diff options
Diffstat (limited to 'usr/src/cmd/auditd')
-rw-r--r-- | usr/src/cmd/auditd/auditd.c | 12 | ||||
-rw-r--r-- | usr/src/cmd/auditd/auditd.xml | 30 | ||||
-rw-r--r-- | usr/src/cmd/auditd/svc-auditd | 20 |
3 files changed, 31 insertions, 31 deletions
diff --git a/usr/src/cmd/auditd/auditd.c b/usr/src/cmd/auditd/auditd.c index 16d4bfe572..5f15c93752 100644 --- a/usr/src/cmd/auditd/auditd.c +++ b/usr/src/cmd/auditd/auditd.c @@ -34,7 +34,7 @@ * used for the child to tell the parent that audit is ready. * * Configuration data comes from audit service configuration - * (AUDITD_FMRI/smf(5)) and the auditon system call. + * (AUDITD_FMRI/smf(7)) and the auditon system call. * * The major errors are EBUSY (auditing is already in use) and EINTR * (one of the above signals was received). File space errors are @@ -273,7 +273,7 @@ main(int argc, char *argv[]) */ (void) umask(007); - if (__logpost("")) { /* Cannot unlink pointer to audit.log(4) file */ + if (__logpost("")) { /* Cannot unlink pointer to audit.log(5) file */ DPRINT((dbfp, "logpost failed\n")); auditd_exit(1); } @@ -285,7 +285,7 @@ main(int argc, char *argv[]) while (running) { /* * Read auditd / auditd plugins related configuration from - * smf(5) repository and create plugin lists. + * smf(7) repository and create plugin lists. * * loadauditlist() and auditd_thread_init() are called * while under the plugin_mutex lock to avoid a race @@ -399,7 +399,7 @@ main(int argc, char *argv[]) * over unless audit configuration actually changed. * * They want to reread the audit configuration from - * smf(5) repository (AUDITD_FMRI). Set reset_list + * smf(7) repository (AUDITD_FMRI). Set reset_list * which will return us to the main while loop in the * main routine. */ @@ -579,7 +579,7 @@ init_plugin(char *name, kva_t *list, int cnt_flag) } /* - * loadauditlist() - read the auditd plugin configuration from smf(5) and + * loadauditlist() - read the auditd plugin configuration from smf(7) and * prepare appropriate plugin related structures (plugin_t). Set cnt policy here * based on currently active policy settings. (future could have a policy = * {+|-}cnt entry per plugin with auditconfig providing the default) @@ -814,7 +814,7 @@ fail: /* * conf_to_kernel() - configure the event to class mapping; see also - * auditconfig(1M) -conf option. + * auditconfig(8) -conf option. */ static void conf_to_kernel(void) diff --git a/usr/src/cmd/auditd/auditd.xml b/usr/src/cmd/auditd/auditd.xml index ee6fd6c110..99dba6091c 100644 --- a/usr/src/cmd/auditd/auditd.xml +++ b/usr/src/cmd/auditd/auditd.xml @@ -128,8 +128,8 @@ <instance name='default' enabled='false'> <!-- - System-wide audit preselection flags - see auditconfig(1M) - and audit_flags(5). + System-wide audit preselection flags - see auditconfig(8) + and audit_flags(7). The 'flags' property is the system-wide default set of audit classes that is combined with the per-user audit @@ -152,10 +152,10 @@ </property_group> <!-- - Audit Queue Control Properties - see auditconfig(1M) + Audit Queue Control Properties - see auditconfig(8) Note, that the default value for all the queue control - configuration parameters is 0, which makes auditd(1M) to + configuration parameters is 0, which makes auditd(8) to use current active system parameters. --> <property_group name='queuectrl' type='application' > @@ -174,10 +174,10 @@ </property_group> <!-- - Audit Policies - see auditconfig(1M) + Audit Policies - see auditconfig(8) Note, that "all" and "none" policies available as a - auditconfig(1M) policy flags actually means a full/empty set + auditconfig(8) policy flags actually means a full/empty set of other policy flags. Thus they are not configurable in the auditd service manifest, but set all the policies to true (all) or false (none). @@ -217,8 +217,8 @@ <!-- Plugins to configure where to send the audit trail - see - auditconfig(1M), audit_binfile(5), audit_remote(5), - audit_syslog(5) + auditconfig(8), audit_binfile(7), audit_remote(7), + audit_syslog(7) Each plugin type property group has properties: @@ -315,25 +315,25 @@ </common_name> <documentation> <manpage title='auditd' - section='1M' + section='8' manpath='/usr/share/man'/> <manpage title='audit' - section='1M' + section='8' manpath='/usr/share/man'/> <manpage title='auditconfig' - section='1M' + section='8' manpath='/usr/share/man'/> <manpage title='audit_flags' - section='5' + section='7' manpath='/usr/share/man'/> <manpage title='audit_binfile' - section='5' + section='7' manpath='/usr/share/man'/> <manpage title='audit_syslog' - section='5' + section='7' manpath='/usr/share/man'/> <manpage title='audit_remote' - section='5' + section='7' manpath='/usr/share/man'/> </documentation> </template> diff --git a/usr/src/cmd/auditd/svc-auditd b/usr/src/cmd/auditd/svc-auditd index ce95015fc1..79ac155b07 100644 --- a/usr/src/cmd/auditd/svc-auditd +++ b/usr/src/cmd/auditd/svc-auditd @@ -79,7 +79,7 @@ do_common() AUDITCOND="`$AUDITCONFIG -getcond 2>/dev/null`" if [ $? -ne 0 ]; then # The decision whether to start - # auditing is driven by bsmconv(1M) / bsmunconv(1M) + # auditing is driven by bsmconv(8) / bsmunconv(8) echo "$0: Unable to get current kernel auditing condition." $SVCADM mark maintenance $AUDITD_FMRI exit $SMF_EXIT_MON_OFFLINE @@ -91,9 +91,9 @@ do_common() $AUDITCONFIG -t -getpolicy | \ $EGREP "perzone|all" 1>/dev/null 2>&1 if [ $? -eq 1 ]; then - echo "$0: auditd(1M) is not configured to run in" + echo "$0: auditd(8) is not configured to run in" echo " a local zone, perzone policy not set" \ - "(see auditconfig(1M))." + "(see auditconfig(8))." $SVCADM disable $AUDITD_FMRI $SLEEP 5 & exit $SMF_EXIT_OK @@ -114,7 +114,7 @@ do_common() do_start() { # - # The transition of the audit_startup(1M) has to be performed. + # The transition of the audit_startup(8) has to be performed. if [ -f "$AUDIT_STARTUP" ]; then if [ -x "$AUDIT_STARTUP" ]; then @@ -125,7 +125,7 @@ do_start() exit $SMF_EXIT_MON_OFFLINE fi - echo "$0: Transition of audit_startup(1M) started." + echo "$0: Transition of audit_startup(8) started." $MV $AUDIT_STARTUP $AUDIT_STARTUP._transitioned_ if [ $? -ne 0 ]; then @@ -144,7 +144,7 @@ do_start() exit $SMF_EXIT_ERR_CONFIG fi - echo "$0: Transition of audit_startup(1M) finished." + echo "$0: Transition of audit_startup(8) finished." fi # @@ -158,7 +158,7 @@ do_refresh() { # # The refresh capability is available only for those systems - # with already transformed audit_startup(1M) into $AUDITD_FMRI + # with already transformed audit_startup(8) into $AUDITD_FMRI # service properties. See do_start() for more information. if [ ! -f "$AUDIT_STARTUP" ]; then # @@ -171,7 +171,7 @@ do_refresh() exit $SMF_EXIT_ERR_FATAL fi # - # signal to auditd(1M): + # signal to auditd(8): $PKILL -HUP -c ${contract_id} if [ $? -ne 0 ]; then echo "$0: SIGHUP was not successfully delivered to" \ @@ -182,8 +182,8 @@ do_refresh() $SLEEP 5 & else echo "$0: Service refresh method not supported on systems" \ - "without converted audit_startup(1M) into auditd service" \ - "SMF configuration. Clear the service (svcadm(1M))." + "without converted audit_startup(8) into auditd service" \ + "SMF configuration. Clear the service (svcadm(8))." $SVCADM mark maintenance $AUDITD_FMRI exit $SMF_EXIT_ERR_CONFIG fi |