summaryrefslogtreecommitdiff
path: root/usr/src/cmd/auditd
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/cmd/auditd')
-rw-r--r--usr/src/cmd/auditd/auditd.c12
-rw-r--r--usr/src/cmd/auditd/auditd.xml30
-rw-r--r--usr/src/cmd/auditd/svc-auditd20
3 files changed, 31 insertions, 31 deletions
diff --git a/usr/src/cmd/auditd/auditd.c b/usr/src/cmd/auditd/auditd.c
index 16d4bfe572..5f15c93752 100644
--- a/usr/src/cmd/auditd/auditd.c
+++ b/usr/src/cmd/auditd/auditd.c
@@ -34,7 +34,7 @@
* used for the child to tell the parent that audit is ready.
*
* Configuration data comes from audit service configuration
- * (AUDITD_FMRI/smf(5)) and the auditon system call.
+ * (AUDITD_FMRI/smf(7)) and the auditon system call.
*
* The major errors are EBUSY (auditing is already in use) and EINTR
* (one of the above signals was received). File space errors are
@@ -273,7 +273,7 @@ main(int argc, char *argv[])
*/
(void) umask(007);
- if (__logpost("")) { /* Cannot unlink pointer to audit.log(4) file */
+ if (__logpost("")) { /* Cannot unlink pointer to audit.log(5) file */
DPRINT((dbfp, "logpost failed\n"));
auditd_exit(1);
}
@@ -285,7 +285,7 @@ main(int argc, char *argv[])
while (running) {
/*
* Read auditd / auditd plugins related configuration from
- * smf(5) repository and create plugin lists.
+ * smf(7) repository and create plugin lists.
*
* loadauditlist() and auditd_thread_init() are called
* while under the plugin_mutex lock to avoid a race
@@ -399,7 +399,7 @@ main(int argc, char *argv[])
* over unless audit configuration actually changed.
*
* They want to reread the audit configuration from
- * smf(5) repository (AUDITD_FMRI). Set reset_list
+ * smf(7) repository (AUDITD_FMRI). Set reset_list
* which will return us to the main while loop in the
* main routine.
*/
@@ -579,7 +579,7 @@ init_plugin(char *name, kva_t *list, int cnt_flag)
}
/*
- * loadauditlist() - read the auditd plugin configuration from smf(5) and
+ * loadauditlist() - read the auditd plugin configuration from smf(7) and
* prepare appropriate plugin related structures (plugin_t). Set cnt policy here
* based on currently active policy settings. (future could have a policy =
* {+|-}cnt entry per plugin with auditconfig providing the default)
@@ -814,7 +814,7 @@ fail:
/*
* conf_to_kernel() - configure the event to class mapping; see also
- * auditconfig(1M) -conf option.
+ * auditconfig(8) -conf option.
*/
static void
conf_to_kernel(void)
diff --git a/usr/src/cmd/auditd/auditd.xml b/usr/src/cmd/auditd/auditd.xml
index ee6fd6c110..99dba6091c 100644
--- a/usr/src/cmd/auditd/auditd.xml
+++ b/usr/src/cmd/auditd/auditd.xml
@@ -128,8 +128,8 @@
<instance name='default' enabled='false'>
<!--
- System-wide audit preselection flags - see auditconfig(1M)
- and audit_flags(5).
+ System-wide audit preselection flags - see auditconfig(8)
+ and audit_flags(7).
The 'flags' property is the system-wide default set of
audit classes that is combined with the per-user audit
@@ -152,10 +152,10 @@
</property_group>
<!--
- Audit Queue Control Properties - see auditconfig(1M)
+ Audit Queue Control Properties - see auditconfig(8)
Note, that the default value for all the queue control
- configuration parameters is 0, which makes auditd(1M) to
+ configuration parameters is 0, which makes auditd(8) to
use current active system parameters.
-->
<property_group name='queuectrl' type='application' >
@@ -174,10 +174,10 @@
</property_group>
<!--
- Audit Policies - see auditconfig(1M)
+ Audit Policies - see auditconfig(8)
Note, that "all" and "none" policies available as a
- auditconfig(1M) policy flags actually means a full/empty set
+ auditconfig(8) policy flags actually means a full/empty set
of other policy flags. Thus they are not configurable in the
auditd service manifest, but set all the policies to true
(all) or false (none).
@@ -217,8 +217,8 @@
<!--
Plugins to configure where to send the audit trail - see
- auditconfig(1M), audit_binfile(5), audit_remote(5),
- audit_syslog(5)
+ auditconfig(8), audit_binfile(7), audit_remote(7),
+ audit_syslog(7)
Each plugin type property group has properties:
@@ -315,25 +315,25 @@
</common_name>
<documentation>
<manpage title='auditd'
- section='1M'
+ section='8'
manpath='/usr/share/man'/>
<manpage title='audit'
- section='1M'
+ section='8'
manpath='/usr/share/man'/>
<manpage title='auditconfig'
- section='1M'
+ section='8'
manpath='/usr/share/man'/>
<manpage title='audit_flags'
- section='5'
+ section='7'
manpath='/usr/share/man'/>
<manpage title='audit_binfile'
- section='5'
+ section='7'
manpath='/usr/share/man'/>
<manpage title='audit_syslog'
- section='5'
+ section='7'
manpath='/usr/share/man'/>
<manpage title='audit_remote'
- section='5'
+ section='7'
manpath='/usr/share/man'/>
</documentation>
</template>
diff --git a/usr/src/cmd/auditd/svc-auditd b/usr/src/cmd/auditd/svc-auditd
index ce95015fc1..79ac155b07 100644
--- a/usr/src/cmd/auditd/svc-auditd
+++ b/usr/src/cmd/auditd/svc-auditd
@@ -79,7 +79,7 @@ do_common()
AUDITCOND="`$AUDITCONFIG -getcond 2>/dev/null`"
if [ $? -ne 0 ]; then
# The decision whether to start
- # auditing is driven by bsmconv(1M) / bsmunconv(1M)
+ # auditing is driven by bsmconv(8) / bsmunconv(8)
echo "$0: Unable to get current kernel auditing condition."
$SVCADM mark maintenance $AUDITD_FMRI
exit $SMF_EXIT_MON_OFFLINE
@@ -91,9 +91,9 @@ do_common()
$AUDITCONFIG -t -getpolicy | \
$EGREP "perzone|all" 1>/dev/null 2>&1
if [ $? -eq 1 ]; then
- echo "$0: auditd(1M) is not configured to run in"
+ echo "$0: auditd(8) is not configured to run in"
echo " a local zone, perzone policy not set" \
- "(see auditconfig(1M))."
+ "(see auditconfig(8))."
$SVCADM disable $AUDITD_FMRI
$SLEEP 5 &
exit $SMF_EXIT_OK
@@ -114,7 +114,7 @@ do_common()
do_start()
{
#
- # The transition of the audit_startup(1M) has to be performed.
+ # The transition of the audit_startup(8) has to be performed.
if [ -f "$AUDIT_STARTUP" ]; then
if [ -x "$AUDIT_STARTUP" ]; then
@@ -125,7 +125,7 @@ do_start()
exit $SMF_EXIT_MON_OFFLINE
fi
- echo "$0: Transition of audit_startup(1M) started."
+ echo "$0: Transition of audit_startup(8) started."
$MV $AUDIT_STARTUP $AUDIT_STARTUP._transitioned_
if [ $? -ne 0 ]; then
@@ -144,7 +144,7 @@ do_start()
exit $SMF_EXIT_ERR_CONFIG
fi
- echo "$0: Transition of audit_startup(1M) finished."
+ echo "$0: Transition of audit_startup(8) finished."
fi
#
@@ -158,7 +158,7 @@ do_refresh()
{
#
# The refresh capability is available only for those systems
- # with already transformed audit_startup(1M) into $AUDITD_FMRI
+ # with already transformed audit_startup(8) into $AUDITD_FMRI
# service properties. See do_start() for more information.
if [ ! -f "$AUDIT_STARTUP" ]; then
#
@@ -171,7 +171,7 @@ do_refresh()
exit $SMF_EXIT_ERR_FATAL
fi
#
- # signal to auditd(1M):
+ # signal to auditd(8):
$PKILL -HUP -c ${contract_id}
if [ $? -ne 0 ]; then
echo "$0: SIGHUP was not successfully delivered to" \
@@ -182,8 +182,8 @@ do_refresh()
$SLEEP 5 &
else
echo "$0: Service refresh method not supported on systems" \
- "without converted audit_startup(1M) into auditd service" \
- "SMF configuration. Clear the service (svcadm(1M))."
+ "without converted audit_startup(8) into auditd service" \
+ "SMF configuration. Clear the service (svcadm(8))."
$SVCADM mark maintenance $AUDITD_FMRI
exit $SMF_EXIT_ERR_CONFIG
fi