1# audit_record_attr.txt 2# Two "#" are comments that are copied to audit_record_attr 3# other comments are removed. 4## 5## Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved. 6## 7## CDDL HEADER START 8## 9## The contents of this file are subject to the terms of the 10## Common Development and Distribution License (the "License"). 11## You may not use this file except in compliance with the License. 12## 13## You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 14## or http://www.opensolaris.org/os/licensing. 15## See the License for the specific language governing permissions 16## and limitations under the License. 17## 18## When distributing Covered Code, include this CDDL HEADER in each 19## file and include the License file at usr/src/OPENSOLARIS.LICENSE. 20## If applicable, add the following below this CDDL HEADER, with the 21## fields enclosed by brackets "[]" replaced with your own identifying 22## information: Portions Copyright [yyyy] [name of copyright owner] 23## 24## CDDL HEADER END 25## 26## 27 28# source file for describing audit records. 29 30# This file is in two sections. The first is a list of attribute / 31# value pairs used to provide short cuts in annotating the audit 32# records. The second is for annotation for each audit record. 33 34# first section: general attributes 35 36# skipClass=<class name of items to skip if only in that class> 37# skipClass=no # uncomment to filter unused events 38 39# token name abbreviations 40# token=alias:fullname -- short names for key tokens 41 42token=arg:argument 43token=attr:attribute 44token=acl:acl_entry 45token=cmd:command 46token=data:data 47token=exec_args:exec_arguments 48token=exec_env:exec_environment 49token=group:group 50token=inaddr:ip_addr 51token=inet:socket 52token=ipc:ipc 53token=ipc_perm:ipc_perm 54token=newgroup:newgroups 55token=path:path 56token=path_attr:attribute_path 57token=privset:privilege 58token=proc:process 59token=text:text 60token=tid:terminal_adr 61token=uauth:use_of_authorization 62token=upriv:use_of_privilege 63token=user:user_object 64token=zone:zonename 65token=fmri:service_instance 66token=label:mandatory_label 67 68token=head:header 69token=subj:subject 70token=ret:return 71token=exit:exit 72 73# note names -- certain notes show up repeatedly; collected here 74# 75# To achieve the maximum line length to be less than 80 characters, the 76# note names (message=) can be defined as a multi line, each line except the 77# last one finished with the backslash character. 78 79message=ipc_perm:The ipc and ipc_perm tokens are not included if \ 80 the message ID is not valid. 81 82 83# basic record pattern ("insert" is where event-specific tokens 84# are listed.) 85 86kernel=head:insert:subj:[upriv]:ret 87user=head:subj:insert:ret 88 89# Second Section 90# Annotation Section 91# 92# Most audit records need annotation beyond what is provided by 93# the files audit_event and audit_class. At a minimum, a record 94# is represented by a label and a format. 95# 96# label=record_id like AUE_ACCEPT 97# format=token_alias 98# 99# there is no end line; a new label= end the preceding definition 100# and starts the next. 101# 102# format values are a list of token names, separated by colons. The 103# name is either one of the values described above (token=) or is 104# a value to be taken literally. If a token name ends with a digit, 105# the digit is an index into an array of comments. In the few cases 106# where there are no tokens (other than header, subject, return/exit), 107# use "format=kernel" or "format="user". 108# 109# comment is an array of strings separated by colons. If comments 110# are listed on separate lines (recommended due to better 111# readability/sustainability of the file), the preceding comment 112# must end with a colon. The array starts at 1. (If the comment 113# contains a colon, use ":" without the quotes.) 114# 115# case is used to generate alternate descriptions for a given 116# record. 117# 118# Constraints - the string length; bear in mind, that any annotation of 119# primitives below longer than is specified, will be silently truncated 120# to given/defined amount of characters in the auditrecord(1M) runtime: 121# 122# primitive <= max (non-truncated) string length 123# case <= unlimited; if necessary, text continues on a new line 124# comment <= unlimited; if necessary, text continues on a new line 125# label <= 43 126# note <= unlimited; if necessary, text continues on a new line 127# program <= 20 128# see <= 39 129# syscall <= 20 130# title <= 46 131# token <= 28 (full name) 132# 133# To achieve the maximum line length to be less than 80 characters, one can 134# define the unlimited primitives as a multi line, each line except the 135# last one finished with the backslash character. In addition to above 136# mentioned, the "format=" record attribute follows the same rule. 137# 138# 139# AUE_ACCEPT illustrates the use of all the above. Note that 140# case is not nested; ellipsis (...) is used to give the effect 141# of nesting. 142 143label=AUE_ACCEPT 144#accept(2) failure 145 case=Invalid socket file descriptor 146 format=arg1 147 comment=1, file descriptor, "so" 148#accept(2) non SOCK_STREAM socket 149 case=If the socket address is not part of the AF_INET family 150 format=arg1:arg2:arg3 151 comment=1, "so", file descriptor: 152 comment="family", so_family: 153 comment="type", so_type 154 case=If the socket address is part of the AF_INET family 155 case=...If there is no vnode for this file descriptor 156 format=[arg]1 157 comment=1, file descriptor, "Bad so" 158#accept(2) SOCK_STREAM socket-not bound 159 case=...or if the socket is not bound 160 format=[arg]1:[inet]2 161 comment=1, file descriptor, "so": 162 comment=local/foreign address (0.0.0.0) 163 case=...or if the socket address length = 0 164 format=[arg]1:[inet]2 165 comment=1, file descriptor, "so": 166 comment=local/foreign address (0.0.0.0) 167 case=...or for all other conditions 168 format=inet1:[inet]1 169 comment=socket address 170#accept(2) failure 171# header 172# au_to_arg32 "so",file descriptor 173# subject 174# return <errno != 0> 175# 176#accept(2) non SOCK_STREAM socket 177# header 178# au_to_arg32 "so", file descriptor 179# au_to_arg32 "family", so_family 180# au_to_arg32 "type", so_type 181# subject 182# return success 183# 184#accept(2) SOCK_STREAM socket-not bound 185# header 186# au_to_arg32 "so", file descriptor 187# au_to_socket_ex local/foreign address (0.0.0.0) 188# subject 189# return success 190# 191#accept(2) SOCK_STREAM socket-bound 192# header 193# au_to_arg32 "so", file descriptor 194# au_to_socket_ex 195# subject 196# return success 197 198 199 200label=AUE_ACCESS 201 format=path1:[attr] 202 comment=may be truncated in failure case 203# header,163,2,access(2),,Wed Apr 25 13:52:49 2001, + 750000733 msec 204# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_succ 205# attribute,100777,41416,staff,8388608,402255,0 206# subject,tuser10,tuser10,other,tuser10,other,1297,322,255 131585 129.146.89.30 207# return,success,0 208# trailer,163 209# 210# header,163,2,access(2),,Wed Apr 25 13:53:02 2001, + 490000427 msec 211# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail 212# attribute,100000,root,other,8388608,402257,0 213# subject,tuser10,tuser10,other,tuser10,other,1433,322,255 131585 129.146.89.30 214# return,failure: Permission denied,-1 215# trailer,163 216# 217# header,135,2,access(2),,Wed Apr 25 13:53:15 2001, + 10000329 msec 218# path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail2 219# subject,tuser10,tuser10,other,tuser10,other,1553,322,255 131585 129.146.89.30 220# return,failure: No such file or directory,-1 221# trailer,135 222 223label=AUE_ACCT 224 case=Zero path 225 format=arg1 226 comment=1, 0, "accounting off" 227 case=Non-zero path 228 format=path1:[attr]2 229 comment=may be truncated in failure case: 230 comment=omitted if failure 231 232label=AUE_ACLSET 233 syscall=acl 234 format=arg1:arg2:(0..n)[acl]3 235 comment=2, SETACL, "cmd": 236 comment=3, number of ACL entries, "nentries": 237 comment=Access Control List entries 238 239label=AUE_ADJTIME 240 format=kernel 241 242label=AUE_ASYNC_DAEMON 243 skip=Not used 244 245label=AUE_ASYNC_DAEMON_EXIT 246 skip=Not used 247 248label=AUE_AUDIT 249 skip=Not used. (Placeholder for the set AUE_AUDIT_*.) 250 251label=AUE_AUDITON 252 skip=Not used. (Placeholder for the set AUE_AUDITON_*.) 253 254label=AUE_AUDITON_GESTATE 255 skip=Not used 256 257label=AUE_AUDITON_GETCAR 258 format=kernel 259 syscall=auditon: GETCAR 260# header,68,2,auditon(2) - get car,,Wed Apr 25 13:49:02 2001, + 710001279 msec 261# subject,tuser10,root,other,root,other,966,322,255 131585 129.146.89.30 262# return,success,0 263# trailer,68 264 265label=AUE_AUDITON_GETCLASS 266 format=kernel 267 syscall=auditon: GETCLASS 268# header,68,2,auditon(2) - get event class,,Mon May 15 09:14:35 2000, + 30001063 msec 269# subject,tuser10,root,other,root,other,1091,367,255 197121 tmach1 270# return,success,0 271# trailer,68 272 273label=AUE_AUDITON_GETCOND 274 format=kernel 275 syscall=auditon: GETCOND 276# header,68,2,auditon(2) - get audit state,,Mon May 15 09:14:48 2000, + 110001736 msec 277# subject,tuser10,root,other,root,other,1248,367,255 197121 tmach1 278# return,success,0 279# trailer,68 280 281label=AUE_AUDITON_GETCWD 282 format=kernel 283 syscall=auditon: GETCWD 284# header,68,2,auditon(2) - get cwd,,Mon May 15 09:15:01 2000, + 120001223 msec 285# subject,tuser10,root,other,root,other,1405,367,255 197121 tmach1 286# return,success,0 287# trailer,68 288 289label=AUE_AUDITON_GETKMASK 290 format=kernel 291 syscall=auditon: GETKMASK 292# header,68,2,auditon(2) - get kernel mask,,Mon May 15 09:15:14 2000, + 220002225 msec 293# subject,tuser10,root,other,root,other,1562,367,255 197121 tmach1 294# return,success,0 295# trailer,68 296 297label=AUE_AUDITON_GETSTAT 298 format=kernel 299 syscall=auditon: A_GETSTAT 300# header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:27 2000, + 220003386 msec 301# subject,tuser10,root,other,root,other,1719,367,255 197121 tmach1 302# return,success,0 303# trailer,68 304 305label=AUE_AUDITON_GPOLICY 306 format=kernel 307 syscall=auditon: GPOLICY 308# header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:40 2000, + 120004056 msec 309# subject,tuser10,root,other,root,other,1879,367,255 197121 tmach1 310# return,success,0 311# trailer,68 312 313label=AUE_AUDITON_GQCTRL 314 format=kernel 315 syscall=auditon: GQCTRL 316# header,68,2,auditon(2) - GQCTRL command,,Mon May 15 09:15:53 2000, + 20001415 msec 317# subject,tuser10,root,other,root,other,2033,367,255 197121 tmach1 318# return,success,0 319# trailer,68 320 321 322label=AUE_AUDITON_GTERMID 323 skip=Not used. 324 325label=AUE_AUDITON_SESTATE 326 skip=Not used. 327 328label=AUE_AUDITON_SETCLASS 329 format=[arg]1:[arg]2 330 comment=2, "setclass:ec_event", event number: 331 comment=3, "setclass:ec_class", class mask 332 syscall=auditon: SETCLASS 333# header,120,2,auditon(2) - set event class,,Mon May 15 09:16:39 2000, + 800002966 msec 334# argument,2,0x0,setclass:ec_event 335# argument,3,0x0,setclass:ec_class 336# subject,tuser10,root,other,root,other,2190,367,255 197121 tmach1 337# return,success,0 338# trailer,120 339 340label=AUE_AUDITON_SETCOND 341 format=[arg]1 342 comment=3, "setcond", audit state 343 syscall=auditon: SETCOND 344 345label=AUE_AUDITON_SETKMASK 346 format=[arg]1:[arg]2 347 comment=2, "setkmask as_success", kernel mask: 348 comment=2, "setkmask as_failure", kernel mask 349 syscall=auditon: SETKMASK 350# header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:06 2000, + 300000807 msec 351# argument,2,0x0,setkmask:as_success 352# argument,2,0x0,setkmask:as_failure 353# subject,tuser10,root,other,root,other,2506,367,255 197121 tmach1 354# return,success,0 355# trailer,124 356# header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:20 2000, + 430001289 msec 357# argument,2,0x0,setkmask:as_success 358# argument,2,0x0,setkmask:as_failure 359# subject,tuser10,tuser10,other,root,other,2620,367,255 197121 tmach1 360# return,failure: Not owner,-1 361# trailer,124 362 363label=AUE_AUDITON_SETSMASK 364 format=[arg]1:[arg]2 365 comment=3, "setsmask:as_success", session ID mask: 366 comment=3, "setsmask:as_failure", session ID mask 367 syscall=auditon: SETSMASK 368# header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:33 2000, + 580000668 msec 369# argument,3,0x400,setsmask:as_success 370# argument,3,0x400,setsmask:as_failure 371# subject,tuser10,root,other,root,other,2777,367,255 197121 tmach1 372# return,success,0 373# trailer,124 374# header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:45 2000, + 700001710 msec 375# argument,3,0x400,setsmask:as_success 376# argument,3,0x400,setsmask:as_failure 377# subject,tuser10,tuser10,other,root,other,2885,367,255 197121 tmach1 378# return,failure: Not owner,-1 379# trailer,124 380 381label=AUE_AUDITON_SETSTAT 382 format=kernel 383 syscall=auditon: SETSTAT 384# header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:17:58 2000, + 930000818 msec 385# subject,tuser10,root,other,root,other,3042,367,255 197121 tmach1 386# return,success,0 387# trailer,68 388# header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:18:13 2000, + 160001101 msec 389# subject,tuser10,tuser10,other,root,other,3156,367,255 197121 tmach1 390# return,failure: Not owner,-1 391# trailer,68 392 393label=AUE_AUDITON_SETUMASK 394 format=[arg]1:[arg]2 395 comment=3, "setumask:as_success", audit ID mask: 396 comment=3, "setumask:as_failure", audit ID mask 397 syscall=auditon: SETUMASK 398# header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:26 2000, + 670003527 msec 399# argument,3,0x400,setumask:as_success 400# argument,3,0x400,setumask:as_failure 401# subject,tuser10,root,other,root,other,3313,367,255 197121 tmach1 402# return,success,0 403# trailer,124 404# header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:38 2000, + 740000732 msec 405# argument,3,0x400,setumask:as_success 406# argument,3,0x400,setumask:as_failure 407# subject,tuser10,tuser10,other,root,other,3421,367,255 197121 tmach1 408# return,failure: Not owner,-1 409# trailer,124 410 411label=AUE_AUDITON_SPOLICY 412 format=[arg]1 413 comment=1, audit policy flags, "setpolicy" 414 syscall=auditon: SPOLICY 415# header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:18:54 2000, + 840 msec 416# argument,3,0x200,setpolicy 417# subject,tuser10,root,other,root,other,3584,367,255 197121 tmach1 418# return,success,0 419# trailer,86 420# header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:19:08 2000, + 200002798 msec 421# argument,3,0x200,setpolicy 422# subject,tuser10,tuser10,other,root,other,3698,367,255 197121 tmach1 423# return,failure: Not owner,-1 424# trailer,86 425 426label=AUE_AUDITON_SQCTRL 427 format=[arg]1:[arg]2:[arg]3:[arg]4 428 comment=3, "setqctrl:aq_hiwater", queue control param.: 429 comment=3, "setqctrl:aq_lowater", queue control param.: 430 comment=3, "setqctrl:aq_bufsz", queue control param.: 431 comment=3, "setqctrl:aq_delay", queue control param. 432 syscall=auditon: SQCTRL 433# header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:23 2000, + 610001124 msec 434# argument,3,0x64,setqctrl:aq_hiwater 435# argument,3,0xa,setqctrl:aq_lowater 436# argument,3,0x400,setqctrl:aq_bufsz 437# argument,3,0x14,setqctrl:aq_delay 438# subject,tuser10,root,other,root,other,3861,367,255 197121 tmach1 439# return,success,0 440# trailer,176 441# header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:35 2000, + 720003197 msec 442# argument,3,0x64,setqctrl:aq_hiwater 443# argument,3,0xa,setqctrl:aq_lowater 444# argument,3,0x400,setqctrl:aq_bufsz 445# argument,3,0x14,setqctrl:aq_delay 446# subject,tuser10,tuser10,other,root,other,3969,367,255 197121 tmach1 447# return,failure: Not owner,-1 448# trailer,176 449 450label=AUE_AUDITON_STERMID 451 skip=Not used. 452 453label=AUE_AUDITSTAT 454 skip=Not used. 455 456label=AUE_AUDITSVC 457 skip=Not used. 458 459label=AUE_AUDITSYS 460 skip=Not used. (Place holder for various auditing events.) 461 462label=AUE_BIND 463# differs from documented version. 464# cases "no vnode" not fully confirmed 465# family and type need argument number 466 case=Invalid socket handle 467 format=arg1 468 comment=1, file descriptor, "so" 469 case=If there is no vnode for this file descriptor 470 case=or if the socket is not of the AF_INET family 471 format=arg1:arg2:arg3 472 comment=1, file descriptor, "so": 473 comment=1, socket family, "family": 474 comment=1, socket type, "type" 475 case=or for all other conditions 476 format=arg1:inet2 477 comment=1, file descriptor, "so": 478 comment=socket address 479 480label=AUE_BRANDSYS 481# generic mechanism to allow user-space and kernel components of a brand 482# to communicate. The interpretation of the arguments to the call is 483# left entirely up to the brand. 484 format=arg1:arg2:arg3:arg4:arg5:arg6:arg7 485 comment=1, command, "cmd": 486 comment=2, command args, "arg": 487 comment=3, command args, "arg": 488 comment=4, command args, "arg": 489 comment=5, command args, "arg": 490 comment=6, command args, "arg": 491 comment=7, command args, "arg" 492 493label=AUE_BSMSYS 494 skip=Not used. 495 496label=AUE_CHDIR 497 format=path:[attr] 498# header,151,2,chdir(2),,Mon May 15 09:20:15 2000, + 70000899 msec 499# path,/export/home/CC_final/icenine/arv/chdir/obj_succ 500# attribute,40777,root,other,8388608,231558,0 501# subject,tuser10,tuser10,other,root,other,4436,367,255 197121 tmach1 502# return,success,0 503# trailer,151 504# header,151,2,chdir(2),,Mon May 15 09:20:27 2000, + 640003327 msec 505# path,/export/home/CC_final/icenine/arv/chdir/obj_fail 506# attribute,40000,root,other,8388608,237646,0 507# subject,tuser10,tuser10,other,root,other,4566,367,255 197121 tmach1 508# return,failure: Permission denied,-1 509# trailer,151 510 511label=AUE_CHMOD 512 format=arg1:path:[attr] 513 comment=2, mode, "new file mode" 514# header,173,2,chmod(2),,Mon May 15 09:20:41 2000, + 140000831 msec 515# argument,2,0x1f8,new file mode 516# path,/export/home/CC_final/icenine/arv/chmod/obj_succ 517# attribute,100770,tuser10,other,8388608,243608,0 518# subject,tuser10,tuser10,other,root,other,4748,367,255 197121 tmach1 519# return,success,0 520# trailer,173 521# header,173,2,chmod(2),,Mon May 15 09:20:54 2000, + 400001156 msec 522# argument,2,0x1f8,new file mode 523# path,/export/home/CC_final/icenine/arv/chmod/obj_fail 524# attribute,100600,root,other,8388608,243609,0 525# subject,tuser10,tuser10,other,root,other,4879,367,255 197121 tmach1 526# return,failure: Not owner,-1 527# trailer,173 528 529label=AUE_CHOWN 530 format=arg1:arg2 531 comment=2, uid, "new file uid": 532 comment=3, gid, "new file gid" 533# header,193,2,chown(2),,Mon May 15 09:21:07 2000, + 930000756 msec 534# argument,2,0x271a,new file uid 535# argument,3,0xffffffff,new file gid 536# path,/export/home/CC_final/icenine/arv/chown/obj_succ 537# attribute,100644,tuser10,other,8388608,268406,0 538# subject,tuser10,tuser10,other,root,other,5062,367,255 197121 tmach1 539# return,success,0 540# trailer,193 541# header,193,2,chown(2),,Mon May 15 09:21:20 2000, + 430001153 msec 542# argument,2,0x271a,new file uid 543# argument,3,0xffffffff,new file gid 544# path,/export/home/CC_final/icenine/arv/chown/obj_fail 545# attribute,100644,root,other,8388608,268407,0 546# subject,tuser10,tuser10,other,root,other,5191,367,255 197121 tmach1 547# return,failure: Not owner,-1 548# trailer,193 549 550label=AUE_CHROOT 551 format=path:[attr] 552# header,104,2,chroot(2),,Mon May 15 09:21:33 2000, + 860001094 msec 553# path,/ 554# attribute,40755,root,root,8388608,2,0 555# subject,tuser10,root,other,root,other,5370,367,255 197121 tmach1 556# return,success,0 557# trailer,104 558# header,152,2,chroot(2),,Mon May 15 09:21:46 2000, + 130002435 msec 559# path,/export/home/CC_final/icenine/arv/chroot/obj_fail 560# attribute,40777,tuser10,other,8388608,335110,0 561# subject,tuser10,tuser10,other,root,other,5499,367,255 197121 tmach1 562# return,failure: Not owner,-1 563# trailer,152 564 565label=AUE_CLOCK_SETTIME 566 format=kernel 567 568label=AUE_CLOSE 569 format=arg1:[path]:[attr] 570 comment=1, file descriptor, "fd" 571 572label=AUE_CONFIGKSSL 573 case=Adding KSSL entry. 574 format=text1:inaddr2:text3:text4 575 comment=opcode, KSSL_ADD_ENTRY: 576 comment=local IP address: 577 comment=SSL port number: 578 comment=proxy port number 579 case=Deleting KSSL entry. 580 format=text1:inaddr2:text3 581 comment=opcode, KSSL_DELETE_ENTRY: 582 comment=local IP address: 583 comment=SSL port number 584 585label=AUE_CONNECT 586# cases "no vnode" not fully confirmed 587 case=If there is no vnode for this file descriptor 588 case=If the socket address is not part of the AF_INET family 589 format=arg1:arg2:arg3 590 comment=1, file descriptor, "so": 591 comment=1, socket family, "family": 592 comment=1, socket type, "type" 593 case=If the socket address is part of the AF_INET family 594 format=arg1:inet2 595 comment=1, file descriptor, "so": 596 comment=socket address 597 598label=AUE_CORE 599 syscall=none 600 title=process dumped core 601 see=none 602 format=path:[attr]:arg1 603 comment=1, signal, "signal" 604# see uts/common/c2/audit.c 605 606label=AUE_CREAT 607# obsolete - see open(2) 608 format=path:[attr] 609# does not match old BSM manual 610# header,151,2,creat(2),,Mon May 15 09:21:59 2000, + 509998810 msec 611# path,/export/home/CC_final/icenine/arv/creat/obj_succ 612# attribute,100644,tuser10,other,8388608,49679,0 613# subject,tuser10,tuser10,other,root,other,5678,367,255 197121 tmach1 614# return,success,8 615# trailer,151 616# header,107,2,creat(2),,Mon May 15 09:22:12 2000, + 50001852 msec 617# path,/devices/pseudo/mm@0:null 618# subject,tuser10,root,other,root,other,5809,367,255 197121 tmach1 619# return,success,8 620# trailer,107 621# header,83,2,creat(2),,Mon May 15 09:22:12 2000, + 70001870 msec 622# path,/obj_fail 623# subject,tuser10,tuser10,other,root,other,5806,367,255 197121 tmach1 624# return,failure: Permission denied,-1 625# trailer,83 626 627label=AUE_CRYPTOADM 628 title=kernel cryptographic framework 629 format=text1:(0..n)[text]2 630 comment=cryptoadm command/operation: 631 comment=mechanism list 632 633label=AUE_DOORFS 634 skip=Not used. (Place holder for set of door audit events.) 635 636label=AUE_DOORFS_DOOR_BIND 637 skip=Not used. 638 syscall=doorfs: DOOR_BIND 639 640label=AUE_DOORFS_DOOR_CALL 641 format=arg1:proc2 642 comment=1, door ID, "door ID": 643 comment=for process that owns the door 644 syscall=doorfs: DOOR_CALL 645 646label=AUE_DOORFS_DOOR_CREATE 647 format=arg1 648 comment=1, door attributes, "door attr" 649 syscall=doorfs: DOOR_CREATE 650 651label=AUE_DOORFS_DOOR_CRED 652 skip=Not used. 653 syscall=doorfs: DOOR_CRED 654 655label=AUE_DOORFS_DOOR_INFO 656 skip=Not used. 657 syscall=doorfs: DOOR_INFO 658 659label=AUE_DOORFS_DOOR_RETURN 660 format=kernel 661 syscall=doorfs: DOOR_RETURN 662 663label=AUE_DOORFS_DOOR_REVOKE 664 format=arg1 665 comment=1, door ID, "door ID" 666 syscall=doorfs: DOOR_REVOKE 667 668label=AUE_DOORFS_DOOR_UNBIND 669 skip=Not used. 670 syscall=doorfs: DOOR_UNBIND 671 672label=AUE_DUP2 673skip=Not used. 674 675label=AUE_ENTERPROM 676 title=enter prom 677 syscall=none 678 format=head:text1:ret 679 comment="kmdb" 680# header,48,2,enter prom,na,tmach1,2004-11-12 09:07:41.342 -08:00 681# text,kmdb 682# return,success,0 683 684label=AUE_EXEC 685# obsolete - see execve(2) 686 format=path:[attr]1:[exec_args]2:[exec_env]3 687 comment=omitted on error: 688 comment=output if argv policy is set: 689 comment=output if arge policy is set 690 691label=AUE_EXECVE 692 format=path:[attr]1:[exec_args]2:[exec_env]3 693 comment=omitted on error: 694 comment=output if argv policy is set: 695 comment=output if arge policy is set 696# header,107,2,creat(2),,Mon May 15 09:22:25 2000, + 559997464 msec 697# path,/devices/pseudo/mm@0:null 698# subject,tuser10,root,other,root,other,5974,367,255 197121 tmach1 699# return,success,8 700# trailer,107 701# header,86,2,execve(2),,Mon May 15 09:22:25 2000, + 590003684 msec 702# path,/usr/bin/pig 703# subject,tuser10,tuser10,other,root,other,5971,367,255 197121 tmach1 704# return,failure: No such file or directory,-1 705# trailer,86 706 707label=AUE_PFEXEC 708 format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5 709 comment=pathname of the executable: 710 comment=pathname of working directory: 711 comment=privileges if the limit or inheritable set are changed: 712 comment=process if ruid, euid, rgid or egid is changed: 713 comment=output if arge policy is set 714 715label=AUE_EXIT 716 format=arg1:[text]2 717 comment=1, exit status, "exit status": 718 comment=event aborted 719 720label=AUE_EXITPROM 721 title=exit prom 722 syscall=none 723 format=head:text1:ret 724 comment="kmdb" 725# header,48,2,exit prom,na,tmach1,2004-11-12 09:07:43.547 -08:00 726# text,kmdb 727# return,success,0 728 729label=AUE_EXPORTFS 730 skip=Not used. 731 732label=AUE_FACCESSAT 733# obsolete 734 see=access(2) 735 format=path:[attr] 736 737label=AUE_FACLSET 738 syscall=facl 739 case=Invalid file descriptor 740 format=arg1:arg2 741 comment=2, SETACL, "cmd": 742 comment=3, number of ACL entries, "nentries" 743 case=Zero path 744 format=arg1:arg2:arg3:[attr]:(0..n)[acl]4 745 comment=2, SETACL, "cmd": 746 comment=3, number of ACL entries, "nentries": 747 comment=1, file descriptor, "no path: fd": 748 comment=ACLs 749 case=Non-zero path 750 format=arg1:arg2:path:[attr]:(0..n)[acl]3 751 comment=2, SETACL, "cmd": 752 comment=3, number of ACL entries, "nentries": 753 comment=ACLs 754 755label=AUE_FCHDIR 756 format=[path]:[attr] 757# header,150,2,fchdir(2),,Mon May 15 09:22:38 2000, + 680001393 msec 758# path,/export/home/CC_final/icenine/arv/fchdir/obj_succ 759# attribute,40777,tuser10,other,8388608,207662,0 760# subject,tuser10,tuser10,other,root,other,6129,367,255 197121 tmach1 761# return,success,0 762# trailer,150 763# header,68,2,fchdir(2),,Mon May 15 09:22:51 2000, + 710001196 msec 764# subject,tuser10,tuser10,other,root,other,6258,367,255 197121 tmach1 765# return,failure: Permission denied,-1 766# trailer,68 767 768label=AUE_FCHMOD 769 case=With a valid file descriptor and path 770 format=arg1:path:[attr] 771 comment=2, mode, "new file mode" 772 case=With a valid file descriptor and invalid path 773 format=arg1:[arg]2:[attr] 774 comment=2, mode, "new file mode": 775 comment=1, file descriptor, "no path: fd" 776 case=With an invalid file descriptor 777 format=arg1 778 comment=2, mode, "new file mode" 779# header,168,2,fchmod(2),,Sat Apr 29 12:28:06 2000, + 350000000 msec 780# argument,2,0x1a4,new file mode 781# path,/export/home/CC/icenine/arv/fchmod/obj_succ 782# attribute,100644,tuser10,other,7602240,26092,0 783# subject,tuser10,tuser10,other,root,other,11507,346,16064 196866 tmach1 784# return,success,0 785# trailer,168 786# header,90,2,fchmod(2),,Sat Apr 29 12:28:32 2000, + 930000000 msec 787# argument,2,0x1a4,new file mode 788# subject,tuser10,tuser10,other,root,other,11759,346,16064 196866 tmach1 789# return,failure: Bad file number,-1 790# trailer,90 791# header,168,2,fchmod(2),,Sat Apr 29 12:28:20 2000, + 770000000 msec 792# argument,2,0x1a4,new file mode 793# path,/export/home/CC/icenine/arv/fchmod/obj_fail 794# attribute,100644,root,other,7602240,26093,0 795# subject,tuser10,tuser10,other,root,other,11644,346,16064 196866 tmach1 796# return,failure: Not owner,-1 797# trailer,168 798 799label=AUE_FCHOWN 800 case=With a valid file descriptor 801 format=arg1:arg2:[path]:[attr] 802 comment=2, uid, "new file uid": 803 comment=3, gid, "new file gid" 804 case=With an invalid file descriptor 805 format=arg1:arg2:[arg]3:[attr] 806 comment=2, uid, "new file uid": 807 comment=3, gid, "new file gid": 808 comment=1, file descriptor, "no path fd" 809 810label=AUE_FCHOWNAT 811# obsolete 812 see=openat(2) 813 case=With a valid absolute/relative file path 814 format=path:[attr] 815 case=With an file path eq. NULL and valid file descriptor 816 format=kernel 817 818label=AUE_FCHROOT 819 format=[path]:[attr] 820# fchroot -> chdirec -> audit_chdirec 821 822label=AUE_FCNTL 823 case=With a valid file descriptor 824 format=arg1:[arg]2:path:attr 825 comment=2, command, "cmd": 826 comment=3, flags, "flags" 827 case=With an invalid file descriptor 828 format=arg1:[arg]2:arg3 829 comment=2, command, "cmd": 830 comment=3, flags, "flags": 831 comment=1, file descriptor, "no path fd" 832 note=Flags are included only when cmd is F_SETFL. 833 834label=AUE_FLOCK 835 skip=Not used. 836 837label=AUE_FORKALL 838 format=[arg]1 839 comment=0, pid, "child PID" 840 note=The forkall(2) return values are undefined because the audit record 841 note=is produced at the point that the child process is spawned. 842# see audit.c 843 844label=AUE_FORK1 845 format=[arg]1 846 comment=0, pid, "child PID" 847 note=The fork1(2) return values are undefined because the audit record 848 note=is produced at the point that the child process is spawned. 849# see audit.c 850 851label=AUE_FSAT 852# obsolete 853 skip=Not used. (Placeholder for AUE_*AT records) 854 855label=AUE_FSTAT 856 skip=Not used. 857 858label=AUE_FSTATAT 859# obsolete 860 format=path:[attr] 861 862label=AUE_FSTATFS 863 case=With a valid file descriptor 864 format=[path]:[attr] 865 case=With an invalid file descriptor 866 format=arg1 867 comment=1, file descriptor, "no path fd" 868 869label=AUE_FTRUNCATE 870 skip=Not used. 871 872label=AUE_FUSERS 873 syscall=utssys: UTS_FUSERS 874 format=path:attr 875 876label=AUE_FUTIMESAT 877# obsolete 878 format=[path]:[attr] 879 880label=AUE_GETAUDIT 881 format=kernel 882# header,68,2,getaudit(2),,Mon May 15 09:23:57 2000, + 620001408 msec 883# subject,tuser10,root,other,root,other,7063,367,255 197121 tmach1 884# return,success,0 885# trailer,68 886# header,68,2,getaudit(2),,Mon May 15 09:24:09 2000, + 490003700 msec 887# subject,tuser10,root,other,root,other,7158,367,255 197121 tmach1 888# return,success,0 889# trailer,68 890 891label=AUE_GETAUDIT_ADDR 892 format=kernel 893# header,73,2,getaudit_addr(2),,Thu Nov 08 15:14:01 2001, + 0 msec 894# subject,tuser1,root,staff,root,staff,9689,12289,0 0 tmach2 895# return,success,0 896 897label=AUE_GETAUID 898 format=kernel 899# header,68,2,getauid(2),,Mon May 15 09:24:22 2000, + 420000668 msec 900# subject,tuser10,root,other,root,other,7303,367,255 197121 tmach1 901# return,success,0 902# trailer,68 903# header,68,2,getauid(2),,Mon May 15 09:24:34 2000, + 490002988 msec 904# subject,tuser10,tuser10,other,root,other,7410,367,255 197121 tmach1 905# return,failure: Not owner,-1 906# trailer,68 907 908label=AUE_GETDENTS 909 skip=Not used. 910#Not security relevant 911 912label=AUE_GETKERNSTATE 913 skip=Not used. 914 915label=AUE_GETMSG 916 case=With a valid file descriptor 917 format=arg1:[path]:attr:arg2 918 comment=1, file descriptor, "fd": 919 comment=4, priority, "pri" 920 case=With an invalid file descriptor 921 format=arg1:arg2 922 comment=1, file descriptor, "fd": 923 comment=4, priority, "pri" 924 925label=AUE_GETPMSG 926 case=With a valid file descriptor 927 format=arg1:[path]:attr 928 comment=1, file descriptor, "fd" 929 case=With an invalid file descriptor 930 format=arg1 931 comment=1, file descriptor, "fd" 932 933label=AUE_GETPORTAUDIT 934 format=Not used. 935 936label=AUE_GETUSERAUDIT 937 skip=Not used. 938 939label=AUE_INST_SYNC 940 format=arg1 941 comment=2, flags value, "flags" 942 943label=AUE_IOCTL 944 case=With an invalid file descriptor 945 format=arg1:arg2:arg3 946 comment=1, file descriptor, "fd": 947 comment=2, command, "cmd": 948 comment=3, arg, "arg" 949 case=With a valid file descriptor 950 format=path:[attr]:arg1:arg2 951 comment=2, ioctl cmd, "cmd": 952 comment=3, ioctl arg, "arg" 953 case=Non-file file descriptor 954 format=arg1:arg2:arg3 955 comment=1, file descriptor, "fd": 956 comment=2, ioctl cmd, "cmd": 957 comment=3, ioctl arg, "arg" 958 case=Bad file name 959 format=arg1:arg2:arg3 960 comment=1, file descriptor, "no path: fd": 961 comment=2, ioctl cmd, "cmd": 962 comment=3, ioctl arg, "arg" 963# old BSM manual misses a case 964 965label=AUE_JUNK 966 skip=Not used. 967 968label=AUE_KILL 969 case=Valid process 970 format=arg1:[proc] 971 comment=2, signo, "signal" 972 case=Zero or negative process 973 format=arg1:arg2 974 comment=2, signo, "signal": 975 comment=1, pid, "process" 976 977label=AUE_KILLPG 978 skip=Not used. 979 980label=AUE_LCHOWN 981 format=arg1:arg2:path:[attr] 982 comment=2, uid, "new file uid": 983 comment=3, gid, "new file gid" 984 985label=AUE_LINK 986 format=path1:[attr]:path2 987 comment=from path: 988 comment=to path 989 990label=AUE_LSEEK 991 skip=Not used. 992 993label=AUE_LSTAT 994 format=path:[attr] 995 996label=AUE_LXSTAT 997# obsolete 998 skip=Not used. 999 1000label=AUE_MCTL 1001 skip=Not used. 1002 1003label=AUE_MEMCNTL 1004 format=arg1:arg2:arg3:arg4:arg5:arg6 1005 comment=1, base address, "base": 1006 comment=2, length, "len": 1007 comment=3, command, "cmd": 1008 comment=4, command args, "arg": 1009 comment=5, command attributes, "attr": 1010 comment=6, 0, "mask" 1011 1012label=AUE_MKDIR 1013 format=arg1:path:[attr] 1014 comment=2, mode, "mode" 1015 1016label=AUE_MKNOD 1017 format=arg1:arg2:path:[attr] 1018 comment=2, mode, "mode": 1019 comment=3, dev, "dev" 1020 1021label=AUE_MMAP 1022 case=With a valid file descriptor 1023 format=arg1:arg2:[path]3:[attr] 1024 comment=1, segment address, "addr": 1025 comment=2, segment address, "len": 1026 comment=if no path, then argument: \ 1027 1, "nopath: fd", file descriptor 1028 case=With an invalid file descriptor 1029 format=arg1:arg2:arg3 1030 comment=1, segment address, "addr": 1031 comment=2, segment address, "len": 1032 comment=1, file descriptor, "no path: fd" 1033 1034label=AUE_MODADDMAJ 1035 title=modctl: bind module 1036 syscall=modctl 1037 format=[text]1:[text]2:text3:arg4:(0..n)[text]5 1038 comment=driver major number: 1039 comment=driver name: 1040 comment=driver major number or "no drvname": 1041 comment=5, number of aliases, "": 1042 comment=aliases 1043 1044label=AUE_MODADDPRIV 1045 format=kernel 1046 1047label=AUE_MODCONFIG 1048 skip=Not used. 1049 1050label=AUE_MODCTL 1051 skip=Not used. (placeholder) 1052 1053label=AUE_MODDEVPLCY 1054 syscall=modctl 1055 title=modctl: set device policy 1056 case=If unknown minor name/pattern 1057 format=arg1:arg2:arg3:arg4:arg5 1058 comment=2, "major", major number: 1059 comment=2, "lomin", low minor number, if known: 1060 comment=2, "himin", hi minor number, if known: 1061 comment=privileges required for reading: 1062 comment=privileges required for writing 1063 case=else 1064 format=arg1:text2:arg3:arg4 1065 comment=2, "major", major number: 1066 comment=minor name/pattern: 1067 comment=privileges required for reading: 1068 comment=privileges required for writing 1069 1070label=AUE_MODLOAD 1071 syscall=modctl 1072 title=modctl: load module 1073 format=[text]1:text2 1074 comment=default path: 1075 comment=filename path 1076 1077label=AUE_MODUNLOAD 1078 syscall=modctl 1079 title=modctl: unload module 1080 format=arg1 1081 comment=1, module ID, "id" 1082 1083label=AUE_MOUNT 1084 case=UNIX file system 1085 format=arg1:text2:path:[attr] 1086 comment=3, flags, "flags": 1087 comment=filesystem type 1088 case=NFS file system 1089 format=arg1:text2:text3:arg4:path:[attr] 1090 comment=3, flags, "flags": 1091 comment=filesystem type: 1092 comment=host name: 1093 comment=3, flags, "internal flags" 1094# unix example: 1095# header,239,2,mount(2),,Sun Apr 16 14:42:32 2000, + 979995208 msec 1096# argument,3,0x104,flags 1097# text,ufs 1098# path,/var2 1099# attribute,40755,root,root,32,12160,0 1100# path,/devices/pci@1f,4000/scsi@3/sd@0,0:e 1101# attribute,60640,root,sys,32,231268,137438953476 1102# subject,abc,root,other,root,other,1726,1715,255 66049 ohboy 1103# return,success,4290707268 1104# ^^^^^^^^^^ <- bugid 4333559 1105 1106label=AUE_MSGCTL 1107 format=arg1:[ipc]:[ipc_perm] 1108 comment=1, message ID, "msg ID" 1109 note=ipc_perm 1110# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1111 1112label=AUE_MSGCTL_RMID 1113 format=arg1:[ipc]:[ipc_perm] 1114 comment=1, message ID, "msg ID" 1115 note=ipc_perm 1116 syscall=msgctl: IPC_RMID 1117# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1118 1119label=AUE_MSGCTL_SET 1120 format=arg1:[ipc]:[ipc_perm] 1121 comment=1, message ID, "msg ID" 1122 note=ipc_perm 1123 syscall=msgctl: IPC_SET 1124# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1125 1126label=AUE_MSGCTL_STAT 1127 format=arg1:[ipc]:[ipc_perm] 1128 comment=1, message ID, "msg ID" 1129 note=ipc_perm 1130 syscall=msgctl: IPC_STAT 1131# ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc 1132 1133label=AUE_MSGGET 1134 format=arg1:ipc 1135 comment=1, message key, "msg key" 1136 note=ipc_perm 1137 syscall=msgget 1138 1139label=AUE_MSGGETL 1140 skip=Not used. 1141 1142label=AUE_MSGRCV 1143 format=arg1:[ipc]:[ipc_perm] 1144 comment=1, message ID, "msg ID" 1145 note=ipc_perm 1146 syscall=msgrcv 1147# ipc, ipc_perm: msgrcv -> ipc_lookup -> audit_ipc 1148 1149label=AUE_MSGRCVL 1150 skip=Not used. 1151 1152label=AUE_MSGSND 1153 format=arg1:[ipc]:[ipc_perm] 1154 comment=1, message ID, "msg ID" 1155 note=ipc_perm 1156 syscall=msgsnd 1157# ipc, ipc_perm: msgsnd -> ipc_lookup -> audit_ipc 1158 1159label=AUE_MSGSNDL 1160 skip=Not used. 1161 1162label=AUE_MSGSYS 1163skip=Not used. (Placeholder for AUE_MSG* events.) 1164 1165label=AUE_MUNMAP 1166 format=arg1:arg2 1167 comment=1, address of memory, "addr": 1168 comment=2, memory segment size, "len" 1169 1170label=AUE_NFS 1171 skip=Not used. 1172 1173label=AUE_NFSSVC_EXIT 1174 skip=Not used. 1175 1176label=AUE_NFS_GETFH 1177 skip=Not used. 1178 1179label=AUE_NFS_SVC 1180 skip=Not used. 1181 1182label=AUE_NICE 1183 format=kernel 1184 1185label=AUE_NULL 1186 skip=Not used. (placeholder) 1187# used internal to audit_event.c for minimal audit 1188 1189label=AUE_NTP_ADJTIME 1190 format=kernel 1191 1192label=AUE_ONESIDE 1193 skip=Not used. 1194 1195label=AUE_OPEN 1196 skip=Not used. (placeholder for AUE_OPEN_*). 1197 1198label=AUE_OPEN_R 1199 format=path:[path_attr]:[attr] 1200 see=open(2) - read 1201 1202label=AUE_OPENAT_R 1203# obsolete 1204 format=path:[path_attr]:[attr] 1205 see=openat(2) 1206 1207label=AUE_OPEN_RC 1208 format=path:[path_attr]:[attr] 1209 see=open(2) - read,creat 1210 1211label=AUE_OPENAT_RC 1212# obsolete 1213 see=openat(2) 1214 format=path:[path_attr]:[attr] 1215 1216label=AUE_OPEN_RT 1217 format=path:[path_attr]:[attr] 1218 see=open(2) - read,trunc 1219 1220label=AUE_OPENAT_RT 1221# obsolete 1222 see=openat(2) 1223 format=path:[path_attr]:[attr] 1224 1225label=AUE_OPEN_RTC 1226 format=path:[path_attr]:[attr] 1227 see=open(2) - read,trunc,creat 1228 1229label=AUE_OPENAT_RTC 1230# obsolete 1231 see=openat(2) 1232 format=path:[path_attr]:[attr] 1233 1234label=AUE_OPEN_RW 1235 format=path:[path_attr]:[attr] 1236 see=open(2) - read,write 1237 1238label=AUE_OPENAT_RW 1239# obsolete 1240 see=openat(2) 1241 format=path:[path_attr]:[attr] 1242# aui_fsat(): fm & O_RDWR 1243 1244label=AUE_OPEN_RWC 1245 format=path:[path_attr]:[attr] 1246 see=open(2) - read,write,creat 1247 1248label=AUE_OPENAT_RWC 1249# obsolete 1250 see=openat(2) 1251 format=path:[path_attr]:[attr] 1252 1253label=AUE_OPEN_RWT 1254 format=path:[path_attr]:[attr] 1255 see=open(2) - read,write,trunc 1256 1257label=AUE_OPENAT_RWT 1258# obsolete 1259 see=openat(2) 1260 format=path:[path_attr]:[attr] 1261 1262label=AUE_OPEN_RWTC 1263 format=path:[path_attr]:[attr] 1264 see=open(2) - read,write,trunc,creat 1265 1266label=AUE_OPENAT_RWTC 1267# obsolete 1268 see=openat(2) 1269 format=path:[path_attr]:[attr] 1270 1271label=AUE_OPEN_W 1272 format=path:[path_attr]:[attr] 1273 see=open(2) - write 1274 1275label=AUE_OPENAT_W 1276 see=openat(2) 1277 format=path:[path_attr]:[attr] 1278 1279label=AUE_OPEN_WC 1280 format=path:[path_attr]:[attr] 1281 see=open(2) - write,creat 1282 1283label=AUE_OPENAT_WC 1284 see=openat(2) 1285 format=path:[path_attr]:[attr] 1286 1287label=AUE_OPEN_WT 1288 format=path:[path_attr]:[attr] 1289 see=open(2) - write,trunc 1290 1291label=AUE_OPENAT_WT 1292 see=openat(2) 1293 format=path:[path_attr]:[attr] 1294 1295label=AUE_OPEN_WTC 1296 format=path:[path_attr]:[attr] 1297 see=open(2) - write,trunc,creat 1298 1299label=AUE_OPENAT_WTC 1300 see=openat(2) 1301 format=path:[path_attr]:[attr] 1302 1303label=AUE_OPEN_S 1304 format=path:[path_attr]:[attr] 1305 see=open(2) - search 1306 1307label=AUE_OPEN_E 1308 format=path:[path_attr]:[attr] 1309 see=open(2) - exec 1310 1311label=AUE_OSETPGRP 1312 skip=Not used. 1313 1314label=AUE_OSTAT 1315# obsolete 1316 skip=Not used. 1317 1318label=AUE_PATHCONF 1319 format=path:[attr] 1320 1321label=AUE_PIPE 1322format=kernel 1323# class is no, not usually printed 1324 1325label=AUE_PORTFS 1326 skip=Not used (placeholder for AUE_PORTFS_*). 1327 1328label=AUE_PORTFS 1329 skip=Not used (placeholder for AUE_PORTFS_*). 1330 1331label=AUE_PORTFS_ASSOCIATE 1332 syscall=portfs 1333 see=port_associate(3C) 1334 case=Port association via PORT_SOURCE_FILE 1335 format=[path]1:attr 1336 comment=name of the file/directory to be watched 1337 1338label=AUE_PORTFS_DISSOCIATE 1339 syscall=portfs 1340 see=port_dissociate(3C) 1341 case=Port disassociation via PORT_SOURCE_FILE 1342 format=kernel 1343 1344label=AUE_PRIOCNTLSYS 1345 syscall=priocntl 1346 see=priocntl(2) 1347 format=arg1:arg2 1348 comment=1, priocntl version number, "pc_version": 1349 comment=3, command, "cmd" 1350 1351label=AUE_PROCESSOR_BIND 1352 case=No LWP/thread bound to the processor 1353 format=arg1:arg2:text3:[proc] 1354 comment=1, type of ID, "ID type": 1355 comment=2, ID value, "ID": 1356 comment="PBIND_NONE" 1357 case=With processor bound 1358 format=arg1:arg2:arg3:[proc] 1359 comment=1, type of ID, "ID type": 1360 comment=2, ID value, "ID": 1361 comment=3, processor ID, "processor_id" 1362 1363label=AUE_PUTMSG 1364 see=putmsg(2) 1365 format=arg1:[path]:[attr]:arg2 1366 comment=1, file descriptor, "fd": 1367 comment=4, priority, "pri" 1368 1369label=AUE_PUTPMSG 1370 see=putpmsg(2) 1371 format=arg1:[path]:[attr]:arg2:arg3 1372 comment=1, file descriptor, "fd": 1373 comment=4, priority, "pri": 1374 comment=5, flags, "flags" 1375 1376label=AUE_P_ONLINE 1377 format=arg1:arg2:text3 1378 comment=1, processor ID, "processor ID": 1379 comment=2, flags value, "flags": 1380 comment=text form of flags. Values: \ 1381 P_ONLINE, P_OFFLINE, P_NOINTR, P_SPARE, P_FAULTED, P_STATUS 1382 1383label=AUE_QUOTACTL 1384 skip=Not used. 1385 1386label=AUE_READ 1387 skip=Not used. (Placeholder for AUE_READ_* events) 1388 1389label=AUE_READL 1390 skip=Not used. (Obsolete) 1391 1392label=AUE_READLINK 1393 format=path:[attr] 1394 1395label=AUE_READV 1396 skip=Not used (obsolete) 1397# detritus from CMS 1398 1399label=AUE_READVL 1400 skip=Not used (obsolete) 1401# detritus from CMS 1402 1403label=AUE_REBOOT 1404 skip=Not used. 1405 1406label=AUE_RECV 1407 case=If address family is AF_INET or AF_INET6 1408 format=[arg]1:[inet] 1409 comment=1, file descriptor, "so" 1410 case=If address family is AF_UNIX and path is defined 1411 format=[path]1:[attr] 1412 comment=1, file descriptor, "so" 1413 case=If address family is AF_UNIX and path is NULL 1414 format=[path]1:[attr] 1415 comment=1, file descriptor, "no path: fd" 1416 case=If address family is other than AF_UNIX, AF_INET, AF_INET6 1417 format=[arg]1:[arg]2:[arg]3 1418 comment=1, file descriptor, "so": 1419 comment=1, family, "family": 1420 comment=1, type, "type" 1421# associated class remapped to AUE_READ's class (audit_event.c:audit_s2e[237]) 1422 1423label=AUE_RECVFROM 1424 format=inet:arg1:[arg]2:inet3:arg4 1425 comment=3, message length, "len": 1426 comment=4, flags, "flags": 1427 comment=from address: 1428 comment=6, address length, "tolen" 1429 note=The socket token for a bad socket is reported as "argument 1430 note=token (1, socket descriptor, "fd")" 1431 1432label=AUE_RECVMSG 1433 case=If invalid file descriptor 1434 format=arg1:arg2 1435 comment=1, file descriptor, "so": 1436 comment=3, flags, "flags" 1437 case=If valid file descriptor and socket is AF_UNIX and no path 1438 format=arg1:[attr] 1439 comment=1, file descriptor, "no path: fd" 1440 case=If valid file descriptor and socket is AF_UNIX and path defined 1441 format=path:attr 1442 case=If valid file descriptor and socket is AF_INET or AF_INET6 1443 case=.. if socket type is SOCK_DGRAM or SOCK_RAW or SOCK_STREAM 1444 format=arg1:arg2:inet 1445 comment=1, file descriptor, "so": 1446 comment=2, flags, "flags" 1447 case=.. if socket type is unknown 1448 format=arg1:arg2:arg3:arg4 1449 comment=1, file descriptor, "so": 1450 comment=1, family, "family": 1451 comment=1, type, "type": 1452 comment=3, flags, "flags" 1453 1454label=AUE_RENAME 1455 format=path1:[attr]1:[path]2 1456 comment=from name: 1457 comment=to name 1458 1459label=AUE_RENAMEAT 1460# obsolete 1461 format=path1:[attr]1:[path]2 1462 comment=from name: 1463 comment=to name 1464 1465label=AUE_RFSSYS 1466 skip=Not used. 1467# apparently replaced 1468 1469label=AUE_RMDIR 1470 format=path:[attr] 1471 1472label=AUE_SEMCTL 1473 format=arg1:[ipc]:[ipc_perm] 1474 comment=1, semaphore ID, "sem ID" 1475 note=ipc_perm 1476# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1477 1478label=AUE_SEMCTL_GETALL 1479 format=arg1:[ipc]:[ipc_perm] 1480 comment=1, semaphore ID, "sem ID" 1481 note=ipc_perm 1482 syscall=semctl: GETALL 1483# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1484 1485label=AUE_SEMCTL_GETNCNT 1486 format=arg1:[ipc]:[ipc_perm] 1487 comment=1, semaphore ID, "sem ID" 1488 note=ipc_perm 1489 syscall=semctl: GETNCNT 1490# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1491 1492label=AUE_SEMCTL_GETPID 1493 format=arg1:[ipc]:[ipc_perm] 1494 comment=1, semaphore ID, "sem ID" 1495 note=ipc_perm 1496 syscall=semctl: GETPID 1497# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1498 1499label=AUE_SEMCTL_GETVAL 1500 format=arg1:[ipc]:[ipc_perm] 1501 comment=1, semaphore ID, "sem ID" 1502 note=ipc_perm 1503 syscall=semctl: GETVAL 1504# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1505 1506label=AUE_SEMCTL_GETZCNT 1507 format=arg1:[ipc]:[ipc_perm] 1508 comment=1, semaphore ID, "sem ID" 1509 note=ipc_perm 1510 syscall=semctl: GETZCNT 1511# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1512 1513label=AUE_SEMCTL_RMID 1514 format=arg1:[ipc]:[ipc_perm] 1515 comment=1, semaphore ID, "sem ID" 1516 note=ipc_perm 1517 syscall=semctl: IPC_RMID 1518# ipc, ipc_perm token: semctl -> ipc_rmid -> ipc_lookup -> audit_ipc 1519 1520label=AUE_SEMCTL_SET 1521 format=arg1:[ipc]:[ipc_perm] 1522 comment=1, semaphore ID, "sem ID" 1523 note=ipc_perm 1524 syscall=semctl: IPC_SET 1525# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1526 1527label=AUE_SEMCTL_SETALL 1528 format=arg1:[ipc]:[ipc_perm] 1529 comment=1, semaphore ID, "sem ID" 1530 note=ipc_perm 1531 syscall=semctl: SETALL 1532# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1533 1534label=AUE_SEMCTL_SETVAL 1535 format=arg1:[ipc]:[ipc_perm] 1536 comment=1, semaphore ID, "sem ID" 1537 note=ipc_perm 1538 syscall=semctl: SETVAL 1539# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1540 1541label=AUE_SEMCTL_STAT 1542 format=arg1:[ipc]:[ipc_perm] 1543 comment=1, semaphore ID, "sem ID" 1544 note=ipc_perm 1545 syscall=semctl: IPC_STAT 1546# ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc 1547 1548label=AUE_SEMGET 1549 format=arg1:[ipc_perm]:ipc 1550 comment=1, semaphore ID, "sem key" 1551 note=ipc_perm 1552 syscall=semctl: SETVAL 1553# ipc_perm token: semget -> audit_ipcget 1554 1555label=AUE_SEMGETL 1556 skip=Not used. 1557 1558label=AUE_SEMOP 1559 format=arg1:[ipc]:[ipc_perm] 1560 comment=1, semaphore ID, "sem ID" 1561 note=ipc_perm 1562# ipc, ipc_perm token: semop -> ipc_lookup -> audit_ipc 1563 1564label=AUE_SEMSYS 1565 skip=Not used. (place holder) -- defaults to a semget variant 1566 1567label=AUE_SEND 1568 case=If address family is AF_INET or AF_INET6 1569 format=[arg]1:[inet] 1570 comment=1, file descriptor, "so" 1571 case=If address family is AF_UNIX and path is defined 1572 format=[path]1:[attr] 1573 comment=1, file descriptor, "so" 1574 case=If address family is AF_UNIX and path is NULL 1575 format=[path]1:[attr] 1576 comment=1, file descriptor, "no path: fd" 1577 case=If address family is other than AF_UNIX, AF_INET, AF_INET6 1578 format=[arg]1:[arg]2:[arg]3 1579 comment=1, file descriptor, "so": 1580 comment=1, family, "family": 1581 comment=1, type, "type" 1582# associated class remapped to AUE_WRITE's class (audit_event.c:audit_s2e[240]) 1583 1584label=AUE_SENDMSG 1585 case=If invalid file descriptor 1586 format=arg1:arg2 1587 comment=1, file descriptor, "so": 1588 comment=3, flags, "flags" 1589 case=If valid file descriptor 1590 case=...and address family is AF_UNIX and path is defined 1591 format=path:attr 1592 case=...and address family is AF_UNIX and path is NULL 1593 format=path1:attr 1594 comment=1, file descriptor, "nopath: fd" 1595 case=...and address family is AF_INET or AF_INET6, \ 1596 socket is SOCK_DGRAM, SOCK_RAW or SOCK_STREAM 1597 format=arg1:arg2:inet 1598 comment=1, file descriptor, "so": 1599 comment=3, flags, "flags" 1600 case=...and unknown address family or address family AF_INET or AF_INET6 \ 1601 and not socket SOCK_DGRAM, SOCK_RAW or SOCK_STREAM 1602 format=arg1:arg2:arg3:arg4 1603 comment=1, file descriptor, "so": 1604 comment=1, family, "family": 1605 comment=1, type, "type": 1606 comment=1, flags, "flags" 1607 1608label=AUE_SENDTO 1609 case=If invalid file descriptor 1610 format=arg1:arg2 1611 comment=1, file descriptor, "so": 1612 comment=3, flags, "flags" 1613 case=If valid file descriptor 1614 case=...and socket is AF_UNIX and path is defined 1615 format=path:attr 1616 case=...and address family is AF_UNIX and path is NULL 1617 format=path1:attr 1618 comment=1, file descriptor, "nopath: fd" 1619 case=...and address family is AF_INET or AF_INET6 1620 format=arg1:arg2:inet 1621 comment=1, file descriptor, "so": 1622 comment=3, flags, "flags" 1623 case=...and unknown address family 1624 format=arg1:arg2:arg3:arg4 1625 comment=1, file descriptor, "so": 1626 comment=1, family, "family": 1627 comment=1, type, "type": 1628 comment=1, flags, "flags" 1629 1630label=AUE_SETAUDIT 1631 case=With a valid program stack address 1632 format=arg1:arg2:arg3:arg4:arg5:arg6 1633 comment=1, audit user ID, "setaudit:auid": 1634 comment=1, terminal ID, "setaudit:port": 1635 comment=1, terminal ID, "setaudit:machine": 1636 comment=1, preselection mask, "setaudit:as_success": 1637 comment=1, preselection mask, "setaudit:as_failure": 1638 comment=1, audit session ID, "setaudit:asid" 1639 case=With an invalid program stack address 1640 format=kernel 1641# header,215,2,setaudit(2),,Mon May 15 09:43:28 2000, + 60002627 msec 1642# argument,1,0x271a,setaudit:auid 1643# argument,1,0x3ff0201,setaudit:port 1644# argument,1,0x8192591e,setaudit:machine 1645# argument,1,0x400,setaudit:as_success 1646# argument,1,0x400,setaudit:as_failure 1647# argument,1,0x16f,setaudit:asid 1648# subject,tuser10,root,other,root,other,20620,367,255 197121 tmach1 1649# return,success,0 1650# trailer,215 1651# header,215,2,setaudit(2),,Mon May 15 09:43:40 2000, + 50000847 msec 1652# argument,1,0x271a,setaudit:auid 1653# argument,1,0x3ff0201,setaudit:port 1654# argument,1,0x8192591e,setaudit:machine 1655# argument,1,0x400,setaudit:as_success 1656# argument,1,0x400,setaudit:as_failure 1657# argument,1,0x16f,setaudit:asid 1658# subject,tuser10,root,other,root,other,20720,367,255 197121 tmach1 1659# return,success,0 1660# trailer,215 1661 1662label=AUE_SETAUDIT_ADDR 1663 case=With a valid program stack address 1664 format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7 1665 comment=1, audit user ID, "auid": 1666 comment=1, terminal ID, "port": 1667 comment=1, type, "type": 1668 comment=1, terminal ID, "ip address": 1669 comment=1, preselection mask, "as_success": 1670 comment=1, preselection mask, "as_failure": 1671 comment=1, audit session ID, "asid" 1672 case=With an invalid program stack address 1673 format=kernel 1674# header,172,2,setaudit_addr(2),,Fri Nov 09 13:52:26 2001, + 0 msec 1675# argument,1,0x15fa7,auid 1676# argument,1,0x0,port 1677# argument,1,0x4,type 1678# ip address,tmach2 1679# argument,1,0x9c00,as_success 1680# argument,1,0x9c00,as_failure 1681# argument,1,0x1f1,asid 1682# subject,tuser1,root,staff,tuser1,staff,10420,497,0 0 tmach2 1683# return,success,0 1684 1685label=AUE_SETAUID 1686 format=arg1 1687 comment=2, audit user ID, "setauid" 1688 1689label=AUE_SETDOMAINNAME 1690 skip=Not used. (See AUE_SYSINFO) 1691# See AUE_SYSINFO with SI_SET_SRPC_DOMAIN 1692 1693label=AUE_SETEGID 1694 format=arg1 1695 comment=1, group ID, "gid" 1696 1697label=AUE_SETEUID 1698 format=arg1 1699 comment=1, user ID, "euid" 1700 1701label=AUE_SETGID 1702 format=arg1 1703 comment=1, group ID, "gid" 1704 1705label=AUE_SETGROUPS 1706 note=If more than NGROUPS_MAX_DEFAULT groups listed, 1707 note=no tokens are generated. 1708 case=If no groups in list 1709 format=[arg]1 1710 comment=1, 0, "setgroups" 1711 case=If 1 or more groups in list 1712 format=(1..n)arg1 1713 comment=1, gid, "setgroups" 1714 1715label=AUE_SETHOSTNAME 1716 skip=Not used. (See AUE_SYSINFO) 1717# See sysinfo call with command SI_SET_HOSTNAME 1718 1719label=AUE_SETKERNSTATE 1720 skip=Not used. 1721 1722label=AUE_SETPGID 1723 format=[proc]:[arg]1 1724 comment=2, pgid, "pgid" 1725 1726label=AUE_SETPGRP 1727 format=kernel 1728 1729label=AUE_SETPRIORITY 1730 skip=Not used. 1731 1732label=AUE_SETPPRIV 1733 case=operation privileges off 1734 format=arg1:privset2 1735 comment=setppriv operation: 1736 comment=privileges actually switched off 1737 case=operation privileges on 1738 format=arg1:privset2 1739 comment=setppriv operation: 1740 comment=privileges actually switched on 1741 case=operation privileges off 1742 format=arg1:privset2:privset3 1743 comment=setppriv operation: 1744 comment=privileges before privset: 1745 comment=privileges after privset 1746#header,220,2,settppriv(2),,test1,Mon Oct 6 10:09:05 PDT 2003, + 753 msec 1747#argument,2,0x2,op 1748#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session 1749#privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session 1750#subject,tuser,root,staff,tuser,staff,444,426,200 131585 test0 1751#return,success,0 1752 1753label=AUE_SETREGID 1754 format=arg1:arg2 1755 comment=1, real group ID, "rgid": 1756 comment=2, effective group ID, "egid" 1757 1758label=AUE_SETREUID 1759 format=arg1:arg2 1760 comment=1, real user ID, "ruid": 1761 comment=2, effective user ID, "euid" 1762 1763label=AUE_SETRLIMIT 1764 format=kernel 1765# header,73,2,setrlimit(2),,Thu Nov 08 15:14:17 2001, + 0 msec 1766# subject,tuser1,tuser1,staff,tuser1,staff,9707,497,0 0 tmach2 1767# return,success,0 1768 1769label=AUE_SETSID 1770 format=kernel 1771 1772label=AUE_SETSOCKOPT 1773 case=Invalid file descriptor 1774 format=arg1:arg2 1775 comment=1, file descriptor, "so": 1776 comment=2, level, "level" 1777 case=Valid file descriptor 1778 case=...and socket is AF_UNIX 1779 format=path1:arg2:arg3:arg4:arg5:arg6:[arg]7:[data]8 1780 comment=if no path, will be argument: 1, "nopath: fd", \ 1781 file descriptor: 1782 comment=1, file descriptor, "so": 1783 comment=1, family, "family": 1784 comment=1, type, "type": 1785 comment=2, protocol level, "level": 1786 comment=3, option name, "optname": 1787 comment=5, option length, "optlen": 1788 comment=option data 1789 case=...and socket is AF_INET or AF_INET6 1790 format=arg1:arg2:arg3:[arg]4:[data]5:inet 1791 comment=1, file descriptor, "so": 1792 comment=2, protocol level, "level": 1793 comment=3, option name, "optname": 1794 comment=5, option length, "optlen": 1795 comment=option data 1796 case=...and socket adddress family is unknown 1797 format=arg1:arg2:arg3:arg4:arg5:[arg]6:[data]7 1798 comment=1, file descriptor, "so": 1799 comment=1, family, "family": 1800 comment=1, type, "type": 1801 comment=2, protocol level, "level": 1802 comment=3, option name, "optname": 1803 comment=5, option length, "optlen": 1804 comment=option data 1805 1806label=AUE_SETTIMEOFDAY 1807 skip=Not used. 1808 1809label=AUE_SETUID 1810 syscall=setuid 1811 format=arg1 1812 comment=1, "uid" to be set 1813 1814label=AUE_SETUSERAUDIT 1815 skip=Not used. 1816 1817label=AUE_SHMAT 1818 format=arg1:arg2:[ipc]:[ipc_perm] 1819 comment=1, shared memory ID, "shm ID": 1820 comment=2, shared mem addr, "shm addr" 1821 note=ipc_perm 1822# ipc, ipc_perm token: shmat -> ipc_lookup -> audit_ipc 1823 1824label=AUE_SHMCTL 1825 format=arg1:[ipc]:[ipc_perm] 1826 comment=1, shared memory ID, "shm ID" 1827 note=ipc_perm 1828# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1829 1830label=AUE_SHMCTL_RMID 1831 format=arg1:[ipc]:[ipc_perm] 1832 comment=1, shared memory ID, "shm ID" 1833 note=ipc_perm 1834 syscall=semctl: IPC_RMID 1835# ipc, ipc_perm token: shmctl -> ipc_rmid -> ipc_lookup -> audit_ipc 1836 1837label=AUE_SHMCTL_SET 1838 format=arg1:[ipc]:[ipc_perm] 1839 comment=1, shared memory ID, "shm ID" 1840 note=ipc_perm 1841 syscall=semctl: IPC_SET 1842# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1843 1844label=AUE_SHMCTL_STAT 1845 format=arg1:[ipc]:[ipc_perm] 1846 comment=1, shared memory ID, "shm ID" 1847 note=ipc_perm 1848 syscall=semctl: IPC_STAT 1849# ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc 1850 1851label=AUE_SHMDT 1852 format=arg1 1853 comment=1, shared memory address, "shm adr" 1854 1855label=AUE_SHMGET 1856 format=arg1:[ipc_perm]:[ipc] 1857 comment=0, shared memory key, "shm key" 1858 note=ipc_perm 1859# ipc_perm: shmget -> audit_ipcget 1860 1861label=AUE_SHMGETL 1862 skip=Not used. 1863 1864label=AUE_SHMSYS 1865 skip=Not used. (Placeholder for shmget and shmctl*) 1866 1867label=AUE_SHUTDOWN 1868 case=If the socket address is invalid 1869 format=[arg]1:[text]2:[text]3 1870 comment=1, file descriptor, "fd": 1871 comment=bad socket address: 1872 comment=bad peer address 1873 case=If the socket address is part of the AF_INET family 1874 case=..with zero file descriptor 1875 format=arg1:[arg]2:[arg]3:[arg]4 1876 comment=1, file descriptor, "so": 1877 comment=1, family, "family": 1878 comment=1, type, "type": 1879 comment=2, how shutdown code, "how" 1880 case=...with non-zero file descriptor 1881 format=arg1:arg2:inet 1882 comment=1, file descriptor, "so": 1883 comment=2, how shutdown code, "how" 1884 case=If the socket address is AF_UNIX 1885 case=...with zero file descriptor 1886 format=path1:arg2:[arg]3:[arg]4:[arg]5 1887 comment=If error: argument: \ 1888 1, "no path: fd", file descriptor: 1889 comment=1, file descriptor, "so": 1890 comment=1, family, "family": 1891 comment=1, type, "type": 1892 comment=2, how shutdown code, "how" 1893 case=...with non-zero file descriptor 1894 format=path1:arg2:arg3:inet 1895 comment=If error: argument: \ 1896 1, file descriptor, "no path: fd": 1897 comment=1, file descriptor, "so": 1898 comment=2, how shutdown code, "how" 1899#old BSM manual wrong; used audit_event.c 1900 1901label=AUE_SOCKACCEPT 1902 syscall=getmsg: socket accept 1903 format=inet:arg1:[path]:attr:arg2 1904 comment=1, file descriptor, "fd": 1905 comment=4, priority, "pri" 1906# see putmsg and getmsg for record format 1907# See audit.c for inet token and audit_start.c for other reference 1908 1909label=AUE_SOCKCONFIG 1910 format=arg1:arg2:arg3:[path]4 1911 comment=1, domain address, "domain": 1912 comment=2, type, "type": 1913 comment=3, protocol, "protocol": 1914 comment=If no path:argument -- 3, 0, "devpath" 1915 1916label=AUE_SOCKCONNECT 1917 syscall=putmsg: socket connect 1918 format=inet:arg1:[path]:attr:arg2 1919 comment=1, file descriptor, "fd": 1920 comment=4, priority, "pri" 1921# same as AUE_SOCKACCEPT 1922 1923label=AUE_SOCKET 1924 format=arg1:[arg]2:arg3 1925 comment=1, socket domain, "domain": 1926 comment=2, socket type, "type": 1927 comment=3, socket protocol, "protocol" 1928 1929label=AUE_SOCKETPAIR 1930 skip=Not used. 1931# unreferenced 1932 1933label=AUE_SOCKRECEIVE 1934 syscall=getmsg 1935 format=inet:arg1:[path]:attr:arg2 1936 comment=1, file descriptor, "fd": 1937 comment=4, priority, "pri" 1938# see AUE_SOCKACCEPT 1939 1940label=AUE_SOCKSEND 1941syscall=putmsg 1942 format=inet:arg1:[path]:attr:arg2 1943 comment=1, file descriptor, "fd": 1944 comment=4, priority, "pri" 1945# see AUE_SOCKACCEPT 1946 1947label=AUE_STAT 1948 format=path:[attr] 1949 1950label=AUE_STATFS 1951 format=path:[attr] 1952 1953label=AUE_STATVFS 1954 format=path:[attr] 1955 1956label=AUE_STIME 1957 format=kernel 1958 1959label=AUE_SWAPON 1960 skip=Not used. 1961 1962label=AUE_SYMLINK 1963 format=path:text1:[attr] 1964 comment=symbolic link string 1965 1966label=AUE_SYSINFO 1967 note=Only SI_SET_HOSTNAME and SI_SET_SRPC_DOMAIN commands 1968 note=are currently audited. 1969 format=arg1:[text]2 1970 comment=1, command, "cmd": 1971 comment=name 1972 1973label=AUE_SYSTEMBOOT 1974 title=system booted 1975 syscall=none 1976 format=head:text1 1977 comment="booting kernel" 1978# see audit_start.c and audit_io.c 1979# no subject or return / exit token 1980# header,44,2,system booted,na,Fri Nov 09 13:53:42 2001, + 0 msec 1981# text,booting kernel 1982 1983label=AUE_TRUNCATE 1984 skip=Not used. 1985 1986label=AUE_UMOUNT 1987 syscall=umount: old version 1988 note=Implemented as call of the newer umount2(2). 1989 format=path:arg1:[path]:[attr] 1990 comment=2, mflag value = 0, "flags" 1991 1992label=AUE_UMOUNT2 1993 syscall=umount2 1994 format=path:arg1:[path]:[attr] 1995 comment=2, mflag value, "flags" 1996 1997label=AUE_UNLINK 1998 format=path:[attr] 1999 2000label=AUE_UNLINKAT 2001# obsolete 2002 see=openat(2) 2003 format=path:[attr] 2004 2005label=AUE_UNMOUNT 2006 skip=Not used. 2007 2008label=AUE_UTIME 2009# obsolete 2010 format=path:[attr] 2011 2012label=AUE_UTIMES 2013 see=futimens(2) 2014 format=path:[attr] 2015 2016label=AUE_VFORK 2017 format=arg1 2018 comment=0, pid, "child PID" 2019 note=The vfork(2) return values are undefined because the audit record is 2020 note=produced at the point that the child process is spawned. 2021 2022label=AUE_VPIXSYS 2023 skip=Not used. 2024 2025label=AUE_VTRACE 2026 skip=Not used. 2027 2028label=AUE_WRITE 2029 format=path1:attr 2030 comment=if no path, argument -- "1, file descriptor, "no path: fd" 2031 note:An audit record is generated for write only once per file close. 2032 2033label=AUE_WRITEV 2034 skip=Not used. (obsolete) 2035 2036label=AUE_XMKNOD 2037# obsolete 2038 skip=Not used. 2039 2040label=AUE_XSTAT 2041# obsolete 2042 skip=Not Used. 2043 2044label=AUE_PF_POLICY_ADDRULE 2045 title=Add IPsec policy rule 2046 see= 2047 syscall=none 2048 format=arg1:arg2:[zone]3:[text]4 2049 comment=Operation applied to active policy (1 is active, 0 is inactive): 2050 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2051 comment=affected zone: 2052 comment=Name of target tunnel 2053 2054label=AUE_PF_POLICY_DELRULE 2055 title=Delete IPsec policy rule 2056 see= 2057 syscall=none 2058 format=arg1:arg2:[zone]3:[text]4 2059 comment=Operation applied to active policy (1 is active, 0 is inactive): 2060 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2061 comment=affected zone: 2062 comment=Name of target tunnel 2063 2064label=AUE_PF_POLICY_CLONE 2065 title=Clone IPsec policy 2066 see= 2067 syscall=none 2068 format=arg1:arg2:[zone]3:[text]4 2069 comment=Operation applied to active policy (1 is active, 0 is inactive): 2070 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2071 comment=affected zone: 2072 comment=Name of target tunnel 2073 2074label=AUE_PF_POLICY_FLIP 2075 title=Flip IPsec policy 2076 see= 2077 syscall=none 2078 format=arg1:arg2:[zone]3:[text]4 2079 comment=Operation applied to active policy (1 is active, 0 is inactive): 2080 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2081 comment=affected zone: 2082 comment=Name of target tunnel 2083 2084label=AUE_PF_POLICY_FLUSH 2085 title=Flip IPsec policy rules 2086 see= 2087 syscall=none 2088 format=arg1:arg2:[zone]3:[text]4 2089 comment=Operation applied to active policy (1 is active, 0 is inactive): 2090 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2091 comment=affected zone: 2092 comment=Name of target tunnel 2093 2094label=AUE_PF_POLICY_ALGS 2095 title=Update IPsec algorithms 2096 see= 2097 syscall=none 2098 format=arg1:arg2:[zone]3:[text]4 2099 comment=Operation applied to active policy (1 is active, 0 is inactive): 2100 comment=Operation applied to global policy (1 is global, 0 is tunnel): 2101 comment=affected zone: 2102 comment=Name of target tunnel 2103 2104label=AUE_allocate_fail 2105 program=/usr/sbin/allocate 2106 title=allocate: allocate-device failure 2107 format=(0..n)[text]1 2108 comment=command line arguments 2109# see audit_allocate.c 2110 2111label=AUE_allocate_succ 2112 program=/usr/sbin/allocate 2113 title=allocate: allocate-device success 2114 format=(0..n)[text]1 2115 comment=command line arguments 2116# see audit_allocate.c 2117 2118label=AUE_at_create 2119 program=/usr/bin/at 2120 title=at: at-create crontab 2121 format=path 2122 2123label=AUE_at_delete 2124 program=/usr/bin/at 2125 title=at: at-delete atjob (at or atrm) 2126 format=text1:path 2127 comment="ancillary file:" filename or "bad format of at-job name" 2128 2129label=AUE_at_perm 2130 skip=Not used. 2131# not referenced outside uevents.h 2132 2133label=AUE_create_user 2134 skip=Not used. 2135 2136label=AUE_cron_invoke 2137 program=/usr/sbin/cron 2138 title=cron: cron-invoke at or cron 2139 case=If issue with account find 2140 format=text1 2141 comment="bad user" name or "user <name> account expired" 2142 case=else 2143 format=text1:text2 2144 comment="at-job", "batch-job", "crontab-job", "queue-job (<queue_name>)", \ 2145 or "unknown job type (<job_type_id>)": 2146 comment=command 2147 2148label=AUE_crontab_create 2149 program=/usr/bin/crontab 2150 title=crontab: crontab created 2151 format=path 2152# See audit_crontab.c 2153 2154label=AUE_crontab_delete 2155 program=/usr/bin/crontab 2156 title=crontab: crontab delete 2157 format=path 2158# See audit_crontab.c 2159 2160label=AUE_crontab_mod 2161 program=/usr/bin/crontab 2162 title=crontab: crontab modify 2163 format=path 2164# See audit_crontab.c 2165 2166label=AUE_crontab_perm 2167 skip=Not used. 2168 2169label=AUE_deallocate_fail 2170 program=/usr/sbin/deallocate 2171 title=deallocate-device failure 2172 format=(0..n)[text]1 2173 comment=command line arguments 2174# See audit_allocate.c 2175 2176label=AUE_deallocate_succ 2177 program=/usr/sbin/deallocate 2178 title=deallocate-device success 2179 format=(0..n)[text]1 2180 comment=command line arguments 2181# See audit_allocate.c 2182 2183label=AUE_delete_user 2184 skip=Not used. 2185 2186label=AUE_disable_user 2187 skip=Not used. 2188 2189label=AUE_enable_user 2190 skip=Not used. 2191 2192label=AUE_ftpd 2193 program=/usr/sbin/in.ftpd 2194 title=in.ftpd 2195 format=[text]1 2196 comment=error message 2197# See audit_ftpd 2198 2199label=AUE_ftpd_logout 2200 program=/usr/sbin/in.ftpd 2201 title=in.ftpd 2202 format=user 2203# See audit_ftpd 2204 2205label=AUE_halt_solaris 2206 program=/usr/sbin/halt 2207 title=halt 2208 format=user 2209# See audit_halt.c 2210 2211label=AUE_kadmind_auth 2212 format=text1:text2:text3 2213 comment=Op: <requested information>: 2214 comment=Arg: <argument for Op>: 2215 comment=Client: <client principal name> 2216# See audit_kadmin.c / common_audit() 2217 2218label=AUE_kadmind_unauth 2219 format=text1:text2:text3 2220 comment=Op: <requested information>: 2221 comment=Arg: <argument for Op>: 2222 comment=Client: <client principal name> 2223# See audit_kadmin.c / common_audit() 2224 2225label=AUE_krb5kdc_as_req 2226 format=text1:text2 2227 comment=Client: <client principal name>: 2228 comment=Service: <requested service name> 2229# See audit_krb5kdc.c / common_audit() 2230 2231label=AUE_krb5kdc_tgs_req 2232 format=text1:text2 2233 comment=Client: <client principal name>: 2234 comment=Service: <requested service name> 2235# See audit_krb5kdc.c / common_audit() 2236 2237label=AUE_krb5kdc_tgs_req_alt_tgt 2238 format=text1:text2 2239 comment=Client: <client principal name>: 2240 comment=Service: <requested service name> 2241# See audit_krb5kdc.c / common_audit() 2242 2243label=AUE_krb5kdc_tgs_req_2ndtktmm 2244 format=text1:text2 2245 comment=Client: <client principal name>: 2246 comment=Service: <requested service name> 2247# See audit_krb5kdc.c / common_audit() 2248 2249label=AUE_listdevice_fail 2250 title=allocate-list devices failure 2251 program=/usr/sbin/allocate 2252 format=(0..n)[text]1 2253 comment=command line arguments 2254# See audit_allocate.c 2255 2256label=AUE_listdevice_succ 2257 title=allocate-list devices success 2258 program=/usr/sbin/allocate 2259 format=(0..n)[text]1 2260 comment=command line arguments 2261# See audit_allocate.c 2262 2263label=AUE_modify_user 2264 skip=Not used. 2265 2266label=AUE_mountd_mount 2267 title=mountd: NFS mount 2268 program=/usr/lib/nfs/mountd 2269 see=mountd(1M) 2270 format=text1:path2 2271 comment=remote client hostname: 2272 comment=mount dir 2273# See audit_mountd.c 2274 2275label=AUE_mountd_umount 2276 title=mountd: NFS unmount 2277 program=/usr/lib/nfs/mountd 2278 format=text1:path2 2279 comment=remote client hostname: 2280 comment=mount dir 2281# See audit_mountd.c 2282 2283label=AUE_poweroff_solaris 2284 program=/usr/sbin/poweroff 2285 title=poweroff 2286 format=user 2287# See audit_halt.c 2288 2289label=AUE_reboot_solaris 2290 program=/usr/sbin/reboot 2291 title=reboot 2292 format=user 2293# See audit_reboot.c 2294# header,61,2,reboot(1m),,Fri Nov 09 13:52:34 2001, + 726 msec 2295# subject,tuser1,root,other,root,other,10422,497,0 0 tmach2 2296# return,success,0 2297 2298label=AUE_rexd 2299 program=/usr/sbin/rpc.rexd 2300 title=rpc.rexd 2301 format=[text]1:text2:text3:[text]4:[text]5 2302 comment=error message (failure only): 2303 comment="Remote execution requested by:" hostname: 2304 comment="Username:" username: 2305 comment="User id:" user ID (failure only): 2306 comment="Command line:" command attempted 2307# See audit_rexd.c 2308 2309label=AUE_rexecd 2310 program=/usr/sbin/rpc.rexecd 2311 title=rpc.rexecd 2312 format=[text]1:text2:text3:text4 2313 comment=error message (failure only): 2314 comment="Remote execution requested by:" hostname: 2315 comment="Username:" username: 2316 comment="Command line:" command attempted 2317# See audit_rexecd.c 2318 2319label=AUE_rshd 2320 program=/usr/sbin/in.rshd 2321 title=in.rshd 2322 format=text1:text2:[text]3:[text]4 2323 comment="cmd" command: 2324 comment="remote user" remote user: 2325 comment="local user" local user: 2326 comment=failure message 2327# See audit_rshd.c 2328 2329label=AUE_shutdown_solaris 2330 title=shutdown 2331 program=/usr/ucb/shutdown 2332 format=user 2333# See audit_shutdown.c 2334 2335label=AUE_smserverd 2336 program=/usr/lib/smedia/rpc.smserverd 2337 format=[text]1:[text]2 2338 comment=state change: 2339 comment=vid, pid, major/minor device 2340# see usr/src/cmd/smserverd 2341# code shows a third token, path, but it isn't implemented. 2342 2343label=AUE_uadmin_solaris 2344 title=uadmin (obsolete) 2345 program= 2346 see= 2347 format=text1:text2 2348 comment=function code: 2349 comment=argument code 2350# not used. Replaced by AUE_uadmin_* events, see uadmin.c, adt.xml 2351 2352label=AUE_LABELSYS_TNRH 2353 title=config Trusted Network remote host cache 2354 see=tnrh(2) 2355 syscall=labelsys: TSOL_TNRH 2356 case=With the flush command (cmd=3) 2357 format=arg1 2358 comment=1, command, "cmd" 2359 case=With the load (cmd=1) and delete (cmd=2) commands 2360 format=arg1:inaddr2:arg3 2361 comment=1, command, "cmd": 2362 comment=ip address of host: 2363 comment=2, prefix length, "prefix len" 2364 2365label=AUE_LABELSYS_TNRHTP 2366 title=config Trusted Network remote host template 2367 see=tnrhtp(2) 2368 syscall=labelsys: TSOL_TNRHTP 2369 case=With the flush command (cmd=3) 2370 format=arg1 2371 comment=1, command, "cmd" 2372 case=With the load (cmd=1) and delete (cmd=2) commands 2373 format=arg1:text2 2374 comment=1, command, "cmd": 2375 comment=name of template 2376 2377label=AUE_LABELSYS_TNMLP 2378 title=config Trusted Network multi-level port entry 2379 see=tnmlp(2) 2380 syscall=labelsys: TSOL_TNMLP 2381 case=With the flush command (cmd=3) 2382 format=arg1:text2 2383 comment=1, command, "cmd": 2384 comment="shared", or name of zone 2385 case=With the load (cmd=1) and delete (cmd=2) commands 2386 format=arg1:text2:arg3:arg4:[arg]5 2387 comment=1, command, "cmd": 2388 comment="shared", or name of zone: 2389 comment=2, protocol number, "proto num": 2390 comment=2, starting mlp port number, "mlp_port": 2391 comment=2, ending mlp port number, "mlp_port_upper" 2392