Blame docs/audit_add_rule_data.3

Packit f0d170
.TH "AUDIT_ADD_RULE_DATA" "3" "Aug 2009" "Red Hat" "Linux Audit API"
Packit f0d170
.SH NAME
Packit f0d170
audit_add_rule_data \- Add new audit rule
Packit f0d170
.SH "SYNOPSIS"
Packit f0d170
.B #include <libaudit.h>
Packit f0d170
.sp
Packit f0d170
int audit_add_rule_data (int fd, struct audit_rule_data *rule, int flags, int action);
Packit f0d170
Packit f0d170
.SH "DESCRIPTION"
Packit f0d170
Packit f0d170
audit_add_rule adds an audit rule previously constructed with audit_rule_fieldpair_data(3) to one of several kernel event filters. The filter is specified by the flags argument. Possible values for flags are:
Packit f0d170
Packit f0d170
.TP 3
Packit f0d170
\(bu
Packit f0d170
AUDIT_FILTER_USER - Apply rule to userspace generated messages. This is the user filter. Normally all user space originating events are accepted. Rules on this filter are typically written to block specific events.
Packit f0d170
.TP
Packit f0d170
\(bu
Packit f0d170
AUDIT_FILTER_TASK - Apply rule at task creation (not syscall). This is the task filter. It's normally used to exclude an application from being audited.
Packit f0d170
.TP
Packit f0d170
\(bu
Packit f0d170
AUDIT_FILTER_EXIT - Apply rule at syscall exit. This is the main filter that is used for syscalls and filesystem watches. Normally all syscall do not trigger events, so this is normally used to specify events that are of interest.
Packit f0d170
.TP
Packit f0d170
\(bu
Packit f0d170
AUDIT_FILTER_EXCLUDE - Apply rule at audit_log_start. This is the exclude filter which discards any records that match.  The action type is ignored for this filter, defaulting to "never".
Packit f0d170
.LP
Packit f0d170
.TP
Packit f0d170
\(bu
Packit f0d170
AUDIT_FILTER_FS - Apply rule when adding PATH auxiliary records to SYSCALL events. This is the filesystem filter. This is used to ignore PATH records that are not of interest.
Packit f0d170
.LP
Packit f0d170
Packit f0d170
.PP
Packit f0d170
The rule's action has two possible values:
Packit f0d170
Packit f0d170
.TP 3
Packit f0d170
\(bu
Packit f0d170
AUDIT_NEVER - Do not build context if rule matches.
Packit f0d170
.TP
Packit f0d170
\(bu
Packit f0d170
AUDIT_ALWAYS - Generate audit record if rule matches.
Packit f0d170
.LP
Packit f0d170
Packit f0d170
.SH "RETURN VALUE"
Packit f0d170
Packit f0d170
The return value is <= 0 on error, otherwise it is the netlink sequence id number. This function can have any error that sendto would encounter.
Packit f0d170
Packit f0d170
.SH "SEE ALSO"
Packit f0d170
Packit f0d170
.BR audit_rule_fieldpair_data(3),
Packit f0d170
.BR audit_delete_rule_data (3),
Packit f0d170
.BR auditctl (8).
Packit f0d170
Packit f0d170
.SH AUTHOR
Packit f0d170
Steve Grubb.