From owner-p4-projects@FreeBSD.ORG Thu Jul 10 04:10:49 2008 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 7B692106572D; Thu, 10 Jul 2008 04:10:49 +0000 (UTC) Delivered-To: perforce@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3F48F106567B for ; Thu, 10 Jul 2008 04:10:49 +0000 (UTC) (envelope-from sson@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 276878FC1C for ; Thu, 10 Jul 2008 04:10:49 +0000 (UTC) (envelope-from sson@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.1/8.14.1) with ESMTP id m6A4Anux029953 for ; Thu, 10 Jul 2008 04:10:49 GMT (envelope-from sson@FreeBSD.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.14.2/8.14.1/Submit) id m6A4An72029951 for perforce@freebsd.org; Thu, 10 Jul 2008 04:10:49 GMT (envelope-from sson@FreeBSD.org) Date: Thu, 10 Jul 2008 04:10:49 GMT Message-Id: <200807100410.m6A4An72029951@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to sson@FreeBSD.org using -f From: Stacey Son To: Perforce Change Reviews Cc: Subject: PERFORCE change 144985 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jul 2008 04:10:49 -0000 http://perforce.freebsd.org/chv.cgi?CH=144985 Change 144985 by sson@sson_amd64 on 2008/07/10 04:10:22 Rewrote the A_SETPOLICY section of auditon(2). Affected files ... .. //depot/projects/trustedbsd/openbsm/man/auditon.2#13 edit Differences ... ==== //depot/projects/trustedbsd/openbsm/man/auditon.2#13 (text+ko) ==== @@ -25,7 +25,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditon.2#12 $ +.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditon.2#13 $ .\" .Dd April 19, 2005 .Dt AUDITON 2 @@ -63,32 +63,32 @@ argument must point to a .Vt long -value set to one of the following audit -policy control values: -either -.Dv AUDIT_CNT -or -.Dv AUDIT_AHLT . -In the -.Dv AUDIT_CNT -case, the action will continue regardless if -an event will not be audited. -In the -.Dv AUDIT_AHLT -case, a +value set to one or more the following audit +policy control values bitwise OR'ed together: +.Dv AUDIT_CNT , +.Dv AUDIT_AHLT , +.Dv AUDIT_ARGV , +and +.Dv AUDIT_ARGE . +If +.Dv AUDIT_CNT is set, the system will continue even if the system becomes low +on space and discontinue logging events until the low space condition is +remedied. If it is not set, audited events will block until the low space +condition is remedied. Unaudited events, however, are unaffected. +If +.Dv AUDIT_AHLT is set, a .Xr panic 9 -will result if an event will not be written to the -audit log file. In addition to one of the audit policy control values -defined above, the argument may also include +if it cannot write an event to the global audit log file. +If .Dv AUDIT_ARGV -or -.Dv AUDIT_ARGE -or both. -These flags will audit the argument list and environment variables -passed to the -.Xr execve -system call and are added by bitwise OR'ing to the audit control policy -argument. +is set, then the argument list passed to the +.Xr execve 2 +system call will be audited. If +.Dv AUDIT_ARGE +is set, then the environment variables passed to the +.Xr execve 2 +system call will be audited. The default policy is none of the audit policy +control flags set. .It Dv A_SETKAUDIT Return .Er ENOSYS .