From owner-p4-projects@FreeBSD.ORG Sat Jun 16 18:41:12 2012 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id A1355106566B; Sat, 16 Jun 2012 18:41:11 +0000 (UTC) Delivered-To: perforce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5BC801065672 for ; Sat, 16 Jun 2012 18:41:11 +0000 (UTC) (envelope-from joel@freebsd.org) Received: from skunkworks.freebsd.org (skunkworks.freebsd.org [IPv6:2001:4f8:fff6::2d]) by mx1.freebsd.org (Postfix) with ESMTP id 2BB688FC14 for ; Sat, 16 Jun 2012 18:41:11 +0000 (UTC) Received: from skunkworks.freebsd.org (localhost [127.0.0.1]) by skunkworks.freebsd.org (8.14.4/8.14.4) with ESMTP id q5GIfAuQ091145 for ; Sat, 16 Jun 2012 18:41:10 GMT (envelope-from joel@freebsd.org) Received: (from perforce@localhost) by skunkworks.freebsd.org (8.14.4/8.14.4/Submit) id q5GIfAeG091139 for perforce@freebsd.org; Sat, 16 Jun 2012 18:41:10 GMT (envelope-from joel@freebsd.org) Date: Sat, 16 Jun 2012 18:41:10 GMT Message-Id: <201206161841.q5GIfAeG091139@skunkworks.freebsd.org> X-Authentication-Warning: skunkworks.freebsd.org: perforce set sender to joel@freebsd.org using -f From: Joel Dahl To: Perforce Change Reviews Precedence: bulk Cc: Subject: PERFORCE change 212966 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 Jun 2012 18:41:12 -0000 http://p4web.freebsd.org/@@212966?ac=10 Change 212966 by joel@joel_crashbox on 2012/06/16 18:41:02 mdocify. Affected files ... .. //depot/projects/trustedbsd/openbsm/man/setaudit.2#12 edit Differences ... ==== //depot/projects/trustedbsd/openbsm/man/setaudit.2#12 (text+ko) ==== @@ -24,7 +24,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.\" $P4: //depot/projects/trustedbsd/openbsm/man/setaudit.2#11 $ +.\" $P4: //depot/projects/trustedbsd/openbsm/man/setaudit.2#12 $ .\" .Dd April 19, 2005 .Dt SETAUDIT 2 @@ -58,9 +58,7 @@ The .Fa auditinfo_t data structure is defined as follows: -.nf -.in +4n - +.Bd -literal -offset 4n struct auditinfo { au_id_t ai_auid; /* Audit user ID */ au_mask_t ai_mask; /* Audit masks */ @@ -68,47 +66,37 @@ au_asid_t ai_asid; /* Audit session ID */ }; typedef struct auditinfo auditinfo_t; -.in -.fi +.Ed .Pp The .Fa ai_auid variable contains the audit identifier which is recorded in the audit log for each event the process caused. -.PP - +.Pp The .Fa au_mask_t data structure defines the bit mask for auditing successful and failed events out of the predefined list of event classes. It is defined as follows: -.nf -.in +4n - +.Bd -literal -offset 4n struct au_mask { unsigned int am_success; /* success bits */ unsigned int am_failure; /* failure bits */ }; typedef struct au_mask au_mask_t; -.in -.fi -.PP - +.Ed +.Pp The .Fa au_termid_t data structure defines the Terminal ID recorded with every event caused by the process. It is defined as follows: -.nf -.in +4n - +.Bd -literal -offset 4n struct au_tid { dev_t port; u_int32_t machine; }; typedef struct au_tid au_tid_t; - -.in -.fi -.PP +.Ed +.Pp The .Fa ai_asid variable contains the audit session ID which is recorded with every event @@ -121,9 +109,7 @@ .Fa auditinfo_addr_t data structure supports Terminal IDs with larger addresses such as those used in IP version 6. It is defined as follows: -.nf -.in +4n - +.Bd -literal -offset 4n struct auditinfo_addr { au_id_t ai_auid; /* Audit user ID. */ au_mask_t ai_mask; /* Audit masks. */ @@ -131,24 +117,20 @@ au_asid_t ai_asid; /* Audit session ID. */ }; typedef struct auditinfo_addr auditinfo_addr_t; -.in -.fi +.Ed .Pp The .Fa au_tid_addr_t data structure which includes a larger address storage field and an additional field with the type of address stored: -.nf -.in +4n - +.Bd -literal -offset 4n struct au_tid_addr { dev_t at_port; u_int32_t at_type; u_int32_t at_addr[4]; }; typedef struct au_tid_addr au_tid_addr_t; -.in -.fi +.Ed .Pp These system calls require an appropriate privilege to complete. .Sh RETURN VALUES