2 .\" Copyright (c) 2008-2009 Apple Inc. All rights reserved.
4 .\" @APPLE_LICENSE_HEADER_START@
6 .\" This file contains Original Code and/or Modifications of Original Code
7 .\" as defined in and that are subject to the Apple Public Source License
8 .\" Version 2.0 (the 'License'). You may not use this file except in
9 .\" compliance with the License. Please obtain a copy of the License at
10 .\" http://www.opensource.apple.com/apsl/ and read it before using this
13 .\" The Original Code and all software distributed under the License are
14 .\" distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 .\" EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 .\" INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 .\" FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 .\" Please see the License for the specific language governing rights and
19 .\" limitations under the License.
21 .\" @APPLE_LICENSE_HEADER_END@
29 .Nd "set audit session state"
33 .Fn setaudit "auditinfo_t *auditinfo"
35 .Fn setaudit_addr "auditinfo_addr_t *auditinfo_addr" "u_int length"
40 sets the active audit session state for the current process via the
47 sets extended state via
54 data structure is defined as follows:
59 au_id_t ai_auid; /* Audit user ID */
60 au_mask_t ai_mask; /* Audit masks */
61 au_tid_t ai_termid; /* Terminal ID */
62 au_asid_t ai_asid; /* Audit session ID */
64 typedef struct auditinfo auditinfo_t;
70 variable contains the audit identifier which is recorded in the audit log for
71 each event the process caused.
72 The value of AU_DEFAUDITID (-1) should not be used.
73 The exception is if the value of audit identifier is known at the
74 start of the session but will be determined and set later.
77 is set to something other than AU_DEFAUDITID any audit events
78 generated by the system with be filtered by the non-attributed audit
84 data structure defines the bit mask for auditing successful and failed events
85 out of the predefined list of event classes. It is defined as follows:
90 unsigned int am_success; /* success bits */
91 unsigned int am_failure; /* failure bits */
93 typedef struct au_mask au_mask_t;
100 data structure defines the Terminal ID recorded with every event caused by the
101 process. It is defined as follows:
109 typedef struct au_tid au_tid_t;
116 variable contains the audit session ID which is recorded with every event
117 caused by the process. It can be any value in the range 1 to PID_MAX (99999).
118 If the value of AU_ASSIGN_ASID is used for
120 a unique session ID will be generated by the kernel.
121 The audit session ID will be returned in
130 data structure supports Terminal IDs with larger addresses such as those used
131 in IP version 6. It is defined as follows:
135 struct auditinfo_addr {
136 au_id_t ai_auid; /* Audit user ID. */
137 au_mask_t ai_mask; /* Audit masks. */
138 au_tid_addr_t ai_termid; /* Terminal ID. */
139 au_asid_t ai_asid; /* Audit session ID. */
140 u_int64_t ai_flags; /* Audit session flags */
142 typedef struct auditinfo_addr auditinfo_addr_t;
148 data structure which includes a larger address storage field and an additional
149 field with the type of address stored:
156 u_int32_t at_addr[4];
158 typedef struct au_tid_addr au_tid_addr_t;
164 field is opaque to the kernel and can be used to store user
165 defined session flags.
167 These system calls require an appropriate privilege to complete.
169 These system calls should only be called once at the start of a new
170 session and not again during the same session to update the session
172 There are some exceptions, however.
175 field may be updated later if initially set to the value of
179 fields may be updated later if the
183 is set to AU_IPv4 and the other
185 fields are all set to zero.
188 field can only be set when a new session is initially created.
189 Creating a new session is done by setting the
191 field to an unique session value or AU_ASSIGN_ASID.
192 These system calls will fail when attempting to change the
197 fields once set to something other than the default values.
198 The audit preselection masks may be changed at any time
199 but are usually updated with
201 using the A_SETPMASK command.
203 .Rv -std setaudit setaudit_addr
207 A failure occurred while data transferred to or from
210 Illegal argument was passed by a system call.
212 The process does not have sufficient permission to complete
223 The OpenBSM implementation was created by McAfee Research, the security
224 division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
225 It was subsequently adopted by the TrustedBSD Project as the foundation for
226 the OpenBSM distribution.
229 This software was created by McAfee Research, the security research division
230 of McAfee, Inc., under contract to Apple Computer Inc.
231 Additional authors include
236 The Basic Security Module (BSM) interface to audit records and audit event
237 stream format were defined by Sun Microsystems.
239 This manual page was written by
240 .An Robert Watson Aq rwatson@FreeBSD.org
242 .An Stacey Son Aq sson@FreeBSD.org .