audit.2 (155131) | audit.2 (168777) |
---|---|
1.\"- 2.\" Copyright (c) 2005 Tom Rhodes 3.\" Copyright (c) 2005 Robert N. M. Watson 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 10 unchanged lines hidden (view full) --- 19.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25.\" SUCH DAMAGE. 26.\" | 1.\"- 2.\" Copyright (c) 2005 Tom Rhodes 3.\" Copyright (c) 2005 Robert N. M. Watson 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 10 unchanged lines hidden (view full) --- 19.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25.\" SUCH DAMAGE. 26.\" |
27.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.2#6 $ | 27.\" $P4: //depot/projects/trustedbsd/openbsm/man/audit.2#8 $ |
28.\" 29.Dd April 19, 2005 30.Dt AUDIT 2 31.Os 32.Sh NAME 33.Nm audit | 28.\" 29.Dd April 19, 2005 30.Dt AUDIT 2 31.Os 32.Sh NAME 33.Nm audit |
34.Nd "Commit a BSM audit record to the audit log" | 34.Nd "commit BSM audit record to audit log" |
35.Sh SYNOPSIS 36.In bsm/audit.h 37.Ft int 38.Fn audit "const char *record" "u_int length" 39.Sh DESCRIPTION | 35.Sh SYNOPSIS 36.In bsm/audit.h 37.Ft int 38.Fn audit "const char *record" "u_int length" 39.Sh DESCRIPTION |
40The |
|
40.Fn audit | 41.Fn audit |
42system call |
|
41submits a completed BSM audit record to the system audit log. 42.Pp | 43submits a completed BSM audit record to the system audit log. 44.Pp |
45The |
|
43.Fa record | 46.Fa record |
44is a pointer to the the specific event to be recorded and 45.Vt length | 47argument 48is a pointer to the specific event to be recorded and 49.Fa length |
46is the size in bytes of the data to be written. 47.Sh RETURN VALUES 48.Rv -std 49.Sh ERRORS 50The 51.Fn audit 52system call will fail and the data never written if: 53.Bl -tag -width Er 54.It Bq Er EFAULT 55The 56.Fa record 57argument is beyond the allocated address space of the process. 58.It Bq Er EINVAL 59The token ID is invalid or | 50is the size in bytes of the data to be written. 51.Sh RETURN VALUES 52.Rv -std 53.Sh ERRORS 54The 55.Fn audit 56system call will fail and the data never written if: 57.Bl -tag -width Er 58.It Bq Er EFAULT 59The 60.Fa record 61argument is beyond the allocated address space of the process. 62.It Bq Er EINVAL 63The token ID is invalid or |
60.Vt length | 64.Va length |
61is larger than | 65is larger than |
62.Vt MAXAUDITDATA . | 66.Dv MAXAUDITDATA . |
63.It Bq Er EPERM 64The process does not have sufficient permission to complete 65the operation. 66.El 67.Sh SEE ALSO 68.Xr auditon 2 , | 67.It Bq Er EPERM 68The process does not have sufficient permission to complete 69the operation. 70.El 71.Sh SEE ALSO 72.Xr auditon 2 , |
69.Xr getauid 2 , 70.Xr setauid 2 , | |
71.Xr getaudit 2 , | 73.Xr getaudit 2 , |
72.Xr setaudit 2 , | |
73.Xr getaudit_addr 2 , | 74.Xr getaudit_addr 2 , |
75.Xr getauid 2 , 76.Xr setaudit 2 , |
|
74.Xr setaudit_addr 2 , | 77.Xr setaudit_addr 2 , |
78.Xr setauid 2 , |
|
75.Xr libbsm 3 | 79.Xr libbsm 3 |
80.Sh HISTORY 81The OpenBSM implementation was created by McAfee Research, the security 82division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004. 83It was subsequently adopted by the TrustedBSD Project as the foundation for 84the OpenBSM distribution. |
|
76.Sh AUTHORS | 85.Sh AUTHORS |
86.An -nosplit |
|
77This software was created by McAfee Research, the security research division 78of McAfee, Inc., under contract to Apple Computer Inc. | 87This software was created by McAfee Research, the security research division 88of McAfee, Inc., under contract to Apple Computer Inc. |
79Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. | 89Additional authors include 90.An Wayne Salamon , 91.An Robert Watson , 92and SPARTA Inc. |
80.Pp 81The Basic Security Module (BSM) interface to audit records and audit event 82stream format were defined by Sun Microsystems. 83.Pp 84This manual page was written by 85.An Tom Rhodes Aq trhodes@FreeBSD.org . | 93.Pp 94The Basic Security Module (BSM) interface to audit records and audit event 95stream format were defined by Sun Microsystems. 96.Pp 97This manual page was written by 98.An Tom Rhodes Aq trhodes@FreeBSD.org . |
86.Sh HISTORY 87The OpenBSM implementation was created by McAfee Research, the security 88division of McAfee Inc., under contract to Apple Computer Inc. in 2004. 89It was subsequently adopted by the TrustedBSD Project as the foundation for 90the OpenBSM distribution. | |
91.Sh BUGS 92The 93.Fx 94kernel does not fully validate that the argument passed is syntactically 95valid BSM. 96Submitting invalid audit records may corrupt the audit log. | 99.Sh BUGS 100The 101.Fx 102kernel does not fully validate that the argument passed is syntactically 103valid BSM. 104Submitting invalid audit records may corrupt the audit log. |