Deleted Added
full compact
audit.log.5 (155131) audit.log.5 (155290)
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#6 $
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#7 $
27.\"
28.Dd May 1, 2005
29.Dt AUDIT.LOG 5
30.Os
31.Sh NAME
32.Nm audit
33.Nd "Basic Security Module (BSM) File Format"
34.Sh DESCRIPTION

--- 264 unchanged lines hidden (view full) ---

299.It Li "Real User ID" Ta "4 bytes" Ta "Real user ID"
300.It Li "Real Group ID" Ta "4 bytes" Ta "Real group ID"
301.It Li "Process ID" Ta "4 bytes" Ta "Process ID"
302.It Li "Session ID" Ta "4 bytes" Ta "Audit session ID"
303.It Li "Terminal Port ID" Ta "4/8 bytes" Ta "Terminal port ID (32/64-bits)"
304.It Li "Terminal Machine Address" Ta "4 bytes" Ta "IP address of machine"
305.El
306.Ss Expanded Process Token
27.\"
28.Dd May 1, 2005
29.Dt AUDIT.LOG 5
30.Os
31.Sh NAME
32.Nm audit
33.Nd "Basic Security Module (BSM) File Format"
34.Sh DESCRIPTION

--- 264 unchanged lines hidden (view full) ---

299.It Li "Real User ID" Ta "4 bytes" Ta "Real user ID"
300.It Li "Real Group ID" Ta "4 bytes" Ta "Real group ID"
301.It Li "Process ID" Ta "4 bytes" Ta "Process ID"
302.It Li "Session ID" Ta "4 bytes" Ta "Audit session ID"
303.It Li "Terminal Port ID" Ta "4/8 bytes" Ta "Terminal port ID (32/64-bits)"
304.It Li "Terminal Machine Address" Ta "4 bytes" Ta "IP address of machine"
305.El
306.Ss Expanded Process Token
307The .Dv expanded process
307The
308.Dv expanded process
308token contains the contents of the
309.Dv process
310token, with the addition of a machine address type and variable length
311address storage capable of containing IPv6 addresses.
312A
313.Dv expanded process
314token can be created using
315.Xr au_to_process32_ex 3

--- 90 unchanged lines hidden (view full) ---

406.El
407.Ss System V IPC Token
408The
409.Dv System V IPC
410token ...
411.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
412.It Sy "Field" Ta Sy Bytes Ta Sy Description
413.It Li "Token ID" Ta "1 byte" Ta "Token ID"
309token contains the contents of the
310.Dv process
311token, with the addition of a machine address type and variable length
312address storage capable of containing IPv6 addresses.
313A
314.Dv expanded process
315token can be created using
316.Xr au_to_process32_ex 3

--- 90 unchanged lines hidden (view full) ---

407.El
408.Ss System V IPC Token
409The
410.Dv System V IPC
411token ...
412.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
413.It Sy "Field" Ta Sy Bytes Ta Sy Description
414.It Li "Token ID" Ta "1 byte" Ta "Token ID"
414.It Li XXXXX
415.It Li "object ID type" Ta "1 byte" Ta "Object ID"
416.It Li "Object ID" Ta "4 bytes" Ta "Object ID"
415.El
416.Ss Text Token
417The
418.Dv text
419token contains a single nul-terminated text string.
420A
421.Dv text
422token may be created using

--- 163 unchanged lines hidden (view full) ---

586.Dv zonename
587token ...
588.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
589.It Sy "Field" Ta Sy Bytes Ta Sy Description
590.It Li "Token ID" Ta "1 byte" Ta "Token ID"
591.It Li XXXXX
592.El
593.Sh SEE ALSO
417.El
418.Ss Text Token
419The
420.Dv text
421token contains a single nul-terminated text string.
422A
423.Dv text
424token may be created using

--- 163 unchanged lines hidden (view full) ---

588.Dv zonename
589token ...
590.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description"
591.It Sy "Field" Ta Sy Bytes Ta Sy Description
592.It Li "Token ID" Ta "1 byte" Ta "Token ID"
593.It Li XXXXX
594.El
595.Sh SEE ALSO
596.Xr audit 8,
594.Xr libbsm 3
595.Sh AUTHORS
596The Basic Security Module (BSM) interface to audit records and audit event
597stream format were defined by Sun Microsystems.
598.Pp
599This manual page was written by
600.An Robert Watson Aq rwatson@FreeBSD.org .
601.Sh HISTORY

--- 21 unchanged lines hidden ---
597.Xr libbsm 3
598.Sh AUTHORS
599The Basic Security Module (BSM) interface to audit records and audit event
600stream format were defined by Sun Microsystems.
601.Pp
602This manual page was written by
603.An Robert Watson Aq rwatson@FreeBSD.org .
604.Sh HISTORY

--- 21 unchanged lines hidden ---