2 .\" Copyright (c) 2008-2009 Apple Inc. All rights reserved.
4 .\" @APPLE_LICENSE_HEADER_START@
6 .\" This file contains Original Code and/or Modifications of Original Code
7 .\" as defined in and that are subject to the Apple Public Source License
8 .\" Version 2.0 (the 'License'). You may not use this file except in
9 .\" compliance with the License. Please obtain a copy of the License at
10 .\" http://www.opensource.apple.com/apsl/ and read it before using this
13 .\" The Original Code and all software distributed under the License are
14 .\" distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 .\" EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 .\" INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 .\" FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 .\" Please see the License for the specific language governing rights and
19 .\" limitations under the License.
21 .\" @APPLE_LICENSE_HEADER_END@
29 .Nd "set audit session state"
33 .Fn setaudit "auditinfo_t *auditinfo"
35 .Fn setaudit_addr "auditinfo_addr_t *auditinfo_addr" "u_int length"
40 sets the active audit session state for the current process via the
47 sets extended state via
54 data structure is defined as follows:
58 au_id_t ai_auid; /* Audit user ID */
59 au_mask_t ai_mask; /* Audit masks */
60 au_tid_t ai_termid; /* Terminal ID */
61 au_asid_t ai_asid; /* Audit session ID */
63 typedef struct auditinfo auditinfo_t;
69 variable contains the audit identifier which is recorded in the audit log for
70 each event the process caused.
71 The value of AU_DEFAUDITID (-1) should not be used.
72 The exception is if the value of audit identifier is known at the
73 start of the session but will be determined and set later.
76 is set to something other than AU_DEFAUDITID any audit events
77 generated by the system with be filtered by the non-attributed audit
82 data structure defines the bit mask for auditing successful and failed events
83 out of the predefined list of event classes. It is defined as follows:
87 unsigned int am_success; /* success bits */
88 unsigned int am_failure; /* failure bits */
90 typedef struct au_mask au_mask_t;
96 data structure defines the Terminal ID recorded with every event caused by the
97 process. It is defined as follows:
104 typedef struct au_tid au_tid_t;
110 variable contains the audit session ID which is recorded with every event
111 caused by the process. It can be any value in the range 1 to PID_MAX (99999).
112 If the value of AU_ASSIGN_ASID is used for
114 a unique session ID will be generated by the kernel.
115 The audit session ID will be returned in the
124 data structure which supports Terminal IDs with larger addresses
125 such as those used in IP version 6. It is defined as follows:
128 struct auditinfo_addr {
129 au_id_t ai_auid; /* Audit user ID. */
130 au_mask_t ai_mask; /* Audit masks. */
131 au_tid_addr_t ai_termid; /* Terminal ID. */
132 au_asid_t ai_asid; /* Audit session ID. */
133 u_int64_t ai_flags; /* Audit session flags */
135 typedef struct auditinfo_addr auditinfo_addr_t;
141 data structure includes a larger address storage field and an additional
142 field with the type of address stored:
148 u_int32_t at_addr[4];
150 typedef struct au_tid_addr au_tid_addr_t;
156 field is opaque to the kernel and can be used to store user
157 defined session flags.
159 These system calls require an appropriate privilege to complete.
161 These system calls should only be called once at the start of a new
162 session and not again during the same session to update the session
164 There are some exceptions, however.
167 field may be updated later if initially set to the value of
171 fields may be updated later if the
175 is set to AU_IPv4 and the other
177 fields are all set to zero.
178 Creating a new session is done by setting the
180 field to an unique session value or AU_ASSIGN_ASID.
181 These system calls will fail when attempting to change the
185 fields once set to something other than the default values.
188 field may be updated only according to local access control
189 policy but this is usually accomplished with
191 using the A_SETSFLAGS command.
192 The audit preselection masks may be changed at any time
193 but are usually updated with
195 using the A_SETPMASK command.
197 .Rv -std setaudit setaudit_addr
201 A failure occurred while data transferred to or from
204 Illegal argument was passed by a system call.
206 The process does not have sufficient permission to complete
217 The OpenBSM implementation was created by McAfee Research, the security
218 division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
219 It was subsequently adopted by the TrustedBSD Project as the foundation for
220 the OpenBSM distribution.
223 This software was created by McAfee Research, the security research division
224 of McAfee, Inc., under contract to Apple Computer Inc.
225 Additional authors include
230 The Basic Security Module (BSM) interface to audit records and audit event
231 stream format were defined by Sun Microsystems.
233 This manual page was written by
234 .An Robert Watson Aq rwatson@FreeBSD.org
236 .An Stacey Son Aq sson@FreeBSD.org .