AUDIT(2) System Calls AUDIT(2)


NAME


audit - write a record to the audit log

SYNOPSIS


cc [ flag ... ] file ... -lbsm -lsocket -lnsl [ library... ]
#include <sys/param.h>
#include <bsm/libbsm.h>

int audit(caddr_t record, int length);


DESCRIPTION


The audit() function queues a record for writing to the system audit log.
The data pointed to by record is queued for the log after a minimal
consistency check, with the length parameter specifying the size of the
record in bytes. The data should be a well-formed audit record as
described by audit.log(4).


The kernel validates the record header token type and length, and sets
the time stamp value before writing the record to the audit log. The
kernel does not do any preselection for user-level generated events. If
the audit policy is set to include sequence or trailer tokens, the
kernel will append them to the record.

RETURN VALUES


Upon successful completion, 0 is returned. Otherwise, -1 is returned and
errno is set to indicate the error.

ERRORS


The audit() function will fail if:

E2BIG
The record length is greater than the maximum allowed record
length.


EFAULT
The record argument points outside the process's allocated
address space.


EINVAL
The header token in the record is invalid.


ENOTSUP
Audit is not defined for this system.


EPERM
The {PRIV_PROC_AUDIT} privilege is not asserted in the
effective set of the calling process.


USAGE


Only privileged processes can successfully execute this call.

ATTRIBUTES


See attributes(5) for descriptions of the following attributes:


+--------------------+-----------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+-----------------+
|Interface Stability | Committed |
+--------------------+-----------------+
|MT-Level | MT-Safe |
+--------------------+-----------------+

SEE ALSO


audit(1M), auditd(1M), svcadm(1M), auditon(2), getaudit(2), audit.log(4),
attributes(5), privileges(5)

NOTES


The functionality described in this man page is available only if the
audit daemon auditd(1M) has not been disabled by audit(1M) or svcadm(1M).


March 6, 2017 AUDIT(2)