1# audit_record_attr.txt 2# Two "#" are comments that are copied to audit_record_attr 3# other comments are removed. 4## 5## Copyright 2010 Sun Microsystems, Inc. All rights reserved. 6## Use is subject to license terms. 7## 8## CDDL HEADER START 9## 10## The contents of this file are subject to the terms of the 11## Common Development and Distribution License (the "License"). 12## You may not use this file except in compliance with the License. 13## 14## You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 15## or http://www.opensolaris.org/os/licensing. 16## See the License for the specific language governing permissions 17## and limitations under the License. 18## 19## When distributing Covered Code, include this CDDL HEADER in each 20## file and include the License file at usr/src/OPENSOLARIS.LICENSE. 21## If applicable, add the following below this CDDL HEADER, with the 22## fields enclosed by brackets "[]" replaced with your own identifying 23## information: Portions Copyright [yyyy] [name of copyright owner] 24## 25## CDDL HEADER END 26## 27## 28 29# source file for describing audit records. 30 31# This file is in two sections. The first is a list of attribute / 32# value pairs used to provide short cuts in annotating the audit 33# records. The second is for annotation for each audit record. 34 35# first section: general attributes 36 37# skipClass=<class name of items to skip if only in that class> 38# skipClass=no # uncomment to filter unused events 39 40# token name abbreviations 41# token=alias:fullname -- short names for key tokens 42 43token=arg:argument 44token=attr:attribute 45token=acl:acl_entry 46token=cmd:command 47token=data:data 48token=exec_args:exec_arguments 49token=exec_env:exec_environment 50token=group:group 51token=inaddr:ip_addr 52token=inet:socket 53token=ipc:ipc 54token=ipc_perm:ipc_perm 55token=newgroup:newgroups 56token=path:path 57token=path_attr:attribute_path 58token=privset:privilege 59token=proc:process 60token=text:text 61token=tid:terminal_adr 62token=uauth:use_of_authorization 63token=upriv:use_of_privilege 64token=zone:zonename 65token=fmri:service_instance 66token=label:mandatory_label 67 68token=head:header 69token=subj:subject 70token=ret:return 71token=exit:exit 72 73# note names -- certain notes show up repeatedly; collected here 74# 75# To achieve the maximum line length to be less than 80 characters, the 76# note names (message=) can be defined as a multi line, each line except the 77# last one finished with the backslash character. 78 79message=ipc_perm:The ipc and ipc_perm tokens are not included if \ 80 the message ID is not valid. 81 82 83# basic record pattern ("insert" is where event-specific tokens 84# are listed.) 85 86kernel=head:insert:subj:[upriv]:ret 87user=head:subj:insert:ret 88 89# Second Section 90# Annotation Section 91# 92# Most audit records need annotation beyond what is provided by 93# the files audit_event and audit_class. At a minimum, a record 94# is represented by a label and a format. 95# 96# label=record_id like AUE_ACCEPT 97# format=token_alias 98# 99# there is no end line; a new label= end the preceding definition 100# and starts the next. 101# 102# format values are a list of token names, separated by colons. The 103# name is either one of the values described above (token=) or is 104# a value to be taken literally. If a token name ends with a digit, 105# the digit is an index into an array of comments. In the few cases 106# where there are no tokens (other than header, subject, return/exit), 107# use "format=kernel" or "format="user". 108# 109# comment is an array of strings separated by colons. If comments 110# are listed on separate lines (recommended due to better 111# readability/sustainability of the file), the preceding comment 112# must end with a colon. The array starts at 1. (If the comment 113# contains a colon, use ":" without the quotes.) 114# 115# case is used to generate alternate descriptions for a given 116# record. 117# 118# Constraints - the string length; bear in mind, that any annotation of 119# primitives below longer than is specified, will be silently truncated 120# to given/defined amount of characters in the auditrecord(1M) runtime: 121# 122# primitive <= max (non-truncated) string length 123# case <= unlimited; if necessary, text continues on a new line 124# comment <= unlimited; if necessary, text continues on a new line 125# label <= 43 126# note <= unlimited; if necessary, text continues on a new line 127# program <= 20 128# see <= 39 129# syscall <= 20 130# title <= 46 131# token <= 28 (full name) 132# 133# To achieve the maximum line length to be less than 80 characters, one can 134# define the unlimited primitives as a multi line, each line except the 135# last one finished with the backslash character. In addition to above 136# mentioned, the "format=" record attribute follows the same rule. 137# 138# 139# AUE_ACCEPT illustrates the use of all the above. Note that 140# case is not nested; ellipsis (...) is used to give the effect 141# of nesting. 142 143label=AUE_ACCEPT 144#accept(2) failure 145 case=Invalid socket file descriptor 146 format=arg1 147 comment=1, file descriptor, "so" 148#accept(2) non SOCK_STREAM socket 149 case=If the socket address is not part of the AF_INET family 150 format=arg1:arg2:arg3 151 comment=1, "so", file descriptor: 152 comment="family", so_family: 153 comment="type", so_type 154 case=If the socket address is part of the AF_INET family 155 case=...If there is no vnode for this file descriptor 156 format=[arg]1 157 comment=1, file descriptor, "Bad so" 158#accept(2) SOCK_STREAM socket-not bound 159 case=...or if the socket is not bound 160 format=[arg]1:[inet]2 161 comment=1, file descriptor, "so": 162 comment=local/foreign address (0.0.0.0) 163 case=...or if the socket address length = 0 164 format=[arg]1:[inet]2 165 comment=1, file descriptor, "so": 166 comment=local/foreign address (0.0.0.0) 167 case=...or for all other conditions 168 format=inet1:[inet]1 169 comment=socket address 170#accept(2) failure 171# header 172# au_to_arg32 "so",file descriptor 173# subject 174# return <errno != 0> 175# 176#accept(2) non SOCK_STREAM socket 177# header 178# au_to_arg32 "so", file descriptor 179# au_to_arg32 "family", so_family 180# au_to_arg32 "type", so_type 181# subject 182# return success 183# 184#accept(2) SOCK_STREAM socket-not bound 185# header 186# au_to_arg32 "so", file descriptor 187# au_to_socket_ex local/foreign address (0.0.0.0) 188# subject 189# return success 190# 191#accept(2) SOCK_STREAM socket-bound 192# header 193# au_to_arg32 "so", file descriptor 194# au_to_socket_ex 195# subject 196# return success 197 198 199 200label=AUE_ACCESS 201 format=path1:[attr] 202 comment=may be truncated in failure case 203# header,163,2,access(2),,Wed Apr 25 13:52:49 2001, + 750000733 msec 204# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_succ 205# attribute,100777,41416,staff,8388608,402255,0 206# subject,tuser10,tuser10,other,tuser10,other,1297,322,255 131585 129.146.89.30 207# return,success,0 208# trailer,163 209# 210# header,163,2,access(2),,Wed Apr 25 13:53:02 2001, + 490000427 msec 211# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail 212# attribute,100000,root,other,8388608,402257,0 213# subject,tuser10,tuser10,other,tuser10,other,1433,322,255 131585 129.146.89.30 214# return,failure: Permission denied,-1 215# trailer,163 216# 217# header,135,2,access(2),,Wed Apr 25 13:53:15 2001, + 10000329 msec 218# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail2 219# subject,tuser10,tuser10,other,tuser10,other,1553,322,255 131585 129.146.89.30 220# return,failure: No such file or directory,-1 221# trailer,135 222 223label=AUE_ACCT 224 case=Zero path 225 format=arg1 226 comment=1, 0, "accounting off" 227 case=Non-zero path 228 format=path1:[attr]2 229 comment=may be truncated in failure case: 230 comment=omitted if failure 231 232label=AUE_ACLSET 233 syscall=acl 234 format=arg1:arg2:(0..n)[acl]3 235 comment=2, SETACL, "cmd": 236 comment=3, number of ACL entries, "nentries": 237 comment=Access Control List entries 238 239label=AUE_ADJTIME 240 format=kernel 241 242label=AUE_ASYNC_DAEMON 243 skip=Not used 244 245label=AUE_ASYNC_DAEMON_EXIT 246 skip=Not used 247 248label=AUE_AUDIT 249 skip=Not used. (Placeholder for the set AUE_AUDIT_*.) 250 251label=AUE_AUDITON 252 skip=Not used. (Placeholder for the set AUE_AUDITON_*.) 253 254label=AUE_AUDITON_GESTATE 255 skip=Not used 256 257label=AUE_AUDITON_GETCAR 258 format=kernel 259 syscall=auditon: GETCAR 260# header,68,2,auditon(2) - get car,,Wed Apr 25 13:49:02 2001, + 710001279 msec 261# subject,tuser10,root,other,root,other,966,322,255 131585 129.146.89.30 262# return,success,0 263# trailer,68 264 265label=AUE_AUDITON_GETCLASS 266 format=kernel 267 syscall=auditon: GETCLASS 268# header,68,2,auditon(2) - get event class,,Mon May 15 09:14:35 2000, + 30001063 msec 269# subject,tuser10,root,other,root,other,1091,367,255 197121 tmach1 270# return,success,0 271# trailer,68 272 273label=AUE_AUDITON_GETCOND 274 format=kernel 275 syscall=auditon: GETCOND 276# header,68,2,auditon(2) - get audit state,,Mon May 15 09:14:48 2000, + 110001736 msec 277# subject,tuser10,root,other,root,other,1248,367,255 197121 tmach1 278# return,success,0 279# trailer,68 280 281label=AUE_AUDITON_GETCWD 282 format=kernel 283 syscall=auditon: GETCWD 284# header,68,2,auditon(2) - get cwd,,Mon May 15 09:15:01 2000, + 120001223 msec 285# subject,tuser10,root,other,root,other,1405,367,255 197121 tmach1 286# return,success,0 287# trailer,68 288 289label=AUE_AUDITON_GETKMASK 290 format=kernel 291 syscall=auditon: GETKMASK 292# header,68,2,auditon(2) - get kernel mask,,Mon May 15 09:15:14 2000, + 220002225 msec 293# subject,tuser10,root,other,root,other,1562,367,255 197121 tmach1 294# return,success,0 295# trailer,68 296 297label=AUE_AUDITON_GETSTAT 298 format=kernel 299 syscall=auditon: A_GETSTAT 300# header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:27 2000, + 220003386 msec 301# subject,tuser10,root,other,root,other,1719,367,255 197121 tmach1 302# return,success,0 303# trailer,68 304 305label=AUE_AUDITON_GPOLICY 306 format=kernel 307 syscall=auditon: GPOLICY 308# header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:40 2000, + 120004056 msec 309# subject,tuser10,root,other,root,other,1879,367,255 197121 tmach1 310# return,success,0 311# trailer,68 312 313label=AUE_AUDITON_GQCTRL 314 format=kernel 315 syscall=auditon: GQCTRL 316# header,68,2,auditon(2) - GQCTRL command,,Mon May 15 09:15:53 2000, + 20001415 msec 317# subject,tuser10,root,other,root,other,2033,367,255 197121 tmach1 318# return,success,0 319# trailer,68 320 321 322label=AUE_AUDITON_GTERMID 323 skip=Not used. 324 325label=AUE_AUDITON_SESTATE 326 skip=Not used. 327 328label=AUE_AUDITON_SETCLASS 329 format=[arg]1:[arg]2 330 comment=2, "setclass:ec_event", event number: 331 comment=3, "setclass:ec_class", class mask 332 syscall=auditon: SETCLASS 333# header,120,2,auditon(2) - set event class,,Mon May 15 09:16:39 2000, + 800002966 msec 334# argument,2,0x0,setclass:ec_event 335# argument,3,0x0,setclass:ec_class 336# subject,tuser10,root,other,root,other,2190,367,255 197121 tmach1 337# return,success,0 338# trailer,120 339 340label=AUE_AUDITON_SETCOND 341 format=[arg]1 342 comment=3, "setcond", audit state 343 syscall=auditon: SETCOND 344 345label=AUE_AUDITON_SETKMASK 346 format=[arg]1:[arg]2 347 comment=2, "setkmask as_success", kernel mask: 348 comment=2, "setkmask as_failure", kernel mask 349 syscall=auditon: SETKMASK 350# header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:06 2000, + 300000807 msec 351# argument,2,0x0,setkmask:as_success 352# argument,2,0x0,setkmask:as_failure 353# subject,tuser10,root,other,root,other,2506,367,255 197121 tmach1 354# return,success,0 355# trailer,124 356# header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:20 2000, + 430001289 msec 357# argument,2,0x0,setkmask:as_success 358# argument,2,0x0,setkmask:as_failure 359# subject,tuser10,tuser10,other,root,other,2620,367,255 197121 tmach1 360# return,failure: Not owner,-1 361# trailer,124 362 363label=AUE_AUDITON_SETSMASK 364 format=[arg]1:[arg]2 365 comment=3, "setsmask:as_success", session ID mask: 366 comment=3, "setsmask:as_failure", session ID mask 367 syscall=auditon: SETSMASK 368# header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:33 2000, + 580000668 msec 369# argument,3,0x400,setsmask:as_success 370# argument,3,0x400,setsmask:as_failure 371# subject,tuser10,root,other,root,other,2777,367,255 197121 tmach1 372# return,success,0 373# trailer,124 374# header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:45 2000, + 700001710 msec 375# argument,3,0x400,setsmask:as_success 376# argument,3,0x400,setsmask:as_failure 377# subject,tuser10,tuser10,other,root,other,2885,367,255 197121 tmach1 378# return,failure: Not owner,-1 379# trailer,124 380 381label=AUE_AUDITON_SETSTAT 382 format=kernel 383 syscall=auditon: SETSTAT 384# header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:17:58 2000, + 930000818 msec 385# subject,tuser10,root,other,root,other,3042,367,255 197121 tmach1 386# return,success,0 387# trailer,68 388# header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:18:13 2000, + 160001101 msec 389# subject,tuser10,tuser10,other,root,other,3156,367,255 197121 tmach1 390# return,failure: Not owner,-1 391# trailer,68 392 393label=AUE_AUDITON_SETUMASK 394 format=[arg]1:[arg]2 395 comment=3, "setumask:as_success", audit ID mask: 396 comment=3, "setumask:as_failure", audit ID mask 397 syscall=auditon: SETUMASK 398# header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:26 2000, + 670003527 msec 399# argument,3,0x400,setumask:as_success 400# argument,3,0x400,setumask:as_failure 401# subject,tuser10,root,other,root,other,3313,367,255 197121 tmach1 402# return,success,0 403# trailer,124 404# header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:38 2000, + 740000732 msec 405# argument,3,0x400,setumask:as_success 406# argument,3,0x400,setumask:as_failure 407# subject,tuser10,tuser10,other,root,other,3421,367,255 197121 tmach1 408# return,failure: Not owner,-1 409# trailer,124 410 411label=AUE_AUDITON_SPOLICY 412 format=[arg]1 413 comment=1, audit policy flags, "setpolicy" 414 syscall=auditon: SPOLICY 415# header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:18:54 2000, + 840 msec 416# argument,3,0x200,setpolicy 417# subject,tuser10,root,other,root,other,3584,367,255 197121 tmach1 418# return,success,0 419# trailer,86 420# header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:19:08 2000, + 200002798 msec 421# argument,3,0x200,setpolicy 422# subject,tuser10,tuser10,other,root,other,3698,367,255 197121 tmach1 423# return,failure: Not owner,-1 424# trailer,86 425 426label=AUE_AUDITON_SQCTRL 427 format=[arg]1:[arg]2:[arg]3:[arg]4 428 comment=3, "setqctrl:aq_hiwater", queue control param.: 429 comment=3, "setqctrl:aq_lowater", queue control param.: 430 comment=3, "setqctrl:aq_bufsz", queue control param.: 431 comment=3, "setqctrl:aq_delay", queue control param. 432 syscall=auditon: SQCTRL 433# header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:23 2000, + 610001124 msec 434# argument,3,0x64,setqctrl:aq_hiwater 435# argument,3,0xa,setqctrl:aq_lowater 436# argument,3,0x400,setqctrl:aq_bufsz 437# argument,3,0x14,setqctrl:aq_delay 438# subject,tuser10,root,other,root,other,3861,367,255 197121 tmach1 439# return,success,0 440# trailer,176 441# header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:35 2000, + 720003197 msec 442# argument,3,0x64,setqctrl:aq_hiwater 443# argument,3,0xa,setqctrl:aq_lowater 444# argument,3,0x400,setqctrl:aq_bufsz 445# argument,3,0x14,setqctrl:aq_delay 446# subject,tuser10,tuser10,other,root,other,3969,367,255 197121 tmach1 447# return,failure: Not owner,-1 448# trailer,176 449 450label=AUE_AUDITON_STERMID 451 skip=Not used. 452 453label=AUE_AUDITSTAT 454 skip=Not used. 455 456label=AUE_AUDITSVC 457 skip=Not used. 458 459label=AUE_AUDITSYS 460 skip=Not used. (Place holder for various auditing events.) 461 462label=AUE_BIND 463# differs from documented version. 464# cases "no vnode" not fully confirmed 465# family and type need argument number 466 case=Invalid socket handle 467 format=arg1 468 comment=1, file descriptor, "so" 469 case=If there is no vnode for this file descriptor 470 case=or if the socket is not of the AF_INET family 471 format=arg1:arg2:arg3 472 comment=1, file descriptor, "so": 473 comment=1, socket family, "family": 474 comment=1, socket type, "type" 475 case=or for all other conditions 476 format=arg1:inet2 477 comment=1, file descriptor, "so": 478 comment=socket address 479 480label=AUE_BRANDSYS 481# generic mechanism to allow user-space and kernel components of a brand 482# to communicate. The interpretation of the arguments to the call is 483# left entirely up to the brand. 484 format=arg1:arg2:arg3:arg4:arg5:arg6:arg7 485 comment=1, command, "cmd": 486 comment=2, command args, "arg": 487 comment=3, command args, "arg": 488 comment=4, command args, "arg": 489 comment=5, command args, "arg": 490 comment=6, command args, "arg": 491 comment=7, command args, "arg" 492 493label=AUE_BSMSYS 494 skip=Not used. 495 496label=AUE_CHDIR 497 format=path:[attr] 498# header,151,2,chdir(2),,Mon May 15 09:20:15 2000, + 70000899 msec 499# path,/export/home/CC_final/icenine/arv/chdir/obj_succ 500# attribute,40777,root,other,8388608,231558,0 501# subject,tuser10,tuser10,other,root,other,4436,367,255 197121 tmach1 502# return,success,0 503# trailer,151 504# header,151,2,chdir(2),,Mon May 15 09:20:27 2000, + 640003327 msec 505# path,/export/home/CC_final/icenine/arv/chdir/obj_fail 506# attribute,40000,root,other,8388608,237646,0 507# subject,tuser10,tuser10,other,root,other,4566,367,255 197121 tmach1 508# return,failure: Permission denied,-1 509# trailer,151 510 511label=AUE_CHMOD 512 format=arg1:path:[attr] 513 comment=2, mode, "new file mode" 514# header,173,2,chmod(2),,Mon May 15 09:20:41 2000, + 140000831 msec 515# argument,2,0x1f8,new file mode 516# path,/export/home/CC_final/icenine/arv/chmod/obj_succ 517# attribute,100770,tuser10,other,8388608,243608,0 518# subject,tuser10,tuser10,other,root,other,4748,367,255 197121 tmach1 519# return,success,0 520# trailer,173 521# header,173,2,chmod(2),,Mon May 15 09:20:54 2000, + 400001156 msec 522# argument,2,0x1f8,new file mode 523# path,/export/home/CC_final/icenine/arv/chmod/obj_fail 524# attribute,100600,root,other,8388608,243609,0 525# subject,tuser10,tuser10,other,root,other,4879,367,255 197121 tmach1 526# return,failure: Not owner,-1 527# trailer,173 528 529label=AUE_CHOWN 530 format=arg1:arg2 531 comment=2, uid, "new file uid": 532 comment=3, gid, "new file gid" 533# header,193,2,chown(2),,Mon May 15 09:21:07 2000, + 930000756 msec 534# argument,2,0x271a,new file uid 535# argument,3,0xffffffff,new file gid 536# path,/export/home/CC_final/icenine/arv/chown/obj_succ 537# attribute,100644,tuser10,other,8388608,268406,0 538# subject,tuser10,tuser10,other,root,other,5062,367,255 197121 tmach1 539# return,success,0 540# trailer,193 541# header,193,2,chown(2),,Mon May 15 09:21:20 2000, + 430001153 msec 542# argument,2,0x271a,new file uid 543# argument,3,0xffffffff,new file gid 544# path,/export/home/CC_final/icenine/arv/chown/obj_fail 545# attribute,100644,root,other,8388608,268407,0 546# subject,tuser10,tuser10,other,root,other,5191,367,255 197121 tmach1 547# return,failure: Not owner,-1 548# trailer,193 549 550label=AUE_CHROOT 551 format=path:[attr] 552# header,104,2,chroot(2),,Mon May 15 09:21:33 2000, + 860001094 msec 553# path,/ 554# attribute,40755,root,root,8388608,2,0 555# subject,tuser10,root,other,root,other,5370,367,255 197121 tmach1 556# return,success,0 557# trailer,104 558# header,152,2,chroot(2),,Mon May 15 09:21:46 2000, + 130002435 msec 559# path,/export/home/CC_final/icenine/arv/chroot/obj_fail 560# attribute,40777,tuser10,other,8388608,335110,0 561# subject,tuser10,tuser10,other,root,other,5499,367,255 197121 tmach1 562# return,failure: Not owner,-1 563# trailer,152 564 565label=AUE_CLOCK_SETTIME 566 format=kernel 567 568label=AUE_CLOSE 569 format=arg1:[path]:[attr] 570 comment=1, file descriptor, "fd" 571 572label=AUE_CONFIGKSSL 573 case=Adding KSSL entry. 574 format=text1:inaddr2:text3:text4 575 comment=opcode, KSSL_ADD_ENTRY: 576 comment=local IP address: 577 comment=SSL port number: 578 comment=proxy port number 579 case=Deleting KSSL entry. 580 format=text1:inaddr2:text3 581 comment=opcode, KSSL_DELETE_ENTRY: 582 comment=local IP address: 583 comment=SSL port number 584 585label=AUE_CONNECT 586# cases "no vnode" not fully confirmed 587 case=If there is no vnode for this file descriptor 588 case=If the socket address is not part of the AF_INET family 589 format=arg1:arg2:arg3 590 comment=1, file descriptor, "so": 591 comment=1, socket family, "family": 592 comment=1, socket type, "type" 593 case=If the socket address is part of the AF_INET family 594 format=arg1:inet2 595 comment=1, file descriptor, "so": 596 comment=socket address 597 598label=AUE_CORE 599 syscall=none 600 title=process dumped core 601 see=none 602 format=path:[attr]:arg1 603 comment=1, signal, "signal" 604# see uts/common/c2/audit.c 605 606label=AUE_CREAT 607# obsolete - see open(2) 608 format=path:[attr] 609# does not match old BSM manual 610# header,151,2,creat(2),,Mon May 15 09:21:59 2000, + 509998810 msec 611# path,/export/home/CC_final/icenine/arv/creat/obj_succ 612# attribute,100644,tuser10,other,8388608,49679,0 613# subject,tuser10,tuser10,other,root,other,5678,367,255 197121 tmach1 614# return,success,8 615# trailer,151 616# header,107,2,creat(2),,Mon May 15 09:22:12 2000, + 50001852 msec 617# path,/devices/pseudo/mm@0:null 618# subject,tuser10,root,other,root,other,5809,367,255 197121 tmach1 619# return,success,8 620# trailer,107 621# header,83,2,creat(2),,Mon May 15 09:22:12 2000, + 70001870 msec 622# path,/obj_fail 623# subject,tuser10,tuser10,other,root,other,5806,367,255 197121 tmach1 624# return,failure: Permission denied,-1 625# trailer,83 626 627label=AUE_CRYPTOADM 628 title=kernel cryptographic framework 629 format=text1:(0..n)[text]2 630 comment=cryptoadm command/operation: 631 comment=mechanism list 632 633label=AUE_DOORFS 634 skip=Not used. (Place holder for set of door audit events.) 635 636label=AUE_DOORFS_DOOR_BIND 637 skip=Not used. 638 syscall=doorfs: DOOR_BIND 639 640label=AUE_DOORFS_DOOR_CALL 641 format=arg1:proc2 642 comment=1, door ID, "door ID": 643 comment=for process that owns the door 644 syscall=doorfs: DOOR_CALL 645 646label=AUE_DOORFS_DOOR_CREATE 647 format=arg1 648 comment=1, door attributes, "door attr" 649 syscall=doorfs: DOOR_CREATE 650 651label=AUE_DOORFS_DOOR_CRED 652 skip=Not used. 653 syscall=doorfs: DOOR_CRED 654 655label=AUE_DOORFS_DOOR_INFO 656 skip=Not used. 657 syscall=doorfs: DOOR_INFO 658 659label=AUE_DOORFS_DOOR_RETURN 660 format=kernel 661 syscall=doorfs: DOOR_RETURN 662 663label=AUE_DOORFS_DOOR_REVOKE 664 format=arg1 665 comment=1, door ID, "door ID" 666 syscall=doorfs: DOOR_REVOKE 667 668label=AUE_DOORFS_DOOR_UNBIND 669 skip=Not used. 670 syscall=doorfs: DOOR_UNBIND 671 672label=AUE_DUP2 673skip=Not used. 674 675label=AUE_ENTERPROM 676 title=enter prom 677 syscall=none 678 format=head:text1:ret 679 comment="kmdb" 680# header,48,2,enter prom,na,tmach1,2004-11-12 09:07:41.342 -08:00 681# text,kmdb 682# return,success,0 683 684label=AUE_EXEC 685# obsolete - see execve(2) 686 format=path:[attr]1:[exec_args]2:[exec_env]3 687 comment=omitted on error: 688 comment=output if argv policy is set: 689 comment=output if arge policy is set 690 691label=AUE_EXECVE 692 format=path:[attr]1:[exec_args]2:[exec_env]3 693 comment=omitted on error: 694 comment=output if argv policy is set: 695 comment=output if arge policy is set 696# header,107,2,creat(2),,Mon May 15 09:22:25 2000, + 559997464 msec 697# path,/devices/pseudo/mm@0:null 698# subject,tuser10,root,other,root,other,5974,367,255 197121 tmach1 699# return,success,8 700# trailer,107 701# header,86,2,execve(2),,Mon May 15 09:22:25 2000, + 590003684 msec 702# path,/usr/bin/pig 703# subject,tuser10,tuser10,other,root,other,5971,367,255 197121 tmach1 704# return,failure: No such file or directory,-1 705# trailer,86 706 707label=AUE_EXIT 708 format=[text]1 709 comment=event aborted 710 711label=AUE_EXITPROM 712 title=exit prom 713 syscall=none 714 format=head:text1:ret 715 comment="kmdb" 716# header,48,2,exit prom,na,tmach1,2004-11-12 09:07:43.547 -08:00 717# text,kmdb 718# return,success,0 719 720label=AUE_EXPORTFS 721 skip=Not used. 722 723label=AUE_FACCESSAT 724# obsolete 725 see=access(2) 726 format=path:[attr] 727 728label=AUE_FACLSET 729 syscall=facl 730 case=Invalid file descriptor 731 format=arg1:arg2 732 comment=2, SETACL, "cmd": 733 comment=3, number of ACL entries, "nentries" 734 case=Zero path 735 format=arg1:arg2:arg3:[attr]:(0..n)[acl]4 736 comment=2, SETACL, "cmd": 737 comment=3, number of ACL entries, "nentries": 738 comment=1, file descriptor, "no path: fd": 739 comment=ACLs 740 case=Non-zero path 741 format=arg1:arg2:path:[attr]:(0..n)[acl]3 742 comment=2, SETACL, "cmd": 743 comment=3, number of ACL entries, "nentries": 744 comment=ACLs 745 746label=AUE_FCHDIR 747 format=[path]:[attr] 748# header,150,2,fchdir(2),,Mon May 15 09:22:38 2000, + 680001393 msec 749# path,/export/home/CC_final/icenine/arv/fchdir/obj_succ 750# attribute,40777,tuser10,other,8388608,207662,0 751# subject,tuser10,tuser10,other,root,other,6129,367,255 197121 tmach1 752# return,success,0 753# trailer,150 754# header,68,2,fchdir(2),,Mon May 15 09:22:51 2000, + 710001196 msec 755# subject,tuser10,tuser10,other,root,other,6258,367,255 197121 tmach1 756# return,failure: Permission denied,-1 757# trailer,68 758 759label=AUE_FCHMOD 760 case=With a valid file descriptor and path 761 format=arg1:path:[attr] 762 comment=2, mode, "new file mode" 763 case=With a valid file descriptor and invalid path 764 format=arg1:[arg]2:[attr] 765 comment=2, mode, "new file mode": 766 comment=1, file descriptor, "no path: fd" 767 case=With an invalid file descriptor 768 format=arg1 769 comment=2, mode, "new file mode" 770# header,168,2,fchmod(2),,Sat Apr 29 12:28:06 2000, + 350000000 msec 771# argument,2,0x1a4,new file mode 772# path,/export/home/CC/icenine/arv/fchmod/obj_succ 773# attribute,100644,tuser10,other,7602240,26092,0 774# subject,tuser10,tuser10,other,root,other,11507,346,16064 196866 tmach1 775# return,success,0 776# trailer,168 777# header,90,2,fchmod(2),,Sat Apr 29 12:28:32 2000, + 930000000 msec 778# argument,2,0x1a4,new file mode 779# subject,tuser10,tuser10,other,root,other,11759,346,16064 196866 tmach1 780# return,failure: Bad file number,-1 781# trailer,90 782# header,168,2,fchmod(2),,Sat Apr 29 12:28:20 2000, + 770000000 msec 783# argument,2,0x1a4,new file mode 784# path,/export/home/CC/icenine/arv/fchmod/obj_fail 785# attribute,100644,root,other,7602240,26093,0 786# subject,tuser10,tuser10,other,root,other,11644,346,16064 196866 tmach1 787# return,failure: Not owner,-1 788# trailer,168 789 790label=AUE_FCHOWN 791 case=With a valid file descriptor 792 format=arg1:arg2:[path]:[attr] 793 comment=2, uid, "new file uid": 794 comment=3, gid, "new file gid" 795 case=With an invalid file descriptor 796 format=arg1:arg2:[arg]3:[attr] 797 comment=2, uid, "new file uid": 798 comment=3, gid, "new file gid": 799 comment=1, file descriptor, "no path fd" 800 801label=AUE_FCHOWNAT 802# obsolete 803 see=openat(2) 804 case=With a valid absolute/relative file path 805 format=path:[attr] 806 case=With an file path eq. NULL and valid file descriptor 807 format=kernel 808 809label=AUE_FCHROOT 810 format=[path]:[attr] 811# fchroot -> chdirec -> audit_chdirec 812 813label=AUE_FCNTL 814 case=With a valid file descriptor 815 format=arg1:path:attr 816 comment=2, command, "cmd" 817 case=With an invalid file descriptor 818 format=arg1:arg2 819 comment=2, command, "cmd": 820 comment=1, file descriptor, "no path fd" 821 822label=AUE_FLOCK 823 skip=Not used. 824 825label=AUE_FORKALL 826 format=[arg]1 827 comment=0, pid, "child PID" 828 note=The forkall(2) return values are undefined because the audit record 829 note=is produced at the point that the child process is spawned. 830# see audit.c 831 832label=AUE_FORK1 833 format=[arg]1 834 comment=0, pid, "child PID" 835 note=The fork1(2) return values are undefined because the audit record 836 note=is produced at the point that the child process is spawned. 837# see audit.c 838 839label=AUE_FSAT 840# obsolete 841 skip=Not used. (Placeholder for AUE_*AT records) 842 843label=AUE_FSTAT 844 skip=Not used. 845 846label=AUE_FSTATAT 847# obsolete 848 format=path:[attr] 849 850label=AUE_FSTATFS 851 case=With a valid file descriptor 852 format=[path]:[attr] 853 case=With an invalid file descriptor 854 format=arg1 855 comment=1, file descriptor, "no path fd" 856 857label=AUE_FTRUNCATE 858 skip=Not used. 859 860label=AUE_FUSERS 861 syscall=utssys: UTS_FUSERS 862 format=path:attr 863 864label=AUE_FUTIMESAT 865# obsolete 866 format=[path]:[attr] 867 868label=AUE_GETAUDIT 869 format=kernel 870# header,68,2,getaudit(2),,Mon May 15 09:23:57 2000, + 620001408 msec 871# subject,tuser10,root,other,root,other,7063,367,255 197121 tmach1 872# return,success,0 873# trailer,68 874# header,68,2,getaudit(2),,Mon May 15 09:24:09 2000, + 490003700 msec 875# subject,tuser10,root,other,root,other,7158,367,255 197121 tmach1 876# return,success,0 877# trailer,68 878 879label=AUE_GETAUDIT_ADDR 880 format=kernel 881# header,73,2,getaudit_addr(2),,Thu Nov 08 15:14:01 2001, + 0 msec 882# subject,tuser1,root,staff,root,staff,9689,12289,0 0 tmach2 883# return,success,0 884 885label=AUE_GETAUID 886 format=kernel 887# header,68,2,getauid(2),,Mon May 15 09:24:22 2000, + 420000668 msec 888# subject,tuser10,root,other,root,other,7303,367,255 197121 tmach1 889# return,success,0 890# trailer,68 891# header,68,2,getauid(2),,Mon May 15 09:24:34 2000, + 490002988 msec 892# subject,tuser10,tuser10,other,root,other,7410,367,255 197121 tmach1 893# return,failure: Not owner,-1 894# trailer,68 895 896label=AUE_GETDENTS 897 skip=Not used. 898#Not security relevant 899 900label=AUE_GETKERNSTATE 901 skip=Not used. 902 903label=AUE_GETMSG 904 case=With a valid file descriptor 905 format=arg1:[path]:attr:arg2 906 comment=1, file descriptor, "fd": 907 comment=4, priority, "pri" 908 case=With an invalid file descriptor 909 format=arg1:arg2 910 comment=1, file descriptor, "fd": 911 comment=4, priority, "pri" 912 913label=AUE_GETPMSG 914 case=With a valid file descriptor 915 format=arg1:[path]:attr 916 comment=1, file descriptor, "fd" 917 case=With an invalid file descriptor 918 format=arg1 919 comment=1, file descriptor, "fd" 920 921label=AUE_GETPORTAUDIT 922 format=Not used. 923 924label=AUE_GETUSERAUDIT 925 skip=Not used. 926 927label=AUE_INST_SYNC 928 format=arg1 929 comment=2, flags value, "flags" 930 931label=AUE_IOCTL 932 case=With an invalid file descriptor 933 format=arg1:arg2:arg3 934 comment=1, file descriptor, "fd": 935 comment=2, command, "cmd": 936 comment=3, arg, "arg" 937 case=With a valid file descriptor 938 format=path:[attr]:arg1:arg2 939 comment=2, ioctl cmd, "cmd": 940 comment=3, ioctl arg, "arg" 941 case=Non-file file descriptor 942 format=arg1:arg2:arg3 943 comment=1, file descriptor, "fd": 944 comment=2, ioctl cmd, "cmd": 945 comment=3, ioctl arg, "arg" 946 case=Bad file name 947 format=arg1:arg2:arg3 948 comment=1, file descriptor, "no path: fd": 949 comment=2, ioctl cmd, "cmd": 950 comment=3, ioctl arg, "arg" 951# old BSM manual misses a case 952 953label=AUE_JUNK 954 skip=Not used. 955 956label=AUE_KILL 957 case=Valid process 958 format=arg1:[proc] 959 comment=2, signo, "signal" 960 case=Zero or negative process 961 format=arg1:arg2 962 comment=2, signo, "signal": 963 comment=1, pid, "process" 964 965label=AUE_KILLPG 966 skip=Not used. 967 968label=AUE_LCHOWN 969 format=arg1:arg2:path:[attr] 970 comment=2, uid, "new file uid": 971 comment=3, gid, "new file gid" 972 973label=AUE_LINK 974 format=path1:[attr]:path2 975 comment=from path: 976 comment=to path 977 978label=AUE_LSEEK 979 skip=Not used. 980 981label=AUE_LSTAT 982 format=path:[attr] 983 984label=AUE_LXSTAT 985# obsolete 986 skip=Not used. 987 988label=AUE_MCTL 989 skip=Not used. 990 991label=AUE_MEMCNTL 992 format=arg1:arg2:arg3:arg4:arg5:arg6 993 comment=1, base address, "base": 994 comment=2, length, "len": 995 comment=3, command, "cmd": 996 comment=4, command args, "arg": 997 comment=5, command attributes, "attr": 998 comment=6, 0, "mask" 999 1000label=AUE_MKDIR 1001 format=arg1:path:[attr] 1002 comment=2, mode, "mode" 1003 1004label=AUE_MKNOD 1005 format=arg1:arg2:path:[attr] 1006 comment=2, mode, "mode": 1007 comment=3, dev, "dev" 1008 1009label=AUE_MMAP 1010 case=With a valid file descriptor 1011 format=arg1:arg2:[path]3:[attr] 1012 comment=1, segment address, "addr": 1013 comment=2, segment address, "len": 1014 comment=if no path, then argument: \ 1015 1, "nopath: fd", file descriptor 1016 case=With an invalid file descriptor 1017 format=arg1:arg2:arg3 1018 comment=1, segment address, "addr": 1019 comment=2, segment address, "len": 1020 comment=1, file descriptor, "no path: fd" 1021 1022label=AUE_MODADDMAJ 1023 title=modctl: bind module 1024 syscall=modctl 1025 format=[text]1:[text]2:text3:arg4:(0..n)[text]5 1026 comment=driver major number: 1027 comment=driver name: 1028 comment=driver major number or "no drvname": 1029 comment=5, number of aliases, "": 1030 comment=aliases 1031 1032label=AUE_MODADDPRIV 1033 format=kernel 1034 1035label=AUE_MODCONFIG 1036 skip=Not used. 1037 1038label=AUE_MODCTL 1039 skip=Not used. (placeholder) 1040 1041label=AUE_MODDEVPLCY 1042 syscall=modctl 1043 title=modctl: set device policy 1044 case=If unknown minor name/pattern 1045 format=arg1:arg2:arg3:arg4:arg5 1046 comment=2, "major", major number: 1047 comment=2, "lomin", low minor number, if known: 1048 comment=2, "himin", hi minor number, if known: 1049 comment=privileges required for reading: 1050 comment=privileges required for writing 1051 case=else 1052 format=arg1:text2:arg3:arg4 1053 comment=2, "major", major number: 1054 comment=minor name/pattern: 1055 comment=privileges required for reading: 1056 comment=privileges required for writing 1057 1058label=AUE_MODLOAD 1059 syscall=modctl 1060 title=modctl: load module 1061 format=[text]1:text2 1062 comment=default path: 1063 comment=filename path 1064 1065label=AUE_MODUNLOAD 1066 syscall=modctl 1067 title=modctl: unload module 1068 format=arg1 1069 comment=1, module ID, "id" 1070 1071label=AUE_MOUNT 1072 case=UNIX file system 1073 format=arg1:text2:path:[attr] 1074 comment=3, flags, "flags": 1075 comment=filesystem type 1076 case=NFS file system 1077 format=arg1:text2:text3:arg4:path:[attr] 1078 comment=3, flags, "flags": 1079 comment=filesystem type: 1080 comment=host name: 1081 comment=3, flags, "internal flags" 1082# unix example: 1083# header,239,2,mount(2),,Sun Apr 16 14:42:32 2000, + 979995208 msec 1084# argument,3,0x104,flags 1085# text,ufs 1086# path,/var2 1087# attribute,40755,root,root,32,12160,0 1088# path,/devices/pci@1f,4000/scsi@3/sd@0,0:e 1089# attribute,60640,root,sys,32,231268,137438953476 1090# subject,abc,root,other,root,other,1726,1715,255 66049 ohboy 1091# return,success,4290707268 1092# ^^^^^^^^^^ <- bugid 4333559 1093 1094label=AUE_MSGCTL 1095 format=arg1:[ipc]:[ipc_perm] 1096 comment=1, message ID, "msg ID" 1097 note=ipc_perm 1098# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1099 1100label=AUE_MSGCTL_RMID 1101 format=arg1:[ipc]:[ipc_perm] 1102 comment=1, message ID, "msg ID" 1103 note=ipc_perm 1104 syscall=msgctl: IPC_RMID 1105# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1106 1107label=AUE_MSGCTL_SET 1108 format=arg1:[ipc]:[ipc_perm] 1109 comment=1, message ID, "msg ID" 1110 note=ipc_perm 1111 syscall=msgctl: IPC_SET 1112# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1113 1114label=AUE_MSGCTL_STAT 1115 format=arg1:[ipc]:[ipc_perm] 1116 comment=1, message ID, "msg ID" 1117 note=ipc_perm 1118 syscall=msgctl: IPC_STAT 1119# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1120 1121label=AUE_MSGGET 1122 format=arg1:ipc 1123 comment=1, message key, "msg key" 1124 note=ipc_perm 1125 syscall=msgget 1126 1127label=AUE_MSGGETL 1128 skip=Not used. 1129 1130label=AUE_MSGRCV 1131 format=arg1:[ipc]:[ipc_perm] 1132 comment=1, message ID, "msg ID" 1133 note=ipc_perm 1134 syscall=msgrcv 1135# ipc, ipc_perm: msgrcv -> ipc_lookup -> audit_ipc 1136 1137label=AUE_MSGRCVL 1138 skip=Not used. 1139 1140label=AUE_MSGSND 1141 format=arg1:[ipc]:[ipc_perm] 1142 comment=1, message ID, "msg ID" 1143 note=ipc_perm 1144 syscall=msgsnd 1145# ipc, ipc_perm: msgsnd -> ipc_lookup -> audit_ipc 1146 1147label=AUE_MSGSNDL 1148 skip=Not used. 1149 1150label=AUE_MSGSYS 1151skip=Not used. (Placeholder for AUE_MSG* events.) 1152 1153label=AUE_MUNMAP 1154 format=arg1:arg2 1155 comment=1, address of memory, "addr": 1156 comment=2, memory segment size, "len" 1157 1158label=AUE_NFS 1159 skip=Not used. 1160 1161label=AUE_NFSSVC_EXIT 1162 skip=Not used. 1163 1164label=AUE_NFS_GETFH 1165 skip=Not used. 1166 1167label=AUE_NFS_SVC 1168 skip=Not used. 1169 1170label=AUE_NICE 1171 format=kernel 1172 1173label=AUE_NULL 1174 skip=Not used. (placeholder) 1175# used internal to audit_event.c for minimal audit 1176 1177label=AUE_NTP_ADJTIME 1178 format=kernel 1179 1180label=AUE_ONESIDE 1181 skip=Not used. 1182 1183label=AUE_OPEN 1184 skip=Not used. (placeholder for AUE_OPEN_*). 1185 1186label=AUE_OPEN_R 1187 format=path:[path_attr]:[attr] 1188 see=open(2) - read 1189 1190label=AUE_OPENAT_R 1191# obsolete 1192 format=path:[path_attr]:[attr] 1193 see=openat(2) 1194 1195label=AUE_OPEN_RC 1196 format=path:[path_attr]:[attr] 1197 see=open(2) - read,creat 1198 1199label=AUE_OPENAT_RC 1200# obsolete 1201 see=openat(2) 1202 format=path:[path_attr]:[attr] 1203 1204label=AUE_OPEN_RT 1205 format=path:[path_attr]:[attr] 1206 see=open(2) - read,trunc 1207 1208label=AUE_OPENAT_RT 1209# obsolete 1210 see=openat(2) 1211 format=path:[path_attr]:[attr] 1212 1213label=AUE_OPEN_RTC 1214 format=path:[path_attr]:[attr] 1215 see=open(2) - read,trunc,creat 1216 1217label=AUE_OPENAT_RTC 1218# obsolete 1219 see=openat(2) 1220 format=path:[path_attr]:[attr] 1221 1222label=AUE_OPEN_RW 1223 format=path:[path_attr]:[attr] 1224 see=open(2) - read,write 1225 1226label=AUE_OPENAT_RW 1227# obsolete 1228 see=openat(2) 1229 format=path:[path_attr]:[attr] 1230# aui_fsat(): fm & O_RDWR 1231 1232label=AUE_OPEN_RWC 1233 format=path:[path_attr]:[attr] 1234 see=open(2) - read,write,creat 1235 1236label=AUE_OPENAT_RWC 1237# obsolete 1238 see=openat(2) 1239 format=path:[path_attr]:[attr] 1240 1241label=AUE_OPEN_RWT 1242 format=path:[path_attr]:[attr] 1243 see=open(2) - read,write,trunc 1244 1245label=AUE_OPENAT_RWT 1246# obsolete 1247 see=openat(2) 1248 format=path:[path_attr]:[attr] 1249 1250label=AUE_OPEN_RWTC 1251 format=path:[path_attr]:[attr] 1252 see=open(2) - read,write,trunc,creat 1253 1254label=AUE_OPENAT_RWTC 1255# obsolete 1256 see=openat(2) 1257 format=path:[path_attr]:[attr] 1258 1259label=AUE_OPEN_W 1260 format=path:[path_attr]:[attr] 1261 see=open(2) - write 1262 1263label=AUE_OPENAT_W 1264 see=openat(2) 1265 format=path:[path_attr]:[attr] 1266 1267label=AUE_OPEN_WC 1268 format=path:[path_attr]:[attr] 1269 see=open(2) - write,creat 1270 1271label=AUE_OPENAT_WC 1272 see=openat(2) 1273 format=path:[path_attr]:[attr] 1274 1275label=AUE_OPEN_WT 1276 format=path:[path_attr]:[attr] 1277 see=open(2) - write,trunc 1278 1279label=AUE_OPENAT_WT 1280 see=openat(2) 1281 format=path:[path_attr]:[attr] 1282 1283label=AUE_OPEN_WTC 1284 format=path:[path_attr]:[attr] 1285 see=open(2) - write,trunc,creat 1286 1287label=AUE_OPENAT_WTC 1288 see=openat(2) 1289 format=path:[path_attr]:[attr] 1290 1291label=AUE_OSETPGRP 1292 skip=Not used. 1293 1294label=AUE_OSTAT 1295# obsolete 1296 skip=Not used. 1297 1298label=AUE_PATHCONF 1299 format=path:[attr] 1300 1301label=AUE_PIPE 1302format=kernel 1303# class is no, not usually printed 1304 1305label=AUE_PORTFS 1306 skip=Not used (placeholder for AUE_PORTFS_*). 1307 1308label=AUE_PORTFS 1309 skip=Not used (placeholder for AUE_PORTFS_*). 1310 1311label=AUE_PORTFS_ASSOCIATE 1312 syscall=portfs 1313 see=port_associate(3C) 1314 case=Port association via PORT_SOURCE_FILE 1315 format=[path]1:attr 1316 comment=name of the file/directory to be watched 1317 1318label=AUE_PORTFS_DISSOCIATE 1319 syscall=portfs 1320 see=port_dissociate(3C) 1321 case=Port disassociation via PORT_SOURCE_FILE 1322 format=kernel 1323 1324label=AUE_PRIOCNTLSYS 1325 syscall=priocntl 1326 see=priocntl(2) 1327 format=arg1:arg2 1328 comment=1, priocntl version number, "pc_version": 1329 comment=3, command, "cmd" 1330 1331label=AUE_PROCESSOR_BIND 1332 case=No LWP/thread bound to the processor 1333 format=arg1:arg2:text3:[proc] 1334 comment=1, type of ID, "ID type": 1335 comment=2, ID value, "ID": 1336 comment="PBIND_NONE" 1337 case=With processor bound 1338 format=arg1:arg2:arg3:[proc] 1339 comment=1, type of ID, "ID type": 1340 comment=2, ID value, "ID": 1341 comment=3, processor ID, "processor_id" 1342 1343label=AUE_PUTMSG 1344 see=putmsg(2) 1345 format=arg1:[path]:[attr]:arg2 1346 comment=1, file descriptor, "fd": 1347 comment=4, priority, "pri" 1348 1349label=AUE_PUTPMSG 1350 see=putpmsg(2) 1351 format=arg1:[path]:[attr]:arg2:arg3 1352 comment=1, file descriptor, "fd": 1353 comment=4, priority, "pri": 1354 comment=5, flags, "flags" 1355 1356label=AUE_P_ONLINE 1357 format=arg1:arg2:text3 1358 comment=1, processor ID, "processor ID": 1359 comment=2, flags value, "flags": 1360 comment=text form of flags. Values: \ 1361 P_ONLINE, P_OFFLINE, P_NOINTR, P_SPARE, P_FAULTED, P_STATUS 1362 1363label=AUE_QUOTACTL 1364 skip=Not used. 1365 1366label=AUE_READ 1367 skip=Not used. (Placeholder for AUE_READ_* events) 1368 1369label=AUE_READL 1370 skip=Not used. (Obsolete) 1371 1372label=AUE_READLINK 1373 format=path:[attr] 1374 1375label=AUE_READV 1376 skip=Not used (obsolete) 1377# detritus from CMS 1378 1379label=AUE_READVL 1380 skip=Not used (obsolete) 1381# detritus from CMS 1382 1383label=AUE_REBOOT 1384 skip=Not used. 1385 1386label=AUE_RECV 1387 case=If address family is AF_INET or AF_INET6 1388 format=[arg]1:[inet] 1389 comment=1, file descriptor, "so" 1390 case=If address family is AF_UNIX and path is defined 1391 format=[path]1:[attr] 1392 comment=1, file descriptor, "so" 1393 case=If address family is AF_UNIX and path is NULL 1394 format=[path]1:[attr] 1395 comment=1, file descriptor, "no path: fd" 1396 case=If address family is other than AF_UNIX, AF_INET, AF_INET6 1397 format=[arg]1:[arg]2:[arg]3 1398 comment=1, file descriptor, "so": 1399 comment=1, family, "family": 1400 comment=1, type, "type" 1401# associated class remapped to AUE_READ's class (audit_event.c:audit_s2e[237]) 1402 1403label=AUE_RECVFROM 1404 format=inet:arg1:[arg]2:inet3:arg4 1405 comment=3, message length, "len": 1406 comment=4, flags, "flags": 1407 comment=from address: 1408 comment=6, address length, "tolen" 1409 note=The socket token for a bad socket is reported as "argument 1410 note=token (1, socket descriptor, "fd")" 1411 1412label=AUE_RECVMSG 1413 case=If invalid file descriptor 1414 format=arg1:arg2 1415 comment=1, file descriptor, "so": 1416 comment=3, flags, "flags" 1417 case=If valid file descriptor and socket is AF_UNIX and no path 1418 format=arg1:[attr] 1419 comment=1, file descriptor, "no path: fd" 1420 case=If valid file descriptor and socket is AF_UNIX and path defined 1421 format=path:attr 1422 case=If valid file descriptor and socket is AF_INET or AF_INET6 1423 case=.. if socket type is SOCK_DGRAM or SOCK_RAW or SOCK_STREAM 1424 format=arg1:arg2:inet 1425 comment=1, file descriptor, "so": 1426 comment=2, flags, "flags" 1427 case=.. if socket type is unknown 1428 format=arg1:arg2:arg3:arg4 1429 comment=1, file descriptor, "so": 1430 comment=1, family, "family": 1431 comment=1, type, "type": 1432 comment=3, flags, "flags" 1433 1434label=AUE_RENAME 1435 format=path1:[attr]1:[path]2 1436 comment=from name: 1437 comment=to name 1438 1439label=AUE_RENAMEAT 1440# obsolete 1441 format=path1:[attr]1:[path]2 1442 comment=from name: 1443 comment=to name 1444 1445label=AUE_RFSSYS 1446 skip=Not used. 1447# apparently replaced 1448 1449label=AUE_RMDIR 1450 format=path:[attr] 1451 1452label=AUE_SEMCTL 1453 format=arg1:[ipc]:[ipc_perm] 1454 comment=1, semaphore ID, "sem ID" 1455 note=ipc_perm 1456# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1457 1458label=AUE_SEMCTL_GETALL 1459 format=arg1:[ipc]:[ipc_perm] 1460 comment=1, semaphore ID, "sem ID" 1461 note=ipc_perm 1462 syscall=semctl: GETALL 1463# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1464 1465label=AUE_SEMCTL_GETNCNT 1466 format=arg1:[ipc]:[ipc_perm] 1467 comment=1, semaphore ID, "sem ID" 1468 note=ipc_perm 1469 syscall=semctl: GETNCNT 1470# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1471 1472label=AUE_SEMCTL_GETPID 1473 format=arg1:[ipc]:[ipc_perm] 1474 comment=1, semaphore ID, "sem ID" 1475 note=ipc_perm 1476 syscall=semctl: GETPID 1477# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1478 1479label=AUE_SEMCTL_GETVAL 1480 format=arg1:[ipc]:[ipc_perm] 1481 comment=1, semaphore ID, "sem ID" 1482 note=ipc_perm 1483 syscall=semctl: GETVAL 1484# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1485 1486label=AUE_SEMCTL_GETZCNT 1487 format=arg1:[ipc]:[ipc_perm] 1488 comment=1, semaphore ID, "sem ID" 1489 note=ipc_perm 1490 syscall=semctl: GETZCNT 1491# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1492 1493label=AUE_SEMCTL_RMID 1494 format=arg1:[ipc]:[ipc_perm] 1495 comment=1, semaphore ID, "sem ID" 1496 note=ipc_perm 1497 syscall=semctl: IPC_RMID 1498# ipc, ipc_perm token: semctl -> ipc_rmid -> ipc_lookup -> audit_ipc 1499 1500label=AUE_SEMCTL_SET 1501 format=arg1:[ipc]:[ipc_perm] 1502 comment=1, semaphore ID, "sem ID" 1503 note=ipc_perm 1504 syscall=semctl: IPC_SET 1505# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1506 1507label=AUE_SEMCTL_SETALL 1508 format=arg1:[ipc]:[ipc_perm] 1509 comment=1, semaphore ID, "sem ID" 1510 note=ipc_perm 1511 syscall=semctl: SETALL 1512# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1513 1514label=AUE_SEMCTL_SETVAL 1515 format=arg1:[ipc]:[ipc_perm] 1516 comment=1, semaphore ID, "sem ID" 1517 note=ipc_perm 1518 syscall=semctl: SETVAL 1519# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1520 1521label=AUE_SEMCTL_STAT 1522 format=arg1:[ipc]:[ipc_perm] 1523 comment=1, semaphore ID, "sem ID" 1524 note=ipc_perm 1525 syscall=semctl: IPC_STAT 1526# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1527 1528label=AUE_SEMGET 1529 format=arg1:[ipc_perm]:ipc 1530 comment=1, semaphore ID, "sem key" 1531 note=ipc_perm 1532 syscall=semctl: SETVAL 1533# ipc_perm token: semget -> audit_ipcget 1534 1535label=AUE_SEMGETL 1536 skip=Not used. 1537 1538label=AUE_SEMOP 1539 format=arg1:[ipc]:[ipc_perm] 1540 comment=1, semaphore ID, "sem ID" 1541 note=ipc_perm 1542# ipc, ipc_perm token: semop -> ipc_lookup -> audit_ipc 1543 1544label=AUE_SEMSYS 1545 skip=Not used. (place holder) -- defaults to a semget variant 1546 1547label=AUE_SEND 1548 case=If address family is AF_INET or AF_INET6 1549 format=[arg]1:[inet] 1550 comment=1, file descriptor, "so" 1551 case=If address family is AF_UNIX and path is defined 1552 format=[path]1:[attr] 1553 comment=1, file descriptor, "so" 1554 case=If address family is AF_UNIX and path is NULL 1555 format=[path]1:[attr] 1556 comment=1, file descriptor, "no path: fd" 1557 case=If address family is other than AF_UNIX, AF_INET, AF_INET6 1558 format=[arg]1:[arg]2:[arg]3 1559 comment=1, file descriptor, "so": 1560 comment=1, family, "family": 1561 comment=1, type, "type" 1562# associated class remapped to AUE_WRITE's class (audit_event.c:audit_s2e[240]) 1563 1564label=AUE_SENDMSG 1565 case=If invalid file descriptor 1566 format=arg1:arg2 1567 comment=1, file descriptor, "so": 1568 comment=3, flags, "flags" 1569 case=If valid file descriptor 1570 case=...and address family is AF_UNIX and path is defined 1571 format=path:attr 1572 case=...and address family is AF_UNIX and path is NULL 1573 format=path1:attr 1574 comment=1, file descriptor, "nopath: fd" 1575 case=...and address family is AF_INET or AF_INET6, \ 1576 socket is SOCK_DGRAM, SOCK_RAW or SOCK_STREAM 1577 format=arg1:arg2:inet 1578 comment=1, file descriptor, "so": 1579 comment=3, flags, "flags" 1580 case=...and unknown address family or address family AF_INET or AF_INET6 \ 1581 and not socket SOCK_DGRAM, SOCK_RAW or SOCK_STREAM 1582 format=arg1:arg2:arg3:arg4 1583 comment=1, file descriptor, "so": 1584 comment=1, family, "family": 1585 comment=1, type, "type": 1586 comment=1, flags, "flags" 1587 1588label=AUE_SENDTO 1589 case=If invalid file descriptor 1590 format=arg1:arg2 1591 comment=1, file descriptor, "so": 1592 comment=3, flags, "flags" 1593 case=If valid file descriptor 1594 case=...and socket is AF_UNIX and path is defined 1595 format=path:attr 1596 case=...and address family is AF_UNIX and path is NULL 1597 format=path1:attr 1598 comment=1, file descriptor, "nopath: fd" 1599 case=...and address family is AF_INET or AF_INET6 1600 format=arg1:arg2:inet 1601 comment=1, file descriptor, "so": 1602 comment=3, flags, "flags" 1603 case=...and unknown address family 1604 format=arg1:arg2:arg3:arg4 1605 comment=1, file descriptor, "so": 1606 comment=1, family, "family": 1607 comment=1, type, "type": 1608 comment=1, flags, "flags" 1609 1610label=AUE_SETAUDIT 1611 case=With a valid program stack address 1612 format=arg1:arg2:arg3:arg4:arg5:arg6 1613 comment=1, audit user ID, "setaudit:auid": 1614 comment=1, terminal ID, "setaudit:port": 1615 comment=1, terminal ID, "setaudit:machine": 1616 comment=1, preselection mask, "setaudit:as_success": 1617 comment=1, preselection mask, "setaudit:as_failure": 1618 comment=1, audit session ID, "setaudit:asid" 1619 case=With an invalid program stack address 1620 format=kernel 1621# header,215,2,setaudit(2),,Mon May 15 09:43:28 2000, + 60002627 msec 1622# argument,1,0x271a,setaudit:auid 1623# argument,1,0x3ff0201,setaudit:port 1624# argument,1,0x8192591e,setaudit:machine 1625# argument,1,0x400,setaudit:as_success 1626# argument,1,0x400,setaudit:as_failure 1627# argument,1,0x16f,setaudit:asid 1628# subject,tuser10,root,other,root,other,20620,367,255 197121 tmach1 1629# return,success,0 1630# trailer,215 1631# header,215,2,setaudit(2),,Mon May 15 09:43:40 2000, + 50000847 msec 1632# argument,1,0x271a,setaudit:auid 1633# argument,1,0x3ff0201,setaudit:port 1634# argument,1,0x8192591e,setaudit:machine 1635# argument,1,0x400,setaudit:as_success 1636# argument,1,0x400,setaudit:as_failure 1637# argument,1,0x16f,setaudit:asid 1638# subject,tuser10,root,other,root,other,20720,367,255 197121 tmach1 1639# return,success,0 1640# trailer,215 1641 1642label=AUE_SETAUDIT_ADDR 1643 case=With a valid program stack address 1644 format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7 1645 comment=1, audit user ID, "auid": 1646 comment=1, terminal ID, "port": 1647 comment=1, type, "type": 1648 comment=1, terminal ID, "ip address": 1649 comment=1, preselection mask, "as_success": 1650 comment=1, preselection mask, "as_failure": 1651 comment=1, audit session ID, "asid" 1652 case=With an invalid program stack address 1653 format=kernel 1654# header,172,2,setaudit_addr(2),,Fri Nov 09 13:52:26 2001, + 0 msec 1655# argument,1,0x15fa7,auid 1656# argument,1,0x0,port 1657# argument,1,0x4,type 1658# ip address,tmach2 1659# argument,1,0x9c00,as_success 1660# argument,1,0x9c00,as_failure 1661# argument,1,0x1f1,asid 1662# subject,tuser1,root,staff,tuser1,staff,10420,497,0 0 tmach2 1663# return,success,0 1664 1665label=AUE_SETAUID 1666 format=arg1 1667 comment=2, audit user ID, "setauid" 1668 1669label=AUE_SETDOMAINNAME 1670 skip=Not used. (See AUE_SYSINFO) 1671# See AUE_SYSINFO with SI_SET_SRPC_DOMAIN 1672 1673label=AUE_SETEGID 1674 format=arg1 1675 comment=1, group ID, "gid" 1676 1677label=AUE_SETEUID 1678 format=arg1 1679 comment=1, user ID, "euid" 1680 1681label=AUE_SETGID 1682 format=arg1 1683 comment=1, group ID, "gid" 1684 1685label=AUE_SETGROUPS 1686 note=If more than NGROUPS_MAX_DEFAULT groups listed, 1687 note=no tokens are generated. 1688 case=If no groups in list 1689 format=[arg]1 1690 comment=1, 0, "setgroups" 1691 case=If 1 or more groups in list 1692 format=(1..n)arg1 1693 comment=1, gid, "setgroups" 1694 1695label=AUE_SETHOSTNAME 1696 skip=Not used. (See AUE_SYSINFO) 1697# See sysinfo call with command SI_SET_HOSTNAME 1698 1699label=AUE_SETKERNSTATE 1700 skip=Not used. 1701 1702label=AUE_SETPGID 1703 format=[proc]:[arg]1 1704 comment=2, pgid, "pgid" 1705 1706label=AUE_SETPGRP 1707 format=kernel 1708 1709label=AUE_SETPRIORITY 1710 skip=Not used. 1711 1712label=AUE_SETPPRIV 1713 case=operation privileges off 1714 format=arg1:privset2 1715 comment=setppriv operation: 1716 comment=privileges actually switched off 1717 case=operation privileges on 1718 format=arg1:privset2 1719 comment=setppriv operation: 1720 comment=privileges actually switched on 1721 case=operation privileges off 1722 format=arg1:privset2:privset3 1723 comment=setppriv operation: 1724 comment=privileges before privset: 1725 comment=privileges after privset 1726#header,220,2,settppriv(2),,test1,Mon Oct 6 10:09:05 PDT 2003, + 753 msec 1727#argument,2,0x2,op 1728#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session 1729#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session 1730#subject,tuser,root,staff,tuser,staff,444,426,200 131585 test0 1731#return,success,0 1732 1733label=AUE_SETREGID 1734 format=arg1:arg2 1735 comment=1, real group ID, "rgid": 1736 comment=2, effective group ID, "egid" 1737 1738label=AUE_SETREUID 1739 format=arg1:arg2 1740 comment=1, real user ID, "ruid": 1741 comment=2, effective user ID, "euid" 1742 1743label=AUE_SETRLIMIT 1744 format=kernel 1745# header,73,2,setrlimit(2),,Thu Nov 08 15:14:17 2001, + 0 msec 1746# subject,tuser1,tuser1,staff,tuser1,staff,9707,497,0 0 tmach2 1747# return,success,0 1748 1749label=AUE_SETSID 1750 format=kernel 1751 1752label=AUE_SETSOCKOPT 1753 case=Invalid file descriptor 1754 format=arg1:arg2 1755 comment=1, file descriptor, "so": 1756 comment=2, level, "level" 1757 case=Valid file descriptor 1758 case=...and socket is AF_UNIX 1759 format=path1:arg2:arg3:arg4:arg5:arg6:[arg]7:[data]8 1760 comment=if no path, will be argument: 1, "nopath: fd", \ 1761 file descriptor: 1762 comment=1, file descriptor, "so": 1763 comment=1, family, "family": 1764 comment=1, type, "type": 1765 comment=2, protocol level, "level": 1766 comment=3, option name, "optname": 1767 comment=5, option length, "optlen": 1768 comment=option data 1769 case=...and socket is AF_INET or AF_INET6 1770 format=arg1:arg2:arg3:[arg]4:[data]5:inet 1771 comment=1, file descriptor, "so": 1772 comment=2, protocol level, "level": 1773 comment=3, option name, "optname": 1774 comment=5, option length, "optlen": 1775 comment=option data 1776 case=...and socket adddress family is unknown 1777 format=arg1:arg2:arg3:arg4:arg5:[arg]6:[data]7 1778 comment=1, file descriptor, "so": 1779 comment=1, family, "family": 1780 comment=1, type, "type": 1781 comment=2, protocol level, "level": 1782 comment=3, option name, "optname": 1783 comment=5, option length, "optlen": 1784 comment=option data 1785 1786label=AUE_SETTIMEOFDAY 1787 skip=Not used. 1788 1789label=AUE_SETUID 1790 syscall=setuid 1791 format=arg1 1792 comment=1, "uid" to be set 1793 1794label=AUE_SETUSERAUDIT 1795 skip=Not used. 1796 1797label=AUE_SHMAT 1798 format=arg1:arg2:[ipc]:[ipc_perm] 1799 comment=1, shared memory ID, "shm ID": 1800 comment=2, shared mem addr, "shm addr" 1801 note=ipc_perm 1802# ipc, ipc_perm token: shmat -> ipc_lookup -> audit_ipc 1803 1804label=AUE_SHMCTL 1805 format=arg1:[ipc]:[ipc_perm] 1806 comment=1, shared memory ID, "shm ID" 1807 note=ipc_perm 1808# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1809 1810label=AUE_SHMCTL_RMID 1811 format=arg1:[ipc]:[ipc_perm] 1812 comment=1, shared memory ID, "shm ID" 1813 note=ipc_perm 1814 syscall=semctl: IPC_RMID 1815# ipc, ipc_perm token: shmctl -> ipc_rmid -> ipc_lookup -> audit_ipc 1816 1817label=AUE_SHMCTL_SET 1818 format=arg1:[ipc]:[ipc_perm] 1819 comment=1, shared memory ID, "shm ID" 1820 note=ipc_perm 1821 syscall=semctl: IPC_SET 1822# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1823 1824label=AUE_SHMCTL_STAT 1825 format=arg1:[ipc]:[ipc_perm] 1826 comment=1, shared memory ID, "shm ID" 1827 note=ipc_perm 1828 syscall=semctl: IPC_STAT 1829# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1830 1831label=AUE_SHMDT 1832 format=arg1 1833 comment=1, shared memory address, "shm adr" 1834 1835label=AUE_SHMGET 1836 format=arg1:[ipc_perm]:[ipc] 1837 comment=0, shared memory key, "shm key" 1838 note=ipc_perm 1839# ipc_perm: shmget -> audit_ipcget 1840 1841label=AUE_SHMGETL 1842 skip=Not used. 1843 1844label=AUE_SHMSYS 1845 skip=Not used. (Placeholder for shmget and shmctl*) 1846 1847label=AUE_SHUTDOWN 1848 case=If the socket address is invalid 1849 format=[arg]1:[text]2:[text]3 1850 comment=1, file descriptor, "fd": 1851 comment=bad socket address: 1852 comment=bad peer address 1853 case=If the socket address is part of the AF_INET family 1854 case=..with zero file descriptor 1855 format=arg1:[arg]2:[arg]3:[arg]4 1856 comment=1, file descriptor, "so": 1857 comment=1, family, "family": 1858 comment=1, type, "type": 1859 comment=2, how shutdown code, "how" 1860 case=...with non-zero file descriptor 1861 format=arg1:arg2:inet 1862 comment=1, file descriptor, "so": 1863 comment=2, how shutdown code, "how" 1864 case=If the socket address is AF_UNIX 1865 case=...with zero file descriptor 1866 format=path1:arg2:[arg]3:[arg]4:[arg]5 1867 comment=If error: argument: \ 1868 1, "no path: fd", file descriptor: 1869 comment=1, file descriptor, "so": 1870 comment=1, family, "family": 1871 comment=1, type, "type": 1872 comment=2, how shutdown code, "how" 1873 case=...with non-zero file descriptor 1874 format=path1:arg2:arg3:inet 1875 comment=If error: argument: \ 1876 1, file descriptor, "no path: fd": 1877 comment=1, file descriptor, "so": 1878 comment=2, how shutdown code, "how" 1879#old BSM manual wrong; used audit_event.c 1880 1881label=AUE_SOCKACCEPT 1882 syscall=getmsg: socket accept 1883 format=inet:arg1:[path]:attr:arg2 1884 comment=1, file descriptor, "fd": 1885 comment=4, priority, "pri" 1886# see putmsg and getmsg for record format 1887# See audit.c for inet token and audit_start.c for other reference 1888 1889label=AUE_SOCKCONFIG 1890 format=arg1:arg2:arg3:[path]4 1891 comment=1, domain address, "domain": 1892 comment=2, type, "type": 1893 comment=3, protocol, "protocol": 1894 comment=If no path:argument -- 3, 0, "devpath" 1895 1896label=AUE_SOCKCONNECT 1897 syscall=putmsg: socket connect 1898 format=inet:arg1:[path]:attr:arg2 1899 comment=1, file descriptor, "fd": 1900 comment=4, priority, "pri" 1901# same as AUE_SOCKACCEPT 1902 1903label=AUE_SOCKET 1904 format=arg1:[arg]2:arg3 1905 comment=1, socket domain, "domain": 1906 comment=2, socket type, "type": 1907 comment=3, socket protocol, "protocol" 1908 1909label=AUE_SOCKETPAIR 1910 skip=Not used. 1911# unreferenced 1912 1913label=AUE_SOCKRECEIVE 1914 syscall=getmsg 1915 format=inet:arg1:[path]:attr:arg2 1916 comment=1, file descriptor, "fd": 1917 comment=4, priority, "pri" 1918# see AUE_SOCKACCEPT 1919 1920label=AUE_SOCKSEND 1921syscall=putmsg 1922 format=inet:arg1:[path]:attr:arg2 1923 comment=1, file descriptor, "fd": 1924 comment=4, priority, "pri" 1925# see AUE_SOCKACCEPT 1926 1927label=AUE_STAT 1928 format=path:[attr] 1929 1930label=AUE_STATFS 1931 format=path:[attr] 1932 1933label=AUE_STATVFS 1934 format=path:[attr] 1935 1936label=AUE_STIME 1937 format=kernel 1938 1939label=AUE_SWAPON 1940 skip=Not used. 1941 1942label=AUE_SYMLINK 1943 format=path:text1:[attr] 1944 comment=symbolic link string 1945 1946label=AUE_SYSINFO 1947 note=Only SI_SET_HOSTNAME and SI_SET_SRPC_DOMAIN commands 1948 note=are currently audited. 1949 format=arg1:[text]2 1950 comment=1, command, "cmd": 1951 comment=name 1952 1953label=AUE_SYSTEMBOOT 1954 title=system booted 1955 syscall=none 1956 format=head:text1 1957 comment="booting kernel" 1958# see audit_start.c and audit_io.c 1959# no subject or return / exit token 1960# header,44,2,system booted,na,Fri Nov 09 13:53:42 2001, + 0 msec 1961# text,booting kernel 1962 1963label=AUE_TRUNCATE 1964 skip=Not used. 1965 1966label=AUE_UMOUNT 1967 syscall=umount: old version 1968 note=Implemented as call of the newer umount2(2). 1969 format=path:arg1:[path]:[attr] 1970 comment=2, mflag value = 0, "flags" 1971 1972label=AUE_UMOUNT2 1973 syscall=umount2 1974 format=path:arg1:[path]:[attr] 1975 comment=2, mflag value, "flags" 1976 1977label=AUE_UNLINK 1978 format=path:[attr] 1979 1980label=AUE_UNLINKAT 1981# obsolete 1982 see=openat(2) 1983 format=path:[attr] 1984 1985label=AUE_UNMOUNT 1986 skip=Not used. 1987 1988label=AUE_UTIME 1989# obsolete 1990 format=path:[attr] 1991 1992label=AUE_UTIMES 1993 see=futimens(2) 1994 format=path:[attr] 1995 1996label=AUE_VFORK 1997 format=arg1 1998 comment=0, pid, "child PID" 1999 note=The vfork(2) return values are undefined because the audit record is 2000 note=produced at the point that the child process is spawned. 2001 2002label=AUE_VPIXSYS 2003 skip=Not used. 2004 2005label=AUE_VTRACE 2006 skip=Not used. 2007 2008label=AUE_WRITE 2009 format=path1:attr 2010 comment=if no path, argument -- "1, file descriptor, "no path: fd" 2011 note:An audit record is generated for write only once per file close. 2012 2013label=AUE_WRITEV 2014 skip=Not used. (obsolete) 2015 2016label=AUE_XMKNOD 2017# obsolete 2018 skip=Not used. 2019 2020label=AUE_XSTAT 2021# obsolete 2022 skip=Not Used. 2023 2024label=AUE_PF_POLICY_ADDRULE 2025 title=Add IPsec policy rule 2026 see= 2027 syscall=none 2028 format=arg1:arg2:[zone]3:[text]4 2029 comment=Operation applied to active policy (1 is active, 0 is inactive): 2030 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2031 comment=affected zone: 2032 comment=Name of target tunnel 2033 2034label=AUE_PF_POLICY_DELRULE 2035 title=Delete IPsec policy rule 2036 see= 2037 syscall=none 2038 format=arg1:arg2:[zone]3:[text]4 2039 comment=Operation applied to active policy (1 is active, 0 is inactive): 2040 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2041 comment=affected zone: 2042 comment=Name of target tunnel 2043 2044label=AUE_PF_POLICY_CLONE 2045 title=Clone IPsec policy 2046 see= 2047 syscall=none 2048 format=arg1:arg2:[zone]3:[text]4 2049 comment=Operation applied to active policy (1 is active, 0 is inactive): 2050 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2051 comment=affected zone: 2052 comment=Name of target tunnel 2053 2054label=AUE_PF_POLICY_FLIP 2055 title=Flip IPsec policy 2056 see= 2057 syscall=none 2058 format=arg1:arg2:[zone]3:[text]4 2059 comment=Operation applied to active policy (1 is active, 0 is inactive): 2060 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2061 comment=affected zone: 2062 comment=Name of target tunnel 2063 2064label=AUE_PF_POLICY_FLUSH 2065 title=Flip IPsec policy rules 2066 see= 2067 syscall=none 2068 format=arg1:arg2:[zone]3:[text]4 2069 comment=Operation applied to active policy (1 is active, 0 is inactive): 2070 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2071 comment=affected zone: 2072 comment=Name of target tunnel 2073 2074label=AUE_PF_POLICY_ALGS 2075 title=Update IPsec algorithms 2076 see= 2077 syscall=none 2078 format=arg1:arg2:[zone]3:[text]4 2079 comment=Operation applied to active policy (1 is active, 0 is inactive): 2080 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2081 comment=affected zone: 2082 comment=Name of target tunnel 2083 2084label=AUE_allocate_fail 2085 program=/usr/sbin/allocate 2086 title=allocate: allocate-device failure 2087 format=(0..n)[text]1 2088 comment=command line arguments 2089# see audit_allocate.c 2090 2091label=AUE_allocate_succ 2092 program=/usr/sbin/allocate 2093 title=allocate: allocate-device success 2094 format=(0..n)[text]1 2095 comment=command line arguments 2096# see audit_allocate.c 2097 2098label=AUE_at_create 2099 program=/usr/bin/at 2100 title=at: at-create crontab 2101 format=path 2102 2103label=AUE_at_delete 2104 program=/usr/bin/at 2105 title=at: at-delete atjob (at or atrm) 2106 format=text1:path 2107 comment="ancillary file:" filename or "bad format of at-job name" 2108 2109label=AUE_at_perm 2110 skip=Not used. 2111# not referenced outside uevents.h 2112 2113label=AUE_create_user 2114 skip=Not used. 2115 2116label=AUE_cron_invoke 2117 program=/usr/sbin/cron 2118 title=cron: cron-invoke at or cron 2119 case=If issue with account find 2120 format=text1 2121 comment="bad user" name or "user <name> account expired" 2122 case=else 2123 format=text1:text2 2124 comment="at-job", "batch-job", "crontab-job", "queue-job (<queue_name>)", \ 2125 or "unknown job type (<job_type_id>)": 2126 comment=command 2127 2128label=AUE_crontab_create 2129 program=/usr/bin/crontab 2130 title=crontab: crontab created 2131 format=path 2132# See audit_crontab.c 2133 2134label=AUE_crontab_delete 2135 program=/usr/bin/crontab 2136 title=crontab: crontab delete 2137 format=path 2138# See audit_crontab.c 2139 2140label=AUE_crontab_mod 2141 program=/usr/bin/crontab 2142 title=crontab: crontab modify 2143 format=path 2144# See audit_crontab.c 2145 2146label=AUE_crontab_perm 2147 skip=Not used. 2148 2149label=AUE_deallocate_fail 2150 program=/usr/sbin/deallocate 2151 title=deallocate-device failure 2152 format=(0..n)[text]1 2153 comment=command line arguments 2154# See audit_allocate.c 2155 2156label=AUE_deallocate_succ 2157 program=/usr/sbin/deallocate 2158 title=deallocate-device success 2159 format=(0..n)[text]1 2160 comment=command line arguments 2161# See audit_allocate.c 2162 2163label=AUE_delete_user 2164 skip=Not used. 2165 2166label=AUE_disable_user 2167 skip=Not used. 2168 2169label=AUE_enable_user 2170 skip=Not used. 2171 2172label=AUE_ftpd 2173 program=/usr/sbin/in.ftpd 2174 title=in.ftpd 2175 format=[text]1 2176 comment=error message 2177# See audit_ftpd 2178 2179label=AUE_ftpd_logout 2180 program=/usr/sbin/in.ftpd 2181 title=in.ftpd 2182 format=user 2183# See audit_ftpd 2184 2185label=AUE_halt_solaris 2186 program=/usr/sbin/halt 2187 title=halt 2188 format=user 2189# See audit_halt.c 2190 2191label=AUE_kadmind_auth 2192 format=text1:text2:text3 2193 comment=Op: <requested information>: 2194 comment=Arg: <argument for Op>: 2195 comment=Client: <client principal name> 2196# See audit_kadmin.c / common_audit() 2197 2198label=AUE_kadmind_unauth 2199 format=text1:text2:text3 2200 comment=Op: <requested information>: 2201 comment=Arg: <argument for Op>: 2202 comment=Client: <client principal name> 2203# See audit_kadmin.c / common_audit() 2204 2205label=AUE_krb5kdc_as_req 2206 format=text1:text2 2207 comment=Client: <client principal name>: 2208 comment=Service: <requested service name> 2209# See audit_krb5kdc.c / common_audit() 2210 2211label=AUE_krb5kdc_tgs_req 2212 format=text1:text2 2213 comment=Client: <client principal name>: 2214 comment=Service: <requested service name> 2215# See audit_krb5kdc.c / common_audit() 2216 2217label=AUE_krb5kdc_tgs_req_alt_tgt 2218 format=text1:text2 2219 comment=Client: <client principal name>: 2220 comment=Service: <requested service name> 2221# See audit_krb5kdc.c / common_audit() 2222 2223label=AUE_krb5kdc_tgs_req_2ndtktmm 2224 format=text1:text2 2225 comment=Client: <client principal name>: 2226 comment=Service: <requested service name> 2227# See audit_krb5kdc.c / common_audit() 2228 2229label=AUE_listdevice_fail 2230 title=allocate-list devices failure 2231 program=/usr/sbin/allocate 2232 format=(0..n)[text]1 2233 comment=command line arguments 2234# See audit_allocate.c 2235 2236label=AUE_listdevice_succ 2237 title=allocate-list devices success 2238 program=/usr/sbin/allocate 2239 format=(0..n)[text]1 2240 comment=command line arguments 2241# See audit_allocate.c 2242 2243label=AUE_modify_user 2244 skip=Not used. 2245 2246label=AUE_mountd_mount 2247 title=mountd: NFS mount 2248 program=/usr/lib/nfs/mountd 2249 see=mountd(1M) 2250 format=text1:path2 2251 comment=remote client hostname: 2252 comment=mount dir 2253# See audit_mountd.c 2254 2255label=AUE_mountd_umount 2256 title=mountd: NFS unmount 2257 program=/usr/lib/nfs/mountd 2258 format=text1:path2 2259 comment=remote client hostname: 2260 comment=mount dir 2261# See audit_mountd.c 2262 2263label=AUE_poweroff_solaris 2264 program=/usr/sbin/poweroff 2265 title=poweroff 2266 format=user 2267# See audit_halt.c 2268 2269label=AUE_reboot_solaris 2270 program=/usr/sbin/reboot 2271 title=reboot 2272 format=user 2273# See audit_reboot.c 2274# header,61,2,reboot(1m),,Fri Nov 09 13:52:34 2001, + 726 msec 2275# subject,tuser1,root,other,root,other,10422,497,0 0 tmach2 2276# return,success,0 2277 2278label=AUE_rexd 2279 program=/usr/sbin/rpc.rexd 2280 title=rpc.rexd 2281 format=[text]1:text2:text3:[text]4:[text]5 2282 comment=error message (failure only): 2283 comment="Remote execution requested by:" hostname: 2284 comment="Username:" username: 2285 comment="User id:" user ID (failure only): 2286 comment="Command line:" command attempted 2287# See audit_rexd.c 2288 2289label=AUE_rexecd 2290 program=/usr/sbin/rpc.rexecd 2291 title=rpc.rexecd 2292 format=[text]1:text2:text3:text4 2293 comment=error message (failure only): 2294 comment="Remote execution requested by:" hostname: 2295 comment="Username:" username: 2296 comment="Command line:" command attempted 2297# See audit_rexecd.c 2298 2299label=AUE_rshd 2300 program=/usr/sbin/in.rshd 2301 title=in.rshd 2302 format=text1:text2:[text]3:[text]4 2303 comment="cmd" command: 2304 comment="remote user" remote user: 2305 comment="local user" local user: 2306 comment=failure message 2307# See audit_rshd.c 2308 2309label=AUE_shutdown_solaris 2310 title=shutdown 2311 program=/usr/ucb/shutdown 2312 format=user 2313# See audit_shutdown.c 2314 2315label=AUE_smserverd 2316 program=/usr/lib/smedia/rpc.smserverd 2317 format=[text]1:[text]2 2318 comment=state change: 2319 comment=vid, pid, major/minor device 2320# see usr/src/cmd/smserverd 2321# code shows a third token, path, but it isn't implemented. 2322 2323label=AUE_uadmin_solaris 2324 title=uadmin (obsolete) 2325 program= 2326 see= 2327 format=text1:text2 2328 comment=function code: 2329 comment=argument code 2330# not used. Replaced by AUE_uadmin_* events, see uadmin.c, adt.xml 2331 2332label=AUE_LABELSYS_TNRH 2333 title=config Trusted Network remote host cache 2334 see=tnrh(2) 2335 syscall=labelsys: TSOL_TNRH 2336 case=With the flush command (cmd=3) 2337 format=arg1 2338 comment=1, command, "cmd" 2339 case=With the load (cmd=1) and delete (cmd=2) commands 2340 format=arg1:inaddr2:arg3 2341 comment=1, command, "cmd": 2342 comment=ip address of host: 2343 comment=2, prefix length, "prefix len" 2344 2345label=AUE_LABELSYS_TNRHTP 2346 title=config Trusted Network remote host template 2347 see=tnrhtp(2) 2348 syscall=labelsys: TSOL_TNRHTP 2349 case=With the flush command (cmd=3) 2350 format=arg1 2351 comment=1, command, "cmd" 2352 case=With the load (cmd=1) and delete (cmd=2) commands 2353 format=arg1:text2 2354 comment=1, command, "cmd": 2355 comment=name of template 2356 2357label=AUE_LABELSYS_TNMLP 2358 title=config Trusted Network multi-level port entry 2359 see=tnmlp(2) 2360 syscall=labelsys: TSOL_TNMLP 2361 case=With the flush command (cmd=3) 2362 format=arg1:text2 2363 comment=1, command, "cmd": 2364 comment="shared", or name of zone 2365 case=With the load (cmd=1) and delete (cmd=2) commands 2366 format=arg1:text2:arg3:arg4:[arg]5 2367 comment=1, command, "cmd": 2368 comment="shared", or name of zone: 2369 comment=2, protocol number, "proto num": 2370 comment=2, starting mlp port number, "mlp_port": 2371 comment=2, ending mlp port number, "mlp_port_upper" 2372