xref: /illumos-gate/usr/src/cmd/auditrecord/audit_record_attr.txt (revision 2b24ab6b3865caeede9eeb9db6b83e1d89dcd1ea)
1# audit_record_attr.txt
2# Two "#" are comments that are copied to audit_record_attr
3# other comments are removed.
4##
5## Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
6## Use is subject to license terms.
7##
8## CDDL HEADER START
9##
10## The contents of this file are subject to the terms of the
11## Common Development and Distribution License (the "License").
12## You may not use this file except in compliance with the License.
13##
14## You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
15## or http://www.opensolaris.org/os/licensing.
16## See the License for the specific language governing permissions
17## and limitations under the License.
18##
19## When distributing Covered Code, include this CDDL HEADER in each
20## file and include the License file at usr/src/OPENSOLARIS.LICENSE.
21## If applicable, add the following below this CDDL HEADER, with the
22## fields enclosed by brackets "[]" replaced with your own identifying
23## information: Portions Copyright [yyyy] [name of copyright owner]
24##
25## CDDL HEADER END
26##
27##
28
29# source file for describing audit records.
30
31# This file is in two sections.  The first is a list of attribute /
32# value pairs used to provide short cuts in annotating the audit
33# records.  The second is for annotation for each audit record.
34
35# first section: general attributes
36
37# skipClass=<class name of items to skip if only in that class>
38# skipClass=no    # uncomment to filter unused events
39
40# token name abbreviations
41# token=alias:fullname  -- short names for key tokens
42
43token=arg:argument
44token=attr:attribute
45token=acl:acl_entry
46token=cmd:command
47token=data:data
48token=exec_args:exec_arguments
49token=exec_env:exec_environment
50token=group:group
51token=inaddr:ip_addr
52token=inet:socket
53token=ipc:ipc
54token=ipc_perm:ipc_perm
55token=newgroup:newgroups
56token=path:path
57token=path_attr:attribute_path
58token=privset:privilege
59token=proc:process
60token=text:text
61token=tid:terminal_adr
62token=uauth:use_of_authorization
63token=upriv:use_of_privilege
64token=zone:zonename
65token=fmri:service_instance
66token=label:mandatory_label
67
68token=head:header
69token=subj:subject
70token=ret:return
71token=exit:exit
72
73# note names -- certain notes show up repeatedly; collected here
74#
75# To achieve the maximum line length to be less than 80 characters, the
76# note names (message=) can be defined as a multi line, each line except the
77# last one finished with the backslash character.
78
79message=ipc_perm:The ipc and ipc_perm tokens are not included if \
80  the message ID is not valid.
81
82
83# basic record pattern ("insert" is where event-specific tokens
84# are listed.)
85
86kernel=head:insert:subj:[upriv]:ret
87user=head:subj:insert:ret
88
89# Second Section
90# Annotation Section
91#
92# Most audit records need annotation beyond what is provided by
93# the files audit_event and audit_class.  At a minimum, a record
94# is represented by a label and a format.
95#
96# label=record_id             like AUE_ACCEPT
97# format=token_alias
98#
99# there is no end line; a new label= end the preceding definition
100# and starts the next.
101#
102# format values are a list of token names, separated by colons.  The
103# name is either one of the values described above (token=) or is
104# a value to be taken literally.  If a token name ends with a digit,
105# the digit is an index into an array of comments.  In the few cases
106# where there are no tokens (other than header, subject, return/exit),
107# use "format=kernel" or "format="user".
108#
109# comment is an array of strings separated by colons.  If comments
110# are listed on separate lines (recommended due to better
111# readability/sustainability of the file), the preceding comment
112# must end with  a colon.  The array starts at 1. (If the comment
113# contains a colon, use "&colon;" without the quotes.)
114#
115# case is used to generate alternate descriptions for a given
116# record.
117#
118# Constraints - the string length; bear in mind, that any annotation of
119# primitives below longer than is specified, will be silently truncated
120# to given/defined amount of characters in the auditrecord(1M) runtime:
121#
122#     primitive <= max (non-truncated) string length
123#	case	<= unlimited; if necessary, text continues on a new line
124#	comment	<= unlimited; if necessary, text continues on a new line
125#	label	<= 43
126#	note	<= unlimited; if necessary, text continues on a new line
127#	program	<= 20
128#	see	<= 39
129#	syscall	<= 20
130#	title	<= 46
131#	token	<= 28 (full name)
132#
133# To achieve the maximum line length to be less than 80 characters, one can
134# define the unlimited primitives as a multi line, each line except the
135# last one finished with the backslash character. In addition to above
136# mentioned, the "format=" record attribute follows the same rule.
137#
138#
139# AUE_ACCEPT illustrates the use of all the above.  Note that
140# case is not nested; ellipsis (...) is used to give the effect
141# of nesting.
142
143label=AUE_ACCEPT
144#accept(2) failure
145  case=Invalid socket file descriptor
146    format=arg1
147      comment=1, file descriptor, "so"
148#accept(2) non SOCK_STREAM socket
149  case=If the socket address is not part of the AF_INET family
150    format=arg1:arg2:arg3
151      comment=1, "so", file descriptor:
152      comment="family", so_family:
153      comment="type", so_type
154  case=If the socket address is part of the AF_INET family
155    case=...If there is no vnode for this file descriptor
156      format=[arg]1
157        comment=1, file descriptor, "Bad so"
158#accept(2) SOCK_STREAM socket-not bound
159    case=...or if the socket is not bound
160      format=[arg]1:[inet]2
161        comment=1, file descriptor, "so":
162        comment=local/foreign address (0.0.0.0)
163    case=...or if the socket address length = 0
164      format=[arg]1:[inet]2
165        comment=1, file descriptor, "so":
166        comment=local/foreign address (0.0.0.0)
167    case=...or for all other conditions
168      format=inet1:[inet]1
169        comment=socket address
170#accept(2) failure
171#	header
172#	au_to_arg32	"so",file descriptor
173#	subject
174#	return	<errno != 0>
175#
176#accept(2) non SOCK_STREAM socket
177#	header
178#	au_to_arg32	"so", file descriptor
179#	au_to_arg32	"family", so_family
180#	au_to_arg32	"type", so_type
181#	subject
182#	return success
183#
184#accept(2) SOCK_STREAM socket-not bound
185#	header
186#	au_to_arg32	"so", file descriptor
187#	au_to_socket_ex	local/foreign address (0.0.0.0)
188#	subject
189#	return success
190#
191#accept(2) SOCK_STREAM socket-bound
192#	header
193#	au_to_arg32	"so", file descriptor
194#	au_to_socket_ex
195#	subject
196#	return success
197
198
199
200label=AUE_ACCESS
201  format=path1:[attr]
202    comment=may be truncated in failure case
203#	header,163,2,access(2),,Wed Apr 25 13:52:49 2001, + 750000733 msec
204#	path,/export/home/testsuites/CC_final/icenine/arv/access/obj_succ
205#	attribute,100777,41416,staff,8388608,402255,0
206#	subject,tuser10,tuser10,other,tuser10,other,1297,322,255 131585 129.146.89.30
207#	return,success,0
208#	trailer,163
209#
210#	header,163,2,access(2),,Wed Apr 25 13:53:02 2001, + 490000427 msec
211#	path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail
212#	attribute,100000,root,other,8388608,402257,0
213#	subject,tuser10,tuser10,other,tuser10,other,1433,322,255 131585 129.146.89.30
214#	return,failure: Permission denied,-1
215#	trailer,163
216#
217#	header,135,2,access(2),,Wed Apr 25 13:53:15 2001, + 10000329 msec
218#	path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail2
219#	subject,tuser10,tuser10,other,tuser10,other,1553,322,255 131585 129.146.89.30
220#	return,failure: No such file or directory,-1
221#	trailer,135
222
223label=AUE_ACCT
224  case=Zero path
225    format=arg1
226      comment=1, 0, "accounting off"
227  case=Non-zero path
228    format=path1:[attr]2
229      comment=may be truncated in failure case:
230      comment=omitted if failure
231
232label=AUE_ACLSET
233  syscall=acl
234  format=arg1:arg2:(0..n)[acl]3
235    comment=2, SETACL, "cmd":
236    comment=3, number of ACL entries, "nentries":
237    comment=Access Control List entries
238
239label=AUE_ADJTIME
240  format=kernel
241
242label=AUE_ASYNC_DAEMON
243  skip=Not used
244
245label=AUE_ASYNC_DAEMON_EXIT
246  skip=Not used
247
248label=AUE_AUDIT
249  skip=Not used.  (Placeholder for the set AUE_AUDIT_*.)
250
251label=AUE_AUDITON
252  skip=Not used.  (Placeholder for the set AUE_AUDITON_*.)
253
254label=AUE_AUDITON_GESTATE
255  skip=Not used
256
257label=AUE_AUDITON_GETCAR
258  format=kernel
259  syscall=auditon: GETCAR
260#	header,68,2,auditon(2) - get car,,Wed Apr 25 13:49:02 2001, + 710001279 msec
261#	subject,tuser10,root,other,root,other,966,322,255 131585 129.146.89.30
262#	return,success,0
263#	trailer,68
264
265label=AUE_AUDITON_GETCLASS
266  format=kernel
267  syscall=auditon: GETCLASS
268#	header,68,2,auditon(2) - get event class,,Mon May 15 09:14:35 2000, + 30001063 msec
269#	subject,tuser10,root,other,root,other,1091,367,255 197121 tmach1
270#	return,success,0
271#	trailer,68
272
273label=AUE_AUDITON_GETCOND
274  format=kernel
275  syscall=auditon: GETCOND
276#	header,68,2,auditon(2) - get audit state,,Mon May 15 09:14:48 2000, + 110001736 msec
277#	subject,tuser10,root,other,root,other,1248,367,255 197121 tmach1
278#	return,success,0
279#	trailer,68
280
281label=AUE_AUDITON_GETCWD
282  format=kernel
283  syscall=auditon: GETCWD
284#	header,68,2,auditon(2) - get cwd,,Mon May 15 09:15:01 2000, + 120001223 msec
285#	subject,tuser10,root,other,root,other,1405,367,255 197121 tmach1
286#	return,success,0
287#	trailer,68
288
289label=AUE_AUDITON_GETKMASK
290  format=kernel
291  syscall=auditon: GETKMASK
292#	header,68,2,auditon(2) - get kernel mask,,Mon May 15 09:15:14 2000, + 220002225 msec
293#	subject,tuser10,root,other,root,other,1562,367,255 197121 tmach1
294#	return,success,0
295#	trailer,68
296
297label=AUE_AUDITON_GETSTAT
298  format=kernel
299  syscall=auditon: A_GETSTAT
300#	header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:27 2000, + 220003386 msec
301#	subject,tuser10,root,other,root,other,1719,367,255 197121 tmach1
302#	return,success,0
303#	trailer,68
304
305label=AUE_AUDITON_GPOLICY
306  format=kernel
307  syscall=auditon: GPOLICY
308#	header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:40 2000, + 120004056 msec
309#	subject,tuser10,root,other,root,other,1879,367,255 197121 tmach1
310#	return,success,0
311#	trailer,68
312
313label=AUE_AUDITON_GQCTRL
314  format=kernel
315  syscall=auditon: GQCTRL
316#	header,68,2,auditon(2) - GQCTRL command,,Mon May 15 09:15:53 2000, + 20001415 msec
317#	subject,tuser10,root,other,root,other,2033,367,255 197121 tmach1
318#	return,success,0
319#	trailer,68
320
321
322label=AUE_AUDITON_GTERMID
323  skip=Not used.
324
325label=AUE_AUDITON_SESTATE
326  skip=Not used.
327
328label=AUE_AUDITON_SETCLASS
329  format=[arg]1:[arg]2
330    comment=2, "setclass&colon;ec_event", event number:
331    comment=3, "setclass&colon;ec_class", class mask
332  syscall=auditon: SETCLASS
333#	header,120,2,auditon(2) - set event class,,Mon May 15 09:16:39 2000, + 800002966 msec
334#	argument,2,0x0,setclass:ec_event
335#	argument,3,0x0,setclass:ec_class
336#	subject,tuser10,root,other,root,other,2190,367,255 197121 tmach1
337#	return,success,0
338#	trailer,120
339
340label=AUE_AUDITON_SETCOND
341  format=[arg]1
342    comment=3, "setcond", audit state
343  syscall=auditon: SETCOND
344
345label=AUE_AUDITON_SETKMASK
346  format=[arg]1:[arg]2
347    comment=2, "setkmask as_success", kernel mask:
348    comment=2, "setkmask as_failure", kernel mask
349  syscall=auditon: SETKMASK
350#	header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:06 2000, + 300000807 msec
351#	argument,2,0x0,setkmask:as_success
352#	argument,2,0x0,setkmask:as_failure
353#	subject,tuser10,root,other,root,other,2506,367,255 197121 tmach1
354#	return,success,0
355#	trailer,124
356#	header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:20 2000, + 430001289 msec
357#	argument,2,0x0,setkmask:as_success
358#	argument,2,0x0,setkmask:as_failure
359#	subject,tuser10,tuser10,other,root,other,2620,367,255 197121 tmach1
360#	return,failure: Not owner,-1
361#	trailer,124
362
363label=AUE_AUDITON_SETSMASK
364  format=[arg]1:[arg]2
365    comment=3, "setsmask&colon;as_success", session ID mask:
366    comment=3, "setsmask&colon;as_failure", session ID mask
367  syscall=auditon: SETSMASK
368#	header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:33 2000, + 580000668 msec
369#	argument,3,0x400,setsmask:as_success
370#	argument,3,0x400,setsmask:as_failure
371#	subject,tuser10,root,other,root,other,2777,367,255 197121 tmach1
372#	return,success,0
373#	trailer,124
374#	header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:45 2000, + 700001710 msec
375#	argument,3,0x400,setsmask:as_success
376#	argument,3,0x400,setsmask:as_failure
377#	subject,tuser10,tuser10,other,root,other,2885,367,255 197121 tmach1
378#	return,failure: Not owner,-1
379#	trailer,124
380
381label=AUE_AUDITON_SETSTAT
382  format=kernel
383  syscall=auditon: SETSTAT
384#	header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:17:58 2000, + 930000818 msec
385#	subject,tuser10,root,other,root,other,3042,367,255 197121 tmach1
386#	return,success,0
387#	trailer,68
388#	header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:18:13 2000, + 160001101 msec
389#	subject,tuser10,tuser10,other,root,other,3156,367,255 197121 tmach1
390#	return,failure: Not owner,-1
391#	trailer,68
392
393label=AUE_AUDITON_SETUMASK
394  format=[arg]1:[arg]2
395    comment=3, "setumask&colon;as_success", audit ID mask:
396    comment=3, "setumask&colon;as_failure", audit ID mask
397  syscall=auditon: SETUMASK
398#	header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:26 2000, + 670003527 msec
399#	argument,3,0x400,setumask:as_success
400#	argument,3,0x400,setumask:as_failure
401#	subject,tuser10,root,other,root,other,3313,367,255 197121 tmach1
402#	return,success,0
403#	trailer,124
404#	header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:38 2000, + 740000732 msec
405#	argument,3,0x400,setumask:as_success
406#	argument,3,0x400,setumask:as_failure
407#	subject,tuser10,tuser10,other,root,other,3421,367,255 197121 tmach1
408#	return,failure: Not owner,-1
409#	trailer,124
410
411label=AUE_AUDITON_SPOLICY
412  format=[arg]1
413    comment=1, audit policy flags, "setpolicy"
414  syscall=auditon: SPOLICY
415#	header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:18:54 2000, + 840 msec
416#	argument,3,0x200,setpolicy
417#	subject,tuser10,root,other,root,other,3584,367,255 197121 tmach1
418#	return,success,0
419#	trailer,86
420#	header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:19:08 2000, + 200002798 msec
421#	argument,3,0x200,setpolicy
422#	subject,tuser10,tuser10,other,root,other,3698,367,255 197121 tmach1
423#	return,failure: Not owner,-1
424#	trailer,86
425
426label=AUE_AUDITON_SQCTRL
427  format=[arg]1:[arg]2:[arg]3:[arg]4
428    comment=3, "setqctrl&colon;aq_hiwater", queue control param.:
429    comment=3, "setqctrl&colon;aq_lowater", queue control param.:
430    comment=3, "setqctrl&colon;aq_bufsz", queue control param.:
431    comment=3, "setqctrl&colon;aq_delay", queue control param.
432  syscall=auditon: SQCTRL
433#	header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:23 2000, + 610001124 msec
434#	argument,3,0x64,setqctrl:aq_hiwater
435#	argument,3,0xa,setqctrl:aq_lowater
436#	argument,3,0x400,setqctrl:aq_bufsz
437#	argument,3,0x14,setqctrl:aq_delay
438#	subject,tuser10,root,other,root,other,3861,367,255 197121 tmach1
439#	return,success,0
440#	trailer,176
441#	header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:35 2000, + 720003197 msec
442#	argument,3,0x64,setqctrl:aq_hiwater
443#	argument,3,0xa,setqctrl:aq_lowater
444#	argument,3,0x400,setqctrl:aq_bufsz
445#	argument,3,0x14,setqctrl:aq_delay
446#	subject,tuser10,tuser10,other,root,other,3969,367,255 197121 tmach1
447#	return,failure: Not owner,-1
448#	trailer,176
449
450label=AUE_AUDITON_STERMID
451  skip=Not used.
452
453label=AUE_AUDITSTAT
454  skip=Not used.
455
456label=AUE_AUDITSVC
457  skip=Not used.
458
459label=AUE_AUDITSYS
460  skip=Not used. (Place holder for various auditing events.)
461
462label=AUE_BIND
463# differs from documented version.
464# cases "no vnode" not fully confirmed
465# family and type need argument number
466  case=Invalid socket handle
467    format=arg1
468      comment=1, file descriptor, "so"
469  case=If there is no vnode for this file descriptor
470  case=or if the socket is not of the AF_INET family
471    format=arg1:arg2:arg3
472      comment=1, file descriptor, "so":
473      comment=1, socket family, "family":
474      comment=1, socket type, "type"
475  case=or for all other conditions
476    format=arg1:inet2
477      comment=1, file descriptor, "so":
478      comment=socket address
479
480label=AUE_BRANDSYS
481# generic mechanism to allow user-space and kernel components of a brand
482# to communicate.  The interpretation of the arguments to the call is
483# left entirely up to the brand.
484  format=arg1:arg2:arg3:arg4:arg5:arg6:arg7
485    comment=1, command, "cmd":
486    comment=2, command args, "arg":
487    comment=3, command args, "arg":
488    comment=4, command args, "arg":
489    comment=5, command args, "arg":
490    comment=6, command args, "arg":
491    comment=7, command args, "arg"
492
493label=AUE_BSMSYS
494  skip=Not used.
495
496label=AUE_CHDIR
497  format=path:[attr]
498#	header,151,2,chdir(2),,Mon May 15 09:20:15 2000, + 70000899 msec
499#	path,/export/home/CC_final/icenine/arv/chdir/obj_succ
500#	attribute,40777,root,other,8388608,231558,0
501#	subject,tuser10,tuser10,other,root,other,4436,367,255 197121 tmach1
502#	return,success,0
503#	trailer,151
504#	header,151,2,chdir(2),,Mon May 15 09:20:27 2000, + 640003327 msec
505#	path,/export/home/CC_final/icenine/arv/chdir/obj_fail
506#	attribute,40000,root,other,8388608,237646,0
507#	subject,tuser10,tuser10,other,root,other,4566,367,255 197121 tmach1
508#	return,failure: Permission denied,-1
509#	trailer,151
510
511label=AUE_CHMOD
512  format=arg1:path:[attr]
513    comment=2, mode, "new file mode"
514#	header,173,2,chmod(2),,Mon May 15 09:20:41 2000, + 140000831 msec
515#	argument,2,0x1f8,new file mode
516#	path,/export/home/CC_final/icenine/arv/chmod/obj_succ
517#	attribute,100770,tuser10,other,8388608,243608,0
518#	subject,tuser10,tuser10,other,root,other,4748,367,255 197121 tmach1
519#	return,success,0
520#	trailer,173
521#	header,173,2,chmod(2),,Mon May 15 09:20:54 2000, + 400001156 msec
522#	argument,2,0x1f8,new file mode
523#	path,/export/home/CC_final/icenine/arv/chmod/obj_fail
524#	attribute,100600,root,other,8388608,243609,0
525#	subject,tuser10,tuser10,other,root,other,4879,367,255 197121 tmach1
526#	return,failure: Not owner,-1
527#	trailer,173
528
529label=AUE_CHOWN
530  format=arg1:arg2
531    comment=2, uid, "new file uid":
532    comment=3, gid, "new file gid"
533#	header,193,2,chown(2),,Mon May 15 09:21:07 2000, + 930000756 msec
534#	argument,2,0x271a,new file uid
535#	argument,3,0xffffffff,new file gid
536#	path,/export/home/CC_final/icenine/arv/chown/obj_succ
537#	attribute,100644,tuser10,other,8388608,268406,0
538#	subject,tuser10,tuser10,other,root,other,5062,367,255 197121 tmach1
539#	return,success,0
540#	trailer,193
541#	header,193,2,chown(2),,Mon May 15 09:21:20 2000, + 430001153 msec
542#	argument,2,0x271a,new file uid
543#	argument,3,0xffffffff,new file gid
544#	path,/export/home/CC_final/icenine/arv/chown/obj_fail
545#	attribute,100644,root,other,8388608,268407,0
546#	subject,tuser10,tuser10,other,root,other,5191,367,255 197121 tmach1
547#	return,failure: Not owner,-1
548#	trailer,193
549
550label=AUE_CHROOT
551  format=path:[attr]
552#	header,104,2,chroot(2),,Mon May 15 09:21:33 2000, + 860001094 msec
553#	path,/
554#	attribute,40755,root,root,8388608,2,0
555#	subject,tuser10,root,other,root,other,5370,367,255 197121 tmach1
556#	return,success,0
557#	trailer,104
558#	header,152,2,chroot(2),,Mon May 15 09:21:46 2000, + 130002435 msec
559#	path,/export/home/CC_final/icenine/arv/chroot/obj_fail
560#	attribute,40777,tuser10,other,8388608,335110,0
561#	subject,tuser10,tuser10,other,root,other,5499,367,255 197121 tmach1
562#	return,failure: Not owner,-1
563#	trailer,152
564
565label=AUE_CLOCK_SETTIME
566  format=kernel
567
568label=AUE_CLOSE
569  format=arg1:[path]:[attr]
570    comment=1, file descriptor, "fd"
571
572label=AUE_CONFIGKSSL
573  case=Adding KSSL entry.
574    format=text1:inaddr2:text3:text4
575      comment=opcode, KSSL_ADD_ENTRY:
576      comment=local IP address:
577      comment=SSL port number:
578      comment=proxy port number
579  case=Deleting KSSL entry.
580    format=text1:inaddr2:text3
581      comment=opcode, KSSL_DELETE_ENTRY:
582      comment=local IP address:
583      comment=SSL port number
584
585label=AUE_CONNECT
586# cases "no vnode" not fully confirmed
587  case=If there is no vnode for this file descriptor
588  case=If the socket address is not part of the AF_INET family
589    format=arg1:arg2:arg3
590      comment=1, file descriptor, "so":
591      comment=1, socket family, "family":
592      comment=1, socket type, "type"
593  case=If the socket address is part of the AF_INET family
594    format=arg1:inet2
595      comment=1, file descriptor, "so":
596      comment=socket address
597
598label=AUE_CORE
599  syscall=none
600  title=process dumped core
601  see=none
602  format=path:[attr]:arg1
603    comment=1, signal, "signal"
604# see uts/common/c2/audit.c
605
606label=AUE_CREAT
607  format=path:[attr]
608# does not match old BSM manual
609#	header,151,2,creat(2),,Mon May 15 09:21:59 2000, + 509998810 msec
610#	path,/export/home/CC_final/icenine/arv/creat/obj_succ
611#	attribute,100644,tuser10,other,8388608,49679,0
612#	subject,tuser10,tuser10,other,root,other,5678,367,255 197121 tmach1
613#	return,success,8
614#	trailer,151
615#	header,107,2,creat(2),,Mon May 15 09:22:12 2000, + 50001852 msec
616#	path,/devices/pseudo/mm@0:null
617#	subject,tuser10,root,other,root,other,5809,367,255 197121 tmach1
618#	return,success,8
619#	trailer,107
620#	header,83,2,creat(2),,Mon May 15 09:22:12 2000, + 70001870 msec
621#	path,/obj_fail
622#	subject,tuser10,tuser10,other,root,other,5806,367,255 197121 tmach1
623#	return,failure: Permission denied,-1
624#	trailer,83
625
626label=AUE_CRYPTOADM
627  title=kernel cryptographic framework
628  format=text1:(0..n)[text]2
629  comment=cryptoadm command/operation:
630  comment=mechanism list
631
632label=AUE_DOORFS
633  skip=Not used.  (Place holder for set of door audit events.)
634
635label=AUE_DOORFS_DOOR_BIND
636  skip=Not used.
637  syscall=doorfs:  DOOR_BIND
638
639label=AUE_DOORFS_DOOR_CALL
640  format=arg1:proc2
641    comment=1, door ID, "door ID":
642    comment=for process that owns the door
643  syscall=doorfs:  DOOR_CALL
644
645label=AUE_DOORFS_DOOR_CREATE
646  format=arg1
647    comment=1, door attributes, "door attr"
648  syscall=doorfs:  DOOR_CREATE
649
650label=AUE_DOORFS_DOOR_CRED
651  skip=Not used.
652  syscall=doorfs:  DOOR_CRED
653
654label=AUE_DOORFS_DOOR_INFO
655  skip=Not used.
656  syscall=doorfs:  DOOR_INFO
657
658label=AUE_DOORFS_DOOR_RETURN
659  format=kernel
660  syscall=doorfs:  DOOR_RETURN
661
662label=AUE_DOORFS_DOOR_REVOKE
663  format=arg1
664    comment=1, door ID, "door ID"
665  syscall=doorfs:  DOOR_REVOKE
666
667label=AUE_DOORFS_DOOR_UNBIND
668  skip=Not used.
669  syscall=doorfs:  DOOR_UNBIND
670
671label=AUE_DUP2
672skip=Not used.
673
674label=AUE_ENTERPROM
675  title=enter prom
676  syscall=none
677  format=head:text1:ret
678    comment="kmdb"
679#	header,48,2,enter prom,na,tmach1,2004-11-12 09:07:41.342 -08:00
680#	text,kmdb
681#	return,success,0
682
683label=AUE_EXEC
684  format=path:[attr]1:[exec_args]2:[exec_env]3
685    comment=omitted on error:
686    comment=output if argv policy is set:
687    comment=output if arge policy is set
688
689label=AUE_EXECVE
690  format=path:[attr]1:[exec_args]2:[exec_env]3
691    comment=omitted on error:
692    comment=output if argv policy is set:
693    comment=output if arge policy is set
694#	header,107,2,creat(2),,Mon May 15 09:22:25 2000, + 559997464 msec
695#	path,/devices/pseudo/mm@0:null
696#	subject,tuser10,root,other,root,other,5974,367,255 197121 tmach1
697#	return,success,8
698#	trailer,107
699#	header,86,2,execve(2),,Mon May 15 09:22:25 2000, + 590003684 msec
700#	path,/usr/bin/pig
701#	subject,tuser10,tuser10,other,root,other,5971,367,255 197121 tmach1
702#	return,failure: No such file or directory,-1
703#	trailer,86
704
705label=AUE_EXIT
706  format=[text]1
707    comment=event aborted
708
709label=AUE_EXITPROM
710  title=exit prom
711  syscall=none
712  format=head:text1:ret
713    comment="kmdb"
714#	header,48,2,exit prom,na,tmach1,2004-11-12 09:07:43.547 -08:00
715#	text,kmdb
716#	return,success,0
717
718label=AUE_EXPORTFS
719  skip=Not used.
720
721label=AUE_FACCESSAT
722  see=access(2)
723  format=path:[path_attr]:[attr]
724
725label=AUE_FACLSET
726  syscall=facl
727  case=Invalid file descriptor
728    format=arg1:arg2
729      comment=2, SETACL, "cmd":
730      comment=3, number of ACL entries, "nentries"
731  case=Zero path
732    format=arg1:arg2:arg3:[attr]:(0..n)[acl]4
733      comment=2, SETACL, "cmd":
734      comment=3, number of ACL entries, "nentries":
735      comment=1, file descriptor, "no path&colon; fd":
736      comment=ACLs
737  case=Non-zero path
738    format=arg1:arg2:path:[attr]:(0..n)[acl]3
739      comment=2, SETACL, "cmd":
740      comment=3, number of ACL entries, "nentries":
741      comment=ACLs
742
743label=AUE_FCHDIR
744  format=[path]:[attr]
745#	header,150,2,fchdir(2),,Mon May 15 09:22:38 2000, + 680001393 msec
746#	path,/export/home/CC_final/icenine/arv/fchdir/obj_succ
747#	attribute,40777,tuser10,other,8388608,207662,0
748#	subject,tuser10,tuser10,other,root,other,6129,367,255 197121 tmach1
749#	return,success,0
750#	trailer,150
751#	header,68,2,fchdir(2),,Mon May 15 09:22:51 2000, + 710001196 msec
752#	subject,tuser10,tuser10,other,root,other,6258,367,255 197121 tmach1
753#	return,failure: Permission denied,-1
754#	trailer,68
755
756label=AUE_FCHMOD
757  case=With a valid file descriptor and path
758    format=arg1:path:[attr]
759      comment=2, mode, "new file mode"
760  case=With a valid file descriptor and invalid path
761    format=arg1:[arg]2:[attr]
762      comment=2, mode, "new file mode":
763      comment=1, file descriptor, "no path&colon; fd"
764  case=With an invalid file descriptor
765    format=arg1
766      comment=2, mode, "new file mode"
767#	header,168,2,fchmod(2),,Sat Apr 29 12:28:06 2000, + 350000000 msec
768#	argument,2,0x1a4,new file mode
769#	path,/export/home/CC/icenine/arv/fchmod/obj_succ
770#	attribute,100644,tuser10,other,7602240,26092,0
771#	subject,tuser10,tuser10,other,root,other,11507,346,16064 196866 tmach1
772#	return,success,0
773#	trailer,168
774#	header,90,2,fchmod(2),,Sat Apr 29 12:28:32 2000, + 930000000 msec
775#	argument,2,0x1a4,new file mode
776#	subject,tuser10,tuser10,other,root,other,11759,346,16064 196866 tmach1
777#	return,failure: Bad file number,-1
778#	trailer,90
779#	header,168,2,fchmod(2),,Sat Apr 29 12:28:20 2000, + 770000000 msec
780#	argument,2,0x1a4,new file mode
781#	path,/export/home/CC/icenine/arv/fchmod/obj_fail
782#	attribute,100644,root,other,7602240,26093,0
783#	subject,tuser10,tuser10,other,root,other,11644,346,16064 196866 tmach1
784#	return,failure: Not owner,-1
785#	trailer,168
786
787label=AUE_FCHOWN
788  case=With a valid file descriptor
789    format=arg1:arg2:[path]:[attr]
790      comment=2, uid, "new file uid":
791      comment=3, gid, "new file gid"
792  case=With an invalid file descriptor
793    format=arg1:arg2:[arg]3:[attr]
794       comment=2, uid, "new file uid":
795       comment=3, gid, "new file gid":
796       comment=1, file descriptor, "no path fd"
797
798label=AUE_FCHOWNAT
799  see=openat(2)
800  case=With a valid absolute/relative file path
801    format=path:[path_attr]:[attr]
802  case=With an file path eq. NULL and valid file descriptor
803    format=kernel
804
805label=AUE_FCHROOT
806  format=[path]:[attr]
807# fchroot -> chdirec -> audit_chdirec
808
809label=AUE_FCNTL
810  case=With a valid file descriptor
811    format=arg1:path:attr
812      comment=2, command, "cmd"
813  case=With an invalid file descriptor
814    format=arg1:arg2
815      comment=2, command, "cmd":
816      comment=1, file descriptor, "no path fd"
817
818label=AUE_FLOCK
819  skip=Not used.
820
821label=AUE_FORKALL
822  format=[arg]1
823    comment=0, pid, "child PID"
824  note=The forkall(2) return values are undefined because the audit record
825  note=is produced at the point that the child process is spawned.
826# see audit.c
827
828label=AUE_FORK1
829  format=[arg]1
830    comment=0, pid, "child PID"
831  note=The fork1(2) return values are undefined because the audit record
832  note=is produced at the point that the child process is spawned.
833# see audit.c
834
835label=AUE_FSAT
836  skip=Not used.  (Placeholder for AUE_*AT records)
837#openat		AUE_OPENAT_{W,RW,R}  appended with CT as needed
838#openat64	AUE_OPENAT_{W,RW,R}  appended with CT as needed
839#fstatat64	AUE_FSTATAT
840#fstat		AUE_FSTATAT
841#chownat	AUE_FCHOWNAT
842#unlinkat	AUE_UNLINKAT
843#futimesat	AUE_FUTIMESAT
844#renameat	AUE_RENAMEAT
845#faccessat	AUE_FACCESSAT
846
847label=AUE_FSTAT
848  skip=Not used.
849
850label=AUE_FSTATAT
851  format=path:[path_attr]:[attr]
852
853label=AUE_FSTATFS
854  case=With a valid file descriptor
855    format=[path]:[attr]
856  case=With an invalid file descriptor
857    format=arg1
858      comment=1, file descriptor, "no path fd"
859
860label=AUE_FTRUNCATE
861  skip=Not used.
862
863label=AUE_FUSERS
864  syscall=utssys: UTS_FUSERS
865  format=path:attr
866
867
868label=AUE_FUTIMESAT
869  syscall=utimes(2)
870  format=[path]:[path_attr]:[attr]
871
872label=AUE_GETAUDIT
873  format=kernel
874#	header,68,2,getaudit(2),,Mon May 15 09:23:57 2000, + 620001408 msec
875#	subject,tuser10,root,other,root,other,7063,367,255 197121 tmach1
876#	return,success,0
877#	trailer,68
878#	header,68,2,getaudit(2),,Mon May 15 09:24:09 2000, + 490003700 msec
879#	subject,tuser10,root,other,root,other,7158,367,255 197121 tmach1
880#	return,success,0
881#	trailer,68
882
883label=AUE_GETAUDIT_ADDR
884  format=kernel
885#	header,73,2,getaudit_addr(2),,Thu Nov 08 15:14:01 2001, + 0 msec
886#	subject,tuser1,root,staff,root,staff,9689,12289,0 0 tmach2
887#	return,success,0
888
889label=AUE_GETAUID
890  format=kernel
891#	header,68,2,getauid(2),,Mon May 15 09:24:22 2000, + 420000668 msec
892#	subject,tuser10,root,other,root,other,7303,367,255 197121 tmach1
893#	return,success,0
894#	trailer,68
895#	header,68,2,getauid(2),,Mon May 15 09:24:34 2000, + 490002988 msec
896#	subject,tuser10,tuser10,other,root,other,7410,367,255 197121 tmach1
897#	return,failure: Not owner,-1
898#	trailer,68
899
900label=AUE_GETDENTS
901  skip=Not used.
902#Not security relevant
903
904label=AUE_GETKERNSTATE
905  skip=Not used.
906
907label=AUE_GETMSG
908  case=With a valid file descriptor
909  format=arg1:[path]:attr:arg2
910    comment=1, file descriptor, "fd":
911    comment=4, priority, "pri"
912  case=With an invalid file descriptor
913  format=arg1:arg2
914    comment=1, file descriptor, "fd":
915    comment=4, priority, "pri"
916
917label=AUE_GETPMSG
918  case=With a valid file descriptor
919  format=arg1:[path]:attr
920    comment=1, file descriptor, "fd"
921  case=With an invalid file descriptor
922  format=arg1
923    comment=1, file descriptor, "fd"
924
925label=AUE_GETPORTAUDIT
926  format=Not used.
927
928label=AUE_GETUSERAUDIT
929  skip=Not used.
930
931label=AUE_INST_SYNC
932  format=arg1
933    comment=2, flags value, "flags"
934
935label=AUE_IOCTL
936  case=With an invalid file descriptor
937    format=arg1:arg2:arg3
938      comment=1, file descriptor, "fd":
939      comment=2, command, "cmd":
940      comment=3, arg, "arg"
941  case=With a valid file descriptor
942    format=path:[attr]:arg1:arg2
943      comment=2, ioctl cmd, "cmd":
944      comment=3, ioctl arg, "arg"
945  case=Non-file file descriptor
946    format=arg1:arg2:arg3
947      comment=1, file descriptor, "fd":
948      comment=2, ioctl cmd, "cmd":
949      comment=3, ioctl arg, "arg"
950  case=Bad file name
951    format=arg1:arg2:arg3
952      comment=1, file descriptor, "no path&colon; fd":
953      comment=2, ioctl cmd, "cmd":
954      comment=3, ioctl arg, "arg"
955# old BSM manual misses a case
956
957label=AUE_JUNK
958  skip=Not used.
959
960label=AUE_KILL
961  case=Valid process
962    format=arg1:[proc]
963      comment=2, signo, "signal"
964  case=Zero or negative process
965    format=arg1:arg2
966      comment=2, signo, "signal":
967      comment=1, pid, "process"
968
969label=AUE_KILLPG
970  skip=Not used.
971
972label=AUE_LCHOWN
973  format=arg1:arg2:path:[attr]
974    comment=2, uid, "new file uid":
975    comment=3, gid, "new file gid"
976
977label=AUE_LINK
978  format=path1:[attr]:path2
979     comment=from path:
980     comment=to path
981
982label=AUE_LSEEK
983  skip=Not used.
984
985label=AUE_LSTAT
986  format=path:[attr]
987
988label=AUE_LXSTAT
989  skip=Not used.
990# AUE_LXSTAT now maps to AUE_LSTAT
991
992label=AUE_MCTL
993  skip=Not used.
994
995label=AUE_MEMCNTL
996  format=arg1:arg2:arg3:arg4:arg5:arg6
997    comment=1, base address, "base":
998    comment=2, length, "len":
999    comment=3, command, "cmd":
1000    comment=4, command args, "arg":
1001    comment=5, command attributes, "attr":
1002    comment=6, 0, "mask"
1003
1004label=AUE_MKDIR
1005  format=arg1:path:[attr]
1006    comment=2, mode, "mode"
1007
1008label=AUE_MKNOD
1009  format=arg1:arg2:path:[attr]
1010    comment=2, mode, "mode":
1011    comment=3, dev, "dev"
1012
1013label=AUE_MMAP
1014  case=With a valid file descriptor
1015    format=arg1:arg2:[path]3:[attr]
1016      comment=1, segment address, "addr":
1017      comment=2, segment address, "len":
1018      comment=if no path, then argument&colon; \
1019        1, "nopath&colon; fd", file descriptor
1020  case=With an invalid file descriptor
1021    format=arg1:arg2:arg3
1022      comment=1, segment address, "addr":
1023      comment=2, segment address, "len":
1024      comment=1, file descriptor, "no path&colon; fd"
1025
1026label=AUE_MODADDMAJ
1027  title=modctl: bind module
1028  syscall=modctl
1029  format=[text]1:[text]2:text3:arg4:(0..n)[text]5
1030    comment=driver major number:
1031    comment=driver name:
1032    comment=driver major number or "no drvname":
1033    comment=5, number of aliases, "":
1034    comment=aliases
1035
1036label=AUE_MODADDPRIV
1037  format=kernel
1038
1039label=AUE_MODCONFIG
1040  skip=Not used.
1041
1042label=AUE_MODCTL
1043  skip=Not used. (placeholder)
1044
1045label=AUE_MODDEVPLCY
1046  syscall=modctl
1047  title=modctl: set device policy
1048  case=If unknown minor name/pattern
1049    format=arg1:arg2:arg3:arg4:arg5
1050      comment=2, "major", major number:
1051      comment=2, "lomin", low minor number, if known:
1052      comment=2, "himin", hi minor number, if known:
1053      comment=privileges required for reading:
1054      comment=privileges required for writing
1055  case=else
1056    format=arg1:text2:arg3:arg4
1057      comment=2, "major", major number:
1058      comment=minor name/pattern:
1059      comment=privileges required for reading:
1060      comment=privileges required for writing
1061
1062label=AUE_MODLOAD
1063  syscall=modctl
1064  title=modctl: load module
1065  format=[text]1:text2
1066    comment=default path:
1067    comment=filename path
1068
1069label=AUE_MODUNLOAD
1070  syscall=modctl
1071  title=modctl: unload module
1072  format=arg1
1073    comment=1, module ID, "id"
1074
1075label=AUE_MOUNT
1076  case=UNIX file system
1077    format=arg1:text2:path:[attr]
1078      comment=3, flags, "flags":
1079      comment=filesystem type
1080  case=NFS file system
1081    format=arg1:text2:text3:arg4:path:[attr]
1082      comment=3, flags, "flags":
1083      comment=filesystem type:
1084      comment=host name:
1085      comment=3, flags, "internal flags"
1086# unix example:
1087#	header,239,2,mount(2),,Sun Apr 16 14:42:32 2000, + 979995208 msec
1088#	argument,3,0x104,flags
1089#	text,ufs
1090#	path,/var2
1091#	attribute,40755,root,root,32,12160,0
1092#	path,/devices/pci@1f,4000/scsi@3/sd@0,0:e
1093#	attribute,60640,root,sys,32,231268,137438953476
1094#	subject,abc,root,other,root,other,1726,1715,255 66049 ohboy
1095#	return,success,4290707268
1096#		       ^^^^^^^^^^         <- bugid 4333559
1097
1098label=AUE_MSGCTL
1099  format=arg1:[ipc]:[ipc_perm]
1100    comment=1, message ID, "msg ID"
1101  note=ipc_perm
1102# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1103
1104label=AUE_MSGCTL_RMID
1105  format=arg1:[ipc]:[ipc_perm]
1106    comment=1, message ID, "msg ID"
1107  note=ipc_perm
1108  syscall=msgctl: IPC_RMID
1109# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1110
1111label=AUE_MSGCTL_SET
1112  format=arg1:[ipc]:[ipc_perm]
1113    comment=1, message ID, "msg ID"
1114  note=ipc_perm
1115  syscall=msgctl: IPC_SET
1116# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1117
1118label=AUE_MSGCTL_STAT
1119  format=arg1:[ipc]:[ipc_perm]
1120    comment=1, message ID, "msg ID"
1121  note=ipc_perm
1122  syscall=msgctl: IPC_STAT
1123# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1124
1125label=AUE_MSGGET
1126  format=arg1:ipc
1127    comment=1, message key, "msg key"
1128  note=ipc_perm
1129  syscall=msgget
1130
1131label=AUE_MSGGETL
1132  skip=Not used.
1133
1134label=AUE_MSGRCV
1135  format=arg1:[ipc]:[ipc_perm]
1136    comment=1, message ID, "msg ID"
1137  note=ipc_perm
1138  syscall=msgrcv
1139# ipc, ipc_perm: msgrcv -> ipc_lookup -> audit_ipc
1140
1141label=AUE_MSGRCVL
1142  skip=Not used.
1143
1144label=AUE_MSGSND
1145  format=arg1:[ipc]:[ipc_perm]
1146    comment=1, message ID, "msg ID"
1147  note=ipc_perm
1148  syscall=msgsnd
1149# ipc, ipc_perm: msgsnd -> ipc_lookup -> audit_ipc
1150
1151label=AUE_MSGSNDL
1152  skip=Not used.
1153
1154label=AUE_MSGSYS
1155skip=Not used.  (Placeholder for AUE_MSG* events.)
1156
1157label=AUE_MUNMAP
1158  format=arg1:arg2
1159    comment=1, address of memory, "addr":
1160    comment=2, memory segment size, "len"
1161
1162label=AUE_NFS
1163  skip=Not used.
1164
1165label=AUE_NFSSVC_EXIT
1166  skip=Not used.
1167
1168label=AUE_NFS_GETFH
1169  skip=Not used.
1170
1171label=AUE_NFS_SVC
1172  skip=Not used.
1173
1174label=AUE_NICE
1175  format=kernel
1176
1177label=AUE_NULL
1178  skip=Not used.  (placeholder)
1179# used internal to audit_event.c for minimal audit
1180
1181label=AUE_NTP_ADJTIME
1182  format=kernel
1183
1184label=AUE_ONESIDE
1185  skip=Not used.
1186
1187label=AUE_OPEN
1188  skip=Not used.  (placeholder for AUE_OPEN_*).
1189
1190label=AUE_OPEN_R
1191  format=path:[attr]
1192  see=open(2) - read
1193
1194label=AUE_OPENAT_R
1195  format=path:[path_attr]:[attr]
1196  see=openat(2)
1197
1198label=AUE_OPEN_RC
1199  format=path:[attr]
1200  see=open(2) - read,creat
1201
1202label=AUE_OPENAT_RC
1203  see=openat(2)
1204  format=path:[path_attr]:[attr]
1205# aui_fsat(): fm & O_CREAT mangling
1206
1207label=AUE_OPEN_RT
1208  format=path:[attr]
1209  see=open(2) - read,trunc
1210
1211label=AUE_OPENAT_RT
1212  see=openat(2)
1213  format=path:[path_attr]:[attr]
1214# aui_fsat(): fm & O_TRUNC mangling
1215
1216label=AUE_OPEN_RTC
1217  format=path:[attr]
1218  see=open(2) - read,trunc,creat
1219
1220label=AUE_OPENAT_RTC
1221  see=openat(2)
1222  format=path:[path_attr]:[attr]
1223# aui_fsat(): fm & O_TRUNC mangling, fm & O_CREAT mangling
1224
1225label=AUE_OPEN_RW
1226  format=path:[attr]
1227  see=open(2) - read,write
1228
1229label=AUE_OPENAT_RW
1230  see=openat(2)
1231  format=path:[path_attr]:[attr]
1232# aui_fsat(): fm & O_RDWR
1233
1234label=AUE_OPEN_RWC
1235  format=path:[attr]
1236  see=open(2) - read,write,creat
1237
1238label=AUE_OPENAT_RWC
1239  see=openat(2)
1240  format=path:[path_attr]:[attr]
1241# aui_fsat(): fm & O_RDWR, fm & O_CREAT mangling
1242
1243label=AUE_OPEN_RWT
1244  format=path:[attr]
1245  see=open(2) - read,write,trunc
1246
1247label=AUE_OPENAT_RWT
1248  see=openat(2)
1249  format=path:[path_attr]:[attr]
1250# aui_fsat(): fm & O_RDWR, fm & O_TRUNC mangling
1251
1252label=AUE_OPEN_RWTC
1253  format=path:[attr]
1254  see=open(2) - read,write,trunc,creat
1255
1256label=AUE_OPENAT_RWTC
1257  see=openat(2)
1258  format=path:[path_attr]:[attr]
1259# aui_fsat(): fm & O_RDWR, fm & O_TRUNC mangling, fm & O_CREAT mangling
1260
1261label=AUE_OPEN_W
1262  format=path:[attr]
1263  see=open(2) - write
1264
1265label=AUE_OPENAT_W
1266  see=openat(2)
1267  format=path:[path_attr]:[attr]
1268
1269label=AUE_OPEN_WC
1270  format=path:[attr]
1271  see=open(2) - write,creat
1272
1273label=AUE_OPENAT_WC
1274  see=openat(2)
1275  format=path:[path_attr]:[attr]
1276# aui_fsat(): fm & O_WRONLY, fm & O_CREAT mangling
1277
1278label=AUE_OPEN_WT
1279  format=path:[attr]
1280  see=open(2) - write,trunc
1281
1282label=AUE_OPENAT_WT
1283  see=openat(2)
1284  format=path:[path_attr]:[attr]
1285# aui_fsat(): fm & O_WRONLY, fm & O_TRUNC mangling
1286
1287label=AUE_OPEN_WTC
1288  format=path:[attr]
1289  see=open(2) - write,trunc,creat
1290
1291label=AUE_OPENAT_WTC
1292  see=openat(2)
1293  format=path:[path_attr]:[attr]
1294# aui_fsat(): fm & O_WRONLY, fm & O_TRUNC mangling, fm & O_CREAT mangling
1295
1296label=AUE_OSETPGRP
1297  skip=Not used.
1298
1299label=AUE_OSTAT
1300  skip=Not used.
1301
1302label=AUE_PATHCONF
1303  format=path:[attr]
1304
1305label=AUE_PIPE
1306format=kernel
1307# class is no, not usually printed
1308
1309label=AUE_PORTFS
1310  skip=Not used (placeholder for AUE_PORTFS_*).
1311
1312label=AUE_PORTFS
1313  skip=Not used (placeholder for AUE_PORTFS_*).
1314
1315label=AUE_PORTFS_ASSOCIATE
1316  syscall=portfs
1317  see=port_associate(3C)
1318  case=Port association via PORT_SOURCE_FILE
1319  format=[path]1:attr
1320    comment=name of the file/directory to be watched
1321
1322label=AUE_PORTFS_DISSOCIATE
1323  syscall=portfs
1324  see=port_dissociate(3C)
1325  case=Port disassociation via PORT_SOURCE_FILE
1326  format=kernel
1327
1328label=AUE_PRIOCNTLSYS
1329  syscall=priocntl
1330  see=priocntl(2)
1331  format=arg1:arg2
1332    comment=1, priocntl version number, "pc_version":
1333    comment=3, command, "cmd"
1334
1335label=AUE_PROCESSOR_BIND
1336  case=No LWP/thread bound to the processor
1337    format=arg1:arg2:text3:[proc]
1338      comment=1, type of ID, "ID type":
1339      comment=2, ID value, "ID":
1340      comment="PBIND_NONE"
1341  case=With processor bound
1342    format=arg1:arg2:arg3:[proc]
1343      comment=1, type of ID, "ID type":
1344      comment=2, ID value, "ID":
1345      comment=3, processor ID, "processor_id"
1346
1347label=AUE_PUTMSG
1348  see=putmsg(2)
1349  format=arg1:[path]:[attr]:arg2
1350    comment=1, file descriptor, "fd":
1351    comment=4, priority, "pri"
1352
1353label=AUE_PUTPMSG
1354  see=putpmsg(2)
1355  format=arg1:[path]:[attr]:arg2:arg3
1356    comment=1, file descriptor, "fd":
1357    comment=4, priority, "pri":
1358    comment=5, flags, "flags"
1359
1360label=AUE_P_ONLINE
1361  format=arg1:arg2:text3
1362    comment=1, processor ID, "processor ID":
1363    comment=2, flags value, "flags":
1364    comment=text form of flags.  Values&colon;  \
1365      P_ONLINE, P_OFFLINE, P_NOINTR, P_SPARE, P_FAULTED, P_STATUS
1366
1367label=AUE_QUOTACTL
1368  skip=Not used.
1369
1370label=AUE_READ
1371  skip=Not used.  (Placeholder for AUE_READ_* events)
1372
1373label=AUE_READL
1374  skip=Not used. (Obsolete)
1375
1376label=AUE_READLINK
1377  format=path:[attr]
1378
1379label=AUE_READV
1380  skip=Not used (obsolete)
1381# detritus from CMS
1382
1383label=AUE_READVL
1384  skip=Not used (obsolete)
1385# detritus from CMS
1386
1387label=AUE_REBOOT
1388  skip=Not used.
1389
1390label=AUE_RECV
1391  case=If address family is AF_INET or AF_INET6
1392    format=[arg]1:[inet]
1393      comment=1, file descriptor, "so"
1394  case=If address family is AF_UNIX and path is defined
1395    format=[path]1:[attr]
1396      comment=1, file descriptor, "so"
1397  case=If address family is AF_UNIX and path is NULL
1398    format=[path]1:[attr]
1399      comment=1, file descriptor, "no path&colon; fd"
1400  case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1401    format=[arg]1:[arg]2:[arg]3
1402      comment=1, file descriptor, "so":
1403      comment=1, family, "family":
1404      comment=1, type, "type"
1405# associated class remapped to AUE_READ's class (audit_event.c:audit_s2e[237])
1406
1407label=AUE_RECVFROM
1408  format=inet:arg1:[arg]2:inet3:arg4
1409    comment=3, message length, "len":
1410    comment=4, flags, "flags":
1411    comment=from address:
1412    comment=6, address length, "tolen"
1413  note=The socket token for a bad socket is reported as "argument
1414  note=token (1, socket descriptor, "fd")"
1415
1416label=AUE_RECVMSG
1417  case=If invalid file descriptor
1418    format=arg1:arg2
1419      comment=1, file descriptor, "so":
1420      comment=3, flags, "flags"
1421  case=If valid file descriptor and socket is AF_UNIX and no path
1422  format=arg1:[attr]
1423    comment=1, file descriptor, "no path&colon; fd"
1424  case=If valid file descriptor and socket is AF_UNIX and path defined
1425  format=path:attr
1426  case=If valid file descriptor and socket is AF_INET or AF_INET6
1427  case=.. if socket type is SOCK_DGRAM or SOCK_RAW or SOCK_STREAM
1428  format=arg1:arg2:inet
1429    comment=1, file descriptor, "so":
1430    comment=2, flags, "flags"
1431  case=.. if socket type is unknown
1432  format=arg1:arg2:arg3:arg4
1433    comment=1, file descriptor, "so":
1434    comment=1, family, "family":
1435    comment=1, type, "type":
1436    comment=3, flags, "flags"
1437
1438label=AUE_RENAME
1439  format=path1:[attr]1:[path]2
1440  comment=from name:
1441  comment=to name
1442
1443label=AUE_RENAMEAT
1444# see openat(2)
1445  format=path1:[path_attr]:[attr]1:[path]2:[path_attr]
1446  comment=from name:
1447  comment=to name
1448
1449label=AUE_RFSSYS
1450  skip=Not used.
1451# apparently replaced
1452
1453label=AUE_RMDIR
1454  format=path:[attr]
1455
1456label=AUE_SEMCTL
1457  format=arg1:[ipc]:[ipc_perm]
1458    comment=1, semaphore ID, "sem ID"
1459  note=ipc_perm
1460# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1461
1462label=AUE_SEMCTL_GETALL
1463  format=arg1:[ipc]:[ipc_perm]
1464    comment=1, semaphore ID, "sem ID"
1465  note=ipc_perm
1466  syscall=semctl: GETALL
1467# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1468
1469label=AUE_SEMCTL_GETNCNT
1470  format=arg1:[ipc]:[ipc_perm]
1471    comment=1, semaphore ID, "sem ID"
1472  note=ipc_perm
1473  syscall=semctl: GETNCNT
1474# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1475
1476label=AUE_SEMCTL_GETPID
1477  format=arg1:[ipc]:[ipc_perm]
1478    comment=1, semaphore ID, "sem ID"
1479  note=ipc_perm
1480  syscall=semctl: GETPID
1481# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1482
1483label=AUE_SEMCTL_GETVAL
1484  format=arg1:[ipc]:[ipc_perm]
1485    comment=1, semaphore ID, "sem ID"
1486  note=ipc_perm
1487  syscall=semctl: GETVAL
1488# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1489
1490label=AUE_SEMCTL_GETZCNT
1491  format=arg1:[ipc]:[ipc_perm]
1492    comment=1, semaphore ID, "sem ID"
1493  note=ipc_perm
1494  syscall=semctl: GETZCNT
1495# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1496
1497label=AUE_SEMCTL_RMID
1498  format=arg1:[ipc]:[ipc_perm]
1499    comment=1, semaphore ID, "sem ID"
1500  note=ipc_perm
1501  syscall=semctl: IPC_RMID
1502# ipc, ipc_perm token: semctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1503
1504label=AUE_SEMCTL_SET
1505  format=arg1:[ipc]:[ipc_perm]
1506    comment=1, semaphore ID, "sem ID"
1507  note=ipc_perm
1508  syscall=semctl: IPC_SET
1509# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1510
1511label=AUE_SEMCTL_SETALL
1512  format=arg1:[ipc]:[ipc_perm]
1513    comment=1, semaphore ID, "sem ID"
1514  note=ipc_perm
1515  syscall=semctl: SETALL
1516# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1517
1518label=AUE_SEMCTL_SETVAL
1519  format=arg1:[ipc]:[ipc_perm]
1520    comment=1, semaphore ID, "sem ID"
1521  note=ipc_perm
1522  syscall=semctl: SETVAL
1523# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1524
1525label=AUE_SEMCTL_STAT
1526  format=arg1:[ipc]:[ipc_perm]
1527    comment=1, semaphore ID, "sem ID"
1528  note=ipc_perm
1529  syscall=semctl: IPC_STAT
1530# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1531
1532label=AUE_SEMGET
1533  format=arg1:[ipc_perm]:ipc
1534    comment=1, semaphore ID, "sem key"
1535  note=ipc_perm
1536  syscall=semctl: SETVAL
1537# ipc_perm token: semget -> audit_ipcget
1538
1539label=AUE_SEMGETL
1540  skip=Not used.
1541
1542label=AUE_SEMOP
1543  format=arg1:[ipc]:[ipc_perm]
1544    comment=1, semaphore ID, "sem ID"
1545  note=ipc_perm
1546# ipc, ipc_perm token: semop -> ipc_lookup -> audit_ipc
1547
1548label=AUE_SEMSYS
1549  skip=Not used.  (place holder) -- defaults to a semget variant
1550
1551label=AUE_SEND
1552  case=If address family is AF_INET or AF_INET6
1553    format=[arg]1:[inet]
1554      comment=1, file descriptor, "so"
1555  case=If address family is AF_UNIX and path is defined
1556    format=[path]1:[attr]
1557      comment=1, file descriptor, "so"
1558  case=If address family is AF_UNIX and path is NULL
1559    format=[path]1:[attr]
1560      comment=1, file descriptor, "no path&colon; fd"
1561  case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1562    format=[arg]1:[arg]2:[arg]3
1563      comment=1, file descriptor, "so":
1564      comment=1, family, "family":
1565      comment=1, type, "type"
1566# associated class remapped to AUE_WRITE's class (audit_event.c:audit_s2e[240])
1567
1568label=AUE_SENDMSG
1569  case=If invalid file descriptor
1570    format=arg1:arg2
1571      comment=1, file descriptor, "so":
1572      comment=3, flags, "flags"
1573  case=If valid file descriptor
1574  case=...and address family is AF_UNIX and path is defined
1575    format=path:attr
1576  case=...and address family is AF_UNIX and path is NULL
1577    format=path1:attr
1578      comment=1, file descriptor, "nopath&colon; fd"
1579  case=...and address family is AF_INET or AF_INET6, \
1580    socket is SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1581    format=arg1:arg2:inet
1582      comment=1, file descriptor, "so":
1583      comment=3, flags, "flags"
1584  case=...and unknown address family or address family AF_INET or AF_INET6 \
1585    and not socket SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1586    format=arg1:arg2:arg3:arg4
1587      comment=1, file descriptor, "so":
1588      comment=1, family, "family":
1589      comment=1, type, "type":
1590      comment=1, flags, "flags"
1591
1592label=AUE_SENDTO
1593  case=If invalid file descriptor
1594    format=arg1:arg2
1595      comment=1, file descriptor, "so":
1596      comment=3, flags, "flags"
1597  case=If valid file descriptor
1598  case=...and socket is AF_UNIX and path is defined
1599    format=path:attr
1600  case=...and address family is AF_UNIX and path is NULL
1601    format=path1:attr
1602      comment=1, file descriptor, "nopath&colon; fd"
1603  case=...and address family is AF_INET or AF_INET6
1604    format=arg1:arg2:inet
1605      comment=1, file descriptor, "so":
1606      comment=3, flags, "flags"
1607  case=...and unknown address family
1608    format=arg1:arg2:arg3:arg4
1609      comment=1, file descriptor, "so":
1610      comment=1, family, "family":
1611      comment=1, type, "type":
1612      comment=1, flags, "flags"
1613
1614label=AUE_SETAUDIT
1615  case=With a valid program stack address
1616    format=arg1:arg2:arg3:arg4:arg5:arg6
1617      comment=1, audit user ID, "setaudit&colon;auid":
1618      comment=1, terminal ID, "setaudit&colon;port":
1619      comment=1, terminal ID, "setaudit&colon;machine":
1620      comment=1, preselection mask, "setaudit&colon;as_success":
1621      comment=1, preselection mask, "setaudit&colon;as_failure":
1622      comment=1, audit session ID, "setaudit&colon;asid"
1623  case=With an invalid program stack address
1624    format=kernel
1625#	header,215,2,setaudit(2),,Mon May 15 09:43:28 2000, + 60002627 msec
1626#	argument,1,0x271a,setaudit:auid
1627#	argument,1,0x3ff0201,setaudit:port
1628#	argument,1,0x8192591e,setaudit:machine
1629#	argument,1,0x400,setaudit:as_success
1630#	argument,1,0x400,setaudit:as_failure
1631#	argument,1,0x16f,setaudit:asid
1632#	subject,tuser10,root,other,root,other,20620,367,255 197121 tmach1
1633#	return,success,0
1634#	trailer,215
1635#	header,215,2,setaudit(2),,Mon May 15 09:43:40 2000, + 50000847 msec
1636#	argument,1,0x271a,setaudit:auid
1637#	argument,1,0x3ff0201,setaudit:port
1638#	argument,1,0x8192591e,setaudit:machine
1639#	argument,1,0x400,setaudit:as_success
1640#	argument,1,0x400,setaudit:as_failure
1641#	argument,1,0x16f,setaudit:asid
1642#	subject,tuser10,root,other,root,other,20720,367,255 197121 tmach1
1643#	return,success,0
1644#	trailer,215
1645
1646label=AUE_SETAUDIT_ADDR
1647  case=With a valid program stack address
1648    format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7
1649      comment=1, audit user ID, "auid":
1650      comment=1, terminal ID, "port":
1651      comment=1, type, "type":
1652      comment=1, terminal ID, "ip address":
1653      comment=1, preselection mask, "as_success":
1654      comment=1, preselection mask, "as_failure":
1655      comment=1, audit session ID, "asid"
1656  case=With an invalid program stack address
1657    format=kernel
1658#	header,172,2,setaudit_addr(2),,Fri Nov 09 13:52:26 2001, + 0 msec
1659#	argument,1,0x15fa7,auid
1660#	argument,1,0x0,port
1661#	argument,1,0x4,type
1662#	ip address,tmach2
1663#	argument,1,0x9c00,as_success
1664#	argument,1,0x9c00,as_failure
1665#	argument,1,0x1f1,asid
1666#	subject,tuser1,root,staff,tuser1,staff,10420,497,0 0 tmach2
1667#	return,success,0
1668
1669label=AUE_SETAUID
1670  format=arg1
1671    comment=2, audit user ID, "setauid"
1672
1673label=AUE_SETDOMAINNAME
1674  skip=Not used.  (See AUE_SYSINFO)
1675# See AUE_SYSINFO with SI_SET_SRPC_DOMAIN
1676
1677label=AUE_SETEGID
1678  format=arg1
1679    comment=1, group ID, "gid"
1680
1681label=AUE_SETEUID
1682  format=arg1
1683    comment=1, user ID, "euid"
1684
1685label=AUE_SETGID
1686  format=arg1
1687    comment=1, group ID, "gid"
1688
1689label=AUE_SETGROUPS
1690  note=If more than NGROUPS_MAX_DEFAULT groups listed,
1691  note=no tokens are generated.
1692  case=If no groups in list
1693    format=[arg]1
1694      comment=1, 0, "setgroups"
1695  case=If 1 or more groups in list
1696    format=(1..n)arg1
1697      comment=1, gid, "setgroups"
1698
1699label=AUE_SETHOSTNAME
1700  skip=Not used.  (See AUE_SYSINFO)
1701# See sysinfo call with command SI_SET_HOSTNAME
1702
1703label=AUE_SETKERNSTATE
1704  skip=Not used.
1705
1706label=AUE_SETPGID
1707  format=[proc]:[arg]1
1708  comment=2, pgid, "pgid"
1709
1710label=AUE_SETPGRP
1711  format=kernel
1712
1713label=AUE_SETPRIORITY
1714  skip=Not used.
1715
1716label=AUE_SETPPRIV
1717  case=operation privileges off
1718  format=arg1:privset2
1719    comment=setppriv operation:
1720    comment=privileges actually switched off
1721  case=operation privileges on
1722  format=arg1:privset2
1723    comment=setppriv operation:
1724    comment=privileges actually switched on
1725  case=operation privileges off
1726  format=arg1:privset2:privset3
1727    comment=setppriv operation:
1728    comment=privileges before privset:
1729    comment=privileges after privset
1730#header,220,2,settppriv(2),,test1,Mon Oct  6 10:09:05 PDT 2003, + 753 msec
1731#argument,2,0x2,op
1732#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1733#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1734#subject,tuser,root,staff,tuser,staff,444,426,200 131585 test0
1735#return,success,0
1736
1737label=AUE_SETREGID
1738  format=arg1:arg2
1739    comment=1, real group ID, "rgid":
1740    comment=2, effective group ID, "egid"
1741
1742label=AUE_SETREUID
1743  format=arg1:arg2
1744    comment=1, real user ID, "ruid":
1745    comment=2, effective user ID, "euid"
1746
1747label=AUE_SETRLIMIT
1748  format=kernel
1749#	header,73,2,setrlimit(2),,Thu Nov 08 15:14:17 2001, + 0 msec
1750#	subject,tuser1,tuser1,staff,tuser1,staff,9707,497,0 0 tmach2
1751#	return,success,0
1752
1753label=AUE_SETSID
1754  format=kernel
1755
1756label=AUE_SETSOCKOPT
1757  case=Invalid file descriptor
1758    format=arg1:arg2
1759      comment=1, file descriptor, "so":
1760      comment=2, level, "level"
1761  case=Valid file descriptor
1762  case=...and socket is AF_UNIX
1763    format=path1:arg2:arg3:arg4:arg5:arg6:[arg]7:[data]8
1764      comment=if no path, will be argument&colon; 1, "nopath&colon; fd", \
1765        file descriptor:
1766      comment=1, file descriptor, "so":
1767      comment=1, family, "family":
1768      comment=1, type, "type":
1769      comment=2, protocol level, "level":
1770      comment=3, option name, "optname":
1771      comment=5, option length, "optlen":
1772      comment=option data
1773  case=...and socket is AF_INET or AF_INET6
1774    format=arg1:arg2:arg3:[arg]4:[data]5:inet
1775      comment=1, file descriptor, "so":
1776      comment=2, protocol level, "level":
1777      comment=3, option name, "optname":
1778      comment=5, option length, "optlen":
1779      comment=option data
1780  case=...and socket adddress family is unknown
1781    format=arg1:arg2:arg3:arg4:arg5:[arg]6:[data]7
1782      comment=1, file descriptor, "so":
1783      comment=1, family, "family":
1784      comment=1, type, "type":
1785      comment=2, protocol level, "level":
1786      comment=3, option name, "optname":
1787      comment=5, option length, "optlen":
1788      comment=option data
1789
1790label=AUE_SETTIMEOFDAY
1791  skip=Not used.
1792
1793label=AUE_SETUID
1794  syscall=setuid
1795  format=arg1
1796    comment=1, "uid" to be set
1797
1798label=AUE_SETUSERAUDIT
1799  skip=Not used.
1800
1801label=AUE_SHMAT
1802  format=arg1:arg2:[ipc]:[ipc_perm]
1803    comment=1, shared memory ID, "shm ID":
1804    comment=2, shared mem addr, "shm addr"
1805  note=ipc_perm
1806# ipc, ipc_perm token: shmat -> ipc_lookup -> audit_ipc
1807
1808label=AUE_SHMCTL
1809  format=arg1:[ipc]:[ipc_perm]
1810    comment=1, shared memory ID, "shm ID"
1811  note=ipc_perm
1812# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1813
1814label=AUE_SHMCTL_RMID
1815  format=arg1:[ipc]:[ipc_perm]
1816  comment=1, shared memory ID, "shm ID"
1817  note=ipc_perm
1818  syscall=semctl:  IPC_RMID
1819# ipc, ipc_perm token: shmctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1820
1821label=AUE_SHMCTL_SET
1822  format=arg1:[ipc]:[ipc_perm]
1823    comment=1, shared memory ID, "shm ID"
1824  note=ipc_perm
1825  syscall=semctl:  IPC_SET
1826# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1827
1828label=AUE_SHMCTL_STAT
1829  format=arg1:[ipc]:[ipc_perm]
1830    comment=1, shared memory ID, "shm ID"
1831  note=ipc_perm
1832  syscall=semctl:  IPC_STAT
1833# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1834
1835label=AUE_SHMDT
1836  format=arg1
1837    comment=1, shared memory address, "shm adr"
1838
1839label=AUE_SHMGET
1840  format=arg1:[ipc_perm]:[ipc]
1841    comment=0, shared memory key, "shm key"
1842  note=ipc_perm
1843# ipc_perm: shmget -> audit_ipcget
1844
1845label=AUE_SHMGETL
1846  skip=Not used.
1847
1848label=AUE_SHMSYS
1849  skip=Not used.  (Placeholder for shmget and shmctl*)
1850
1851label=AUE_SHUTDOWN
1852  case=If the socket address is invalid
1853    format=[arg]1:[text]2:[text]3
1854      comment=1, file descriptor, "fd":
1855      comment=bad socket address:
1856      comment=bad peer address
1857  case=If the socket address is part of the AF_INET family
1858    case=..with zero file descriptor
1859      format=arg1:[arg]2:[arg]3:[arg]4
1860	comment=1, file descriptor, "so":
1861	comment=1, family, "family":
1862	comment=1, type, "type":
1863	comment=2, how shutdown code, "how"
1864    case=...with non-zero file descriptor
1865      format=arg1:arg2:inet
1866	comment=1, file descriptor, "so":
1867	comment=2, how shutdown code, "how"
1868  case=If the socket address is AF_UNIX
1869    case=...with zero file descriptor
1870      format=path1:arg2:[arg]3:[arg]4:[arg]5
1871	comment=If error&colon; argument&colon; \
1872	  1, "no path&colon; fd", file descriptor:
1873	comment=1, file descriptor, "so":
1874	comment=1, family, "family":
1875	comment=1, type, "type":
1876	comment=2, how shutdown code, "how"
1877    case=...with non-zero file descriptor
1878      format=path1:arg2:arg3:inet
1879	comment=If error&colon; argument&colon; \
1880	  1, file descriptor, "no path&colon; fd":
1881	comment=1, file descriptor, "so":
1882	comment=2, how shutdown code, "how"
1883#old BSM manual wrong; used audit_event.c
1884
1885label=AUE_SOCKACCEPT
1886  syscall=getmsg:  socket accept
1887  format=inet:arg1:[path]:attr:arg2
1888    comment=1, file descriptor, "fd":
1889    comment=4, priority, "pri"
1890# see putmsg and getmsg for record format
1891# See audit.c for inet token and audit_start.c for other reference
1892
1893label=AUE_SOCKCONFIG
1894  format=arg1:arg2:arg3:[path]4
1895    comment=1, domain address, "domain":
1896    comment=2, type, "type":
1897    comment=3, protocol, "protocol":
1898    comment=If no path&colon;argument -- 3, 0, "devpath"
1899
1900label=AUE_SOCKCONNECT
1901  syscall=putmsg:  socket connect
1902  format=inet:arg1:[path]:attr:arg2
1903    comment=1, file descriptor, "fd":
1904    comment=4, priority, "pri"
1905# same as AUE_SOCKACCEPT
1906
1907label=AUE_SOCKET
1908  format=arg1:[arg]2:arg3
1909    comment=1, socket domain, "domain":
1910    comment=2, socket type, "type":
1911    comment=3, socket protocol, "protocol"
1912
1913label=AUE_SOCKETPAIR
1914  skip=Not used.
1915# unreferenced
1916
1917label=AUE_SOCKRECEIVE
1918  syscall=getmsg
1919  format=inet:arg1:[path]:attr:arg2
1920    comment=1, file descriptor, "fd":
1921    comment=4, priority, "pri"
1922# see AUE_SOCKACCEPT
1923
1924label=AUE_SOCKSEND
1925syscall=putmsg
1926  format=inet:arg1:[path]:attr:arg2
1927    comment=1, file descriptor, "fd":
1928    comment=4, priority, "pri"
1929# see AUE_SOCKACCEPT
1930
1931label=AUE_STAT
1932  format=path:[attr]
1933
1934label=AUE_STATFS
1935  format=path:[attr]
1936
1937label=AUE_STATVFS
1938  format=path:[attr]
1939
1940label=AUE_STIME
1941  format=kernel
1942
1943label=AUE_SWAPON
1944  skip=Not used.
1945
1946label=AUE_SYMLINK
1947  format=path:text1:[attr]
1948    comment=symbolic link string
1949
1950label=AUE_SYSINFO
1951  note=Only SI_SET_HOSTNAME and SI_SET_SRPC_DOMAIN commands
1952  note=are currently audited.
1953  format=arg1:[text]2
1954    comment=1, command, "cmd":
1955    comment=name
1956
1957label=AUE_SYSTEMBOOT
1958  title=system booted
1959  syscall=none
1960  format=head:text1
1961    comment="booting kernel"
1962# see audit_start.c and audit_io.c
1963# no subject or return / exit token
1964#	header,44,2,system booted,na,Fri Nov 09 13:53:42 2001, + 0 msec
1965#	text,booting kernel
1966
1967label=AUE_TRUNCATE
1968  skip=Not used.
1969
1970label=AUE_UMOUNT
1971  syscall=umount: old version
1972  note=Implemented as call of the newer umount2(2).
1973  format=path:arg1:[path]:[attr]
1974    comment=2, mflag value = 0, "flags"
1975
1976label=AUE_UMOUNT2
1977  syscall=umount2
1978  format=path:arg1:[path]:[attr]
1979    comment=2, mflag value, "flags"
1980
1981label=AUE_UNLINK
1982  format=path:[attr]
1983
1984label=AUE_UNLINKAT
1985  see=openat(2)
1986  format=path:[path_attr]:[attr]
1987
1988label=AUE_UNMOUNT
1989  skip=Not used.
1990
1991label=AUE_UTIME
1992  format=path:[attr]
1993
1994label=AUE_UTIMES
1995  format=path:[attr]
1996
1997label=AUE_VFORK
1998  format=arg1
1999    comment=0, pid, "child PID"
2000  note=The vfork(2) return values are undefined because the audit record is
2001  note=produced at the point that the child process is spawned.
2002
2003label=AUE_VPIXSYS
2004  skip=Not used.
2005
2006label=AUE_VTRACE
2007  skip=Not used.
2008
2009label=AUE_WRITE
2010  format=path1:attr
2011    comment=if no path, argument -- "1, file descriptor, "no path: fd"
2012  note:An audit record is generated for write only once per file close.
2013
2014label=AUE_WRITEV
2015  skip=Not used. (obsolete)
2016
2017label=AUE_XMKNOD
2018  skip=Not used.  xmknod() generates AUE_MKNOD
2019
2020label=AUE_XSTAT
2021  skip=Not Used.  xstat() generates AUE_STAT.
2022
2023label=AUE_PF_POLICY_ADDRULE
2024  title=Add IPsec policy rule
2025  see=
2026  syscall=none
2027  format=arg1:arg2:[zone]3:[text]4
2028  comment=Operation applied to active policy (1 is active, 0 is inactive):
2029  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2030  comment=affected zone:
2031  comment=Name of target tunnel
2032
2033label=AUE_PF_POLICY_DELRULE
2034  title=Delete IPsec policy rule
2035  see=
2036  syscall=none
2037  format=arg1:arg2:[zone]3:[text]4
2038  comment=Operation applied to active policy (1 is active, 0 is inactive):
2039  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2040  comment=affected zone:
2041  comment=Name of target tunnel
2042
2043label=AUE_PF_POLICY_CLONE
2044  title=Clone IPsec policy
2045  see=
2046  syscall=none
2047  format=arg1:arg2:[zone]3:[text]4
2048  comment=Operation applied to active policy (1 is active, 0 is inactive):
2049  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2050  comment=affected zone:
2051  comment=Name of target tunnel
2052
2053label=AUE_PF_POLICY_FLIP
2054  title=Flip IPsec policy
2055  see=
2056  syscall=none
2057  format=arg1:arg2:[zone]3:[text]4
2058  comment=Operation applied to active policy (1 is active, 0 is inactive):
2059  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2060  comment=affected zone:
2061  comment=Name of target tunnel
2062
2063label=AUE_PF_POLICY_FLUSH
2064  title=Flip IPsec policy rules
2065  see=
2066  syscall=none
2067  format=arg1:arg2:[zone]3:[text]4
2068  comment=Operation applied to active policy (1 is active, 0 is inactive):
2069  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2070  comment=affected zone:
2071  comment=Name of target tunnel
2072
2073label=AUE_PF_POLICY_ALGS
2074  title=Update IPsec algorithms
2075  see=
2076  syscall=none
2077  format=arg1:arg2:[zone]3:[text]4
2078  comment=Operation applied to active policy (1 is active, 0 is inactive):
2079  comment=Operation applied to global policy (1 is global, 0 is tunnel):
2080  comment=affected zone:
2081  comment=Name of target tunnel
2082
2083label=AUE_allocate_fail
2084  program=/usr/sbin/allocate
2085  title=allocate: allocate-device failure
2086  format=(0..n)[text]1
2087    comment=command line arguments
2088# see audit_allocate.c
2089
2090label=AUE_allocate_succ
2091  program=/usr/sbin/allocate
2092  title=allocate: allocate-device success
2093  format=(0..n)[text]1
2094    comment=command line arguments
2095# see audit_allocate.c
2096
2097label=AUE_at_create
2098  program=/usr/bin/at
2099  title=at: at-create crontab
2100  format=path
2101
2102label=AUE_at_delete
2103  program=/usr/bin/at
2104  title=at: at-delete atjob (at or atrm)
2105  format=text1:path
2106  comment="ancillary file&colon;" filename or "bad format of at-job name"
2107
2108label=AUE_at_perm
2109  skip=Not used.
2110# not referenced outside uevents.h
2111
2112label=AUE_create_user
2113  skip=Not used.
2114
2115label=AUE_cron_invoke
2116  program=/usr/sbin/cron
2117  title=cron: cron-invoke at or cron
2118  case=If issue with account find
2119  format=text1
2120    comment="bad user" name or "user <name> account expired"
2121  case=else
2122  format=text1:text2
2123    comment="at-job", "batch-job", "crontab-job", "queue-job (<queue_name>)", \
2124      or "unknown job type (<job_type_id>)":
2125    comment=command
2126
2127label=AUE_crontab_create
2128  program=/usr/bin/crontab
2129  title=crontab: crontab created
2130  format=path
2131# See audit_crontab.c
2132
2133label=AUE_crontab_delete
2134  program=/usr/bin/crontab
2135  title=crontab: crontab delete
2136  format=path
2137# See audit_crontab.c
2138
2139label=AUE_crontab_mod
2140  program=/usr/bin/crontab
2141  title=crontab:  crontab modify
2142  format=path
2143# See audit_crontab.c
2144
2145label=AUE_crontab_perm
2146  skip=Not used.
2147
2148label=AUE_deallocate_fail
2149  program=/usr/sbin/deallocate
2150  title=deallocate-device failure
2151  format=(0..n)[text]1
2152    comment=command line arguments
2153# See audit_allocate.c
2154
2155label=AUE_deallocate_succ
2156  program=/usr/sbin/deallocate
2157  title=deallocate-device success
2158  format=(0..n)[text]1
2159    comment=command line arguments
2160# See audit_allocate.c
2161
2162label=AUE_delete_user
2163  skip=Not used.
2164
2165label=AUE_disable_user
2166  skip=Not used.
2167
2168label=AUE_enable_user
2169  skip=Not used.
2170
2171label=AUE_ftpd
2172  program=/usr/sbin/in.ftpd
2173  title=in.ftpd
2174  format=[text]1
2175    comment=error message
2176# See audit_ftpd
2177
2178label=AUE_ftpd_logout
2179  program=/usr/sbin/in.ftpd
2180  title=in.ftpd
2181  format=user
2182# See audit_ftpd
2183
2184label=AUE_halt_solaris
2185  program=/usr/sbin/halt
2186  title=halt
2187  format=user
2188# See audit_halt.c
2189
2190label=AUE_kadmind_auth
2191  format=text1:text2:text3
2192    comment=Op&colon; <requested information>:
2193    comment=Arg&colon; <argument for Op>:
2194    comment=Client&colon; <client principal name>
2195# See audit_kadmin.c / common_audit()
2196
2197label=AUE_kadmind_unauth
2198  format=text1:text2:text3
2199    comment=Op&colon; <requested information>:
2200    comment=Arg&colon; <argument for Op>:
2201    comment=Client&colon; <client principal name>
2202# See audit_kadmin.c / common_audit()
2203
2204label=AUE_krb5kdc_as_req
2205  format=text1:text2
2206    comment=Client&colon; <client principal name>:
2207    comment=Service&colon; <requested service name>
2208# See audit_krb5kdc.c / common_audit()
2209
2210label=AUE_krb5kdc_tgs_req
2211  format=text1:text2
2212    comment=Client&colon; <client principal name>:
2213    comment=Service&colon; <requested service name>
2214# See audit_krb5kdc.c / common_audit()
2215
2216label=AUE_krb5kdc_tgs_req_alt_tgt
2217  format=text1:text2
2218    comment=Client&colon; <client principal name>:
2219    comment=Service&colon; <requested service name>
2220# See audit_krb5kdc.c / common_audit()
2221
2222label=AUE_krb5kdc_tgs_req_2ndtktmm
2223  format=text1:text2
2224    comment=Client&colon; <client principal name>:
2225    comment=Service&colon; <requested service name>
2226# See audit_krb5kdc.c / common_audit()
2227
2228label=AUE_listdevice_fail
2229  title=allocate-list devices failure
2230  program=/usr/sbin/allocate
2231  format=(0..n)[text]1
2232    comment=command line arguments
2233# See audit_allocate.c
2234
2235label=AUE_listdevice_succ
2236  title=allocate-list devices success
2237  program=/usr/sbin/allocate
2238  format=(0..n)[text]1
2239    comment=command line arguments
2240# See audit_allocate.c
2241
2242label=AUE_modify_user
2243  skip=Not used.
2244
2245label=AUE_mountd_mount
2246  title=mountd: NFS mount
2247  program=/usr/lib/nfs/mountd
2248  see=mountd(1M)
2249  format=text1:path2
2250    comment=remote client hostname:
2251    comment=mount dir
2252# See audit_mountd.c
2253
2254label=AUE_mountd_umount
2255  title=mountd: NFS unmount
2256  program=/usr/lib/nfs/mountd
2257  format=text1:path2
2258  comment=remote client hostname:
2259  comment=mount dir
2260# See audit_mountd.c
2261
2262label=AUE_poweroff_solaris
2263  program=/usr/sbin/poweroff
2264  title=poweroff
2265  format=user
2266# See audit_halt.c
2267
2268label=AUE_reboot_solaris
2269  program=/usr/sbin/reboot
2270  title=reboot
2271  format=user
2272# See audit_reboot.c
2273#	header,61,2,reboot(1m),,Fri Nov 09 13:52:34 2001, + 726 msec
2274#	subject,tuser1,root,other,root,other,10422,497,0 0 tmach2
2275#	return,success,0
2276
2277label=AUE_rexd
2278  program=/usr/sbin/rpc.rexd
2279  title=rpc.rexd
2280  format=[text]1:text2:text3:[text]4:[text]5
2281    comment=error message (failure only):
2282    comment="Remote execution requested by&colon;" hostname:
2283    comment="Username&colon;" username:
2284    comment="User id&colon;" user ID (failure only):
2285    comment="Command line&colon;" command attempted
2286# See audit_rexd.c
2287
2288label=AUE_rexecd
2289  program=/usr/sbin/rpc.rexecd
2290  title=rpc.rexecd
2291  format=[text]1:text2:text3:text4
2292    comment=error message (failure only):
2293    comment="Remote execution requested by&colon;" hostname:
2294    comment="Username&colon;" username:
2295    comment="Command line&colon;" command attempted
2296# See audit_rexecd.c
2297
2298label=AUE_rshd
2299  program=/usr/sbin/in.rshd
2300  title=in.rshd
2301  format=text1:text2:[text]3:[text]4
2302    comment="cmd" command:
2303    comment="remote user" remote user:
2304    comment="local user" local user:
2305    comment=failure message
2306# See audit_rshd.c
2307
2308label=AUE_shutdown_solaris
2309  title=shutdown
2310  program=/usr/ucb/shutdown
2311  format=user
2312# See audit_shutdown.c
2313
2314label=AUE_smserverd
2315  program=/usr/lib/smedia/rpc.smserverd
2316  format=[text]1:[text]2
2317    comment=state change:
2318    comment=vid, pid, major/minor device
2319# see usr/src/cmd/smserverd
2320# code shows a third token, path, but it isn't implemented.
2321
2322label=AUE_uadmin_solaris
2323  title=uadmin (obsolete)
2324  program=
2325  see=
2326  format=text1:text2
2327  comment=function code:
2328  comment=argument code
2329# not used. Replaced by AUE_uadmin_* events, see uadmin.c, adt.xml
2330
2331label=AUE_LABELSYS_TNRH
2332  title=config Trusted Network remote host cache
2333  see=tnrh(2)
2334  syscall=labelsys: TSOL_TNRH
2335  case=With the flush command (cmd=3)
2336    format=arg1
2337      comment=1, command, "cmd"
2338  case=With the load (cmd=1) and delete (cmd=2) commands
2339    format=arg1:inaddr2:arg3
2340      comment=1, command, "cmd":
2341      comment=ip address of host:
2342      comment=2, prefix length, "prefix len"
2343
2344label=AUE_LABELSYS_TNRHTP
2345  title=config Trusted Network remote host template
2346  see=tnrhtp(2)
2347  syscall=labelsys: TSOL_TNRHTP
2348  case=With the flush command (cmd=3)
2349    format=arg1
2350      comment=1, command, "cmd"
2351  case=With the load (cmd=1) and delete (cmd=2) commands
2352    format=arg1:text2
2353      comment=1, command, "cmd":
2354      comment=name of template
2355
2356label=AUE_LABELSYS_TNMLP
2357  title=config Trusted Network multi-level port entry
2358  see=tnmlp(2)
2359  syscall=labelsys: TSOL_TNMLP
2360  case=With the flush command (cmd=3)
2361    format=arg1:text2
2362      comment=1, command, "cmd":
2363      comment="shared", or name of zone
2364  case=With the load (cmd=1) and delete (cmd=2) commands
2365    format=arg1:text2:arg3:arg4:[arg]5
2366      comment=1, command, "cmd":
2367      comment="shared", or name of zone:
2368      comment=2, protocol number, "proto num":
2369      comment=2, starting mlp port number, "mlp_port":
2370      comment=2, ending mlp port number, "mlp_port_upper"
2371