table of contents
SETAUDIT(2) | System Calls Manual | SETAUDIT(2) |
NAME¶
setaudit, setaudit_addr — set audit session stateSYNOPSIS¶
#include <bsm/audit.h> intsetaudit(auditinfo_t *auditinfo); int
setaudit_addr(auditinfo_addr_t *auditinfo_addr, u_int length);
DESCRIPTION¶
The setaudit() system call sets the active audit session state for the current process via the auditinfo_t pointed to by auditinfo. The setaudit_addr() system call sets extended state via auditinfo_addr and length. The auditinfo_t data structure is defined as follows:RETURN VALUES¶
The setaudit() and setaudit_addr() functions return the value 0 if successful; otherwise the value -1 is returned and the global variable errno is set to indicate the error.ERRORS¶
- [
EFAULT
] - A failure occurred while data transferred to or from the kernel failed.
- [
EINVAL
] - Illegal argument was passed by a system call.
- [
EPERM
] - The process does not have sufficient permission to complete the operation.
SEE ALSO¶
audit(2), auditon(2), getaudit(2), getauid(2), setauid(2), libbsm(3)HISTORY¶
The OpenBSM implementation was created by McAfee Research, the security division of McAfee Inc., under contract to Apple Computer Inc. in 2004. It was subsequently adopted by the TrustedBSD Project as the foundation for the OpenBSM distribution.AUTHORS¶
This software was created by McAfee Research, the security research division of McAfee, Inc., under contract to Apple Computer Inc. Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems. This manual page was written by Robert Watson ⟨rwatson@FreeBSD.org⟩.April 19, 2005 | Debian |