1 # audit_record_attr.txt
   2 # Two "#" are comments that are copied to audit_record_attr
   3 # other comments are removed.
   4 ##
   5 ## Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
   6 ## Copyright 2018 Nexenta Systems, Inc.  All rights reserved.
   7 ## Copyright 2019 Joyent, Inc.
   8 ##
   9 ## CDDL HEADER START
  10 ##
  11 ## The contents of this file are subject to the terms of the
  12 ## Common Development and Distribution License (the "License").
  13 ## You may not use this file except in compliance with the License.
  14 ##
  15 ## You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
  16 ## or http://www.opensolaris.org/os/licensing.
  17 ## See the License for the specific language governing permissions
  18 ## and limitations under the License.
  19 ##
  20 ## When distributing Covered Code, include this CDDL HEADER in each
  21 ## file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  22 ## If applicable, add the following below this CDDL HEADER, with the
  23 ## fields enclosed by brackets "[]" replaced with your own identifying
  24 ## information: Portions Copyright [yyyy] [name of copyright owner]
  25 ##
  26 ## CDDL HEADER END
  27 ##
  28 ##
  29 
  30 # source file for describing audit records.
  31 
  32 # This file is in two sections.  The first is a list of attribute /
  33 # value pairs used to provide short cuts in annotating the audit
  34 # records.  The second is for annotation for each audit record.
  35 
  36 # first section: general attributes
  37 
  38 # skipClass=<class name of items to skip if only in that class>
  39 # skipClass=no    # uncomment to filter unused events
  40 
  41 # token name abbreviations
  42 # token=alias:fullname  -- short names for key tokens
  43 
  44 token=arg:argument
  45 token=attr:attribute
  46 token=acl:acl_entry
  47 token=cmd:command
  48 token=data:data
  49 token=exec_args:exec_arguments
  50 token=exec_env:exec_environment
  51 token=group:group
  52 token=inaddr:ip_addr
  53 token=inet:socket
  54 token=ipc:ipc
  55 token=ipc_perm:ipc_perm
  56 token=newgroup:newgroups
  57 token=path:path
  58 token=path_attr:attribute_path
  59 token=privset:privilege
  60 token=proc:process
  61 token=text:text
  62 token=tid:terminal_adr
  63 token=uauth:use_of_authorization
  64 token=upriv:use_of_privilege
  65 token=user:user_object
  66 token=zone:zonename
  67 token=fmri:service_instance
  68 token=label:mandatory_label
  69 
  70 token=head:header
  71 token=subj:subject
  72 token=ret:return
  73 token=exit:exit
  74 
  75 # note names -- certain notes show up repeatedly; collected here
  76 #
  77 # To achieve the maximum line length to be less than 80 characters, the
  78 # note names (message=) can be defined as a multi line, each line except the
  79 # last one finished with the backslash character.
  80 
  81 message=ipc_perm:The ipc and ipc_perm tokens are not included if \
  82   the message ID is not valid.
  83 
  84 
  85 # basic record pattern ("insert" is where event-specific tokens
  86 # are listed.)
  87 
  88 kernel=head:insert:subj:[upriv]:ret
  89 user=head:subj:insert:ret
  90 
  91 # Second Section
  92 # Annotation Section
  93 #
  94 # Most audit records need annotation beyond what is provided by
  95 # the files audit_event and audit_class.  At a minimum, a record
  96 # is represented by a label and a format.
  97 #
  98 # label=record_id             like AUE_ACCEPT
  99 # format=token_alias
 100 #
 101 # there is no end line; a new label= end the preceding definition
 102 # and starts the next.
 103 #
 104 # format values are a list of token names, separated by colons.  The
 105 # name is either one of the values described above (token=) or is
 106 # a value to be taken literally.  If a token name ends with a digit,
 107 # the digit is an index into an array of comments.  In the few cases
 108 # where there are no tokens (other than header, subject, return/exit),
 109 # use "format=kernel" or "format="user".
 110 #
 111 # comment is an array of strings separated by colons.  If comments
 112 # are listed on separate lines (recommended due to better
 113 # readability/sustainability of the file), the preceding comment
 114 # must end with  a colon.  The array starts at 1. (If the comment
 115 # contains a colon, use "&colon;" without the quotes.)
 116 #
 117 # case is used to generate alternate descriptions for a given
 118 # record.
 119 #
 120 # Constraints - the string length; bear in mind, that any annotation of
 121 # primitives below longer than is specified, will be silently truncated
 122 # to given/defined amount of characters in the auditrecord(1M) runtime:
 123 #
 124 #     primitive <= max (non-truncated) string length
 125 #       case    <= unlimited; if necessary, text continues on a new line
 126 #       comment <= unlimited; if necessary, text continues on a new line
 127 #       label   <= 43
 128 #       note    <= unlimited; if necessary, text continues on a new line
 129 #       program <= 20
 130 #       see     <= 39
 131 #       syscall <= 20
 132 #       title   <= 46
 133 #       token   <= 28 (full name)
 134 #
 135 # To achieve the maximum line length to be less than 80 characters, one can
 136 # define the unlimited primitives as a multi line, each line except the
 137 # last one finished with the backslash character. In addition to above
 138 # mentioned, the "format=" record attribute follows the same rule.
 139 #
 140 #
 141 # AUE_ACCEPT illustrates the use of all the above.  Note that
 142 # case is not nested; ellipsis (...) is used to give the effect
 143 # of nesting.
 144 
 145 label=AUE_ACCEPT
 146 #accept(2) failure
 147   case=Invalid socket file descriptor
 148     format=arg1
 149       comment=1, file descriptor, "so"
 150 #accept(2) non SOCK_STREAM socket
 151   case=If the socket address is not part of the AF_INET family
 152     format=arg1:arg2:arg3
 153       comment=1, "so", file descriptor:
 154       comment="family", so_family:
 155       comment="type", so_type
 156   case=If the socket address is part of the AF_INET family
 157     case=...If there is no vnode for this file descriptor
 158       format=[arg]1
 159         comment=1, file descriptor, "Bad so"
 160 #accept(2) SOCK_STREAM socket-not bound
 161     case=...or if the socket is not bound
 162       format=[arg]1:[inet]2
 163         comment=1, file descriptor, "so":
 164         comment=local/foreign address (0.0.0.0)
 165     case=...or if the socket address length = 0
 166       format=[arg]1:[inet]2
 167         comment=1, file descriptor, "so":
 168         comment=local/foreign address (0.0.0.0)
 169     case=...or for all other conditions
 170       format=inet1:[inet]1
 171         comment=socket address
 172 #accept(2) failure
 173 #       header
 174 #       au_to_arg32     "so",file descriptor
 175 #       subject
 176 #       return  <errno != 0>
 177 #
 178 #accept(2) non SOCK_STREAM socket
 179 #       header
 180 #       au_to_arg32     "so", file descriptor
 181 #       au_to_arg32     "family", so_family
 182 #       au_to_arg32     "type", so_type
 183 #       subject
 184 #       return success
 185 #
 186 #accept(2) SOCK_STREAM socket-not bound
 187 #       header
 188 #       au_to_arg32     "so", file descriptor
 189 #       au_to_socket_ex local/foreign address (0.0.0.0)
 190 #       subject
 191 #       return success
 192 #
 193 #accept(2) SOCK_STREAM socket-bound
 194 #       header
 195 #       au_to_arg32     "so", file descriptor
 196 #       au_to_socket_ex
 197 #       subject
 198 #       return success
 199 
 200 
 201 
 202 label=AUE_ACCESS
 203   format=path1:[attr]
 204     comment=may be truncated in failure case
 205 #       header,163,2,access(2),,Wed Apr 25 13:52:49 2001, + 750000733 msec
 206 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_succ
 207 #       attribute,100777,41416,staff,8388608,402255,0
 208 #       subject,tuser10,tuser10,other,tuser10,other,1297,322,255 131585 129.146.89.30
 209 #       return,success,0
 210 #       trailer,163
 211 #
 212 #       header,163,2,access(2),,Wed Apr 25 13:53:02 2001, + 490000427 msec
 213 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail
 214 #       attribute,100000,root,other,8388608,402257,0
 215 #       subject,tuser10,tuser10,other,tuser10,other,1433,322,255 131585 129.146.89.30
 216 #       return,failure: Permission denied,-1
 217 #       trailer,163
 218 #
 219 #       header,135,2,access(2),,Wed Apr 25 13:53:15 2001, + 10000329 msec
 220 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail2
 221 #       subject,tuser10,tuser10,other,tuser10,other,1553,322,255 131585 129.146.89.30
 222 #       return,failure: No such file or directory,-1
 223 #       trailer,135
 224 
 225 label=AUE_ACCT
 226   case=Zero path
 227     format=arg1
 228       comment=1, 0, "accounting off"
 229   case=Non-zero path
 230     format=path1:[attr]2
 231       comment=may be truncated in failure case:
 232       comment=omitted if failure
 233 
 234 label=AUE_ACLSET
 235   syscall=acl
 236   format=arg1:arg2:(0..n)[acl]3
 237     comment=2, SETACL, "cmd":
 238     comment=3, number of ACL entries, "nentries":
 239     comment=Access Control List entries
 240 
 241 label=AUE_ADJTIME
 242   format=kernel
 243 
 244 label=AUE_ASYNC_DAEMON
 245   skip=Not used
 246 
 247 label=AUE_ASYNC_DAEMON_EXIT
 248   skip=Not used
 249 
 250 label=AUE_AUDIT
 251   skip=Not used.  (Placeholder for the set AUE_AUDIT_*.)
 252 
 253 label=AUE_AUDITON
 254   skip=Not used.  (Placeholder for the set AUE_AUDITON_*.)
 255 
 256 label=AUE_AUDITON_GESTATE
 257   skip=Not used
 258 
 259 label=AUE_AUDITON_GETAMASK
 260   format=kernel
 261   syscall=auditon: GETAMASK
 262 
 263 label=AUE_AUDITON_GETCAR
 264   format=kernel
 265   syscall=auditon: GETCAR
 266 #       header,68,2,auditon(2) - get car,,Wed Apr 25 13:49:02 2001, + 710001279 msec
 267 #       subject,tuser10,root,other,root,other,966,322,255 131585 129.146.89.30
 268 #       return,success,0
 269 #       trailer,68
 270 
 271 label=AUE_AUDITON_GETCLASS
 272   format=kernel
 273   syscall=auditon: GETCLASS
 274 #       header,68,2,auditon(2) - get event class,,Mon May 15 09:14:35 2000, + 30001063 msec
 275 #       subject,tuser10,root,other,root,other,1091,367,255 197121 tmach1
 276 #       return,success,0
 277 #       trailer,68
 278 
 279 label=AUE_AUDITON_GETCOND
 280   format=kernel
 281   syscall=auditon: GETCOND
 282 #       header,68,2,auditon(2) - get audit state,,Mon May 15 09:14:48 2000, + 110001736 msec
 283 #       subject,tuser10,root,other,root,other,1248,367,255 197121 tmach1
 284 #       return,success,0
 285 #       trailer,68
 286 
 287 label=AUE_AUDITON_GETCWD
 288   format=kernel
 289   syscall=auditon: GETCWD
 290 #       header,68,2,auditon(2) - get cwd,,Mon May 15 09:15:01 2000, + 120001223 msec
 291 #       subject,tuser10,root,other,root,other,1405,367,255 197121 tmach1
 292 #       return,success,0
 293 #       trailer,68
 294 
 295 label=AUE_AUDITON_GETKMASK
 296   format=kernel
 297   syscall=auditon: GETKMASK
 298 #       header,68,2,auditon(2) - get kernel mask,,Mon May 15 09:15:14 2000, + 220002225 msec
 299 #       subject,tuser10,root,other,root,other,1562,367,255 197121 tmach1
 300 #       return,success,0
 301 #       trailer,68
 302 
 303 label=AUE_AUDITON_GETSTAT
 304   format=kernel
 305   syscall=auditon: A_GETSTAT
 306 #       header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:27 2000, + 220003386 msec
 307 #       subject,tuser10,root,other,root,other,1719,367,255 197121 tmach1
 308 #       return,success,0
 309 #       trailer,68
 310 
 311 label=AUE_AUDITON_GPOLICY
 312   format=kernel
 313   syscall=auditon: GPOLICY
 314 #       header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:40 2000, + 120004056 msec
 315 #       subject,tuser10,root,other,root,other,1879,367,255 197121 tmach1
 316 #       return,success,0
 317 #       trailer,68
 318 
 319 label=AUE_AUDITON_GQCTRL
 320   format=kernel
 321   syscall=auditon: GQCTRL
 322 #       header,68,2,auditon(2) - GQCTRL command,,Mon May 15 09:15:53 2000, + 20001415 msec
 323 #       subject,tuser10,root,other,root,other,2033,367,255 197121 tmach1
 324 #       return,success,0
 325 #       trailer,68
 326 
 327 
 328 label=AUE_AUDITON_GTERMID
 329   skip=Not used.
 330 
 331 label=AUE_AUDITON_SESTATE
 332   skip=Not used.
 333 
 334 label=AUE_AUDITON_SETAMASK
 335   format=[arg]1:[arg]2
 336     comment=2, "setamask as_success", user default audit preselection mask:
 337     comment=2, "setamask as_failure", user default audit preselection mask
 338   syscall=auditon: SETAMASK
 339 
 340 label=AUE_AUDITON_SETCLASS
 341   format=[arg]1:[arg]2
 342     comment=2, "setclass&colon;ec_event", event number:
 343     comment=3, "setclass&colon;ec_class", class mask
 344   syscall=auditon: SETCLASS
 345 #       header,120,2,auditon(2) - set event class,,Mon May 15 09:16:39 2000, + 800002966 msec
 346 #       argument,2,0x0,setclass:ec_event
 347 #       argument,3,0x0,setclass:ec_class
 348 #       subject,tuser10,root,other,root,other,2190,367,255 197121 tmach1
 349 #       return,success,0
 350 #       trailer,120
 351 
 352 label=AUE_AUDITON_SETCOND
 353   format=[arg]1
 354     comment=3, "setcond", audit state
 355   syscall=auditon: SETCOND
 356 
 357 label=AUE_AUDITON_SETKMASK
 358   format=[arg]1:[arg]2
 359     comment=2, "setkmask as_success", kernel non-attributable mask:
 360     comment=2, "setkmask as_failure", kernel non-attributable mask
 361   syscall=auditon: SETKMASK
 362 #       header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:06 2000, + 300000807 msec
 363 #       argument,2,0x0,setkmask:as_success
 364 #       argument,2,0x0,setkmask:as_failure
 365 #       subject,tuser10,root,other,root,other,2506,367,255 197121 tmach1
 366 #       return,success,0
 367 #       trailer,124
 368 #       header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:20 2000, + 430001289 msec
 369 #       argument,2,0x0,setkmask:as_success
 370 #       argument,2,0x0,setkmask:as_failure
 371 #       subject,tuser10,tuser10,other,root,other,2620,367,255 197121 tmach1
 372 #       return,failure: Not owner,-1
 373 #       trailer,124
 374 
 375 label=AUE_AUDITON_SETSMASK
 376   format=[arg]1:[arg]2
 377     comment=3, "setsmask&colon;as_success", session ID mask:
 378     comment=3, "setsmask&colon;as_failure", session ID mask
 379   syscall=auditon: SETSMASK
 380 #       header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:33 2000, + 580000668 msec
 381 #       argument,3,0x400,setsmask:as_success
 382 #       argument,3,0x400,setsmask:as_failure
 383 #       subject,tuser10,root,other,root,other,2777,367,255 197121 tmach1
 384 #       return,success,0
 385 #       trailer,124
 386 #       header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:45 2000, + 700001710 msec
 387 #       argument,3,0x400,setsmask:as_success
 388 #       argument,3,0x400,setsmask:as_failure
 389 #       subject,tuser10,tuser10,other,root,other,2885,367,255 197121 tmach1
 390 #       return,failure: Not owner,-1
 391 #       trailer,124
 392 
 393 label=AUE_AUDITON_SETSTAT
 394   format=kernel
 395   syscall=auditon: SETSTAT
 396 #       header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:17:58 2000, + 930000818 msec
 397 #       subject,tuser10,root,other,root,other,3042,367,255 197121 tmach1
 398 #       return,success,0
 399 #       trailer,68
 400 #       header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:18:13 2000, + 160001101 msec
 401 #       subject,tuser10,tuser10,other,root,other,3156,367,255 197121 tmach1
 402 #       return,failure: Not owner,-1
 403 #       trailer,68
 404 
 405 label=AUE_AUDITON_SETUMASK
 406   format=[arg]1:[arg]2
 407     comment=3, "setumask&colon;as_success", audit ID mask:
 408     comment=3, "setumask&colon;as_failure", audit ID mask
 409   syscall=auditon: SETUMASK
 410 #       header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:26 2000, + 670003527 msec
 411 #       argument,3,0x400,setumask:as_success
 412 #       argument,3,0x400,setumask:as_failure
 413 #       subject,tuser10,root,other,root,other,3313,367,255 197121 tmach1
 414 #       return,success,0
 415 #       trailer,124
 416 #       header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:38 2000, + 740000732 msec
 417 #       argument,3,0x400,setumask:as_success
 418 #       argument,3,0x400,setumask:as_failure
 419 #       subject,tuser10,tuser10,other,root,other,3421,367,255 197121 tmach1
 420 #       return,failure: Not owner,-1
 421 #       trailer,124
 422 
 423 label=AUE_AUDITON_SPOLICY
 424   format=[arg]1
 425     comment=1, audit policy flags, "setpolicy"
 426   syscall=auditon: SPOLICY
 427 #       header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:18:54 2000, + 840 msec
 428 #       argument,3,0x200,setpolicy
 429 #       subject,tuser10,root,other,root,other,3584,367,255 197121 tmach1
 430 #       return,success,0
 431 #       trailer,86
 432 #       header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:19:08 2000, + 200002798 msec
 433 #       argument,3,0x200,setpolicy
 434 #       subject,tuser10,tuser10,other,root,other,3698,367,255 197121 tmach1
 435 #       return,failure: Not owner,-1
 436 #       trailer,86
 437 
 438 label=AUE_AUDITON_SQCTRL
 439   format=[arg]1:[arg]2:[arg]3:[arg]4
 440     comment=3, "setqctrl&colon;aq_hiwater", queue control param.:
 441     comment=3, "setqctrl&colon;aq_lowater", queue control param.:
 442     comment=3, "setqctrl&colon;aq_bufsz", queue control param.:
 443     comment=3, "setqctrl&colon;aq_delay", queue control param.
 444   syscall=auditon: SQCTRL
 445 #       header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:23 2000, + 610001124 msec
 446 #       argument,3,0x64,setqctrl:aq_hiwater
 447 #       argument,3,0xa,setqctrl:aq_lowater
 448 #       argument,3,0x400,setqctrl:aq_bufsz
 449 #       argument,3,0x14,setqctrl:aq_delay
 450 #       subject,tuser10,root,other,root,other,3861,367,255 197121 tmach1
 451 #       return,success,0
 452 #       trailer,176
 453 #       header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:35 2000, + 720003197 msec
 454 #       argument,3,0x64,setqctrl:aq_hiwater
 455 #       argument,3,0xa,setqctrl:aq_lowater
 456 #       argument,3,0x400,setqctrl:aq_bufsz
 457 #       argument,3,0x14,setqctrl:aq_delay
 458 #       subject,tuser10,tuser10,other,root,other,3969,367,255 197121 tmach1
 459 #       return,failure: Not owner,-1
 460 #       trailer,176
 461 
 462 label=AUE_AUDITON_STERMID
 463   skip=Not used.
 464 
 465 label=AUE_AUDITSTAT
 466   skip=Not used.
 467 
 468 label=AUE_AUDITSVC
 469   skip=Not used.
 470 
 471 label=AUE_AUDITSYS
 472   skip=Not used. (Place holder for various auditing events.)
 473 
 474 label=AUE_BIND
 475 # differs from documented version.
 476 # cases "no vnode" not fully confirmed
 477 # family and type need argument number
 478   case=Invalid socket handle
 479     format=arg1
 480       comment=1, file descriptor, "so"
 481   case=If there is no vnode for this file descriptor
 482   case=or if the socket is not of the AF_INET family
 483     format=arg1:arg2:arg3
 484       comment=1, file descriptor, "so":
 485       comment=1, socket family, "family":
 486       comment=1, socket type, "type"
 487   case=or for all other conditions
 488     format=arg1:inet2
 489       comment=1, file descriptor, "so":
 490       comment=socket address
 491 
 492 label=AUE_BRANDSYS
 493 # generic mechanism to allow user-space and kernel components of a brand
 494 # to communicate.  The interpretation of the arguments to the call is
 495 # left entirely up to the brand.
 496   format=arg1:arg2:arg3:arg4:arg5:arg6:arg7
 497     comment=1, command, "cmd":
 498     comment=2, command args, "arg":
 499     comment=3, command args, "arg":
 500     comment=4, command args, "arg":
 501     comment=5, command args, "arg":
 502     comment=6, command args, "arg":
 503     comment=7, command args, "arg"
 504 
 505 label=AUE_BSMSYS
 506   skip=Not used.
 507 
 508 label=AUE_CHDIR
 509   format=path:[attr]
 510 #       header,151,2,chdir(2),,Mon May 15 09:20:15 2000, + 70000899 msec
 511 #       path,/export/home/CC_final/icenine/arv/chdir/obj_succ
 512 #       attribute,40777,root,other,8388608,231558,0
 513 #       subject,tuser10,tuser10,other,root,other,4436,367,255 197121 tmach1
 514 #       return,success,0
 515 #       trailer,151
 516 #       header,151,2,chdir(2),,Mon May 15 09:20:27 2000, + 640003327 msec
 517 #       path,/export/home/CC_final/icenine/arv/chdir/obj_fail
 518 #       attribute,40000,root,other,8388608,237646,0
 519 #       subject,tuser10,tuser10,other,root,other,4566,367,255 197121 tmach1
 520 #       return,failure: Permission denied,-1
 521 #       trailer,151
 522 
 523 label=AUE_CHMOD
 524   format=arg1:path:[attr]
 525     comment=2, mode, "new file mode"
 526 #       header,173,2,chmod(2),,Mon May 15 09:20:41 2000, + 140000831 msec
 527 #       argument,2,0x1f8,new file mode
 528 #       path,/export/home/CC_final/icenine/arv/chmod/obj_succ
 529 #       attribute,100770,tuser10,other,8388608,243608,0
 530 #       subject,tuser10,tuser10,other,root,other,4748,367,255 197121 tmach1
 531 #       return,success,0
 532 #       trailer,173
 533 #       header,173,2,chmod(2),,Mon May 15 09:20:54 2000, + 400001156 msec
 534 #       argument,2,0x1f8,new file mode
 535 #       path,/export/home/CC_final/icenine/arv/chmod/obj_fail
 536 #       attribute,100600,root,other,8388608,243609,0
 537 #       subject,tuser10,tuser10,other,root,other,4879,367,255 197121 tmach1
 538 #       return,failure: Not owner,-1
 539 #       trailer,173
 540 
 541 label=AUE_CHOWN
 542   format=arg1:arg2
 543     comment=2, uid, "new file uid":
 544     comment=3, gid, "new file gid"
 545 #       header,193,2,chown(2),,Mon May 15 09:21:07 2000, + 930000756 msec
 546 #       argument,2,0x271a,new file uid
 547 #       argument,3,0xffffffff,new file gid
 548 #       path,/export/home/CC_final/icenine/arv/chown/obj_succ
 549 #       attribute,100644,tuser10,other,8388608,268406,0
 550 #       subject,tuser10,tuser10,other,root,other,5062,367,255 197121 tmach1
 551 #       return,success,0
 552 #       trailer,193
 553 #       header,193,2,chown(2),,Mon May 15 09:21:20 2000, + 430001153 msec
 554 #       argument,2,0x271a,new file uid
 555 #       argument,3,0xffffffff,new file gid
 556 #       path,/export/home/CC_final/icenine/arv/chown/obj_fail
 557 #       attribute,100644,root,other,8388608,268407,0
 558 #       subject,tuser10,tuser10,other,root,other,5191,367,255 197121 tmach1
 559 #       return,failure: Not owner,-1
 560 #       trailer,193
 561 
 562 label=AUE_CHROOT
 563   format=path:[attr]
 564 #       header,104,2,chroot(2),,Mon May 15 09:21:33 2000, + 860001094 msec
 565 #       path,/
 566 #       attribute,40755,root,root,8388608,2,0
 567 #       subject,tuser10,root,other,root,other,5370,367,255 197121 tmach1
 568 #       return,success,0
 569 #       trailer,104
 570 #       header,152,2,chroot(2),,Mon May 15 09:21:46 2000, + 130002435 msec
 571 #       path,/export/home/CC_final/icenine/arv/chroot/obj_fail
 572 #       attribute,40777,tuser10,other,8388608,335110,0
 573 #       subject,tuser10,tuser10,other,root,other,5499,367,255 197121 tmach1
 574 #       return,failure: Not owner,-1
 575 #       trailer,152
 576 
 577 label=AUE_CLOCK_SETTIME
 578   format=kernel
 579 
 580 label=AUE_CLOSE
 581   format=arg1:[path]:[attr]
 582     comment=1, file descriptor, "fd"
 583 
 584 label=AUE_CONFIGKSSL
 585   case=Adding KSSL entry.
 586     format=text1:inaddr2:text3:text4
 587       comment=opcode, KSSL_ADD_ENTRY:
 588       comment=local IP address:
 589       comment=SSL port number:
 590       comment=proxy port number
 591   case=Deleting KSSL entry.
 592     format=text1:inaddr2:text3
 593       comment=opcode, KSSL_DELETE_ENTRY:
 594       comment=local IP address:
 595       comment=SSL port number
 596 
 597 label=AUE_CONNECT
 598 # cases "no vnode" not fully confirmed
 599   case=If there is no vnode for this file descriptor
 600   case=If the socket address is not part of the AF_INET family
 601     format=arg1:arg2:arg3
 602       comment=1, file descriptor, "so":
 603       comment=1, socket family, "family":
 604       comment=1, socket type, "type"
 605   case=If the socket address is part of the AF_INET family
 606     format=arg1:inet2
 607       comment=1, file descriptor, "so":
 608       comment=socket address
 609 
 610 label=AUE_CORE
 611   syscall=none
 612   title=process dumped core
 613   see=none
 614   format=path:[attr]:arg1
 615     comment=1, signal, "signal"
 616 # see uts/common/c2/audit.c
 617 
 618 label=AUE_CREAT
 619 # obsolete - see open(2)
 620   format=path:[attr]
 621 # does not match old BSM manual
 622 #       header,151,2,creat(2),,Mon May 15 09:21:59 2000, + 509998810 msec
 623 #       path,/export/home/CC_final/icenine/arv/creat/obj_succ
 624 #       attribute,100644,tuser10,other,8388608,49679,0
 625 #       subject,tuser10,tuser10,other,root,other,5678,367,255 197121 tmach1
 626 #       return,success,8
 627 #       trailer,151
 628 #       header,107,2,creat(2),,Mon May 15 09:22:12 2000, + 50001852 msec
 629 #       path,/devices/pseudo/mm@0:null
 630 #       subject,tuser10,root,other,root,other,5809,367,255 197121 tmach1
 631 #       return,success,8
 632 #       trailer,107
 633 #       header,83,2,creat(2),,Mon May 15 09:22:12 2000, + 70001870 msec
 634 #       path,/obj_fail
 635 #       subject,tuser10,tuser10,other,root,other,5806,367,255 197121 tmach1
 636 #       return,failure: Permission denied,-1
 637 #       trailer,83
 638 
 639 label=AUE_CRYPTOADM
 640   title=kernel cryptographic framework
 641   format=text1:(0..n)[text]2
 642   comment=cryptoadm command/operation:
 643   comment=mechanism list
 644 
 645 label=AUE_DOORFS
 646   skip=Not used.  (Place holder for set of door audit events.)
 647 
 648 label=AUE_DOORFS_DOOR_BIND
 649   skip=Not used.
 650   syscall=doorfs:  DOOR_BIND
 651 
 652 label=AUE_DOORFS_DOOR_CALL
 653   format=arg1:proc2
 654     comment=1, door ID, "door ID":
 655     comment=for process that owns the door
 656   syscall=doorfs:  DOOR_CALL
 657 
 658 label=AUE_DOORFS_DOOR_CREATE
 659   format=arg1
 660     comment=1, door attributes, "door attr"
 661   syscall=doorfs:  DOOR_CREATE
 662 
 663 label=AUE_DOORFS_DOOR_CRED
 664   skip=Not used.
 665   syscall=doorfs:  DOOR_CRED
 666 
 667 label=AUE_DOORFS_DOOR_INFO
 668   skip=Not used.
 669   syscall=doorfs:  DOOR_INFO
 670 
 671 label=AUE_DOORFS_DOOR_RETURN
 672   format=kernel
 673   syscall=doorfs:  DOOR_RETURN
 674 
 675 label=AUE_DOORFS_DOOR_REVOKE
 676   format=arg1
 677     comment=1, door ID, "door ID"
 678   syscall=doorfs:  DOOR_REVOKE
 679 
 680 label=AUE_DOORFS_DOOR_UNBIND
 681   skip=Not used.
 682   syscall=doorfs:  DOOR_UNBIND
 683 
 684 label=AUE_DUP2
 685 skip=Not used.
 686 
 687 label=AUE_ENTERPROM
 688   title=enter prom
 689   syscall=none
 690   format=head:text1:ret
 691     comment="kmdb"
 692 #       header,48,2,enter prom,na,tmach1,2004-11-12 09:07:41.342 -08:00
 693 #       text,kmdb
 694 #       return,success,0
 695 
 696 label=AUE_EXEC
 697 # obsolete - see execve(2)
 698   format=path:[attr]1:[exec_args]2:[exec_env]3
 699     comment=omitted on error:
 700     comment=output if argv policy is set:
 701     comment=output if arge policy is set
 702 
 703 label=AUE_EXECVE
 704   format=path:[attr]1:[exec_args]2:[exec_env]3
 705     comment=omitted on error:
 706     comment=output if argv policy is set:
 707     comment=output if arge policy is set
 708 #       header,107,2,creat(2),,Mon May 15 09:22:25 2000, + 559997464 msec
 709 #       path,/devices/pseudo/mm@0:null
 710 #       subject,tuser10,root,other,root,other,5974,367,255 197121 tmach1
 711 #       return,success,8
 712 #       trailer,107
 713 #       header,86,2,execve(2),,Mon May 15 09:22:25 2000, + 590003684 msec
 714 #       path,/usr/bin/pig
 715 #       subject,tuser10,tuser10,other,root,other,5971,367,255 197121 tmach1
 716 #       return,failure: No such file or directory,-1
 717 #       trailer,86
 718 
 719 label=AUE_PFEXEC
 720   format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5
 721     comment=pathname of the executable:
 722     comment=pathname of working directory:
 723     comment=privileges if the limit or inheritable set are changed:
 724     comment=process if ruid, euid, rgid or egid is changed:
 725     comment=output if arge policy is set
 726 
 727 label=AUE_sudo
 728   format=exec_args1:[text]2
 729     comment=command args:
 730     comment=error message (failure only)
 731 
 732 label=AUE_EXIT
 733   format=arg1:[text]2
 734     comment=1, exit status, "exit status":
 735     comment=event aborted
 736 
 737 label=AUE_EXITPROM
 738   title=exit prom
 739   syscall=none
 740   format=head:text1:ret
 741     comment="kmdb"
 742 #       header,48,2,exit prom,na,tmach1,2004-11-12 09:07:43.547 -08:00
 743 #       text,kmdb
 744 #       return,success,0
 745 
 746 label=AUE_EXPORTFS
 747   skip=Not used.
 748 
 749 label=AUE_FACCESSAT
 750 # obsolete
 751   see=access(2)
 752   format=path:[attr]
 753 
 754 label=AUE_FACLSET
 755   syscall=facl
 756   case=Invalid file descriptor
 757     format=arg1:arg2
 758       comment=2, SETACL, "cmd":
 759       comment=3, number of ACL entries, "nentries"
 760   case=Zero path
 761     format=arg1:arg2:arg3:[attr]:(0..n)[acl]4
 762       comment=2, SETACL, "cmd":
 763       comment=3, number of ACL entries, "nentries":
 764       comment=1, file descriptor, "no path&colon; fd":
 765       comment=ACLs
 766   case=Non-zero path
 767     format=arg1:arg2:path:[attr]:(0..n)[acl]3
 768       comment=2, SETACL, "cmd":
 769       comment=3, number of ACL entries, "nentries":
 770       comment=ACLs
 771 
 772 label=AUE_FCHDIR
 773   format=[path]:[attr]
 774 #       header,150,2,fchdir(2),,Mon May 15 09:22:38 2000, + 680001393 msec
 775 #       path,/export/home/CC_final/icenine/arv/fchdir/obj_succ
 776 #       attribute,40777,tuser10,other,8388608,207662,0
 777 #       subject,tuser10,tuser10,other,root,other,6129,367,255 197121 tmach1
 778 #       return,success,0
 779 #       trailer,150
 780 #       header,68,2,fchdir(2),,Mon May 15 09:22:51 2000, + 710001196 msec
 781 #       subject,tuser10,tuser10,other,root,other,6258,367,255 197121 tmach1
 782 #       return,failure: Permission denied,-1
 783 #       trailer,68
 784 
 785 label=AUE_FCHMOD
 786   case=With a valid file descriptor and path
 787     format=arg1:path:[attr]
 788       comment=2, mode, "new file mode"
 789   case=With a valid file descriptor and invalid path
 790     format=arg1:[arg]2:[attr]
 791       comment=2, mode, "new file mode":
 792       comment=1, file descriptor, "no path&colon; fd"
 793   case=With an invalid file descriptor
 794     format=arg1
 795       comment=2, mode, "new file mode"
 796 #       header,168,2,fchmod(2),,Sat Apr 29 12:28:06 2000, + 350000000 msec
 797 #       argument,2,0x1a4,new file mode
 798 #       path,/export/home/CC/icenine/arv/fchmod/obj_succ
 799 #       attribute,100644,tuser10,other,7602240,26092,0
 800 #       subject,tuser10,tuser10,other,root,other,11507,346,16064 196866 tmach1
 801 #       return,success,0
 802 #       trailer,168
 803 #       header,90,2,fchmod(2),,Sat Apr 29 12:28:32 2000, + 930000000 msec
 804 #       argument,2,0x1a4,new file mode
 805 #       subject,tuser10,tuser10,other,root,other,11759,346,16064 196866 tmach1
 806 #       return,failure: Bad file number,-1
 807 #       trailer,90
 808 #       header,168,2,fchmod(2),,Sat Apr 29 12:28:20 2000, + 770000000 msec
 809 #       argument,2,0x1a4,new file mode
 810 #       path,/export/home/CC/icenine/arv/fchmod/obj_fail
 811 #       attribute,100644,root,other,7602240,26093,0
 812 #       subject,tuser10,tuser10,other,root,other,11644,346,16064 196866 tmach1
 813 #       return,failure: Not owner,-1
 814 #       trailer,168
 815 
 816 label=AUE_FCHOWN
 817   case=With a valid file descriptor
 818     format=arg1:arg2:[path]:[attr]
 819       comment=2, uid, "new file uid":
 820       comment=3, gid, "new file gid"
 821   case=With an invalid file descriptor
 822     format=arg1:arg2:[arg]3:[attr]
 823        comment=2, uid, "new file uid":
 824        comment=3, gid, "new file gid":
 825        comment=1, file descriptor, "no path fd"
 826 
 827 label=AUE_FCHOWNAT
 828 # obsolete
 829   see=openat(2)
 830   case=With a valid absolute/relative file path
 831     format=path:[attr]
 832   case=With an file path eq. NULL and valid file descriptor
 833     format=kernel
 834 
 835 label=AUE_FCHROOT
 836   format=[path]:[attr]
 837 # fchroot -> chdirec -> audit_chdirec
 838 
 839 label=AUE_FCNTL
 840   case=With a valid file descriptor
 841     format=arg1:[arg]2:path:attr
 842       comment=2, command, "cmd":
 843       comment=3, flags, "flags"
 844   case=With an invalid file descriptor
 845     format=arg1:[arg]2:arg3
 846       comment=2, command, "cmd":
 847       comment=3, flags, "flags":
 848       comment=1, file descriptor, "no path fd"
 849   note=Flags are included only when cmd is F_SETFL.
 850 
 851 label=AUE_FLOCK
 852   skip=Not used.
 853 
 854 label=AUE_FORKALL
 855   format=[arg]1
 856     comment=0, pid, "child PID"
 857   note=The forkall(2) return values are undefined because the audit record
 858   note=is produced at the point that the child process is spawned.
 859 # see audit.c
 860 
 861 label=AUE_FORK1
 862   format=[arg]1
 863     comment=0, pid, "child PID"
 864   note=The fork1(2) return values are undefined because the audit record
 865   note=is produced at the point that the child process is spawned.
 866 # see audit.c
 867 
 868 label=AUE_FSAT
 869 # obsolete
 870   skip=Not used.  (Placeholder for AUE_*AT records)
 871 
 872 label=AUE_FSTAT
 873   skip=Not used.
 874 
 875 label=AUE_FSTATAT
 876 # obsolete
 877   format=path:[attr]
 878 
 879 label=AUE_FSTATFS
 880   case=With a valid file descriptor
 881     format=[path]:[attr]
 882   case=With an invalid file descriptor
 883     format=arg1
 884       comment=1, file descriptor, "no path fd"
 885 
 886 label=AUE_FTRUNCATE
 887   skip=Not used.
 888 
 889 label=AUE_FUSERS
 890   syscall=utssys: UTS_FUSERS
 891   format=path:attr
 892 
 893 label=AUE_FUTIMESAT
 894 # obsolete
 895   format=[path]:[attr]
 896 
 897 label=AUE_GETAUDIT
 898   format=kernel
 899 #       header,68,2,getaudit(2),,Mon May 15 09:23:57 2000, + 620001408 msec
 900 #       subject,tuser10,root,other,root,other,7063,367,255 197121 tmach1
 901 #       return,success,0
 902 #       trailer,68
 903 #       header,68,2,getaudit(2),,Mon May 15 09:24:09 2000, + 490003700 msec
 904 #       subject,tuser10,root,other,root,other,7158,367,255 197121 tmach1
 905 #       return,success,0
 906 #       trailer,68
 907 
 908 label=AUE_GETAUDIT_ADDR
 909   format=kernel
 910 #       header,73,2,getaudit_addr(2),,Thu Nov 08 15:14:01 2001, + 0 msec
 911 #       subject,tuser1,root,staff,root,staff,9689,12289,0 0 tmach2
 912 #       return,success,0
 913 
 914 label=AUE_GETAUID
 915   format=kernel
 916 #       header,68,2,getauid(2),,Mon May 15 09:24:22 2000, + 420000668 msec
 917 #       subject,tuser10,root,other,root,other,7303,367,255 197121 tmach1
 918 #       return,success,0
 919 #       trailer,68
 920 #       header,68,2,getauid(2),,Mon May 15 09:24:34 2000, + 490002988 msec
 921 #       subject,tuser10,tuser10,other,root,other,7410,367,255 197121 tmach1
 922 #       return,failure: Not owner,-1
 923 #       trailer,68
 924 
 925 label=AUE_GETDENTS
 926   skip=Not used.
 927 #Not security relevant
 928 
 929 label=AUE_GETKERNSTATE
 930   skip=Not used.
 931 
 932 label=AUE_GETMSG
 933   case=With a valid file descriptor
 934   format=arg1:[path]:attr:arg2
 935     comment=1, file descriptor, "fd":
 936     comment=4, priority, "pri"
 937   case=With an invalid file descriptor
 938   format=arg1:arg2
 939     comment=1, file descriptor, "fd":
 940     comment=4, priority, "pri"
 941 
 942 label=AUE_GETPMSG
 943   case=With a valid file descriptor
 944   format=arg1:[path]:attr
 945     comment=1, file descriptor, "fd"
 946   case=With an invalid file descriptor
 947   format=arg1
 948     comment=1, file descriptor, "fd"
 949 
 950 label=AUE_GETPORTAUDIT
 951   format=Not used.
 952 
 953 label=AUE_GETUSERAUDIT
 954   skip=Not used.
 955 
 956 label=AUE_INST_SYNC
 957   format=arg1
 958     comment=2, flags value, "flags"
 959 
 960 label=AUE_IOCTL
 961   case=With an invalid file descriptor
 962     format=arg1:arg2:arg3
 963       comment=1, file descriptor, "fd":
 964       comment=2, command, "cmd":
 965       comment=3, arg, "arg"
 966   case=With a valid file descriptor
 967     format=path:[attr]:arg1:arg2
 968       comment=2, ioctl cmd, "cmd":
 969       comment=3, ioctl arg, "arg"
 970   case=Non-file file descriptor
 971     format=arg1:arg2:arg3
 972       comment=1, file descriptor, "fd":
 973       comment=2, ioctl cmd, "cmd":
 974       comment=3, ioctl arg, "arg"
 975   case=Bad file name
 976     format=arg1:arg2:arg3
 977       comment=1, file descriptor, "no path&colon; fd":
 978       comment=2, ioctl cmd, "cmd":
 979       comment=3, ioctl arg, "arg"
 980 # old BSM manual misses a case
 981 
 982 label=AUE_JUNK
 983   skip=Not used.
 984 
 985 label=AUE_KILL
 986   case=Valid process
 987     format=arg1:[proc]
 988       comment=2, signo, "signal"
 989   case=Zero or negative process
 990     format=arg1:arg2
 991       comment=2, signo, "signal":
 992       comment=1, pid, "process"
 993 
 994 label=AUE_KILLPG
 995   skip=Not used.
 996 
 997 label=AUE_LCHOWN
 998   format=arg1:arg2:path:[attr]
 999     comment=2, uid, "new file uid":
1000     comment=3, gid, "new file gid"
1001 
1002 label=AUE_LINK
1003   format=path1:[attr]:path2
1004      comment=from path:
1005      comment=to path
1006 
1007 label=AUE_LSEEK
1008   skip=Not used.
1009 
1010 label=AUE_LSTAT
1011   format=path:[attr]
1012 
1013 label=AUE_LXSTAT
1014 # obsolete
1015   skip=Not used.
1016 
1017 label=AUE_MCTL
1018   skip=Not used.
1019 
1020 label=AUE_MEMCNTL
1021   format=arg1:arg2:arg3:arg4:arg5:arg6
1022     comment=1, base address, "base":
1023     comment=2, length, "len":
1024     comment=3, command, "cmd":
1025     comment=4, command args, "arg":
1026     comment=5, command attributes, "attr":
1027     comment=6, 0, "mask"
1028 
1029 label=AUE_MKDIR
1030   format=arg1:path:[attr]
1031     comment=2, mode, "mode"
1032 
1033 label=AUE_MKNOD
1034   format=arg1:arg2:path:[attr]
1035     comment=2, mode, "mode":
1036     comment=3, dev, "dev"
1037 
1038 label=AUE_MMAP
1039   case=With a valid file descriptor
1040     format=arg1:arg2:[path]3:[attr]
1041       comment=1, segment address, "addr":
1042       comment=2, segment address, "len":
1043       comment=if no path, then argument&colon; \
1044         1, "nopath&colon; fd", file descriptor
1045   case=With an invalid file descriptor
1046     format=arg1:arg2:arg3
1047       comment=1, segment address, "addr":
1048       comment=2, segment address, "len":
1049       comment=1, file descriptor, "no path&colon; fd"
1050 
1051 label=AUE_MODADDMAJ
1052   title=modctl: bind module
1053   syscall=modctl
1054   format=[text]1:[text]2:text3:arg4:(0..n)[text]5
1055     comment=driver major number:
1056     comment=driver name:
1057     comment=driver major number or "no drvname":
1058     comment=5, number of aliases, "":
1059     comment=aliases
1060 
1061 label=AUE_MODADDPRIV
1062   format=kernel
1063 
1064 label=AUE_MODCONFIG
1065   skip=Not used.
1066 
1067 label=AUE_MODCTL
1068   skip=Not used. (placeholder)
1069 
1070 label=AUE_MODDEVPLCY
1071   syscall=modctl
1072   title=modctl: set device policy
1073   case=If unknown minor name/pattern
1074     format=arg1:arg2:arg3:arg4:arg5
1075       comment=2, "major", major number:
1076       comment=2, "lomin", low minor number, if known:
1077       comment=2, "himin", hi minor number, if known:
1078       comment=privileges required for reading:
1079       comment=privileges required for writing
1080   case=else
1081     format=arg1:text2:arg3:arg4
1082       comment=2, "major", major number:
1083       comment=minor name/pattern:
1084       comment=privileges required for reading:
1085       comment=privileges required for writing
1086 
1087 label=AUE_MODLOAD
1088   syscall=modctl
1089   title=modctl: load module
1090   format=[text]1:text2
1091     comment=default path:
1092     comment=filename path
1093 
1094 label=AUE_MODUNLOAD
1095   syscall=modctl
1096   title=modctl: unload module
1097   format=arg1
1098     comment=1, module ID, "id"
1099 
1100 label=AUE_MOUNT
1101   case=UNIX file system
1102     format=arg1:text2:path:[attr]
1103       comment=3, flags, "flags":
1104       comment=filesystem type
1105   case=NFS file system
1106     format=arg1:text2:text3:arg4:path:[attr]
1107       comment=3, flags, "flags":
1108       comment=filesystem type:
1109       comment=host name:
1110       comment=3, flags, "internal flags"
1111 # unix example:
1112 #       header,239,2,mount(2),,Sun Apr 16 14:42:32 2000, + 979995208 msec
1113 #       argument,3,0x104,flags
1114 #       text,ufs
1115 #       path,/var2
1116 #       attribute,40755,root,root,32,12160,0
1117 #       path,/devices/pci@1f,4000/scsi@3/sd@0,0:e
1118 #       attribute,60640,root,sys,32,231268,137438953476
1119 #       subject,abc,root,other,root,other,1726,1715,255 66049 ohboy
1120 #       return,success,4290707268
1121 #                      ^^^^^^^^^^         <- bugid 4333559
1122 
1123 label=AUE_MSGCTL
1124   format=arg1:[ipc]:[ipc_perm]
1125     comment=1, message ID, "msg ID"
1126   note=ipc_perm
1127 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1128 
1129 label=AUE_MSGCTL_RMID
1130   format=arg1:[ipc]:[ipc_perm]
1131     comment=1, message ID, "msg ID"
1132   note=ipc_perm
1133   syscall=msgctl: IPC_RMID
1134 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1135 
1136 label=AUE_MSGCTL_SET
1137   format=arg1:[ipc]:[ipc_perm]
1138     comment=1, message ID, "msg ID"
1139   note=ipc_perm
1140   syscall=msgctl: IPC_SET
1141 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1142 
1143 label=AUE_MSGCTL_STAT
1144   format=arg1:[ipc]:[ipc_perm]
1145     comment=1, message ID, "msg ID"
1146   note=ipc_perm
1147   syscall=msgctl: IPC_STAT
1148 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1149 
1150 label=AUE_MSGGET
1151   format=arg1:ipc
1152     comment=1, message key, "msg key"
1153   note=ipc_perm
1154   syscall=msgget
1155 
1156 label=AUE_MSGGETL
1157   skip=Not used.
1158 
1159 label=AUE_MSGRCV
1160   format=arg1:[ipc]:[ipc_perm]
1161     comment=1, message ID, "msg ID"
1162   note=ipc_perm
1163   syscall=msgrcv
1164 # ipc, ipc_perm: msgrcv -> ipc_lookup -> audit_ipc
1165 
1166 label=AUE_MSGRCVL
1167   skip=Not used.
1168 
1169 label=AUE_MSGSND
1170   format=arg1:[ipc]:[ipc_perm]
1171     comment=1, message ID, "msg ID"
1172   note=ipc_perm
1173   syscall=msgsnd
1174 # ipc, ipc_perm: msgsnd -> ipc_lookup -> audit_ipc
1175 
1176 label=AUE_MSGSNDL
1177   skip=Not used.
1178 
1179 label=AUE_MSGSYS
1180 skip=Not used.  (Placeholder for AUE_MSG* events.)
1181 
1182 label=AUE_MUNMAP
1183   format=arg1:arg2
1184     comment=1, address of memory, "addr":
1185     comment=2, memory segment size, "len"
1186 
1187 label=AUE_NFS
1188   skip=Not used.
1189 
1190 label=AUE_NFSSVC_EXIT
1191   skip=Not used.
1192 
1193 label=AUE_NFS_GETFH
1194   skip=Not used.
1195 
1196 label=AUE_NFS_SVC
1197   skip=Not used.
1198 
1199 label=AUE_NICE
1200   format=kernel
1201 
1202 label=AUE_NULL
1203   skip=Not used.  (placeholder)
1204 # used internal to audit_event.c for minimal audit
1205 
1206 label=AUE_NTP_ADJTIME
1207   format=kernel
1208 
1209 label=AUE_ONESIDE
1210   skip=Not used.
1211 
1212 label=AUE_OPEN
1213   skip=Not used.  (placeholder for AUE_OPEN_*).
1214 
1215 label=AUE_OPEN_R
1216   format=path:[path_attr]:[attr]
1217   see=open(2) - read
1218 
1219 label=AUE_OPENAT_R
1220 # obsolete
1221   format=path:[path_attr]:[attr]
1222   see=openat(2)
1223 
1224 label=AUE_OPEN_RC
1225   format=path:[path_attr]:[attr]
1226   see=open(2) - read,creat
1227 
1228 label=AUE_OPENAT_RC
1229 # obsolete
1230   see=openat(2)
1231   format=path:[path_attr]:[attr]
1232 
1233 label=AUE_OPEN_RT
1234   format=path:[path_attr]:[attr]
1235   see=open(2) - read,trunc
1236 
1237 label=AUE_OPENAT_RT
1238 # obsolete
1239   see=openat(2)
1240   format=path:[path_attr]:[attr]
1241 
1242 label=AUE_OPEN_RTC
1243   format=path:[path_attr]:[attr]
1244   see=open(2) - read,trunc,creat
1245 
1246 label=AUE_OPENAT_RTC
1247 # obsolete
1248   see=openat(2)
1249   format=path:[path_attr]:[attr]
1250 
1251 label=AUE_OPEN_RW
1252   format=path:[path_attr]:[attr]
1253   see=open(2) - read,write
1254 
1255 label=AUE_OPENAT_RW
1256 # obsolete
1257   see=openat(2)
1258   format=path:[path_attr]:[attr]
1259 # aui_fsat(): fm & O_RDWR
1260 
1261 label=AUE_OPEN_RWC
1262   format=path:[path_attr]:[attr]
1263   see=open(2) - read,write,creat
1264 
1265 label=AUE_OPENAT_RWC
1266 # obsolete
1267   see=openat(2)
1268   format=path:[path_attr]:[attr]
1269 
1270 label=AUE_OPEN_RWT
1271   format=path:[path_attr]:[attr]
1272   see=open(2) - read,write,trunc
1273 
1274 label=AUE_OPENAT_RWT
1275 # obsolete
1276   see=openat(2)
1277   format=path:[path_attr]:[attr]
1278 
1279 label=AUE_OPEN_RWTC
1280   format=path:[path_attr]:[attr]
1281   see=open(2) - read,write,trunc,creat
1282 
1283 label=AUE_OPENAT_RWTC
1284 # obsolete
1285   see=openat(2)
1286   format=path:[path_attr]:[attr]
1287 
1288 label=AUE_OPEN_W
1289   format=path:[path_attr]:[attr]
1290   see=open(2) - write
1291 
1292 label=AUE_OPENAT_W
1293   see=openat(2)
1294   format=path:[path_attr]:[attr]
1295 
1296 label=AUE_OPEN_WC
1297   format=path:[path_attr]:[attr]
1298   see=open(2) - write,creat
1299 
1300 label=AUE_OPENAT_WC
1301   see=openat(2)
1302   format=path:[path_attr]:[attr]
1303 
1304 label=AUE_OPEN_WT
1305   format=path:[path_attr]:[attr]
1306   see=open(2) - write,trunc
1307 
1308 label=AUE_OPENAT_WT
1309   see=openat(2)
1310   format=path:[path_attr]:[attr]
1311 
1312 label=AUE_OPEN_WTC
1313   format=path:[path_attr]:[attr]
1314   see=open(2) - write,trunc,creat
1315 
1316 label=AUE_OPENAT_WTC
1317   see=openat(2)
1318   format=path:[path_attr]:[attr]
1319 
1320 label=AUE_OPEN_S
1321   format=path:[path_attr]:[attr]
1322   see=open(2) - search
1323 
1324 label=AUE_OPEN_E
1325   format=path:[path_attr]:[attr]
1326   see=open(2) - exec
1327 
1328 label=AUE_OSETPGRP
1329   skip=Not used.
1330 
1331 label=AUE_OSTAT
1332 # obsolete
1333   skip=Not used.
1334 
1335 label=AUE_PATHCONF
1336   format=path:[attr]
1337 
1338 label=AUE_PIPE
1339 format=kernel
1340 # class is no, not usually printed
1341 
1342 label=AUE_PORTFS
1343   skip=Not used (placeholder for AUE_PORTFS_*).
1344 
1345 label=AUE_PORTFS
1346   skip=Not used (placeholder for AUE_PORTFS_*).
1347 
1348 label=AUE_PORTFS_ASSOCIATE
1349   syscall=portfs
1350   see=port_associate(3C)
1351   case=Port association via PORT_SOURCE_FILE
1352   format=[path]1:attr
1353     comment=name of the file/directory to be watched
1354 
1355 label=AUE_PORTFS_DISSOCIATE
1356   syscall=portfs
1357   see=port_dissociate(3C)
1358   case=Port disassociation via PORT_SOURCE_FILE
1359   format=kernel
1360 
1361 label=AUE_PRIOCNTLSYS
1362   syscall=priocntl
1363   see=priocntl(2)
1364   format=arg1:arg2
1365     comment=1, priocntl version number, "pc_version":
1366     comment=3, command, "cmd"
1367 
1368 label=AUE_PROCESSOR_BIND
1369   case=No LWP/thread bound to the processor
1370     format=arg1:arg2:text3:[proc]
1371       comment=1, type of ID, "ID type":
1372       comment=2, ID value, "ID":
1373       comment="PBIND_NONE"
1374   case=With processor bound
1375     format=arg1:arg2:arg3:[proc]
1376       comment=1, type of ID, "ID type":
1377       comment=2, ID value, "ID":
1378       comment=3, processor ID, "processor_id"
1379 
1380 label=AUE_PUTMSG
1381   see=putmsg(2)
1382   format=arg1:[path]:[attr]:arg2
1383     comment=1, file descriptor, "fd":
1384     comment=4, priority, "pri"
1385 
1386 label=AUE_PUTPMSG
1387   see=putpmsg(2)
1388   format=arg1:[path]:[attr]:arg2:arg3
1389     comment=1, file descriptor, "fd":
1390     comment=4, priority, "pri":
1391     comment=5, flags, "flags"
1392 
1393 label=AUE_P_ONLINE
1394   format=arg1:arg2:text3
1395     comment=1, processor ID, "processor ID":
1396     comment=2, flags value, "flags":
1397     comment=text form of flags.  Values&colon;  \
1398       P_ONLINE, P_OFFLINE, P_NOINTR, P_SPARE, P_FAULTED, P_STATUS, P_DISABLED
1399 
1400 label=AUE_QUOTACTL
1401   skip=Not used.
1402 
1403 label=AUE_READ
1404   skip=Not used.  (Placeholder for AUE_READ_* events)
1405 
1406 label=AUE_READL
1407   skip=Not used. (Obsolete)
1408 
1409 label=AUE_READLINK
1410   format=path:[attr]
1411 
1412 label=AUE_READV
1413   skip=Not used (obsolete)
1414 # detritus from CMS
1415 
1416 label=AUE_READVL
1417   skip=Not used (obsolete)
1418 # detritus from CMS
1419 
1420 label=AUE_REBOOT
1421   skip=Not used.
1422 
1423 label=AUE_RECV
1424   case=If address family is AF_INET or AF_INET6
1425     format=[arg]1:[inet]
1426       comment=1, file descriptor, "so"
1427   case=If address family is AF_UNIX and path is defined
1428     format=[path]1:[attr]
1429       comment=1, file descriptor, "so"
1430   case=If address family is AF_UNIX and path is NULL
1431     format=[path]1:[attr]
1432       comment=1, file descriptor, "no path&colon; fd"
1433   case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1434     format=[arg]1:[arg]2:[arg]3
1435       comment=1, file descriptor, "so":
1436       comment=1, family, "family":
1437       comment=1, type, "type"
1438 # associated class remapped to AUE_READ's class (audit_event.c:audit_s2e[237])
1439 
1440 label=AUE_RECVFROM
1441   format=inet:arg1:[arg]2:inet3:arg4
1442     comment=3, message length, "len":
1443     comment=4, flags, "flags":
1444     comment=from address:
1445     comment=6, address length, "tolen"
1446   note=The socket token for a bad socket is reported as "argument
1447   note=token (1, socket descriptor, "fd")"
1448 
1449 label=AUE_RECVMSG
1450   case=If invalid file descriptor
1451     format=arg1:arg2
1452       comment=1, file descriptor, "so":
1453       comment=3, flags, "flags"
1454   case=If valid file descriptor and socket is AF_UNIX and no path
1455   format=arg1:[attr]
1456     comment=1, file descriptor, "no path&colon; fd"
1457   case=If valid file descriptor and socket is AF_UNIX and path defined
1458   format=path:attr
1459   case=If valid file descriptor and socket is AF_INET or AF_INET6
1460   case=.. if socket type is SOCK_DGRAM or SOCK_RAW or SOCK_STREAM
1461   format=arg1:arg2:inet
1462     comment=1, file descriptor, "so":
1463     comment=2, flags, "flags"
1464   case=.. if socket type is unknown
1465   format=arg1:arg2:arg3:arg4
1466     comment=1, file descriptor, "so":
1467     comment=1, family, "family":
1468     comment=1, type, "type":
1469     comment=3, flags, "flags"
1470 
1471 label=AUE_RENAME
1472   format=path1:[attr]1:[path]2
1473   comment=from name:
1474   comment=to name
1475 
1476 label=AUE_RENAMEAT
1477 # obsolete
1478   format=path1:[attr]1:[path]2
1479   comment=from name:
1480   comment=to name
1481 
1482 label=AUE_RFSSYS
1483   skip=Not used.
1484 # apparently replaced
1485 
1486 label=AUE_RMDIR
1487   format=path:[attr]
1488 
1489 label=AUE_SACL
1490   title=File Access Audit
1491   syscall=none
1492   see=none
1493   format=head:path:arg1:[text]2:subj
1494     comment="access_mask":
1495     comment="Windows SID"
1496 
1497 label=AUE_SEMCTL
1498   format=arg1:[ipc]:[ipc_perm]
1499     comment=1, semaphore ID, "sem ID"
1500   note=ipc_perm
1501 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1502 
1503 label=AUE_SEMCTL_GETALL
1504   format=arg1:[ipc]:[ipc_perm]
1505     comment=1, semaphore ID, "sem ID"
1506   note=ipc_perm
1507   syscall=semctl: GETALL
1508 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1509 
1510 label=AUE_SEMCTL_GETNCNT
1511   format=arg1:[ipc]:[ipc_perm]
1512     comment=1, semaphore ID, "sem ID"
1513   note=ipc_perm
1514   syscall=semctl: GETNCNT
1515 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1516 
1517 label=AUE_SEMCTL_GETPID
1518   format=arg1:[ipc]:[ipc_perm]
1519     comment=1, semaphore ID, "sem ID"
1520   note=ipc_perm
1521   syscall=semctl: GETPID
1522 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1523 
1524 label=AUE_SEMCTL_GETVAL
1525   format=arg1:[ipc]:[ipc_perm]
1526     comment=1, semaphore ID, "sem ID"
1527   note=ipc_perm
1528   syscall=semctl: GETVAL
1529 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1530 
1531 label=AUE_SEMCTL_GETZCNT
1532   format=arg1:[ipc]:[ipc_perm]
1533     comment=1, semaphore ID, "sem ID"
1534   note=ipc_perm
1535   syscall=semctl: GETZCNT
1536 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1537 
1538 label=AUE_SEMCTL_RMID
1539   format=arg1:[ipc]:[ipc_perm]
1540     comment=1, semaphore ID, "sem ID"
1541   note=ipc_perm
1542   syscall=semctl: IPC_RMID
1543 # ipc, ipc_perm token: semctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1544 
1545 label=AUE_SEMCTL_SET
1546   format=arg1:[ipc]:[ipc_perm]
1547     comment=1, semaphore ID, "sem ID"
1548   note=ipc_perm
1549   syscall=semctl: IPC_SET
1550 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1551 
1552 label=AUE_SEMCTL_SETALL
1553   format=arg1:[ipc]:[ipc_perm]
1554     comment=1, semaphore ID, "sem ID"
1555   note=ipc_perm
1556   syscall=semctl: SETALL
1557 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1558 
1559 label=AUE_SEMCTL_SETVAL
1560   format=arg1:[ipc]:[ipc_perm]
1561     comment=1, semaphore ID, "sem ID"
1562   note=ipc_perm
1563   syscall=semctl: SETVAL
1564 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1565 
1566 label=AUE_SEMCTL_STAT
1567   format=arg1:[ipc]:[ipc_perm]
1568     comment=1, semaphore ID, "sem ID"
1569   note=ipc_perm
1570   syscall=semctl: IPC_STAT
1571 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1572 
1573 label=AUE_SEMGET
1574   format=arg1:[ipc_perm]:ipc
1575     comment=1, semaphore ID, "sem key"
1576   note=ipc_perm
1577   syscall=semctl: SETVAL
1578 # ipc_perm token: semget -> audit_ipcget
1579 
1580 label=AUE_SEMGETL
1581   skip=Not used.
1582 
1583 label=AUE_SEMOP
1584   format=arg1:[ipc]:[ipc_perm]
1585     comment=1, semaphore ID, "sem ID"
1586   note=ipc_perm
1587 # ipc, ipc_perm token: semop -> ipc_lookup -> audit_ipc
1588 
1589 label=AUE_SEMSYS
1590   skip=Not used.  (place holder) -- defaults to a semget variant
1591 
1592 label=AUE_SEND
1593   case=If address family is AF_INET or AF_INET6
1594     format=[arg]1:[inet]
1595       comment=1, file descriptor, "so"
1596   case=If address family is AF_UNIX and path is defined
1597     format=[path]1:[attr]
1598       comment=1, file descriptor, "so"
1599   case=If address family is AF_UNIX and path is NULL
1600     format=[path]1:[attr]
1601       comment=1, file descriptor, "no path&colon; fd"
1602   case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1603     format=[arg]1:[arg]2:[arg]3
1604       comment=1, file descriptor, "so":
1605       comment=1, family, "family":
1606       comment=1, type, "type"
1607 # associated class remapped to AUE_WRITE's class (audit_event.c:audit_s2e[240])
1608 
1609 label=AUE_SENDMSG
1610   case=If invalid file descriptor
1611     format=arg1:arg2
1612       comment=1, file descriptor, "so":
1613       comment=3, flags, "flags"
1614   case=If valid file descriptor
1615   case=...and address family is AF_UNIX and path is defined
1616     format=path:attr
1617   case=...and address family is AF_UNIX and path is NULL
1618     format=path1:attr
1619       comment=1, file descriptor, "nopath&colon; fd"
1620   case=...and address family is AF_INET or AF_INET6, \
1621     socket is SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1622     format=arg1:arg2:inet
1623       comment=1, file descriptor, "so":
1624       comment=3, flags, "flags"
1625   case=...and unknown address family or address family AF_INET or AF_INET6 \
1626     and not socket SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1627     format=arg1:arg2:arg3:arg4
1628       comment=1, file descriptor, "so":
1629       comment=1, family, "family":
1630       comment=1, type, "type":
1631       comment=1, flags, "flags"
1632 
1633 label=AUE_SENDTO
1634   case=If invalid file descriptor
1635     format=arg1:arg2
1636       comment=1, file descriptor, "so":
1637       comment=3, flags, "flags"
1638   case=If valid file descriptor
1639   case=...and socket is AF_UNIX and path is defined
1640     format=path:attr
1641   case=...and address family is AF_UNIX and path is NULL
1642     format=path1:attr
1643       comment=1, file descriptor, "nopath&colon; fd"
1644   case=...and address family is AF_INET or AF_INET6
1645     format=arg1:arg2:inet
1646       comment=1, file descriptor, "so":
1647       comment=3, flags, "flags"
1648   case=...and unknown address family
1649     format=arg1:arg2:arg3:arg4
1650       comment=1, file descriptor, "so":
1651       comment=1, family, "family":
1652       comment=1, type, "type":
1653       comment=1, flags, "flags"
1654 
1655 label=AUE_SETAUDIT
1656   case=With a valid program stack address
1657     format=arg1:arg2:arg3:arg4:arg5:arg6
1658       comment=1, audit user ID, "setaudit&colon;auid":
1659       comment=1, terminal ID, "setaudit&colon;port":
1660       comment=1, terminal ID, "setaudit&colon;machine":
1661       comment=1, preselection mask, "setaudit&colon;as_success":
1662       comment=1, preselection mask, "setaudit&colon;as_failure":
1663       comment=1, audit session ID, "setaudit&colon;asid"
1664   case=With an invalid program stack address
1665     format=kernel
1666 #       header,215,2,setaudit(2),,Mon May 15 09:43:28 2000, + 60002627 msec
1667 #       argument,1,0x271a,setaudit:auid
1668 #       argument,1,0x3ff0201,setaudit:port
1669 #       argument,1,0x8192591e,setaudit:machine
1670 #       argument,1,0x400,setaudit:as_success
1671 #       argument,1,0x400,setaudit:as_failure
1672 #       argument,1,0x16f,setaudit:asid
1673 #       subject,tuser10,root,other,root,other,20620,367,255 197121 tmach1
1674 #       return,success,0
1675 #       trailer,215
1676 #       header,215,2,setaudit(2),,Mon May 15 09:43:40 2000, + 50000847 msec
1677 #       argument,1,0x271a,setaudit:auid
1678 #       argument,1,0x3ff0201,setaudit:port
1679 #       argument,1,0x8192591e,setaudit:machine
1680 #       argument,1,0x400,setaudit:as_success
1681 #       argument,1,0x400,setaudit:as_failure
1682 #       argument,1,0x16f,setaudit:asid
1683 #       subject,tuser10,root,other,root,other,20720,367,255 197121 tmach1
1684 #       return,success,0
1685 #       trailer,215
1686 
1687 label=AUE_SETAUDIT_ADDR
1688   case=With a valid program stack address
1689     format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7
1690       comment=1, audit user ID, "auid":
1691       comment=1, terminal ID, "port":
1692       comment=1, type, "type":
1693       comment=1, terminal ID, "ip address":
1694       comment=1, preselection mask, "as_success":
1695       comment=1, preselection mask, "as_failure":
1696       comment=1, audit session ID, "asid"
1697   case=With an invalid program stack address
1698     format=kernel
1699 #       header,172,2,setaudit_addr(2),,Fri Nov 09 13:52:26 2001, + 0 msec
1700 #       argument,1,0x15fa7,auid
1701 #       argument,1,0x0,port
1702 #       argument,1,0x4,type
1703 #       ip address,tmach2
1704 #       argument,1,0x9c00,as_success
1705 #       argument,1,0x9c00,as_failure
1706 #       argument,1,0x1f1,asid
1707 #       subject,tuser1,root,staff,tuser1,staff,10420,497,0 0 tmach2
1708 #       return,success,0
1709 
1710 label=AUE_SETAUID
1711   format=arg1
1712     comment=2, audit user ID, "setauid"
1713 
1714 label=AUE_SETDOMAINNAME
1715   skip=Not used.  (See AUE_SYSINFO)
1716 # See AUE_SYSINFO with SI_SET_SRPC_DOMAIN
1717 
1718 label=AUE_SETEGID
1719   format=arg1
1720     comment=1, group ID, "gid"
1721 
1722 label=AUE_SETEUID
1723   format=arg1
1724     comment=1, user ID, "euid"
1725 
1726 label=AUE_SETGID
1727   format=arg1
1728     comment=1, group ID, "gid"
1729 
1730 label=AUE_SETGROUPS
1731   note=If more than NGROUPS_MAX_DEFAULT groups listed,
1732   note=no tokens are generated.
1733   case=If no groups in list
1734     format=[arg]1
1735       comment=1, 0, "setgroups"
1736   case=If 1 or more groups in list
1737     format=(1..n)arg1
1738       comment=1, gid, "setgroups"
1739 
1740 label=AUE_SETHOSTNAME
1741   skip=Not used.  (See AUE_SYSINFO)
1742 # See sysinfo call with command SI_SET_HOSTNAME
1743 
1744 label=AUE_SETKERNSTATE
1745   skip=Not used.
1746 
1747 label=AUE_SETPGID
1748   format=[proc]:[arg]1
1749   comment=2, pgid, "pgid"
1750 
1751 label=AUE_SETPGRP
1752   format=kernel
1753 
1754 label=AUE_SETPRIORITY
1755   skip=Not used.
1756 
1757 label=AUE_SETPPRIV
1758   case=operation privileges off
1759   format=arg1:privset2
1760     comment=setppriv operation:
1761     comment=privileges actually switched off
1762   case=operation privileges on
1763   format=arg1:privset2
1764     comment=setppriv operation:
1765     comment=privileges actually switched on
1766   case=operation privileges off
1767   format=arg1:privset2:privset3
1768     comment=setppriv operation:
1769     comment=privileges before privset:
1770     comment=privileges after privset
1771 #header,220,2,settppriv(2),,test1,Mon Oct  6 10:09:05 PDT 2003, + 753 msec
1772 #argument,2,0x2,op
1773 #privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1774 #privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1775 #subject,tuser,root,staff,tuser,staff,444,426,200 131585 test0
1776 #return,success,0
1777 
1778 label=AUE_SETREGID
1779   format=arg1:arg2
1780     comment=1, real group ID, "rgid":
1781     comment=2, effective group ID, "egid"
1782 
1783 label=AUE_SETREUID
1784   format=arg1:arg2
1785     comment=1, real user ID, "ruid":
1786     comment=2, effective user ID, "euid"
1787 
1788 label=AUE_SETRLIMIT
1789   format=kernel
1790 #       header,73,2,setrlimit(2),,Thu Nov 08 15:14:17 2001, + 0 msec
1791 #       subject,tuser1,tuser1,staff,tuser1,staff,9707,497,0 0 tmach2
1792 #       return,success,0
1793 
1794 label=AUE_SETSID
1795   format=kernel
1796 
1797 label=AUE_SETSOCKOPT
1798   case=Invalid file descriptor
1799     format=arg1:arg2
1800       comment=1, file descriptor, "so":
1801       comment=2, level, "level"
1802   case=Valid file descriptor
1803   case=...and socket is AF_UNIX
1804     format=path1:arg2:arg3:arg4:arg5:arg6:[arg]7:[data]8
1805       comment=if no path, will be argument&colon; 1, "nopath&colon; fd", \
1806         file descriptor:
1807       comment=1, file descriptor, "so":
1808       comment=1, family, "family":
1809       comment=1, type, "type":
1810       comment=2, protocol level, "level":
1811       comment=3, option name, "optname":
1812       comment=5, option length, "optlen":
1813       comment=option data
1814   case=...and socket is AF_INET or AF_INET6
1815     format=arg1:arg2:arg3:[arg]4:[data]5:inet
1816       comment=1, file descriptor, "so":
1817       comment=2, protocol level, "level":
1818       comment=3, option name, "optname":
1819       comment=5, option length, "optlen":
1820       comment=option data
1821   case=...and socket adddress family is unknown
1822     format=arg1:arg2:arg3:arg4:arg5:[arg]6:[data]7
1823       comment=1, file descriptor, "so":
1824       comment=1, family, "family":
1825       comment=1, type, "type":
1826       comment=2, protocol level, "level":
1827       comment=3, option name, "optname":
1828       comment=5, option length, "optlen":
1829       comment=option data
1830 
1831 label=AUE_SETTIMEOFDAY
1832   skip=Not used.
1833 
1834 label=AUE_SETUID
1835   syscall=setuid
1836   format=arg1
1837     comment=1, "uid" to be set
1838 
1839 label=AUE_SETUSERAUDIT
1840   skip=Not used.
1841 
1842 label=AUE_SHMAT
1843   format=arg1:arg2:[ipc]:[ipc_perm]
1844     comment=1, shared memory ID, "shm ID":
1845     comment=2, shared mem addr, "shm addr"
1846   note=ipc_perm
1847 # ipc, ipc_perm token: shmat -> ipc_lookup -> audit_ipc
1848 
1849 label=AUE_SHMCTL
1850   format=arg1:[ipc]:[ipc_perm]
1851     comment=1, shared memory ID, "shm ID"
1852   note=ipc_perm
1853 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1854 
1855 label=AUE_SHMCTL_RMID
1856   format=arg1:[ipc]:[ipc_perm]
1857   comment=1, shared memory ID, "shm ID"
1858   note=ipc_perm
1859   syscall=semctl:  IPC_RMID
1860 # ipc, ipc_perm token: shmctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1861 
1862 label=AUE_SHMCTL_SET
1863   format=arg1:[ipc]:[ipc_perm]
1864     comment=1, shared memory ID, "shm ID"
1865   note=ipc_perm
1866   syscall=semctl:  IPC_SET
1867 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1868 
1869 label=AUE_SHMCTL_STAT
1870   format=arg1:[ipc]:[ipc_perm]
1871     comment=1, shared memory ID, "shm ID"
1872   note=ipc_perm
1873   syscall=semctl:  IPC_STAT
1874 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1875 
1876 label=AUE_SHMDT
1877   format=arg1
1878     comment=1, shared memory address, "shm adr"
1879 
1880 label=AUE_SHMGET
1881   format=arg1:[ipc_perm]:[ipc]
1882     comment=0, shared memory key, "shm key"
1883   note=ipc_perm
1884 # ipc_perm: shmget -> audit_ipcget
1885 
1886 label=AUE_SHMGETL
1887   skip=Not used.
1888 
1889 label=AUE_SHMSYS
1890   skip=Not used.  (Placeholder for shmget and shmctl*)
1891 
1892 label=AUE_SHUTDOWN
1893   case=If the socket address is invalid
1894     format=[arg]1:[text]2:[text]3
1895       comment=1, file descriptor, "fd":
1896       comment=bad socket address:
1897       comment=bad peer address
1898   case=If the socket address is part of the AF_INET family
1899     case=..with zero file descriptor
1900       format=arg1:[arg]2:[arg]3:[arg]4
1901         comment=1, file descriptor, "so":
1902         comment=1, family, "family":
1903         comment=1, type, "type":
1904         comment=2, how shutdown code, "how"
1905     case=...with non-zero file descriptor
1906       format=arg1:arg2:inet
1907         comment=1, file descriptor, "so":
1908         comment=2, how shutdown code, "how"
1909   case=If the socket address is AF_UNIX
1910     case=...with zero file descriptor
1911       format=path1:arg2:[arg]3:[arg]4:[arg]5
1912         comment=If error&colon; argument&colon; \
1913           1, "no path&colon; fd", file descriptor:
1914         comment=1, file descriptor, "so":
1915         comment=1, family, "family":
1916         comment=1, type, "type":
1917         comment=2, how shutdown code, "how"
1918     case=...with non-zero file descriptor
1919       format=path1:arg2:arg3:inet
1920         comment=If error&colon; argument&colon; \
1921           1, file descriptor, "no path&colon; fd":
1922         comment=1, file descriptor, "so":
1923         comment=2, how shutdown code, "how"
1924 #old BSM manual wrong; used audit_event.c
1925 
1926 label=AUE_SOCKACCEPT
1927   syscall=getmsg:  socket accept
1928   format=inet:arg1:[path]:attr:arg2
1929     comment=1, file descriptor, "fd":
1930     comment=4, priority, "pri"
1931 # see putmsg and getmsg for record format
1932 # See audit.c for inet token and audit_start.c for other reference
1933 
1934 label=AUE_SOCKCONFIG
1935   format=arg1:arg2:arg3:[path]4
1936     comment=1, domain address, "domain":
1937     comment=2, type, "type":
1938     comment=3, protocol, "protocol":
1939     comment=If no path&colon;argument -- 3, 0, "devpath"
1940 
1941 label=AUE_SOCKCONNECT
1942   syscall=putmsg:  socket connect
1943   format=inet:arg1:[path]:attr:arg2
1944     comment=1, file descriptor, "fd":
1945     comment=4, priority, "pri"
1946 # same as AUE_SOCKACCEPT
1947 
1948 label=AUE_SOCKET
1949   format=arg1:[arg]2:arg3
1950     comment=1, socket domain, "domain":
1951     comment=2, socket type, "type":
1952     comment=3, socket protocol, "protocol"
1953 
1954 label=AUE_SOCKETPAIR
1955   skip=Not used.
1956 # unreferenced
1957 
1958 label=AUE_SOCKRECEIVE
1959   syscall=getmsg
1960   format=inet:arg1:[path]:attr:arg2
1961     comment=1, file descriptor, "fd":
1962     comment=4, priority, "pri"
1963 # see AUE_SOCKACCEPT
1964 
1965 label=AUE_SOCKSEND
1966 syscall=putmsg
1967   format=inet:arg1:[path]:attr:arg2
1968     comment=1, file descriptor, "fd":
1969     comment=4, priority, "pri"
1970 # see AUE_SOCKACCEPT
1971 
1972 label=AUE_STAT
1973   format=path:[attr]
1974 
1975 label=AUE_STATFS
1976   format=path:[attr]
1977 
1978 label=AUE_STATVFS
1979   format=path:[attr]
1980 
1981 label=AUE_STIME
1982   format=kernel
1983 
1984 label=AUE_SWAPON
1985   skip=Not used.
1986 
1987 label=AUE_SYMLINK
1988   format=path:text1:[attr]
1989     comment=symbolic link string
1990 
1991 label=AUE_SYSINFO
1992   note=Only SI_SET_HOSTNAME and SI_SET_SRPC_DOMAIN commands
1993   note=are currently audited.
1994   format=arg1:[text]2
1995     comment=1, command, "cmd":
1996     comment=name
1997 
1998 label=AUE_SYSTEMBOOT
1999   title=system booted
2000   syscall=none
2001   format=head:text1
2002     comment="booting kernel"
2003 # see audit_start.c and audit_io.c
2004 # no subject or return / exit token
2005 #       header,44,2,system booted,na,Fri Nov 09 13:53:42 2001, + 0 msec
2006 #       text,booting kernel
2007 
2008 label=AUE_TRUNCATE
2009   skip=Not used.
2010 
2011 label=AUE_UMOUNT
2012   syscall=umount: old version
2013   note=Implemented as call of the newer umount2(2).
2014   format=path:arg1:[path]:[attr]
2015     comment=2, mflag value = 0, "flags"
2016 
2017 label=AUE_UMOUNT2
2018   syscall=umount2
2019   format=path:arg1:[path]:[attr]
2020     comment=2, mflag value, "flags"
2021 
2022 label=AUE_UNLINK
2023   format=path:[attr]
2024 
2025 label=AUE_UNLINKAT
2026 # obsolete
2027   see=openat(2)
2028   format=path:[attr]
2029 
2030 label=AUE_UNMOUNT
2031   skip=Not used.
2032 
2033 label=AUE_UTIME
2034 # obsolete
2035   format=path:[attr]
2036 
2037 label=AUE_UTIMES
2038   see=futimens(2)
2039   format=path:[attr]
2040 
2041 label=AUE_VFORK
2042   format=arg1
2043     comment=0, pid, "child PID"
2044   note=The vfork(2) return values are undefined because the audit record is
2045   note=produced at the point that the child process is spawned.
2046 
2047 label=AUE_VPIXSYS
2048   skip=Not used.
2049 
2050 label=AUE_VTRACE
2051   skip=Not used.
2052 
2053 label=AUE_WRITE
2054   format=path1:attr
2055     comment=if no path, argument -- "1, file descriptor, "no path: fd"
2056   note:An audit record is generated for write only once per file close.
2057 
2058 label=AUE_WRITEV
2059   skip=Not used. (obsolete)
2060 
2061 label=AUE_XMKNOD
2062 # obsolete
2063   skip=Not used.
2064 
2065 label=AUE_XSTAT
2066 # obsolete
2067   skip=Not Used.
2068 
2069 label=AUE_PF_POLICY_ADDRULE
2070   title=Add IPsec policy rule
2071   see=
2072   syscall=none
2073   format=arg1:arg2:[zone]3:[text]4
2074   comment=Operation applied to active policy (1 is active, 0 is inactive):
2075   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2076   comment=affected zone:
2077   comment=Name of target tunnel
2078 
2079 label=AUE_PF_POLICY_DELRULE
2080   title=Delete IPsec policy rule
2081   see=
2082   syscall=none
2083   format=arg1:arg2:[zone]3:[text]4
2084   comment=Operation applied to active policy (1 is active, 0 is inactive):
2085   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2086   comment=affected zone:
2087   comment=Name of target tunnel
2088 
2089 label=AUE_PF_POLICY_CLONE
2090   title=Clone IPsec policy
2091   see=
2092   syscall=none
2093   format=arg1:arg2:[zone]3:[text]4
2094   comment=Operation applied to active policy (1 is active, 0 is inactive):
2095   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2096   comment=affected zone:
2097   comment=Name of target tunnel
2098 
2099 label=AUE_PF_POLICY_FLIP
2100   title=Flip IPsec policy
2101   see=
2102   syscall=none
2103   format=arg1:arg2:[zone]3:[text]4
2104   comment=Operation applied to active policy (1 is active, 0 is inactive):
2105   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2106   comment=affected zone:
2107   comment=Name of target tunnel
2108 
2109 label=AUE_PF_POLICY_FLUSH
2110   title=Flip IPsec policy rules
2111   see=
2112   syscall=none
2113   format=arg1:arg2:[zone]3:[text]4
2114   comment=Operation applied to active policy (1 is active, 0 is inactive):
2115   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2116   comment=affected zone:
2117   comment=Name of target tunnel
2118 
2119 label=AUE_PF_POLICY_ALGS
2120   title=Update IPsec algorithms
2121   see=
2122   syscall=none
2123   format=arg1:arg2:[zone]3:[text]4
2124   comment=Operation applied to active policy (1 is active, 0 is inactive):
2125   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2126   comment=affected zone:
2127   comment=Name of target tunnel
2128 
2129 label=AUE_allocate_fail
2130   program=/usr/sbin/allocate
2131   title=allocate: allocate-device failure
2132   format=(0..n)[text]1
2133     comment=command line arguments
2134 # see audit_allocate.c
2135 
2136 label=AUE_allocate_succ
2137   program=/usr/sbin/allocate
2138   title=allocate: allocate-device success
2139   format=(0..n)[text]1
2140     comment=command line arguments
2141 # see audit_allocate.c
2142 
2143 label=AUE_at_create
2144   program=/usr/bin/at
2145   title=at: at-create crontab
2146   format=path
2147 
2148 label=AUE_at_delete
2149   program=/usr/bin/at
2150   title=at: at-delete atjob (at or atrm)
2151   format=text1:path
2152   comment="ancillary file&colon;" filename or "bad format of at-job name"
2153 
2154 label=AUE_at_perm
2155   skip=Not used.
2156 # not referenced outside uevents.h
2157 
2158 label=AUE_create_user
2159   skip=Not used.
2160 
2161 label=AUE_cron_invoke
2162   program=/usr/sbin/cron
2163   title=cron: cron-invoke at or cron
2164   case=If issue with account find
2165   format=text1
2166     comment="bad user" name or "user <name> account expired"
2167   case=else
2168   format=text1:text2
2169     comment="at-job", "batch-job", "crontab-job", "queue-job (<queue_name>)", \
2170       or "unknown job type (<job_type_id>)":
2171     comment=command
2172 
2173 label=AUE_crontab_create
2174   program=/usr/bin/crontab
2175   title=crontab: crontab created
2176   format=path
2177 # See audit_crontab.c
2178 
2179 label=AUE_crontab_delete
2180   program=/usr/bin/crontab
2181   title=crontab: crontab delete
2182   format=path
2183 # See audit_crontab.c
2184 
2185 label=AUE_crontab_mod
2186   program=/usr/bin/crontab
2187   title=crontab:  crontab modify
2188   format=path
2189 # See audit_crontab.c
2190 
2191 label=AUE_crontab_perm
2192   skip=Not used.
2193 
2194 label=AUE_deallocate_fail
2195   program=/usr/sbin/deallocate
2196   title=deallocate-device failure
2197   format=(0..n)[text]1
2198     comment=command line arguments
2199 # See audit_allocate.c
2200 
2201 label=AUE_deallocate_succ
2202   program=/usr/sbin/deallocate
2203   title=deallocate-device success
2204   format=(0..n)[text]1
2205     comment=command line arguments
2206 # See audit_allocate.c
2207 
2208 label=AUE_delete_user
2209   skip=Not used.
2210 
2211 label=AUE_disable_user
2212   skip=Not used.
2213 
2214 label=AUE_enable_user
2215   skip=Not used.
2216 
2217 label=AUE_ftpd
2218   program=/usr/sbin/in.ftpd
2219   title=in.ftpd
2220   format=[text]1
2221     comment=error message
2222 # See audit_ftpd
2223 
2224 label=AUE_ftpd_logout
2225   program=/usr/sbin/in.ftpd
2226   title=in.ftpd
2227   format=user
2228 # See audit_ftpd
2229 
2230 label=AUE_halt_solaris
2231   program=/usr/sbin/halt
2232   title=halt
2233   format=user
2234 # See audit_halt.c
2235 
2236 label=AUE_kadmind_auth
2237   format=text1:text2:text3
2238     comment=Op&colon; <requested information>:
2239     comment=Arg&colon; <argument for Op>:
2240     comment=Client&colon; <client principal name>
2241 # See audit_kadmin.c / common_audit()
2242 
2243 label=AUE_kadmind_unauth
2244   format=text1:text2:text3
2245     comment=Op&colon; <requested information>:
2246     comment=Arg&colon; <argument for Op>:
2247     comment=Client&colon; <client principal name>
2248 # See audit_kadmin.c / common_audit()
2249 
2250 label=AUE_krb5kdc_as_req
2251   format=text1:text2
2252     comment=Client&colon; <client principal name>:
2253     comment=Service&colon; <requested service name>
2254 # See audit_krb5kdc.c / common_audit()
2255 
2256 label=AUE_krb5kdc_tgs_req
2257   format=text1:text2
2258     comment=Client&colon; <client principal name>:
2259     comment=Service&colon; <requested service name>
2260 # See audit_krb5kdc.c / common_audit()
2261 
2262 label=AUE_krb5kdc_tgs_req_alt_tgt
2263   format=text1:text2
2264     comment=Client&colon; <client principal name>:
2265     comment=Service&colon; <requested service name>
2266 # See audit_krb5kdc.c / common_audit()
2267 
2268 label=AUE_krb5kdc_tgs_req_2ndtktmm
2269   format=text1:text2
2270     comment=Client&colon; <client principal name>:
2271     comment=Service&colon; <requested service name>
2272 # See audit_krb5kdc.c / common_audit()
2273 
2274 label=AUE_listdevice_fail
2275   title=allocate-list devices failure
2276   program=/usr/sbin/allocate
2277   format=(0..n)[text]1
2278     comment=command line arguments
2279 # See audit_allocate.c
2280 
2281 label=AUE_listdevice_succ
2282   title=allocate-list devices success
2283   program=/usr/sbin/allocate
2284   format=(0..n)[text]1
2285     comment=command line arguments
2286 # See audit_allocate.c
2287 
2288 label=AUE_modify_user
2289   skip=Not used.
2290 
2291 label=AUE_mountd_mount
2292   title=mountd: NFS mount
2293   program=/usr/lib/nfs/mountd
2294   see=mountd(1M)
2295   format=text1:path2
2296     comment=remote client hostname:
2297     comment=mount dir
2298 # See audit_mountd.c
2299 
2300 label=AUE_mountd_umount
2301   title=mountd: NFS unmount
2302   program=/usr/lib/nfs/mountd
2303   format=text1:path2
2304   comment=remote client hostname:
2305   comment=mount dir
2306 # See audit_mountd.c
2307 
2308 label=AUE_poweroff_solaris
2309   program=/usr/sbin/poweroff
2310   title=poweroff
2311   format=user
2312 # See audit_halt.c
2313 
2314 label=AUE_reboot_solaris
2315   program=/usr/sbin/reboot
2316   title=reboot
2317   format=user
2318 # See audit_reboot.c
2319 #       header,61,2,reboot(1m),,Fri Nov 09 13:52:34 2001, + 726 msec
2320 #       subject,tuser1,root,other,root,other,10422,497,0 0 tmach2
2321 #       return,success,0
2322 
2323 label=AUE_rexd
2324   program=/usr/sbin/rpc.rexd
2325   title=rpc.rexd
2326   format=[text]1:text2:text3:[text]4:[text]5
2327     comment=error message (failure only):
2328     comment="Remote execution requested by&colon;" hostname:
2329     comment="Username&colon;" username:
2330     comment="User id&colon;" user ID (failure only):
2331     comment="Command line&colon;" command attempted
2332 # See audit_rexd.c
2333 
2334 label=AUE_rexecd
2335   program=/usr/sbin/rpc.rexecd
2336   title=rpc.rexecd
2337   format=[text]1:text2:text3:text4
2338     comment=error message (failure only):
2339     comment="Remote execution requested by&colon;" hostname:
2340     comment="Username&colon;" username:
2341     comment="Command line&colon;" command attempted
2342 # See audit_rexecd.c
2343 
2344 label=AUE_rshd
2345   program=/usr/sbin/in.rshd
2346   title=in.rshd
2347   format=text1:text2:[text]3:[text]4
2348     comment="cmd" command:
2349     comment="remote user" remote user:
2350     comment="local user" local user:
2351     comment=failure message
2352 # See audit_rshd.c
2353 
2354 label=AUE_shutdown_solaris
2355   title=shutdown
2356   program=/usr/ucb/shutdown
2357   format=user
2358 # See audit_shutdown.c
2359 
2360 label=AUE_smserverd
2361   program=/usr/lib/smedia/rpc.smserverd
2362   format=[text]1:[text]2
2363     comment=state change:
2364     comment=vid, pid, major/minor device
2365 # see usr/src/cmd/smserverd
2366 # code shows a third token, path, but it isn't implemented.
2367 
2368 label=AUE_uadmin_solaris
2369   title=uadmin (obsolete)
2370   program=
2371   see=
2372   format=text1:text2
2373   comment=function code:
2374   comment=argument code
2375 # not used. Replaced by AUE_uadmin_* events, see uadmin.c, adt.xml
2376 
2377 label=AUE_LABELSYS_TNRH
2378   title=config Trusted Network remote host cache
2379   see=tnrh(2)
2380   syscall=labelsys: TSOL_TNRH
2381   case=With the flush command (cmd=3)
2382     format=arg1
2383       comment=1, command, "cmd"
2384   case=With the load (cmd=1) and delete (cmd=2) commands
2385     format=arg1:inaddr2:arg3
2386       comment=1, command, "cmd":
2387       comment=ip address of host:
2388       comment=2, prefix length, "prefix len"
2389 
2390 label=AUE_LABELSYS_TNRHTP
2391   title=config Trusted Network remote host template
2392   see=tnrhtp(2)
2393   syscall=labelsys: TSOL_TNRHTP
2394   case=With the flush command (cmd=3)
2395     format=arg1
2396       comment=1, command, "cmd"
2397   case=With the load (cmd=1) and delete (cmd=2) commands
2398     format=arg1:text2
2399       comment=1, command, "cmd":
2400       comment=name of template
2401 
2402 label=AUE_LABELSYS_TNMLP
2403   title=config Trusted Network multi-level port entry
2404   see=tnmlp(2)
2405   syscall=labelsys: TSOL_TNMLP
2406   case=With the flush command (cmd=3)
2407     format=arg1:text2
2408       comment=1, command, "cmd":
2409       comment="shared", or name of zone
2410   case=With the load (cmd=1) and delete (cmd=2) commands
2411     format=arg1:text2:arg3:arg4:[arg]5
2412       comment=1, command, "cmd":
2413       comment="shared", or name of zone:
2414       comment=2, protocol number, "proto num":
2415       comment=2, starting mlp port number, "mlp_port":
2416       comment=2, ending mlp port number, "mlp_port_upper"