/freebsd/sys/security/audit/ |
H A D | audit.c | 178 void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 180 int (*dtaudit_hook_commit)(struct kaudit_record *kar, au_id_t auid, 182 void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid, 450 au_id_t auid; in audit_commit() local 520 auid = ar->k_ar.ar_subj_auid; in audit_commit() 527 if (audit_pipe_preselect(auid, event, class, sorf, in audit_commit() 537 if (dtaudit_hook_commit(ar, auid, event, class, sorf) != 0) in audit_commit() 601 au_id_t auid; in audit_syscall_enter() local 627 auid = td->td_ucred->cr_audit.ai_auid; in audit_syscall_enter() 628 if (auid == AU_DEFAUDITID) in audit_syscall_enter() [all …]
|
H A D | audit_pipe.c | 271 audit_pipe_preselect_find(struct audit_pipe *ap, au_id_t auid) in audit_pipe_preselect_find() argument 278 if (app->app_auid == auid) in audit_pipe_preselect_find() 288 audit_pipe_preselect_get(struct audit_pipe *ap, au_id_t auid, in audit_pipe_preselect_get() argument 295 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_get() 310 audit_pipe_preselect_set(struct audit_pipe *ap, au_id_t auid, au_mask_t mask) in audit_pipe_preselect_set() argument 320 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_set() 324 app->app_auid = auid; in audit_pipe_preselect_set() 337 audit_pipe_preselect_delete(struct audit_pipe *ap, au_id_t auid) in audit_pipe_preselect_delete() argument 343 app = audit_pipe_preselect_find(ap, auid); in audit_pipe_preselect_delete() 391 audit_pipe_preselect_check(struct audit_pipe *ap, au_id_t auid, in audit_pipe_preselect_check() argument [all …]
|
H A D | bsm_token.c | 666 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process32() argument 675 ADD_U_INT32(dptr, auid); in au_to_process32() 696 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process64() argument 706 ADD_U_INT32(dptr, auid); in au_to_process64() 727 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process() argument 731 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 750 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process32_ex() argument 766 ADD_U_INT32(dptr, auid); in au_to_process32_ex() 786 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process64_ex() argument 805 ADD_U_INT32(dptr, auid); in au_to_process64_ex() [all …]
|
H A D | audit_private.h | 430 extern void *(*dtaudit_hook_preselect)(au_id_t auid, au_event_t event, 433 au_id_t auid, au_event_t event, au_class_t class, 435 extern void (*dtaudit_hook_bsm)(struct kaudit_record *kar, au_id_t auid, 503 int audit_pipe_preselect(au_id_t auid, au_event_t event, 505 void audit_pipe_submit(au_id_t auid, au_event_t event, au_class_t class,
|
H A D | audit_worker.c | 336 au_id_t auid; in audit_worker_process_record() local 374 auid = ar->k_ar.ar_subj_auid; in audit_worker_process_record() 404 audit_pipe_submit(auid, event, class, sorf, in audit_worker_process_record() 414 dtaudit_hook_bsm(ar, auid, event, class, sorf, in audit_worker_process_record()
|
H A D | audit_dtrace.c | 174 dtaudit_preselect(au_id_t auid, au_event_t event, au_class_t class) in dtaudit_preselect() argument 214 dtaudit_commit(struct kaudit_record *kar, au_id_t auid, au_event_t event, in dtaudit_commit() argument 259 dtaudit_bsm(struct kaudit_record *kar, au_id_t auid, au_event_t event, in dtaudit_bsm() argument
|
H A D | audit_syscalls.c | 600 return (copyout(&td->td_ucred->cr_audit.ai_auid, uap->auid, in sys_getauid() 614 error = copyin(uap->auid, &id, sizeof(id)); in sys_setauid()
|
H A D | audit_arg.c | 483 audit_arg_auid(uid_t auid) in audit_arg_auid() argument 491 ar->k_ar.ar_arg_auid = auid; in audit_arg_auid()
|
H A D | audit.h | 114 void audit_arg_auid(uid_t auid);
|
/freebsd/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 242 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 244 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 246 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 248 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 250 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 253 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 265 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 267 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 269 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/sys/bsm/ |
H A D | audit_record.h | 247 token_t *au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 249 token_t *au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 251 token_t *au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 253 token_t *au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 255 token_t *au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, 258 token_t *au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 271 token_t *au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 273 token_t *au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 275 token_t *au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, 277 token_t *au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, [all …]
|
/freebsd/usr.bin/su/ |
H A D | su.c | 159 au_id_t auid; in main() local 209 if (getauid(&auid) < 0 && errno != ENOSYS) { in main() 216 if (audit_submit(AUE_su, auid, in main() 251 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 292 if (audit_submit(AUE_su, auid, EPERM, 1, "bad su %s to %s on %s", in main() 301 if (audit_submit(AUE_su, auid, 0, 0, "successful authentication")) in main() 313 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 329 if (audit_submit(AUE_su, auid, EPERM, 1, in main() 340 if (audit_submit(AUE_su, auid, EPERM, 1, "pam_acct_mgmt: %s", in main() 355 if (audit_submit(AUE_su, auid, EPERM, 1, in main()
|
/freebsd/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process32() argument 759 ADD_U_INT32(dptr, auid); in au_to_process32() 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process64() argument 792 ADD_U_INT32(dptr, auid); in au_to_process64() 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, in au_to_process() argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, in au_to_process() 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process32_ex() argument 856 ADD_U_INT32(dptr, auid); in au_to_process32_ex() 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, in au_to_process64_ex() argument 898 ADD_U_INT32(dptr, auid); in au_to_process64_ex() [all …]
|
H A D | bsm_wrappers.c | 65 audit_submit(short au_event, au_id_t auid, char status, in audit_submit() argument 144 token = au_to_subject32(auid, geteuid(), getegid(), in audit_submit() 147 token = au_to_subject_ex(auid, geteuid(), getegid(), in audit_submit() 359 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, in audit_write_success() argument 367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in audit_write_success() 403 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, in audit_write_failure() argument 410 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); in audit_write_failure()
|
H A D | bsm_io.c | 2519 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.auid, tok->len, err); in fetch_process32_tok() 2566 print_user(fp, tok->tt.proc32.auid, oflags); in print_process32_tok() 2593 print_user(fp, tok->tt.proc32.auid, oflags); in print_process32_tok() 2631 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.auid, tok->len, err); in fetch_process64_tok() 2677 print_user(fp, tok->tt.proc64.auid, oflags); in print_process64_tok() 2704 print_user(fp, tok->tt.proc64.auid, oflags); in print_process64_tok() 2743 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32_ex.auid, tok->len, err); in fetch_process32ex_tok() 2804 print_user(fp, tok->tt.proc32_ex.auid, oflags); in print_process32ex_tok() 2832 print_user(fp, tok->tt.proc32_ex.auid, oflags); in print_process32ex_tok() 2872 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64_ex.auid, tok->len, err); in fetch_process64ex_tok() [all …]
|
/freebsd/contrib/openbsm/bsm/ |
H A D | libbsm.h | 460 u_int32_t auid; member 471 u_int32_t auid; member 495 u_int32_t auid; member 506 u_int32_t auid; member 610 u_int32_t auid; member 621 u_int32_t auid; member 645 u_int32_t auid; member 656 u_int32_t auid; member 785 int audit_submit(short au_event, au_id_t auid, 1117 int audit_write_success(short event_code, token_t *misctok, au_id_t auid, [all …]
|
/freebsd/sys/security/mac/ |
H A D | mac_audit.c | 87 mac_cred_check_setauid(struct ucred *cred, uid_t auid) in mac_cred_check_setauid() argument 91 MAC_POLICY_CHECK_NOSLEEP(cred_check_setauid, cred, auid); in mac_cred_check_setauid() 92 MAC_CHECK_PROBE2(cred_check_setauid, error, cred, auid); in mac_cred_check_setauid()
|
H A D | mac_framework.h | 117 int mac_cred_check_setauid(struct ucred *cred, uid_t auid);
|
H A D | mac_policy.h | 146 typedef int (*mpo_cred_check_setauid_t)(struct ucred *cred, uid_t auid);
|
/freebsd/tests/sys/audit/ |
H A D | administrative.c | 466 au_id_t auid; in ATF_TC_BODY() local 471 ATF_REQUIRE_EQ(0, getauid(&auid)); in ATF_TC_BODY() 514 au_id_t auid; in ATF_TC_BODY() local 517 ATF_REQUIRE_EQ(0, getauid(&auid)); in ATF_TC_BODY() 520 ATF_REQUIRE_EQ(0, setauid(&auid)); in ATF_TC_BODY()
|
/freebsd/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 455 if (!select_auid(tok.tt.proc32.auid)) in select_proc32() 485 if (!select_auid(tok.tt.subj32.auid)) in select_subj32()
|
/freebsd/lib/libsys/ |
H A D | _libsys.h | 737 int __sys_getauid(uid_t * auid); 738 int __sys_setauid(uid_t * auid);
|
/freebsd/sys/security/mac_stub/ |
H A D | mac_stub.c | 219 stub_cred_check_setauid(struct ucred *cred, uid_t auid) in stub_cred_check_setauid() argument
|
/freebsd/sys/kern/ |
H A D | systrace_args.c | 2279 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args() 2286 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args()
|
/freebsd/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 2137 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args() 2144 uarg[a++] = (intptr_t)p->auid; /* uid_t * */ in systrace_args()
|