Visit The New, Modern Unix Linux Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #250
Difficulty: Easy
MILNET was the name given to a network that split off from ARPANET in 1983 to create an internetwork designated for use by the U.S. Department of Defense.
True or False?
Linux & Unix Commands - Search Man Pages

auditctl(2) [freebsd man page]

AUDITCTL(2)						      BSD System Calls Manual						       AUDITCTL(2)

NAME
auditctl -- configure system audit parameters SYNOPSIS
#include <bsm/audit.h> int auditctl(const char *path); DESCRIPTION
The auditctl() system call directs the kernel to open a new audit trail log file. It requires an appropriate privilege. The auditctl() sys- tem call opens new files, but auditon(2) is used to disable the audit log. RETURN VALUES
Upon successful completion, the value 0 is returned; otherwise the value -1 is returned and the global variable errno is set to indicate the error. ERRORS
The auditctl() system call will fail if: [EINVAL] The path is invalid. [EPERM] The process does not have sufficient permission to complete the operation. SEE ALSO
auditon(2), libbsm(3), auditd(8) HISTORY
The OpenBSM implementation was created by McAfee Research, the security division of McAfee Inc., under contract to Apple Computer Inc. in 2004. It was subsequently adopted by the TrustedBSD Project as the foundation for the OpenBSM distribution. AUTHORS
This software was created by McAfee Research, the security research division of McAfee, Inc., under contract to Apple Computer Inc. Addi- tional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems. This manual page was written by Robert Watson <rwatson@FreeBSD.org>. BSD
April 19, 2005 BSD

Check Out this Related Man Page

SETAUID(2)						      BSD System Calls Manual							SETAUID(2)

NAME
setauid -- set audit session ID SYNOPSIS
#include <bsm/audit.h> int setauid(au_id_t *auid); DESCRIPTION
The setauid() system call sets the active audit session ID for the current process from the au_id_t pointed to by auid. This system call requires an appropriate privilege to complete. RETURN VALUES
Upon successful completion, the value 0 is returned; otherwise the value -1 is returned and the global variable errno is set to indicate the error. ERRORS
The setauid() function will fail if: [EFAULT] A failure occurred while data transferred to the kernel failed. [EPERM] The process does not have sufficient permission to complete the operation. SEE ALSO
audit(2), auditon(2), getaudit(2), getaudit_addr(2), getauid(2), setaudit(2), setaudit_addr(2), libbsm(3) HISTORY
The OpenBSM implementation was created by McAfee Research, the security division of McAfee Inc., under contract to Apple Computer Inc. in 2004. It was subsequently adopted by the TrustedBSD Project as the foundation for the OpenBSM distribution. AUTHORS
This software was created by McAfee Research, the security research division of McAfee, Inc., under contract to Apple Computer Inc. Addi- tional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems. This manual page was written by Robert Watson <rwatson@FreeBSD.org>. BSD
April 19, 2005 BSD

Featured Tech Videos