/illumos-gate/usr/src/uts/common/syscall/ |
H A D | ppriv.c | 38 #include <c2/audit.h>
|
H A D | stat.c | 56 #include <c2/audit.h>
|
H A D | auditsys.c | 29 #include <c2/audit.h> 37 uint32_t audit_policy; /* global audit policies in force */ 75 result = audit((caddr_t)uap->a1, (int)uap->a2); 99 * Return the audit user ID for the current process. Currently only 100 * the privileged processes may see the audit id. That may change. 122 * Set the audit userid, for a process. This can only be changed by 123 * privileged processes. The audit userid is inherited across forks & execs. 163 * Get the audit state information from the current process. 212 * Get the audit state information from the current process. 265 * Set the audit stat [all...] |
/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit.h | 46 * audit records. None of the "global state" is returned by an 55 #define AUC_AUDITING 0x1 /* audit daemon is active */ 56 #define AUC_NOAUDIT 0x2 /* audit daemon is not active */ 57 #define AUC_INIT_AUDIT 0x4 /* audit ready but auditd has not run */ 58 #define AUC_NOSPACE 0x8 /* audit enabled, no space for audit records */ 80 #define PAD_FAILURE 0x8000 /* fail audit event */ 94 * An audit event mask. 236 #define A_GETPOLICY 2 /* get audit policy */ 237 #define A_SETPOLICY 3 /* set audit polic [all...] |
H A D | audit_io.c | 26 * Routines for writing audit records. 49 #include <c2/audit.h> 71 * Write to an audit descriptor. 100 * Close an audit descriptor. 132 * Defer closing/queueing of an audit descriptor. For async events, queue 195 * from both au_close() (for kernel audit) and from audit() (userland audit). 226 * Close an audit descriptor. 249 /* if auditing not enabled, then don't generate an audit recor [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/libumem/ |
H A D | leaky_subr.c | 472 int audit = (c->cache_flags & UMF_AUDIT); local 477 if (audit) { 492 if (!audit)
|
/illumos-gate/usr/src/cmd/sgs/rtld/common/ |
H A D | cap.c | 676 int audit = 0; local 724 audit = 1; 760 DBG_CALL(Dbg_file_filtee(lml, 0, pdp->pd_pname, audit));
|
H A D | elf.c | 976 int audit = 0; local 1107 audit = 1; 1144 audit)); 1659 Addr base, fltr = 0, audit = 0, cfile = 0, crle = 0; local 1943 audit = dyn->d_un.d_val; 2259 * link-map its too early to go searching for audit objects so just 2262 if (audit) { 2263 char *cp = audit + (char *)STRTAB(lmp);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/ilbd/ |
H A D | ilbd_rules.c | 498 * Generates an audit record for a supplied rule name 596 /* in audit record, max=min when single port */ 699 * 0 in the audit record. 734 * audit records. 737 cvt_addr(uint32_t *audit, int32_t type, struct in6_addr address) argument 742 audit[0] = address._S6_un._S6_u32[3]; 745 (void) memcpy(audit, address._S6_un._S6_u32, 840 /* generate the audit record before bailing out */ 913 * there is not need to audit them.
|
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | getpwaent.c | 33 #include <sys/audit.h>
|
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | kssl.c | 48 #include <c2/audit.h>
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | main.c | 82 #include <c2/audit.h>
|
H A D | devpolicy.c | 68 #include <c2/audit.h>
|
H A D | pid.c | 45 #include <c2/audit.h>
|
/illumos-gate/usr/src/uts/sun4/os/ |
H A D | memlist.c | 79 #include <c2/audit.h>
|
/illumos-gate/usr/src/cmd/praudit/ |
H A D | toktable.c | 35 #include <bsm/audit.h> 65 * These names refer to different type of audit tokens. 204 table_init(TAG_AUID, "audit-uid", pa_pw_uid, T_ATTRIBUTE);
|
/illumos-gate/usr/src/lib/auditd_plugins/binfile/ |
H A D | binfile.c | 24 * write binary audit records directly to a file. 43 #include <bsm/audit.h> 81 /* minimum reasonable size in bytes to roll over an audit file */ 270 DPRINT((dbfp, "binfile: Loading audit list from audit service " 336 DPRINT((dbfp, "loadauditlist: close / open audit.log(4)\n")); 397 * write_file_token - put the file token into the audit log 619 * to ensure audit log does not grow above size limit 743 * exceeded or the current file system fills up, and "audit -s" with 744 * changed parameters. For "audit [all...] |
/illumos-gate/usr/src/lib/auditd_plugins/remote/ |
H A D | audit_remote.c | 24 * send audit records to remote host 37 #include <bsm/audit.h> 99 * audit queue high water mark. This is backup solution for a case, when the 120 * get_port_default() - set the default port number; note, that "solaris-audit" 122 * remote solaris audit logging. 131 if (getservbyname_r("solaris-audit", "tcp", &serventry, 665 "the audit record to with no success " 698 * `audit -s`, then kvlist != NULL; on `audit -n`, then kvlist == NULL. 699 * For more information see audit( [all...] |
/illumos-gate/usr/src/cmd/auditd/ |
H A D | auditd.c | 27 * These routines make up the audit daemon server. This daemon, called 29 * audit records (usually one or more per buffer, potentially less than 33 * SIGALRM (quit), and SIGUSR1 (start a new audit log file). SIGTERM is also 34 * used for the child to tell the parent that audit is ready. 36 * Configuration data comes from audit service configuration 51 #include <bsm/audit.h> 112 static int reset_list = 1; /* 1 to re-read audit configuration */ 175 auditinfo_addr_t as_null; /* audit state to set */ 196 * Set the audit host-id. 216 * Set the audit stat [all...] |
/illumos-gate/usr/src/cmd/auditreduce/ |
H A D | proc.c | 35 #include <bsm/audit.h> 163 * .func asort - audit sort. 202 * .func aget - audit get. 225 * if the file really is an audit file. If there are no more then 279 * Check header of audit file. 298 * Found a good audit file. 694 "Warning: invalid event no %d in audit trail."), 859 * .desc Read in and check the header for an audit file. 885 (void) sprintf(errbuf, gettext("%s not an audit file "), fn);
|
/illumos-gate/usr/src/cmd/sgs/rtld/amd64/ |
H A D | boot_elf.s | 278 andl $AF_PLTEXIT, %eax / value of audit.h:AF_PLTEXIT
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | cryptoadm.c | 50 #include <c2/audit.h>
|
/illumos-gate/usr/src/uts/intel/ia32/os/ |
H A D | sundep.c | 79 #include <c2/audit.h>
|
H A D | sendsig.c | 82 #include <c2/audit.h>
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 32 #include <bsm/audit.h> 395 adt_write_syslog("audit failure", errno); 565 * If the group audit policy is set, generate the subject group token.
|