audit.log.5 (155131) | audit.log.5 (155290) |
---|---|
1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" | 1.\"- 2.\" Copyright (c) 2005 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" |
26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#6 $ | 26.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.log.5#7 $ |
27.\" 28.Dd May 1, 2005 29.Dt AUDIT.LOG 5 30.Os 31.Sh NAME 32.Nm audit 33.Nd "Basic Security Module (BSM) File Format" 34.Sh DESCRIPTION --- 264 unchanged lines hidden (view full) --- 299.It Li "Real User ID" Ta "4 bytes" Ta "Real user ID" 300.It Li "Real Group ID" Ta "4 bytes" Ta "Real group ID" 301.It Li "Process ID" Ta "4 bytes" Ta "Process ID" 302.It Li "Session ID" Ta "4 bytes" Ta "Audit session ID" 303.It Li "Terminal Port ID" Ta "4/8 bytes" Ta "Terminal port ID (32/64-bits)" 304.It Li "Terminal Machine Address" Ta "4 bytes" Ta "IP address of machine" 305.El 306.Ss Expanded Process Token | 27.\" 28.Dd May 1, 2005 29.Dt AUDIT.LOG 5 30.Os 31.Sh NAME 32.Nm audit 33.Nd "Basic Security Module (BSM) File Format" 34.Sh DESCRIPTION --- 264 unchanged lines hidden (view full) --- 299.It Li "Real User ID" Ta "4 bytes" Ta "Real user ID" 300.It Li "Real Group ID" Ta "4 bytes" Ta "Real group ID" 301.It Li "Process ID" Ta "4 bytes" Ta "Process ID" 302.It Li "Session ID" Ta "4 bytes" Ta "Audit session ID" 303.It Li "Terminal Port ID" Ta "4/8 bytes" Ta "Terminal port ID (32/64-bits)" 304.It Li "Terminal Machine Address" Ta "4 bytes" Ta "IP address of machine" 305.El 306.Ss Expanded Process Token |
307The .Dv expanded process | 307The 308.Dv expanded process |
308token contains the contents of the 309.Dv process 310token, with the addition of a machine address type and variable length 311address storage capable of containing IPv6 addresses. 312A 313.Dv expanded process 314token can be created using 315.Xr au_to_process32_ex 3 --- 90 unchanged lines hidden (view full) --- 406.El 407.Ss System V IPC Token 408The 409.Dv System V IPC 410token ... 411.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 412.It Sy "Field" Ta Sy Bytes Ta Sy Description 413.It Li "Token ID" Ta "1 byte" Ta "Token ID" | 309token contains the contents of the 310.Dv process 311token, with the addition of a machine address type and variable length 312address storage capable of containing IPv6 addresses. 313A 314.Dv expanded process 315token can be created using 316.Xr au_to_process32_ex 3 --- 90 unchanged lines hidden (view full) --- 407.El 408.Ss System V IPC Token 409The 410.Dv System V IPC 411token ... 412.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 413.It Sy "Field" Ta Sy Bytes Ta Sy Description 414.It Li "Token ID" Ta "1 byte" Ta "Token ID" |
414.It Li XXXXX | 415.It Li "object ID type" Ta "1 byte" Ta "Object ID" 416.It Li "Object ID" Ta "4 bytes" Ta "Object ID" |
415.El 416.Ss Text Token 417The 418.Dv text 419token contains a single nul-terminated text string. 420A 421.Dv text 422token may be created using --- 163 unchanged lines hidden (view full) --- 586.Dv zonename 587token ... 588.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 589.It Sy "Field" Ta Sy Bytes Ta Sy Description 590.It Li "Token ID" Ta "1 byte" Ta "Token ID" 591.It Li XXXXX 592.El 593.Sh SEE ALSO | 417.El 418.Ss Text Token 419The 420.Dv text 421token contains a single nul-terminated text string. 422A 423.Dv text 424token may be created using --- 163 unchanged lines hidden (view full) --- 588.Dv zonename 589token ... 590.Bl -column -offset ind ".Sy Field Name Width XX" ".Sy XX Bytes XXXX" ".Sy Description" 591.It Sy "Field" Ta Sy Bytes Ta Sy Description 592.It Li "Token ID" Ta "1 byte" Ta "Token ID" 593.It Li XXXXX 594.El 595.Sh SEE ALSO |
596.Xr audit 8, |
|
594.Xr libbsm 3 595.Sh AUTHORS 596The Basic Security Module (BSM) interface to audit records and audit event 597stream format were defined by Sun Microsystems. 598.Pp 599This manual page was written by 600.An Robert Watson Aq rwatson@FreeBSD.org . 601.Sh HISTORY --- 21 unchanged lines hidden --- | 597.Xr libbsm 3 598.Sh AUTHORS 599The Basic Security Module (BSM) interface to audit records and audit event 600stream format were defined by Sun Microsystems. 601.Pp 602This manual page was written by 603.An Robert Watson Aq rwatson@FreeBSD.org . 604.Sh HISTORY --- 21 unchanged lines hidden --- |