From owner-p4-projects@FreeBSD.ORG Thu Jul 10 09:03:46 2008 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 3659E1065670; Thu, 10 Jul 2008 09:03:46 +0000 (UTC) Delivered-To: perforce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CFAC5106564A for ; Thu, 10 Jul 2008 09:03:45 +0000 (UTC) (envelope-from brueffer@freebsd.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id BEEA18FC0C for ; Thu, 10 Jul 2008 09:03:45 +0000 (UTC) (envelope-from brueffer@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.1/8.14.1) with ESMTP id m6A93jnJ080576 for ; Thu, 10 Jul 2008 09:03:45 GMT (envelope-from brueffer@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.14.2/8.14.1/Submit) id m6A93j2I080574 for perforce@freebsd.org; Thu, 10 Jul 2008 09:03:45 GMT (envelope-from brueffer@freebsd.org) Date: Thu, 10 Jul 2008 09:03:45 GMT Message-Id: <200807100903.m6A93j2I080574@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to brueffer@freebsd.org using -f From: Christian Brueffer To: Perforce Change Reviews Cc: Subject: PERFORCE change 144998 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jul 2008 09:03:46 -0000 http://perforce.freebsd.org/chv.cgi?CH=144998 Change 144998 by brueffer@brueffer_haakonia on 2008/07/10 09:02:51 Mdoc style and wording fixes. Affected files ... .. //depot/projects/trustedbsd/openbsm/man/auditon.2#14 edit Differences ... ==== //depot/projects/trustedbsd/openbsm/man/auditon.2#14 (text+ko) ==== @@ -25,9 +25,9 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditon.2#13 $ +.\" $P4: //depot/projects/trustedbsd/openbsm/man/auditon.2#14 $ .\" -.Dd April 19, 2005 +.Dd July 10, 2008 .Dt AUDITON 2 .Os .Sh NAME @@ -71,10 +71,12 @@ and .Dv AUDIT_ARGE . If -.Dv AUDIT_CNT is set, the system will continue even if the system becomes low +.Dv AUDIT_CNT is set, the system will continue even if it becomes low on space and discontinue logging events until the low space condition is -remedied. If it is not set, audited events will block until the low space -condition is remedied. Unaudited events, however, are unaffected. +remedied. +If it is not set, audited events will block until the low space +condition is remedied. +Unaudited events, however, are unaffected. If .Dv AUDIT_AHLT is set, a .Xr panic 9 @@ -132,9 +134,10 @@ The field .Fa aq_hiwater defines the maximum number of audit record entries in the queue used to store -the audit records ready for delivery to disk. New records are inserted at the -tail of the queue and removed from the head. New records which would exceed the -high water mark, the calling thread is inserted into the a wait queue, waiting +the audit records ready for delivery to disk. +New records are inserted at the tail of the queue and removed from the head. +For new records which would exceed the +high water mark, the calling thread is inserted into the wait queue, waiting for the audit queue to have enough space available as defined with the field .Fa aq_lowater . The field @@ -147,10 +150,11 @@ The field .Fa aq_minfree specifies the minimum amount of free blocks on the disk device used to store -audit records. If the value of free blocks falls below the configured -minimum amount, the kernel informs the audit daemon about low disk space. The -value is to be specified in percent of free filesystem blocks. A value of 0 -results in a disabling of the check. +audit records. +If the value of free blocks falls below the configured +minimum amount, the kernel informs the audit daemon about low disk space. +The value is to be specified in percent of free file system blocks. +A value of 0 results in a disabling of the check. .It Dv A_SETSTAT Return .Er ENOSYS . @@ -207,9 +211,11 @@ must point to a .Vt auditpinfo_t structure that contains the given process's audit -preselection masks for both success and failure. The field +preselection masks for both success and failure. +The field .Fa ap_pid -is the process id of the target process. The field +is the process id of the target process. +The field .Fa ap_mask must point to a .Fa au_mask_t @@ -262,10 +268,12 @@ (the terminal ID), and .Fa ap_asid (the audit session ID) -of the given target process. The process ID of the target process is passed +of the given target process. +The process ID of the target process is passed into the kernel using the .Fa ap_pid -field. See the section +field. +See the section .Dv A_SETPMASK above and .Xr getaudit 2 @@ -287,7 +295,8 @@ structure can hold much a larger terminal address and an address type. The process ID of the target process is passed into the kernel using the .Fa ap_pid -field. See the section +field. +See the section .Dv A_SETPMASK above and .Xr getaudit 2 @@ -309,7 +318,8 @@ must point to a .Vt long value which will be set to -one of the current audit policy flags. The audit policy flags are +one of the current audit policy flags. +The audit policy flags are described in the .Dv A_SETPOLICY section above. @@ -321,7 +331,8 @@ must point to a .Vt au_qctrl_t structure which will be set to the current -kernel audit queue control parameters. See the +kernel audit queue control parameters. +See the .Dv A_SETQCTL section above for more information. .It Dv A_GETFSIZE