/freebsd-12-stable/sys/security/mac/ |
H A D | mac_audit.c | 90 mac_cred_check_setauid(struct ucred *cred, uid_t auid) argument 94 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid); 95 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid);
|
H A D | mac_framework.h | 113 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
|
H A D | mac_policy.h | 141 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
|
/freebsd-12-stable/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-12-stable/sys/bsm/ |
H A D | audit_record.h | 249 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 257 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 260 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 279 token_t *au_to_subject_ex(au_id_t auid, uid_ [all...] |
/freebsd-12-stable/sys/security/audit/ |
H A D | audit.c | 180 void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 182 int (*dtaudit_hook_commit)(struct kaudit_record *kar, au_id_t auid, 184 void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid, 451 au_id_t auid; local 521 auid = ar->k_ar.ar_subj_auid; 528 if (audit_pipe_preselect(auid, event, class, sorf, 538 if (dtaudit_hook_commit(ar, auid, event, class, sorf) != 0) 602 au_id_t auid; local 628 auid = td->td_ucred->cr_audit.ai_auid; 629 if (auid 798 au_id_t auid; local [all...] |
H A D | audit_pipe.c | 95 * and optionally expressing per-auid masks. The following data structure is 96 * the per-auid mask description. The global state is stored in the audit 100 * usage patterns for per-auid specifications are clear. 161 * interest specifications by auid. 271 * Find an audit pipe preselection specification for an auid, if any. 274 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) argument 281 if (app->app_auid == auid) 288 * Query the per-pipe mask for a specific auid. 291 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, argument 298 app = audit_pipe_preselect_find(ap, auid); 313 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) argument 340 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) argument 394 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 431 audit_pipe_preselect(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_preselect) argument 507 audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class, int sorf, int trail_select, void *record, u_int record_len) argument 699 au_id_t auid; local [all...] |
H A D | bsm_token.c | 671 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 680 ADD_U_INT32(dptr, auid); 701 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 711 ADD_U_INT32(dptr, auid); 732 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 736 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 755 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 771 ADD_U_INT32(dptr, auid); 791 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 810 ADD_U_INT32(dptr, auid); 830 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1100 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1123 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1147 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1170 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1205 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1242 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit_private.h | 432 extern void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 435 au_id_t auid, au_event_t event, au_class_t class, 437 extern void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid, 503 int audit_pipe_preselect(au_id_t auid, au_event_t event, 505 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit_worker.c | 339 au_id_t auid; local 377 auid = ar->k_ar.ar_subj_auid; 407 audit_pipe_submit(auid, event, class, sorf, 417 dtaudit_hook_bsm(ar, auid, event, class, sorf,
|
H A D | audit_dtrace.c | 177 dtaudit_preselect(au_id_t auid, au_event_t event, au_class_t class) argument 217 dtaudit_commit(struct kaudit_record *kar, au_id_t auid, au_event_t event, argument 262 dtaudit_bsm(struct kaudit_record *kar, au_id_t auid, au_event_t event, argument
|
H A D | audit.h | 116 void audit_arg_auid(uid_t auid);
|
H A D | audit_arg.c | 486 audit_arg_auid(uid_t auid) argument 494 ar->k_ar.ar_arg_auid = auid;
|
H A D | audit_syscalls.c | 604 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid, 618 error = copyin(uap->auid, &id, sizeof(id));
|
/freebsd-12-stable/usr.bin/su/ |
H A D | su.c | 174 au_id_t auid; local 224 if (getauid(&auid) < 0 && errno != ENOSYS) { 231 if (audit_submit(AUE_su, auid, 266 if (audit_submit(AUE_su, auid, EPERM, 1, 307 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", 316 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) 328 if (audit_submit(AUE_su, auid, EPERM, 1, 344 if (audit_submit(AUE_su, auid, EPERM, 1, 355 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", 370 if (audit_submit(AUE_su, auid, EPER [all...] |
/freebsd-12-stable/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 759 ADD_U_INT32(dptr, auid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 792 ADD_U_INT32(dptr, auid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 856 ADD_U_INT32(dptr, auid); 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, argument 898 ADD_U_INT32(dptr, auid); 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 65 audit_submit(short au_event, au_id_t auid, char status, argument 144 token = au_to_subject32(auid, geteuid(), getegid(), 147 token = au_to_subject_ex(auid, geteuid(), getegid(), 359 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, argument 367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 403 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, argument 410 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid);
|
H A D | bsm_io.c | 2519 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.auid, tok->len, err); 2566 print_user(fp, tok->tt.proc32.auid, oflags); 2593 print_user(fp, tok->tt.proc32.auid, oflags); 2631 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.auid, tok->len, err); 2677 print_user(fp, tok->tt.proc64.auid, oflags); 2704 print_user(fp, tok->tt.proc64.auid, oflags); 2743 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.auid, tok->len, err); 2804 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2832 print_user(fp, tok->tt.proc32_ex.auid, oflags); 2872 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.auid, to [all...] |
/freebsd-12-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 460 u_int32_t auid; member in struct:__anon6755 471 u_int32_t auid; member in struct:__anon6756 495 u_int32_t auid; member in struct:__anon6757 506 u_int32_t auid; member in struct:__anon6758 610 u_int32_t auid; member in struct:__anon6767 621 u_int32_t auid; member in struct:__anon6768 645 u_int32_t auid; member in struct:__anon6769 656 u_int32_t auid; member in struct:__anon6770 785 int audit_submit(short au_event, au_id_t auid, 1096 * @param auid [all...] |
/freebsd-12-stable/tests/sys/audit/ |
H A D | administrative.c | 462 au_id_t auid; local 467 ATF_REQUIRE_EQ(0, getauid(&auid)); 510 au_id_t auid; local 513 ATF_REQUIRE_EQ(0, getauid(&auid)); 516 ATF_REQUIRE_EQ(0, setauid(&auid));
|
/freebsd-12-stable/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 198 * Check if the given auid matches the selection criteria. 204 /* Check if we want to select on auid. */ 442 * auid, 455 if (!select_auid(tok.tt.proc32.auid)) 472 * auid, 485 if (!select_auid(tok.tt.subj32.auid))
|
/freebsd-12-stable/sys/security/mac_stub/ |
H A D | mac_stub.c | 219 stub_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|
/freebsd-12-stable/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 2137 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2144 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-12-stable/sys/kern/ |
H A D | systrace_args.c | 2299 uarg[0] = (intptr_t) p->auid; /* uid_t * */ 2306 uarg[0] = (intptr_t) p->auid; /* uid_t * */
|
/freebsd-12-stable/sys/security/mac_test/ |
H A D | mac_test.c | 251 test_cred_check_setauid(struct ucred *cred, uid_t auid) argument
|