptr, auid);
813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument
817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid,
836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
856 ADD_U_INT32(dptr, auid);
876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument
898 ADD_U_INT32(dptr, auid);
918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument
[all...]
H A Dbsm_wrappers.c65 audit_submit(short au_event, au_id_t auid, char status, argument
144 token = au_to_subject32(auid, geteuid(), getegid(),
147 token = au_to_subject_ex(auid, geteuid(), getegid(),
359 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, argument
367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid,
403 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, argument
410 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid);
H A Dbsm_io.c2519 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.auid, tok->len, err);
2566 print_user(fp, tok->tt.proc32.auid, oflags);
2593 print_user(fp, tok->tt.proc32.auid, oflags);
2631 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.auid, tok->len, err);
2677 print_user(fp, tok->tt.proc64.auid, oflags);
2704 print_user(fp, tok->tt.proc64.auid, oflags);
2743 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.auid, tok->len, err);
2804 print_user(fp, tok->tt.proc32_ex.auid, oflags);
2832 print_user(fp, tok->tt.proc32_ex.auid, oflags);
2872 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.auid, to
[all...]
/freebsd-12-stable/contrib/openbsm/bsm/
H A Dlibbsm.h460 u_int32_t auid; member in struct:__anon6755
471 u_int32_t auid; member in struct:__anon6756
495 u_int32_t auid; member in struct:__anon6757
506 u_int32_t auid; member in struct:__anon6758
610 u_int32_t auid; member in struct:__anon6767
621 u_int32_t auid; member in struct:__anon6768
645 u_int32_t auid; member in struct:__anon6769
656 u_int32_t auid; member in struct:__anon6770
785 int audit_submit(short au_event, au_id_t auid,
1096 * @param auid
[all...]
/freebsd-12-stable/tests/sys/audit/
H A Dadministrative.c462 au_id_t auid; local
467 ATF_REQUIRE_EQ(0, getauid(&auid));
510 au_id_t auid; local
513 ATF_REQUIRE_EQ(0, getauid(&auid));
516 ATF_REQUIRE_EQ(0, setauid(&auid));
/freebsd-12-stable/contrib/openbsm/bin/auditreduce/
H A Dauditreduce.c198 * Check if the given auid matches the selection criteria.
204 /* Check if we want to select on auid. */
442 * auid,
455 if (!select_auid(tok.tt.proc32.auid))
472 * auid,
485 if (!select_auid(tok.tt.subj32.auid))
/freebsd-12-stable/sys/security/mac_stub/
H A Dmac_stub.c219 stub_cred_check_setauid(struct ucred *cred, uid_t auid) argument
/freebsd-12-stable/sys/compat/freebsd32/
H A Dfreebsd32_systrace_args.c2137 uarg[0] = (intptr_t) p->auid; /* uid_t * */
2144 uarg[0] = (intptr_t) p->auid; /* uid_t * */
/freebsd-12-stable/sys/kern/
H A Dsystrace_args.c2299 uarg[0] = (intptr_t) p->auid; /* uid_t * */
2306 uarg[0] = (intptr_t) p->auid; /* uid_t * */
/freebsd-12-stable/sys/security/mac_test/
H A Dmac_test.c251 test_cred_check_setauid(struct ucred *cred, uid_t auid) argument

Completed in 181 milliseconds

12