1 # audit_record_attr.txt
   2 # Two "#" are comments that are copied to audit_record_attr
   3 # other comments are removed.
   4 ##
   5 ## Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
   6 ## Copyright 2018 Nexenta Systems, Inc.  All rights reserved.
   7 ## Copyright 2019 Joyent, Inc.
   8 ##
   9 ## CDDL HEADER START
  10 ##
  11 ## The contents of this file are subject to the terms of the
  12 ## Common Development and Distribution License (the "License").
  13 ## You may not use this file except in compliance with the License.
  14 ##
  15 ## You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
  16 ## or http://www.opensolaris.org/os/licensing.
  17 ## See the License for the specific language governing permissions
  18 ## and limitations under the License.
  19 ##
  20 ## When distributing Covered Code, include this CDDL HEADER in each
  21 ## file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  22 ## If applicable, add the following below this CDDL HEADER, with the
  23 ## fields enclosed by brackets "[]" replaced with your own identifying
  24 ## information: Portions Copyright [yyyy] [name of copyright owner]
  25 ##
  26 ## CDDL HEADER END
  27 ##
  28 ##
  29 
  30 # source file for describing audit records.
  31 
  32 # This file is in two sections.  The first is a list of attribute /
  33 # value pairs used to provide short cuts in annotating the audit
  34 # records.  The second is for annotation for each audit record.
  35 
  36 # first section: general attributes
  37 
  38 # skipClass=<class name of items to skip if only in that class>
  39 # skipClass=no    # uncomment to filter unused events
  40 
  41 # token name abbreviations
  42 # token=alias:fullname  -- short names for key tokens
  43 
  44 token=arg:argument
  45 token=attr:attribute
  46 token=acl:acl_entry
  47 token=cmd:command
  48 token=data:data
  49 token=exec_args:exec_arguments
  50 token=exec_env:exec_environment
  51 token=group:group
  52 token=inaddr:ip_addr
  53 token=inet:socket
  54 token=ipc:ipc
  55 token=ipc_perm:ipc_perm
  56 token=newgroup:newgroups
  57 token=path:path
  58 token=path_attr:attribute_path
  59 token=privset:privilege
  60 token=proc:process
  61 token=text:text
  62 token=tid:terminal_adr
  63 token=uauth:use_of_authorization
  64 token=upriv:use_of_privilege
  65 token=user:user_object
  66 token=zone:zonename
  67 token=fmri:service_instance
  68 token=label:mandatory_label
  69 
  70 token=head:header
  71 token=subj:subject
  72 token=ret:return
  73 token=exit:exit
  74 
  75 # note names -- certain notes show up repeatedly; collected here
  76 #
  77 # To achieve the maximum line length to be less than 80 characters, the
  78 # note names (message=) can be defined as a multi line, each line except the
  79 # last one finished with the backslash character.
  80 
  81 message=ipc_perm:The ipc and ipc_perm tokens are not included if \
  82   the message ID is not valid.
  83 
  84 
  85 # basic record pattern ("insert" is where event-specific tokens
  86 # are listed.)
  87 
  88 kernel=head:insert:subj:[upriv]:ret
  89 user=head:subj:insert:ret
  90 
  91 # Second Section
  92 # Annotation Section
  93 #
  94 # Most audit records need annotation beyond what is provided by
  95 # the files audit_event and audit_class.  At a minimum, a record
  96 # is represented by a label and a format.
  97 #
  98 # label=record_id             like AUE_ACCEPT
  99 # format=token_alias
 100 #
 101 # there is no end line; a new label= end the preceding definition
 102 # and starts the next.
 103 #
 104 # format values are a list of token names, separated by colons.  The
 105 # name is either one of the values described above (token=) or is
 106 # a value to be taken literally.  If a token name ends with a digit,
 107 # the digit is an index into an array of comments.  In the few cases
 108 # where there are no tokens (other than header, subject, return/exit),
 109 # use "format=kernel" or "format="user".
 110 #
 111 # comment is an array of strings separated by colons.  If comments
 112 # are listed on separate lines (recommended due to better
 113 # readability/sustainability of the file), the preceding comment
 114 # must end with  a colon.  The array starts at 1. (If the comment
 115 # contains a colon, use "&colon;" without the quotes.)
 116 #
 117 # case is used to generate alternate descriptions for a given
 118 # record.
 119 #
 120 # Constraints - the string length; bear in mind, that any annotation of
 121 # primitives below longer than is specified, will be silently truncated
 122 # to given/defined amount of characters in the auditrecord(1M) runtime:
 123 #
 124 #     primitive <= max (non-truncated) string length
 125 #       case    <= unlimited; if necessary, text continues on a new line
 126 #       comment <= unlimited; if necessary, text continues on a new line
 127 #       label   <= 43
 128 #       note    <= unlimited; if necessary, text continues on a new line
 129 #       program <= 20
 130 #       see     <= 39
 131 #       syscall <= 20
 132 #       title   <= 46
 133 #       token   <= 28 (full name)
 134 #
 135 # To achieve the maximum line length to be less than 80 characters, one can
 136 # define the unlimited primitives as a multi line, each line except the
 137 # last one finished with the backslash character. In addition to above
 138 # mentioned, the "format=" record attribute follows the same rule.
 139 #
 140 #
 141 # AUE_ACCEPT illustrates the use of all the above.  Note that
 142 # case is not nested; ellipsis (...) is used to give the effect
 143 # of nesting.
 144 
 145 label=AUE_ACCEPT
 146 #accept(2) failure
 147   case=Invalid socket file descriptor
 148     format=arg1
 149       comment=1, file descriptor, "so"
 150 #accept(2) non SOCK_STREAM socket
 151   case=If the socket address is not part of the AF_INET family
 152     format=arg1:arg2:arg3
 153       comment=1, "so", file descriptor:
 154       comment="family", so_family:
 155       comment="type", so_type
 156   case=If the socket address is part of the AF_INET family
 157     case=...If there is no vnode for this file descriptor
 158       format=[arg]1
 159         comment=1, file descriptor, "Bad so"
 160 #accept(2) SOCK_STREAM socket-not bound
 161     case=...or if the socket is not bound
 162       format=[arg]1:[inet]2
 163         comment=1, file descriptor, "so":
 164         comment=local/foreign address (0.0.0.0)
 165     case=...or if the socket address length = 0
 166       format=[arg]1:[inet]2
 167         comment=1, file descriptor, "so":
 168         comment=local/foreign address (0.0.0.0)
 169     case=...or for all other conditions
 170       format=inet1:[inet]1
 171         comment=socket address
 172 #accept(2) failure
 173 #       header
 174 #       au_to_arg32     "so",file descriptor
 175 #       subject
 176 #       return  <errno != 0>
 177 #
 178 #accept(2) non SOCK_STREAM socket
 179 #       header
 180 #       au_to_arg32     "so", file descriptor
 181 #       au_to_arg32     "family", so_family
 182 #       au_to_arg32     "type", so_type
 183 #       subject
 184 #       return success
 185 #
 186 #accept(2) SOCK_STREAM socket-not bound
 187 #       header
 188 #       au_to_arg32     "so", file descriptor
 189 #       au_to_socket_ex local/foreign address (0.0.0.0)
 190 #       subject
 191 #       return success
 192 #
 193 #accept(2) SOCK_STREAM socket-bound
 194 #       header
 195 #       au_to_arg32     "so", file descriptor
 196 #       au_to_socket_ex
 197 #       subject
 198 #       return success
 199 
 200 
 201 
 202 label=AUE_ACCESS
 203   format=path1:[attr]
 204     comment=may be truncated in failure case
 205 #       header,163,2,access(2),,Wed Apr 25 13:52:49 2001, + 750000733 msec
 206 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_succ
 207 #       attribute,100777,41416,staff,8388608,402255,0
 208 #       subject,tuser10,tuser10,other,tuser10,other,1297,322,255 131585 129.146.89.30
 209 #       return,success,0
 210 #       trailer,163
 211 #
 212 #       header,163,2,access(2),,Wed Apr 25 13:53:02 2001, + 490000427 msec
 213 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail
 214 #       attribute,100000,root,other,8388608,402257,0
 215 #       subject,tuser10,tuser10,other,tuser10,other,1433,322,255 131585 129.146.89.30
 216 #       return,failure: Permission denied,-1
 217 #       trailer,163
 218 #
 219 #       header,135,2,access(2),,Wed Apr 25 13:53:15 2001, + 10000329 msec
 220 #       path,/export/home/testsuites/CC_final/icenine/arv/access/obj_fail2
 221 #       subject,tuser10,tuser10,other,tuser10,other,1553,322,255 131585 129.146.89.30
 222 #       return,failure: No such file or directory,-1
 223 #       trailer,135
 224 
 225 label=AUE_ACCT
 226   case=Zero path
 227     format=arg1
 228       comment=1, 0, "accounting off"
 229   case=Non-zero path
 230     format=path1:[attr]2
 231       comment=may be truncated in failure case:
 232       comment=omitted if failure
 233 
 234 label=AUE_ACLSET
 235   syscall=acl
 236   format=arg1:arg2:(0..n)[acl]3
 237     comment=2, SETACL, "cmd":
 238     comment=3, number of ACL entries, "nentries":
 239     comment=Access Control List entries
 240 
 241 label=AUE_ADJTIME
 242   format=kernel
 243 
 244 label=AUE_ASYNC_DAEMON
 245   skip=Not used
 246 
 247 label=AUE_ASYNC_DAEMON_EXIT
 248   skip=Not used
 249 
 250 label=AUE_AUDIT
 251   skip=Not used.  (Placeholder for the set AUE_AUDIT_*.)
 252 
 253 label=AUE_AUDITON
 254   skip=Not used.  (Placeholder for the set AUE_AUDITON_*.)
 255 
 256 label=AUE_AUDITON_GESTATE
 257   skip=Not used
 258 
 259 label=AUE_AUDITON_GETAMASK
 260   format=kernel
 261   syscall=auditon: GETAMASK
 262 
 263 label=AUE_AUDITON_GETCAR
 264   format=kernel
 265   syscall=auditon: GETCAR
 266 #       header,68,2,auditon(2) - get car,,Wed Apr 25 13:49:02 2001, + 710001279 msec
 267 #       subject,tuser10,root,other,root,other,966,322,255 131585 129.146.89.30
 268 #       return,success,0
 269 #       trailer,68
 270 
 271 label=AUE_AUDITON_GETCLASS
 272   format=kernel
 273   syscall=auditon: GETCLASS
 274 #       header,68,2,auditon(2) - get event class,,Mon May 15 09:14:35 2000, + 30001063 msec
 275 #       subject,tuser10,root,other,root,other,1091,367,255 197121 tmach1
 276 #       return,success,0
 277 #       trailer,68
 278 
 279 label=AUE_AUDITON_GETCOND
 280   format=kernel
 281   syscall=auditon: GETCOND
 282 #       header,68,2,auditon(2) - get audit state,,Mon May 15 09:14:48 2000, + 110001736 msec
 283 #       subject,tuser10,root,other,root,other,1248,367,255 197121 tmach1
 284 #       return,success,0
 285 #       trailer,68
 286 
 287 label=AUE_AUDITON_GETCWD
 288   format=kernel
 289   syscall=auditon: GETCWD
 290 #       header,68,2,auditon(2) - get cwd,,Mon May 15 09:15:01 2000, + 120001223 msec
 291 #       subject,tuser10,root,other,root,other,1405,367,255 197121 tmach1
 292 #       return,success,0
 293 #       trailer,68
 294 
 295 label=AUE_AUDITON_GETKMASK
 296   format=kernel
 297   syscall=auditon: GETKMASK
 298 #       header,68,2,auditon(2) - get kernel mask,,Mon May 15 09:15:14 2000, + 220002225 msec
 299 #       subject,tuser10,root,other,root,other,1562,367,255 197121 tmach1
 300 #       return,success,0
 301 #       trailer,68
 302 
 303 label=AUE_AUDITON_GETSTAT
 304   format=kernel
 305   syscall=auditon: A_GETSTAT
 306 #       header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:27 2000, + 220003386 msec
 307 #       subject,tuser10,root,other,root,other,1719,367,255 197121 tmach1
 308 #       return,success,0
 309 #       trailer,68
 310 
 311 label=AUE_AUDITON_GPOLICY
 312   format=kernel
 313   syscall=auditon: GPOLICY
 314 #       header,68,2,auditon(2) - get audit statistics,,Mon May 15 09:15:40 2000, + 120004056 msec
 315 #       subject,tuser10,root,other,root,other,1879,367,255 197121 tmach1
 316 #       return,success,0
 317 #       trailer,68
 318 
 319 label=AUE_AUDITON_GQCTRL
 320   format=kernel
 321   syscall=auditon: GQCTRL
 322 #       header,68,2,auditon(2) - GQCTRL command,,Mon May 15 09:15:53 2000, + 20001415 msec
 323 #       subject,tuser10,root,other,root,other,2033,367,255 197121 tmach1
 324 #       return,success,0
 325 #       trailer,68
 326 
 327 
 328 label=AUE_AUDITON_GTERMID
 329   skip=Not used.
 330 
 331 label=AUE_AUDITON_SESTATE
 332   skip=Not used.
 333 
 334 label=AUE_AUDITON_SETAMASK
 335   format=[arg]1:[arg]2
 336     comment=2, "setamask as_success", user default audit preselection mask:
 337     comment=2, "setamask as_failure", user default audit preselection mask
 338   syscall=auditon: SETAMASK
 339 
 340 label=AUE_AUDITON_SETCLASS
 341   format=[arg]1:[arg]2
 342     comment=2, "setclass&colon;ec_event", event number:
 343     comment=3, "setclass&colon;ec_class", class mask
 344   syscall=auditon: SETCLASS
 345 #       header,120,2,auditon(2) - set event class,,Mon May 15 09:16:39 2000, + 800002966 msec
 346 #       argument,2,0x0,setclass:ec_event
 347 #       argument,3,0x0,setclass:ec_class
 348 #       subject,tuser10,root,other,root,other,2190,367,255 197121 tmach1
 349 #       return,success,0
 350 #       trailer,120
 351 
 352 label=AUE_AUDITON_SETCOND
 353   format=[arg]1
 354     comment=3, "setcond", audit state
 355   syscall=auditon: SETCOND
 356 
 357 label=AUE_AUDITON_SETKMASK
 358   format=[arg]1:[arg]2
 359     comment=2, "setkmask as_success", kernel non-attributable mask:
 360     comment=2, "setkmask as_failure", kernel non-attributable mask
 361   syscall=auditon: SETKMASK
 362 #       header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:06 2000, + 300000807 msec
 363 #       argument,2,0x0,setkmask:as_success
 364 #       argument,2,0x0,setkmask:as_failure
 365 #       subject,tuser10,root,other,root,other,2506,367,255 197121 tmach1
 366 #       return,success,0
 367 #       trailer,124
 368 #       header,124,2,auditon(2) - set kernel mask,,Mon May 15 09:17:20 2000, + 430001289 msec
 369 #       argument,2,0x0,setkmask:as_success
 370 #       argument,2,0x0,setkmask:as_failure
 371 #       subject,tuser10,tuser10,other,root,other,2620,367,255 197121 tmach1
 372 #       return,failure: Not owner,-1
 373 #       trailer,124
 374 
 375 label=AUE_AUDITON_SETSMASK
 376   format=[arg]1:[arg]2
 377     comment=3, "setsmask&colon;as_success", session ID mask:
 378     comment=3, "setsmask&colon;as_failure", session ID mask
 379   syscall=auditon: SETSMASK
 380 #       header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:33 2000, + 580000668 msec
 381 #       argument,3,0x400,setsmask:as_success
 382 #       argument,3,0x400,setsmask:as_failure
 383 #       subject,tuser10,root,other,root,other,2777,367,255 197121 tmach1
 384 #       return,success,0
 385 #       trailer,124
 386 #       header,124,2,auditon(2) - set mask per session ID,,Mon May 15 09:17:45 2000, + 700001710 msec
 387 #       argument,3,0x400,setsmask:as_success
 388 #       argument,3,0x400,setsmask:as_failure
 389 #       subject,tuser10,tuser10,other,root,other,2885,367,255 197121 tmach1
 390 #       return,failure: Not owner,-1
 391 #       trailer,124
 392 
 393 label=AUE_AUDITON_SETSTAT
 394   format=kernel
 395   syscall=auditon: SETSTAT
 396 #       header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:17:58 2000, + 930000818 msec
 397 #       subject,tuser10,root,other,root,other,3042,367,255 197121 tmach1
 398 #       return,success,0
 399 #       trailer,68
 400 #       header,68,2,auditon(2) - reset audit statistics,,Mon May 15 09:18:13 2000, + 160001101 msec
 401 #       subject,tuser10,tuser10,other,root,other,3156,367,255 197121 tmach1
 402 #       return,failure: Not owner,-1
 403 #       trailer,68
 404 
 405 label=AUE_AUDITON_SETUMASK
 406   format=[arg]1:[arg]2
 407     comment=3, "setumask&colon;as_success", audit ID mask:
 408     comment=3, "setumask&colon;as_failure", audit ID mask
 409   syscall=auditon: SETUMASK
 410 #       header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:26 2000, + 670003527 msec
 411 #       argument,3,0x400,setumask:as_success
 412 #       argument,3,0x400,setumask:as_failure
 413 #       subject,tuser10,root,other,root,other,3313,367,255 197121 tmach1
 414 #       return,success,0
 415 #       trailer,124
 416 #       header,124,2,auditon(2) - set mask per uid,,Mon May 15 09:18:38 2000, + 740000732 msec
 417 #       argument,3,0x400,setumask:as_success
 418 #       argument,3,0x400,setumask:as_failure
 419 #       subject,tuser10,tuser10,other,root,other,3421,367,255 197121 tmach1
 420 #       return,failure: Not owner,-1
 421 #       trailer,124
 422 
 423 label=AUE_AUDITON_SPOLICY
 424   format=[arg]1
 425     comment=1, audit policy flags, "setpolicy"
 426   syscall=auditon: SPOLICY
 427 #       header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:18:54 2000, + 840 msec
 428 #       argument,3,0x200,setpolicy
 429 #       subject,tuser10,root,other,root,other,3584,367,255 197121 tmach1
 430 #       return,success,0
 431 #       trailer,86
 432 #       header,86,2,auditon(2) - SPOLICY command,,Mon May 15 09:19:08 2000, + 200002798 msec
 433 #       argument,3,0x200,setpolicy
 434 #       subject,tuser10,tuser10,other,root,other,3698,367,255 197121 tmach1
 435 #       return,failure: Not owner,-1
 436 #       trailer,86
 437 
 438 label=AUE_AUDITON_SQCTRL
 439   format=[arg]1:[arg]2:[arg]3:[arg]4
 440     comment=3, "setqctrl&colon;aq_hiwater", queue control param.:
 441     comment=3, "setqctrl&colon;aq_lowater", queue control param.:
 442     comment=3, "setqctrl&colon;aq_bufsz", queue control param.:
 443     comment=3, "setqctrl&colon;aq_delay", queue control param.
 444   syscall=auditon: SQCTRL
 445 #       header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:23 2000, + 610001124 msec
 446 #       argument,3,0x64,setqctrl:aq_hiwater
 447 #       argument,3,0xa,setqctrl:aq_lowater
 448 #       argument,3,0x400,setqctrl:aq_bufsz
 449 #       argument,3,0x14,setqctrl:aq_delay
 450 #       subject,tuser10,root,other,root,other,3861,367,255 197121 tmach1
 451 #       return,success,0
 452 #       trailer,176
 453 #       header,176,2,auditon(2) - SQCTRL command,,Mon May 15 09:19:35 2000, + 720003197 msec
 454 #       argument,3,0x64,setqctrl:aq_hiwater
 455 #       argument,3,0xa,setqctrl:aq_lowater
 456 #       argument,3,0x400,setqctrl:aq_bufsz
 457 #       argument,3,0x14,setqctrl:aq_delay
 458 #       subject,tuser10,tuser10,other,root,other,3969,367,255 197121 tmach1
 459 #       return,failure: Not owner,-1
 460 #       trailer,176
 461 
 462 label=AUE_AUDITON_SETPMASK
 463   format=[arg]1:[arg]2
 464     comment=3, "setpmask&colon;pid", process
 465     comment=3, "setpmask&colon;as_success", audit ID mask:
 466     comment=3, "setpmask&colon;as_failure", audit ID mask
 467   syscall=auditon: SETPMASK
 468 
 469 label=AUE_AUDITON_SETKAUDIT
 470   format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7
 471     comment=1, audit user ID, "auid":
 472     comment=1, terminal ID, "port":
 473     comment=1, type, "type":
 474     comment=1, terminal ID, "ip address":
 475     comment=1, preselection mask, "as_success":
 476     comment=1, preselection mask, "as_failure":
 477     comment=1, audit session ID, "asid"
 478   syscall=auditon: SETKAUDIT
 479 
 480 label=AUE_AUDITON_GETPINFO
 481   format=kernel
 482   syscall=auditon: GETPINFO
 483 
 484 label=AUE_AUDITON_GETKAUDIT
 485   format=kernel
 486   syscall=auditon: GETKAUDIT
 487 
 488 label=AUE_AUDITON_OTHER
 489   format=kernel
 490   syscall=auditon: OTHER
 491 
 492 label=AUE_AUDITON_STERMID
 493   skip=Not used.
 494 
 495 label=AUE_AUDITSTAT
 496   skip=Not used.
 497 
 498 label=AUE_AUDITSVC
 499   skip=Not used.
 500 
 501 label=AUE_AUDITSYS
 502   skip=Not used. (Place holder for various auditing events.)
 503 
 504 label=AUE_BIND
 505 # differs from documented version.
 506 # cases "no vnode" not fully confirmed
 507 # family and type need argument number
 508   case=Invalid socket handle
 509     format=arg1
 510       comment=1, file descriptor, "so"
 511   case=If there is no vnode for this file descriptor
 512   case=or if the socket is not of the AF_INET family
 513     format=arg1:arg2:arg3
 514       comment=1, file descriptor, "so":
 515       comment=1, socket family, "family":
 516       comment=1, socket type, "type"
 517   case=or for all other conditions
 518     format=arg1:inet2
 519       comment=1, file descriptor, "so":
 520       comment=socket address
 521 
 522 label=AUE_BRANDSYS
 523 # generic mechanism to allow user-space and kernel components of a brand
 524 # to communicate.  The interpretation of the arguments to the call is
 525 # left entirely up to the brand.
 526   format=arg1:arg2:arg3:arg4:arg5:arg6:arg7
 527     comment=1, command, "cmd":
 528     comment=2, command args, "arg":
 529     comment=3, command args, "arg":
 530     comment=4, command args, "arg":
 531     comment=5, command args, "arg":
 532     comment=6, command args, "arg":
 533     comment=7, command args, "arg"
 534 
 535 label=AUE_BSMSYS
 536   skip=Not used.
 537 
 538 label=AUE_CHDIR
 539   format=path:[attr]
 540 #       header,151,2,chdir(2),,Mon May 15 09:20:15 2000, + 70000899 msec
 541 #       path,/export/home/CC_final/icenine/arv/chdir/obj_succ
 542 #       attribute,40777,root,other,8388608,231558,0
 543 #       subject,tuser10,tuser10,other,root,other,4436,367,255 197121 tmach1
 544 #       return,success,0
 545 #       trailer,151
 546 #       header,151,2,chdir(2),,Mon May 15 09:20:27 2000, + 640003327 msec
 547 #       path,/export/home/CC_final/icenine/arv/chdir/obj_fail
 548 #       attribute,40000,root,other,8388608,237646,0
 549 #       subject,tuser10,tuser10,other,root,other,4566,367,255 197121 tmach1
 550 #       return,failure: Permission denied,-1
 551 #       trailer,151
 552 
 553 label=AUE_CHMOD
 554   format=arg1:path:[attr]
 555     comment=2, mode, "new file mode"
 556 #       header,173,2,chmod(2),,Mon May 15 09:20:41 2000, + 140000831 msec
 557 #       argument,2,0x1f8,new file mode
 558 #       path,/export/home/CC_final/icenine/arv/chmod/obj_succ
 559 #       attribute,100770,tuser10,other,8388608,243608,0
 560 #       subject,tuser10,tuser10,other,root,other,4748,367,255 197121 tmach1
 561 #       return,success,0
 562 #       trailer,173
 563 #       header,173,2,chmod(2),,Mon May 15 09:20:54 2000, + 400001156 msec
 564 #       argument,2,0x1f8,new file mode
 565 #       path,/export/home/CC_final/icenine/arv/chmod/obj_fail
 566 #       attribute,100600,root,other,8388608,243609,0
 567 #       subject,tuser10,tuser10,other,root,other,4879,367,255 197121 tmach1
 568 #       return,failure: Not owner,-1
 569 #       trailer,173
 570 
 571 label=AUE_CHOWN
 572   format=arg1:arg2
 573     comment=2, uid, "new file uid":
 574     comment=3, gid, "new file gid"
 575 #       header,193,2,chown(2),,Mon May 15 09:21:07 2000, + 930000756 msec
 576 #       argument,2,0x271a,new file uid
 577 #       argument,3,0xffffffff,new file gid
 578 #       path,/export/home/CC_final/icenine/arv/chown/obj_succ
 579 #       attribute,100644,tuser10,other,8388608,268406,0
 580 #       subject,tuser10,tuser10,other,root,other,5062,367,255 197121 tmach1
 581 #       return,success,0
 582 #       trailer,193
 583 #       header,193,2,chown(2),,Mon May 15 09:21:20 2000, + 430001153 msec
 584 #       argument,2,0x271a,new file uid
 585 #       argument,3,0xffffffff,new file gid
 586 #       path,/export/home/CC_final/icenine/arv/chown/obj_fail
 587 #       attribute,100644,root,other,8388608,268407,0
 588 #       subject,tuser10,tuser10,other,root,other,5191,367,255 197121 tmach1
 589 #       return,failure: Not owner,-1
 590 #       trailer,193
 591 
 592 label=AUE_CHROOT
 593   format=path:[attr]
 594 #       header,104,2,chroot(2),,Mon May 15 09:21:33 2000, + 860001094 msec
 595 #       path,/
 596 #       attribute,40755,root,root,8388608,2,0
 597 #       subject,tuser10,root,other,root,other,5370,367,255 197121 tmach1
 598 #       return,success,0
 599 #       trailer,104
 600 #       header,152,2,chroot(2),,Mon May 15 09:21:46 2000, + 130002435 msec
 601 #       path,/export/home/CC_final/icenine/arv/chroot/obj_fail
 602 #       attribute,40777,tuser10,other,8388608,335110,0
 603 #       subject,tuser10,tuser10,other,root,other,5499,367,255 197121 tmach1
 604 #       return,failure: Not owner,-1
 605 #       trailer,152
 606 
 607 label=AUE_CLOCK_SETTIME
 608   format=kernel
 609 
 610 label=AUE_CLOSE
 611   format=arg1:[path]:[attr]
 612     comment=1, file descriptor, "fd"
 613 
 614 label=AUE_CONFIGKSSL
 615   case=Adding KSSL entry.
 616     format=text1:inaddr2:text3:text4
 617       comment=opcode, KSSL_ADD_ENTRY:
 618       comment=local IP address:
 619       comment=SSL port number:
 620       comment=proxy port number
 621   case=Deleting KSSL entry.
 622     format=text1:inaddr2:text3
 623       comment=opcode, KSSL_DELETE_ENTRY:
 624       comment=local IP address:
 625       comment=SSL port number
 626 
 627 label=AUE_CONNECT
 628 # cases "no vnode" not fully confirmed
 629   case=If there is no vnode for this file descriptor
 630   case=If the socket address is not part of the AF_INET family
 631     format=arg1:arg2:arg3
 632       comment=1, file descriptor, "so":
 633       comment=1, socket family, "family":
 634       comment=1, socket type, "type"
 635   case=If the socket address is part of the AF_INET family
 636     format=arg1:inet2
 637       comment=1, file descriptor, "so":
 638       comment=socket address
 639 
 640 label=AUE_CORE
 641   syscall=none
 642   title=process dumped core
 643   see=none
 644   format=path:[attr]:arg1
 645     comment=1, signal, "signal"
 646 # see uts/common/c2/audit.c
 647 
 648 label=AUE_CREAT
 649 # obsolete - see open(2)
 650   format=path:[attr]
 651 # does not match old BSM manual
 652 #       header,151,2,creat(2),,Mon May 15 09:21:59 2000, + 509998810 msec
 653 #       path,/export/home/CC_final/icenine/arv/creat/obj_succ
 654 #       attribute,100644,tuser10,other,8388608,49679,0
 655 #       subject,tuser10,tuser10,other,root,other,5678,367,255 197121 tmach1
 656 #       return,success,8
 657 #       trailer,151
 658 #       header,107,2,creat(2),,Mon May 15 09:22:12 2000, + 50001852 msec
 659 #       path,/devices/pseudo/mm@0:null
 660 #       subject,tuser10,root,other,root,other,5809,367,255 197121 tmach1
 661 #       return,success,8
 662 #       trailer,107
 663 #       header,83,2,creat(2),,Mon May 15 09:22:12 2000, + 70001870 msec
 664 #       path,/obj_fail
 665 #       subject,tuser10,tuser10,other,root,other,5806,367,255 197121 tmach1
 666 #       return,failure: Permission denied,-1
 667 #       trailer,83
 668 
 669 label=AUE_CRYPTOADM
 670   title=kernel cryptographic framework
 671   format=text1:(0..n)[text]2
 672   comment=cryptoadm command/operation:
 673   comment=mechanism list
 674 
 675 label=AUE_DOORFS
 676   skip=Not used.  (Place holder for set of door audit events.)
 677 
 678 label=AUE_DOORFS_DOOR_BIND
 679   skip=Not used.
 680   syscall=doorfs:  DOOR_BIND
 681 
 682 label=AUE_DOORFS_DOOR_CALL
 683   format=arg1:proc2
 684     comment=1, door ID, "door ID":
 685     comment=for process that owns the door
 686   syscall=doorfs:  DOOR_CALL
 687 
 688 label=AUE_DOORFS_DOOR_CREATE
 689   format=arg1
 690     comment=1, door attributes, "door attr"
 691   syscall=doorfs:  DOOR_CREATE
 692 
 693 label=AUE_DOORFS_DOOR_CRED
 694   skip=Not used.
 695   syscall=doorfs:  DOOR_CRED
 696 
 697 label=AUE_DOORFS_DOOR_INFO
 698   skip=Not used.
 699   syscall=doorfs:  DOOR_INFO
 700 
 701 label=AUE_DOORFS_DOOR_RETURN
 702   format=kernel
 703   syscall=doorfs:  DOOR_RETURN
 704 
 705 label=AUE_DOORFS_DOOR_REVOKE
 706   format=arg1
 707     comment=1, door ID, "door ID"
 708   syscall=doorfs:  DOOR_REVOKE
 709 
 710 label=AUE_DOORFS_DOOR_UNBIND
 711   skip=Not used.
 712   syscall=doorfs:  DOOR_UNBIND
 713 
 714 label=AUE_DUP2
 715 skip=Not used.
 716 
 717 label=AUE_ENTERPROM
 718   title=enter prom
 719   syscall=none
 720   format=head:text1:ret
 721     comment="kmdb"
 722 #       header,48,2,enter prom,na,tmach1,2004-11-12 09:07:41.342 -08:00
 723 #       text,kmdb
 724 #       return,success,0
 725 
 726 label=AUE_EXEC
 727 # obsolete - see execve(2)
 728   format=path:[attr]1:[exec_args]2:[exec_env]3
 729     comment=omitted on error:
 730     comment=output if argv policy is set:
 731     comment=output if arge policy is set
 732 
 733 label=AUE_EXECVE
 734   format=path:[attr]1:[exec_args]2:[exec_env]3
 735     comment=omitted on error:
 736     comment=output if argv policy is set:
 737     comment=output if arge policy is set
 738 #       header,107,2,creat(2),,Mon May 15 09:22:25 2000, + 559997464 msec
 739 #       path,/devices/pseudo/mm@0:null
 740 #       subject,tuser10,root,other,root,other,5974,367,255 197121 tmach1
 741 #       return,success,8
 742 #       trailer,107
 743 #       header,86,2,execve(2),,Mon May 15 09:22:25 2000, + 590003684 msec
 744 #       path,/usr/bin/pig
 745 #       subject,tuser10,tuser10,other,root,other,5971,367,255 197121 tmach1
 746 #       return,failure: No such file or directory,-1
 747 #       trailer,86
 748 
 749 label=AUE_PFEXEC
 750   format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5
 751     comment=pathname of the executable:
 752     comment=pathname of working directory:
 753     comment=privileges if the limit or inheritable set are changed:
 754     comment=process if ruid, euid, rgid or egid is changed:
 755     comment=output if arge policy is set
 756 
 757 label=AUE_sudo
 758   format=exec_args1:[text]2
 759     comment=command args:
 760     comment=error message (failure only)
 761 
 762 label=AUE_EXIT
 763   format=arg1:[text]2
 764     comment=1, exit status, "exit status":
 765     comment=event aborted
 766 
 767 label=AUE_EXITPROM
 768   title=exit prom
 769   syscall=none
 770   format=head:text1:ret
 771     comment="kmdb"
 772 #       header,48,2,exit prom,na,tmach1,2004-11-12 09:07:43.547 -08:00
 773 #       text,kmdb
 774 #       return,success,0
 775 
 776 label=AUE_EXPORTFS
 777   skip=Not used.
 778 
 779 label=AUE_FACCESSAT
 780 # obsolete
 781   see=access(2)
 782   format=path:[attr]
 783 
 784 label=AUE_FACLSET
 785   syscall=facl
 786   case=Invalid file descriptor
 787     format=arg1:arg2
 788       comment=2, SETACL, "cmd":
 789       comment=3, number of ACL entries, "nentries"
 790   case=Zero path
 791     format=arg1:arg2:arg3:[attr]:(0..n)[acl]4
 792       comment=2, SETACL, "cmd":
 793       comment=3, number of ACL entries, "nentries":
 794       comment=1, file descriptor, "no path&colon; fd":
 795       comment=ACLs
 796   case=Non-zero path
 797     format=arg1:arg2:path:[attr]:(0..n)[acl]3
 798       comment=2, SETACL, "cmd":
 799       comment=3, number of ACL entries, "nentries":
 800       comment=ACLs
 801 
 802 label=AUE_FCHDIR
 803   format=[path]:[attr]
 804 #       header,150,2,fchdir(2),,Mon May 15 09:22:38 2000, + 680001393 msec
 805 #       path,/export/home/CC_final/icenine/arv/fchdir/obj_succ
 806 #       attribute,40777,tuser10,other,8388608,207662,0
 807 #       subject,tuser10,tuser10,other,root,other,6129,367,255 197121 tmach1
 808 #       return,success,0
 809 #       trailer,150
 810 #       header,68,2,fchdir(2),,Mon May 15 09:22:51 2000, + 710001196 msec
 811 #       subject,tuser10,tuser10,other,root,other,6258,367,255 197121 tmach1
 812 #       return,failure: Permission denied,-1
 813 #       trailer,68
 814 
 815 label=AUE_FCHMOD
 816   case=With a valid file descriptor and path
 817     format=arg1:path:[attr]
 818       comment=2, mode, "new file mode"
 819   case=With a valid file descriptor and invalid path
 820     format=arg1:[arg]2:[attr]
 821       comment=2, mode, "new file mode":
 822       comment=1, file descriptor, "no path&colon; fd"
 823   case=With an invalid file descriptor
 824     format=arg1
 825       comment=2, mode, "new file mode"
 826 #       header,168,2,fchmod(2),,Sat Apr 29 12:28:06 2000, + 350000000 msec
 827 #       argument,2,0x1a4,new file mode
 828 #       path,/export/home/CC/icenine/arv/fchmod/obj_succ
 829 #       attribute,100644,tuser10,other,7602240,26092,0
 830 #       subject,tuser10,tuser10,other,root,other,11507,346,16064 196866 tmach1
 831 #       return,success,0
 832 #       trailer,168
 833 #       header,90,2,fchmod(2),,Sat Apr 29 12:28:32 2000, + 930000000 msec
 834 #       argument,2,0x1a4,new file mode
 835 #       subject,tuser10,tuser10,other,root,other,11759,346,16064 196866 tmach1
 836 #       return,failure: Bad file number,-1
 837 #       trailer,90
 838 #       header,168,2,fchmod(2),,Sat Apr 29 12:28:20 2000, + 770000000 msec
 839 #       argument,2,0x1a4,new file mode
 840 #       path,/export/home/CC/icenine/arv/fchmod/obj_fail
 841 #       attribute,100644,root,other,7602240,26093,0
 842 #       subject,tuser10,tuser10,other,root,other,11644,346,16064 196866 tmach1
 843 #       return,failure: Not owner,-1
 844 #       trailer,168
 845 
 846 label=AUE_FCHOWN
 847   case=With a valid file descriptor
 848     format=arg1:arg2:[path]:[attr]
 849       comment=2, uid, "new file uid":
 850       comment=3, gid, "new file gid"
 851   case=With an invalid file descriptor
 852     format=arg1:arg2:[arg]3:[attr]
 853        comment=2, uid, "new file uid":
 854        comment=3, gid, "new file gid":
 855        comment=1, file descriptor, "no path fd"
 856 
 857 label=AUE_FCHOWNAT
 858 # obsolete
 859   see=openat(2)
 860   case=With a valid absolute/relative file path
 861     format=path:[attr]
 862   case=With an file path eq. NULL and valid file descriptor
 863     format=kernel
 864 
 865 label=AUE_FCHROOT
 866   format=[path]:[attr]
 867 # fchroot -> chdirec -> audit_chdirec
 868 
 869 label=AUE_FCNTL
 870   case=With a valid file descriptor
 871     format=arg1:[arg]2:path:attr
 872       comment=2, command, "cmd":
 873       comment=3, flags, "flags"
 874   case=With an invalid file descriptor
 875     format=arg1:[arg]2:arg3
 876       comment=2, command, "cmd":
 877       comment=3, flags, "flags":
 878       comment=1, file descriptor, "no path fd"
 879   note=Flags are included only when cmd is F_SETFL.
 880 
 881 label=AUE_FLOCK
 882   skip=Not used.
 883 
 884 label=AUE_FORKALL
 885   format=[arg]1
 886     comment=0, pid, "child PID"
 887   note=The forkall(2) return values are undefined because the audit record
 888   note=is produced at the point that the child process is spawned.
 889 # see audit.c
 890 
 891 label=AUE_FORK1
 892   format=[arg]1
 893     comment=0, pid, "child PID"
 894   note=The fork1(2) return values are undefined because the audit record
 895   note=is produced at the point that the child process is spawned.
 896 # see audit.c
 897 
 898 label=AUE_FSAT
 899 # obsolete
 900   skip=Not used.  (Placeholder for AUE_*AT records)
 901 
 902 label=AUE_FSTAT
 903   skip=Not used.
 904 
 905 label=AUE_FSTATAT
 906 # obsolete
 907   format=path:[attr]
 908 
 909 label=AUE_FSTATFS
 910   case=With a valid file descriptor
 911     format=[path]:[attr]
 912   case=With an invalid file descriptor
 913     format=arg1
 914       comment=1, file descriptor, "no path fd"
 915 
 916 label=AUE_FTRUNCATE
 917   skip=Not used.
 918 
 919 label=AUE_FUSERS
 920   syscall=utssys: UTS_FUSERS
 921   format=path:attr
 922 
 923 label=AUE_FUTIMESAT
 924 # obsolete
 925   format=[path]:[attr]
 926 
 927 label=AUE_GETAUDIT
 928   format=kernel
 929 #       header,68,2,getaudit(2),,Mon May 15 09:23:57 2000, + 620001408 msec
 930 #       subject,tuser10,root,other,root,other,7063,367,255 197121 tmach1
 931 #       return,success,0
 932 #       trailer,68
 933 #       header,68,2,getaudit(2),,Mon May 15 09:24:09 2000, + 490003700 msec
 934 #       subject,tuser10,root,other,root,other,7158,367,255 197121 tmach1
 935 #       return,success,0
 936 #       trailer,68
 937 
 938 label=AUE_GETAUDIT_ADDR
 939   format=kernel
 940 #       header,73,2,getaudit_addr(2),,Thu Nov 08 15:14:01 2001, + 0 msec
 941 #       subject,tuser1,root,staff,root,staff,9689,12289,0 0 tmach2
 942 #       return,success,0
 943 
 944 label=AUE_GETAUID
 945   format=kernel
 946 #       header,68,2,getauid(2),,Mon May 15 09:24:22 2000, + 420000668 msec
 947 #       subject,tuser10,root,other,root,other,7303,367,255 197121 tmach1
 948 #       return,success,0
 949 #       trailer,68
 950 #       header,68,2,getauid(2),,Mon May 15 09:24:34 2000, + 490002988 msec
 951 #       subject,tuser10,tuser10,other,root,other,7410,367,255 197121 tmach1
 952 #       return,failure: Not owner,-1
 953 #       trailer,68
 954 
 955 label=AUE_GETDENTS
 956   skip=Not used.
 957 #Not security relevant
 958 
 959 label=AUE_GETKERNSTATE
 960   skip=Not used.
 961 
 962 label=AUE_GETMSG
 963   case=With a valid file descriptor
 964   format=arg1:[path]:attr:arg2
 965     comment=1, file descriptor, "fd":
 966     comment=4, priority, "pri"
 967   case=With an invalid file descriptor
 968   format=arg1:arg2
 969     comment=1, file descriptor, "fd":
 970     comment=4, priority, "pri"
 971 
 972 label=AUE_GETPMSG
 973   case=With a valid file descriptor
 974   format=arg1:[path]:attr
 975     comment=1, file descriptor, "fd"
 976   case=With an invalid file descriptor
 977   format=arg1
 978     comment=1, file descriptor, "fd"
 979 
 980 label=AUE_GETPORTAUDIT
 981   format=Not used.
 982 
 983 label=AUE_GETUSERAUDIT
 984   skip=Not used.
 985 
 986 label=AUE_INST_SYNC
 987   format=arg1
 988     comment=2, flags value, "flags"
 989 
 990 label=AUE_IOCTL
 991   case=With an invalid file descriptor
 992     format=arg1:arg2:arg3
 993       comment=1, file descriptor, "fd":
 994       comment=2, command, "cmd":
 995       comment=3, arg, "arg"
 996   case=With a valid file descriptor
 997     format=path:[attr]:arg1:arg2
 998       comment=2, ioctl cmd, "cmd":
 999       comment=3, ioctl arg, "arg"
1000   case=Non-file file descriptor
1001     format=arg1:arg2:arg3
1002       comment=1, file descriptor, "fd":
1003       comment=2, ioctl cmd, "cmd":
1004       comment=3, ioctl arg, "arg"
1005   case=Bad file name
1006     format=arg1:arg2:arg3
1007       comment=1, file descriptor, "no path&colon; fd":
1008       comment=2, ioctl cmd, "cmd":
1009       comment=3, ioctl arg, "arg"
1010 # old BSM manual misses a case
1011 
1012 label=AUE_JUNK
1013   skip=Not used.
1014 
1015 label=AUE_KILL
1016   case=Valid process
1017     format=arg1:[proc]
1018       comment=2, signo, "signal"
1019   case=Zero or negative process
1020     format=arg1:arg2
1021       comment=2, signo, "signal":
1022       comment=1, pid, "process"
1023 
1024 label=AUE_KILLPG
1025   skip=Not used.
1026 
1027 label=AUE_LCHOWN
1028   format=arg1:arg2:path:[attr]
1029     comment=2, uid, "new file uid":
1030     comment=3, gid, "new file gid"
1031 
1032 label=AUE_LINK
1033   format=path1:[attr]:path2
1034      comment=from path:
1035      comment=to path
1036 
1037 label=AUE_LSEEK
1038   skip=Not used.
1039 
1040 label=AUE_LSTAT
1041   format=path:[attr]
1042 
1043 label=AUE_LXSTAT
1044 # obsolete
1045   skip=Not used.
1046 
1047 label=AUE_MCTL
1048   skip=Not used.
1049 
1050 label=AUE_MEMCNTL
1051   format=arg1:arg2:arg3:arg4:arg5:arg6
1052     comment=1, base address, "base":
1053     comment=2, length, "len":
1054     comment=3, command, "cmd":
1055     comment=4, command args, "arg":
1056     comment=5, command attributes, "attr":
1057     comment=6, 0, "mask"
1058 
1059 label=AUE_MKDIR
1060   format=arg1:path:[attr]
1061     comment=2, mode, "mode"
1062 
1063 label=AUE_MKNOD
1064   format=arg1:arg2:path:[attr]
1065     comment=2, mode, "mode":
1066     comment=3, dev, "dev"
1067 
1068 label=AUE_MMAP
1069   case=With a valid file descriptor
1070     format=arg1:arg2:[path]3:[attr]
1071       comment=1, segment address, "addr":
1072       comment=2, segment address, "len":
1073       comment=if no path, then argument&colon; \
1074         1, "nopath&colon; fd", file descriptor
1075   case=With an invalid file descriptor
1076     format=arg1:arg2:arg3
1077       comment=1, segment address, "addr":
1078       comment=2, segment address, "len":
1079       comment=1, file descriptor, "no path&colon; fd"
1080 
1081 label=AUE_MODADDMAJ
1082   title=modctl: bind module
1083   syscall=modctl
1084   format=[text]1:[text]2:text3:arg4:(0..n)[text]5
1085     comment=driver major number:
1086     comment=driver name:
1087     comment=driver major number or "no drvname":
1088     comment=5, number of aliases, "":
1089     comment=aliases
1090 
1091 label=AUE_MODADDPRIV
1092   format=kernel
1093 
1094 label=AUE_MODCONFIG
1095   skip=Not used.
1096 
1097 label=AUE_MODCTL
1098   skip=Not used. (placeholder)
1099 
1100 label=AUE_MODDEVPLCY
1101   syscall=modctl
1102   title=modctl: set device policy
1103   case=If unknown minor name/pattern
1104     format=arg1:arg2:arg3:arg4:arg5
1105       comment=2, "major", major number:
1106       comment=2, "lomin", low minor number, if known:
1107       comment=2, "himin", hi minor number, if known:
1108       comment=privileges required for reading:
1109       comment=privileges required for writing
1110   case=else
1111     format=arg1:text2:arg3:arg4
1112       comment=2, "major", major number:
1113       comment=minor name/pattern:
1114       comment=privileges required for reading:
1115       comment=privileges required for writing
1116 
1117 label=AUE_MODLOAD
1118   syscall=modctl
1119   title=modctl: load module
1120   format=[text]1:text2
1121     comment=default path:
1122     comment=filename path
1123 
1124 label=AUE_MODUNLOAD
1125   syscall=modctl
1126   title=modctl: unload module
1127   format=arg1
1128     comment=1, module ID, "id"
1129 
1130 label=AUE_MOUNT
1131   case=UNIX file system
1132     format=arg1:text2:path:[attr]
1133       comment=3, flags, "flags":
1134       comment=filesystem type
1135   case=NFS file system
1136     format=arg1:text2:text3:arg4:path:[attr]
1137       comment=3, flags, "flags":
1138       comment=filesystem type:
1139       comment=host name:
1140       comment=3, flags, "internal flags"
1141 # unix example:
1142 #       header,239,2,mount(2),,Sun Apr 16 14:42:32 2000, + 979995208 msec
1143 #       argument,3,0x104,flags
1144 #       text,ufs
1145 #       path,/var2
1146 #       attribute,40755,root,root,32,12160,0
1147 #       path,/devices/pci@1f,4000/scsi@3/sd@0,0:e
1148 #       attribute,60640,root,sys,32,231268,137438953476
1149 #       subject,abc,root,other,root,other,1726,1715,255 66049 ohboy
1150 #       return,success,4290707268
1151 #                      ^^^^^^^^^^         <- bugid 4333559
1152 
1153 label=AUE_MSGCTL
1154   format=arg1:[ipc]:[ipc_perm]
1155     comment=1, message ID, "msg ID"
1156   note=ipc_perm
1157 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1158 
1159 label=AUE_MSGCTL_RMID
1160   format=arg1:[ipc]:[ipc_perm]
1161     comment=1, message ID, "msg ID"
1162   note=ipc_perm
1163   syscall=msgctl: IPC_RMID
1164 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1165 
1166 label=AUE_MSGCTL_SET
1167   format=arg1:[ipc]:[ipc_perm]
1168     comment=1, message ID, "msg ID"
1169   note=ipc_perm
1170   syscall=msgctl: IPC_SET
1171 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1172 
1173 label=AUE_MSGCTL_STAT
1174   format=arg1:[ipc]:[ipc_perm]
1175     comment=1, message ID, "msg ID"
1176   note=ipc_perm
1177   syscall=msgctl: IPC_STAT
1178 # ipc, ipc_perm: msgctl -> ipc_lookup -> audit_ipc
1179 
1180 label=AUE_MSGGET
1181   format=arg1:ipc
1182     comment=1, message key, "msg key"
1183   note=ipc_perm
1184   syscall=msgget
1185 
1186 label=AUE_MSGGETL
1187   skip=Not used.
1188 
1189 label=AUE_MSGRCV
1190   format=arg1:[ipc]:[ipc_perm]
1191     comment=1, message ID, "msg ID"
1192   note=ipc_perm
1193   syscall=msgrcv
1194 # ipc, ipc_perm: msgrcv -> ipc_lookup -> audit_ipc
1195 
1196 label=AUE_MSGRCVL
1197   skip=Not used.
1198 
1199 label=AUE_MSGSND
1200   format=arg1:[ipc]:[ipc_perm]
1201     comment=1, message ID, "msg ID"
1202   note=ipc_perm
1203   syscall=msgsnd
1204 # ipc, ipc_perm: msgsnd -> ipc_lookup -> audit_ipc
1205 
1206 label=AUE_MSGSNDL
1207   skip=Not used.
1208 
1209 label=AUE_MSGSYS
1210 skip=Not used.  (Placeholder for AUE_MSG* events.)
1211 
1212 label=AUE_MUNMAP
1213   format=arg1:arg2
1214     comment=1, address of memory, "addr":
1215     comment=2, memory segment size, "len"
1216 
1217 label=AUE_NFS
1218   skip=Not used.
1219 
1220 label=AUE_NFSSVC_EXIT
1221   skip=Not used.
1222 
1223 label=AUE_NFS_GETFH
1224   skip=Not used.
1225 
1226 label=AUE_NFS_SVC
1227   skip=Not used.
1228 
1229 label=AUE_NICE
1230   format=kernel
1231 
1232 label=AUE_NULL
1233   skip=Not used.  (placeholder)
1234 # used internal to audit_event.c for minimal audit
1235 
1236 label=AUE_NTP_ADJTIME
1237   format=kernel
1238 
1239 label=AUE_ONESIDE
1240   skip=Not used.
1241 
1242 label=AUE_OPEN
1243   skip=Not used.  (placeholder for AUE_OPEN_*).
1244 
1245 label=AUE_OPEN_R
1246   format=path:[path_attr]:[attr]
1247   see=open(2) - read
1248 
1249 label=AUE_OPENAT_R
1250 # obsolete
1251   format=path:[path_attr]:[attr]
1252   see=openat(2)
1253 
1254 label=AUE_OPEN_RC
1255   format=path:[path_attr]:[attr]
1256   see=open(2) - read,creat
1257 
1258 label=AUE_OPENAT_RC
1259 # obsolete
1260   see=openat(2)
1261   format=path:[path_attr]:[attr]
1262 
1263 label=AUE_OPEN_RT
1264   format=path:[path_attr]:[attr]
1265   see=open(2) - read,trunc
1266 
1267 label=AUE_OPENAT_RT
1268 # obsolete
1269   see=openat(2)
1270   format=path:[path_attr]:[attr]
1271 
1272 label=AUE_OPEN_RTC
1273   format=path:[path_attr]:[attr]
1274   see=open(2) - read,trunc,creat
1275 
1276 label=AUE_OPENAT_RTC
1277 # obsolete
1278   see=openat(2)
1279   format=path:[path_attr]:[attr]
1280 
1281 label=AUE_OPEN_RW
1282   format=path:[path_attr]:[attr]
1283   see=open(2) - read,write
1284 
1285 label=AUE_OPENAT_RW
1286 # obsolete
1287   see=openat(2)
1288   format=path:[path_attr]:[attr]
1289 # aui_fsat(): fm & O_RDWR
1290 
1291 label=AUE_OPEN_RWC
1292   format=path:[path_attr]:[attr]
1293   see=open(2) - read,write,creat
1294 
1295 label=AUE_OPENAT_RWC
1296 # obsolete
1297   see=openat(2)
1298   format=path:[path_attr]:[attr]
1299 
1300 label=AUE_OPEN_RWT
1301   format=path:[path_attr]:[attr]
1302   see=open(2) - read,write,trunc
1303 
1304 label=AUE_OPENAT_RWT
1305 # obsolete
1306   see=openat(2)
1307   format=path:[path_attr]:[attr]
1308 
1309 label=AUE_OPEN_RWTC
1310   format=path:[path_attr]:[attr]
1311   see=open(2) - read,write,trunc,creat
1312 
1313 label=AUE_OPENAT_RWTC
1314 # obsolete
1315   see=openat(2)
1316   format=path:[path_attr]:[attr]
1317 
1318 label=AUE_OPEN_W
1319   format=path:[path_attr]:[attr]
1320   see=open(2) - write
1321 
1322 label=AUE_OPENAT_W
1323   see=openat(2)
1324   format=path:[path_attr]:[attr]
1325 
1326 label=AUE_OPEN_WC
1327   format=path:[path_attr]:[attr]
1328   see=open(2) - write,creat
1329 
1330 label=AUE_OPENAT_WC
1331   see=openat(2)
1332   format=path:[path_attr]:[attr]
1333 
1334 label=AUE_OPEN_WT
1335   format=path:[path_attr]:[attr]
1336   see=open(2) - write,trunc
1337 
1338 label=AUE_OPENAT_WT
1339   see=openat(2)
1340   format=path:[path_attr]:[attr]
1341 
1342 label=AUE_OPEN_WTC
1343   format=path:[path_attr]:[attr]
1344   see=open(2) - write,trunc,creat
1345 
1346 label=AUE_OPENAT_WTC
1347   see=openat(2)
1348   format=path:[path_attr]:[attr]
1349 
1350 label=AUE_OPEN_S
1351   format=path:[path_attr]:[attr]
1352   see=open(2) - search
1353 
1354 label=AUE_OPEN_E
1355   format=path:[path_attr]:[attr]
1356   see=open(2) - exec
1357 
1358 label=AUE_OSETPGRP
1359   skip=Not used.
1360 
1361 label=AUE_OSTAT
1362 # obsolete
1363   skip=Not used.
1364 
1365 label=AUE_PATHCONF
1366   format=path:[attr]
1367 
1368 label=AUE_PIPE
1369 format=kernel
1370 # class is no, not usually printed
1371 
1372 label=AUE_PORTFS
1373   skip=Not used (placeholder for AUE_PORTFS_*).
1374 
1375 label=AUE_PORTFS
1376   skip=Not used (placeholder for AUE_PORTFS_*).
1377 
1378 label=AUE_PORTFS_ASSOCIATE
1379   syscall=portfs
1380   see=port_associate(3C)
1381   case=Port association via PORT_SOURCE_FILE
1382   format=[path]1:attr
1383     comment=name of the file/directory to be watched
1384 
1385 label=AUE_PORTFS_DISSOCIATE
1386   syscall=portfs
1387   see=port_dissociate(3C)
1388   case=Port disassociation via PORT_SOURCE_FILE
1389   format=kernel
1390 
1391 label=AUE_PRIOCNTLSYS
1392   syscall=priocntl
1393   see=priocntl(2)
1394   format=arg1:arg2
1395     comment=1, priocntl version number, "pc_version":
1396     comment=3, command, "cmd"
1397 
1398 label=AUE_PROCESSOR_BIND
1399   case=No LWP/thread bound to the processor
1400     format=arg1:arg2:text3:[proc]
1401       comment=1, type of ID, "ID type":
1402       comment=2, ID value, "ID":
1403       comment="PBIND_NONE"
1404   case=With processor bound
1405     format=arg1:arg2:arg3:[proc]
1406       comment=1, type of ID, "ID type":
1407       comment=2, ID value, "ID":
1408       comment=3, processor ID, "processor_id"
1409 
1410 label=AUE_PUTMSG
1411   see=putmsg(2)
1412   format=arg1:[path]:[attr]:arg2
1413     comment=1, file descriptor, "fd":
1414     comment=4, priority, "pri"
1415 
1416 label=AUE_PUTPMSG
1417   see=putpmsg(2)
1418   format=arg1:[path]:[attr]:arg2:arg3
1419     comment=1, file descriptor, "fd":
1420     comment=4, priority, "pri":
1421     comment=5, flags, "flags"
1422 
1423 label=AUE_P_ONLINE
1424   format=arg1:arg2:text3
1425     comment=1, processor ID, "processor ID":
1426     comment=2, flags value, "flags":
1427     comment=text form of flags.  Values&colon;  \
1428       P_ONLINE, P_OFFLINE, P_NOINTR, P_SPARE, P_FAULTED, P_STATUS, P_DISABLED
1429 
1430 label=AUE_QUOTACTL
1431   skip=Not used.
1432 
1433 label=AUE_READ
1434   skip=Not used.  (Placeholder for AUE_READ_* events)
1435 
1436 label=AUE_READL
1437   skip=Not used. (Obsolete)
1438 
1439 label=AUE_READLINK
1440   format=path:[attr]
1441 
1442 label=AUE_READV
1443   skip=Not used (obsolete)
1444 # detritus from CMS
1445 
1446 label=AUE_READVL
1447   skip=Not used (obsolete)
1448 # detritus from CMS
1449 
1450 label=AUE_REBOOT
1451   skip=Not used.
1452 
1453 label=AUE_RECV
1454   case=If address family is AF_INET or AF_INET6
1455     format=[arg]1:[inet]
1456       comment=1, file descriptor, "so"
1457   case=If address family is AF_UNIX and path is defined
1458     format=[path]1:[attr]
1459       comment=1, file descriptor, "so"
1460   case=If address family is AF_UNIX and path is NULL
1461     format=[path]1:[attr]
1462       comment=1, file descriptor, "no path&colon; fd"
1463   case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1464     format=[arg]1:[arg]2:[arg]3
1465       comment=1, file descriptor, "so":
1466       comment=1, family, "family":
1467       comment=1, type, "type"
1468 # associated class remapped to AUE_READ's class (audit_event.c:audit_s2e[237])
1469 
1470 label=AUE_RECVFROM
1471   format=inet:arg1:[arg]2:inet3:arg4
1472     comment=3, message length, "len":
1473     comment=4, flags, "flags":
1474     comment=from address:
1475     comment=6, address length, "tolen"
1476   note=The socket token for a bad socket is reported as "argument
1477   note=token (1, socket descriptor, "fd")"
1478 
1479 label=AUE_RECVMSG
1480   case=If invalid file descriptor
1481     format=arg1:arg2
1482       comment=1, file descriptor, "so":
1483       comment=3, flags, "flags"
1484   case=If valid file descriptor and socket is AF_UNIX and no path
1485   format=arg1:[attr]
1486     comment=1, file descriptor, "no path&colon; fd"
1487   case=If valid file descriptor and socket is AF_UNIX and path defined
1488   format=path:attr
1489   case=If valid file descriptor and socket is AF_INET or AF_INET6
1490   case=.. if socket type is SOCK_DGRAM or SOCK_RAW or SOCK_STREAM
1491   format=arg1:arg2:inet
1492     comment=1, file descriptor, "so":
1493     comment=2, flags, "flags"
1494   case=.. if socket type is unknown
1495   format=arg1:arg2:arg3:arg4
1496     comment=1, file descriptor, "so":
1497     comment=1, family, "family":
1498     comment=1, type, "type":
1499     comment=3, flags, "flags"
1500 
1501 label=AUE_RENAME
1502   format=path1:[attr]1:[path]2
1503   comment=from name:
1504   comment=to name
1505 
1506 label=AUE_RENAMEAT
1507 # obsolete
1508   format=path1:[attr]1:[path]2
1509   comment=from name:
1510   comment=to name
1511 
1512 label=AUE_RFSSYS
1513   skip=Not used.
1514 # apparently replaced
1515 
1516 label=AUE_RMDIR
1517   format=path:[attr]
1518 
1519 label=AUE_SACL
1520   title=File Access Audit
1521   syscall=none
1522   see=none
1523   format=head:path:arg1:[text]2:subj
1524     comment="access_mask":
1525     comment="Windows SID"
1526 
1527 label=AUE_SEMCTL
1528   format=arg1:[ipc]:[ipc_perm]
1529     comment=1, semaphore ID, "sem ID"
1530   note=ipc_perm
1531 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1532 
1533 label=AUE_SEMCTL_GETALL
1534   format=arg1:[ipc]:[ipc_perm]
1535     comment=1, semaphore ID, "sem ID"
1536   note=ipc_perm
1537   syscall=semctl: GETALL
1538 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1539 
1540 label=AUE_SEMCTL_GETNCNT
1541   format=arg1:[ipc]:[ipc_perm]
1542     comment=1, semaphore ID, "sem ID"
1543   note=ipc_perm
1544   syscall=semctl: GETNCNT
1545 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1546 
1547 label=AUE_SEMCTL_GETPID
1548   format=arg1:[ipc]:[ipc_perm]
1549     comment=1, semaphore ID, "sem ID"
1550   note=ipc_perm
1551   syscall=semctl: GETPID
1552 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1553 
1554 label=AUE_SEMCTL_GETVAL
1555   format=arg1:[ipc]:[ipc_perm]
1556     comment=1, semaphore ID, "sem ID"
1557   note=ipc_perm
1558   syscall=semctl: GETVAL
1559 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1560 
1561 label=AUE_SEMCTL_GETZCNT
1562   format=arg1:[ipc]:[ipc_perm]
1563     comment=1, semaphore ID, "sem ID"
1564   note=ipc_perm
1565   syscall=semctl: GETZCNT
1566 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1567 
1568 label=AUE_SEMCTL_RMID
1569   format=arg1:[ipc]:[ipc_perm]
1570     comment=1, semaphore ID, "sem ID"
1571   note=ipc_perm
1572   syscall=semctl: IPC_RMID
1573 # ipc, ipc_perm token: semctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1574 
1575 label=AUE_SEMCTL_SET
1576   format=arg1:[ipc]:[ipc_perm]
1577     comment=1, semaphore ID, "sem ID"
1578   note=ipc_perm
1579   syscall=semctl: IPC_SET
1580 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1581 
1582 label=AUE_SEMCTL_SETALL
1583   format=arg1:[ipc]:[ipc_perm]
1584     comment=1, semaphore ID, "sem ID"
1585   note=ipc_perm
1586   syscall=semctl: SETALL
1587 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1588 
1589 label=AUE_SEMCTL_SETVAL
1590   format=arg1:[ipc]:[ipc_perm]
1591     comment=1, semaphore ID, "sem ID"
1592   note=ipc_perm
1593   syscall=semctl: SETVAL
1594 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1595 
1596 label=AUE_SEMCTL_STAT
1597   format=arg1:[ipc]:[ipc_perm]
1598     comment=1, semaphore ID, "sem ID"
1599   note=ipc_perm
1600   syscall=semctl: IPC_STAT
1601 # ipc, ipc_perm token: semctl -> ipc_lookup -> audit_ipc
1602 
1603 label=AUE_SEMGET
1604   format=arg1:[ipc_perm]:ipc
1605     comment=1, semaphore ID, "sem key"
1606   note=ipc_perm
1607   syscall=semctl: SETVAL
1608 # ipc_perm token: semget -> audit_ipcget
1609 
1610 label=AUE_SEMGETL
1611   skip=Not used.
1612 
1613 label=AUE_SEMOP
1614   format=arg1:[ipc]:[ipc_perm]
1615     comment=1, semaphore ID, "sem ID"
1616   note=ipc_perm
1617 # ipc, ipc_perm token: semop -> ipc_lookup -> audit_ipc
1618 
1619 label=AUE_SEMSYS
1620   skip=Not used.  (place holder) -- defaults to a semget variant
1621 
1622 label=AUE_SEND
1623   case=If address family is AF_INET or AF_INET6
1624     format=[arg]1:[inet]
1625       comment=1, file descriptor, "so"
1626   case=If address family is AF_UNIX and path is defined
1627     format=[path]1:[attr]
1628       comment=1, file descriptor, "so"
1629   case=If address family is AF_UNIX and path is NULL
1630     format=[path]1:[attr]
1631       comment=1, file descriptor, "no path&colon; fd"
1632   case=If address family is other than AF_UNIX, AF_INET, AF_INET6
1633     format=[arg]1:[arg]2:[arg]3
1634       comment=1, file descriptor, "so":
1635       comment=1, family, "family":
1636       comment=1, type, "type"
1637 # associated class remapped to AUE_WRITE's class (audit_event.c:audit_s2e[240])
1638 
1639 label=AUE_SENDMSG
1640   case=If invalid file descriptor
1641     format=arg1:arg2
1642       comment=1, file descriptor, "so":
1643       comment=3, flags, "flags"
1644   case=If valid file descriptor
1645   case=...and address family is AF_UNIX and path is defined
1646     format=path:attr
1647   case=...and address family is AF_UNIX and path is NULL
1648     format=path1:attr
1649       comment=1, file descriptor, "nopath&colon; fd"
1650   case=...and address family is AF_INET or AF_INET6, \
1651     socket is SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1652     format=arg1:arg2:inet
1653       comment=1, file descriptor, "so":
1654       comment=3, flags, "flags"
1655   case=...and unknown address family or address family AF_INET or AF_INET6 \
1656     and not socket SOCK_DGRAM, SOCK_RAW or SOCK_STREAM
1657     format=arg1:arg2:arg3:arg4
1658       comment=1, file descriptor, "so":
1659       comment=1, family, "family":
1660       comment=1, type, "type":
1661       comment=1, flags, "flags"
1662 
1663 label=AUE_SENDTO
1664   case=If invalid file descriptor
1665     format=arg1:arg2
1666       comment=1, file descriptor, "so":
1667       comment=3, flags, "flags"
1668   case=If valid file descriptor
1669   case=...and socket is AF_UNIX and path is defined
1670     format=path:attr
1671   case=...and address family is AF_UNIX and path is NULL
1672     format=path1:attr
1673       comment=1, file descriptor, "nopath&colon; fd"
1674   case=...and address family is AF_INET or AF_INET6
1675     format=arg1:arg2:inet
1676       comment=1, file descriptor, "so":
1677       comment=3, flags, "flags"
1678   case=...and unknown address family
1679     format=arg1:arg2:arg3:arg4
1680       comment=1, file descriptor, "so":
1681       comment=1, family, "family":
1682       comment=1, type, "type":
1683       comment=1, flags, "flags"
1684 
1685 label=AUE_SETAUDIT
1686   case=With a valid program stack address
1687     format=arg1:arg2:arg3:arg4:arg5:arg6
1688       comment=1, audit user ID, "setaudit&colon;auid":
1689       comment=1, terminal ID, "setaudit&colon;port":
1690       comment=1, terminal ID, "setaudit&colon;machine":
1691       comment=1, preselection mask, "setaudit&colon;as_success":
1692       comment=1, preselection mask, "setaudit&colon;as_failure":
1693       comment=1, audit session ID, "setaudit&colon;asid"
1694   case=With an invalid program stack address
1695     format=kernel
1696 #       header,215,2,setaudit(2),,Mon May 15 09:43:28 2000, + 60002627 msec
1697 #       argument,1,0x271a,setaudit:auid
1698 #       argument,1,0x3ff0201,setaudit:port
1699 #       argument,1,0x8192591e,setaudit:machine
1700 #       argument,1,0x400,setaudit:as_success
1701 #       argument,1,0x400,setaudit:as_failure
1702 #       argument,1,0x16f,setaudit:asid
1703 #       subject,tuser10,root,other,root,other,20620,367,255 197121 tmach1
1704 #       return,success,0
1705 #       trailer,215
1706 #       header,215,2,setaudit(2),,Mon May 15 09:43:40 2000, + 50000847 msec
1707 #       argument,1,0x271a,setaudit:auid
1708 #       argument,1,0x3ff0201,setaudit:port
1709 #       argument,1,0x8192591e,setaudit:machine
1710 #       argument,1,0x400,setaudit:as_success
1711 #       argument,1,0x400,setaudit:as_failure
1712 #       argument,1,0x16f,setaudit:asid
1713 #       subject,tuser10,root,other,root,other,20720,367,255 197121 tmach1
1714 #       return,success,0
1715 #       trailer,215
1716 
1717 label=AUE_SETAUDIT_ADDR
1718   case=With a valid program stack address
1719     format=arg1:arg2:arg3:inaddr4:arg5:arg6:arg7
1720       comment=1, audit user ID, "auid":
1721       comment=1, terminal ID, "port":
1722       comment=1, type, "type":
1723       comment=1, terminal ID, "ip address":
1724       comment=1, preselection mask, "as_success":
1725       comment=1, preselection mask, "as_failure":
1726       comment=1, audit session ID, "asid"
1727   case=With an invalid program stack address
1728     format=kernel
1729 #       header,172,2,setaudit_addr(2),,Fri Nov 09 13:52:26 2001, + 0 msec
1730 #       argument,1,0x15fa7,auid
1731 #       argument,1,0x0,port
1732 #       argument,1,0x4,type
1733 #       ip address,tmach2
1734 #       argument,1,0x9c00,as_success
1735 #       argument,1,0x9c00,as_failure
1736 #       argument,1,0x1f1,asid
1737 #       subject,tuser1,root,staff,tuser1,staff,10420,497,0 0 tmach2
1738 #       return,success,0
1739 
1740 label=AUE_SETAUID
1741   format=arg1
1742     comment=2, audit user ID, "setauid"
1743 
1744 label=AUE_SETDOMAINNAME
1745   skip=Not used.  (See AUE_SYSINFO)
1746 # See AUE_SYSINFO with SI_SET_SRPC_DOMAIN
1747 
1748 label=AUE_SETEGID
1749   format=arg1
1750     comment=1, group ID, "gid"
1751 
1752 label=AUE_SETEUID
1753   format=arg1
1754     comment=1, user ID, "euid"
1755 
1756 label=AUE_SETGID
1757   format=arg1
1758     comment=1, group ID, "gid"
1759 
1760 label=AUE_SETGROUPS
1761   note=If more than NGROUPS_MAX_DEFAULT groups listed,
1762   note=no tokens are generated.
1763   case=If no groups in list
1764     format=[arg]1
1765       comment=1, 0, "setgroups"
1766   case=If 1 or more groups in list
1767     format=(1..n)arg1
1768       comment=1, gid, "setgroups"
1769 
1770 label=AUE_SETHOSTNAME
1771   skip=Not used.  (See AUE_SYSINFO)
1772 # See sysinfo call with command SI_SET_HOSTNAME
1773 
1774 label=AUE_SETKERNSTATE
1775   skip=Not used.
1776 
1777 label=AUE_SETPGID
1778   format=[proc]:[arg]1
1779   comment=2, pgid, "pgid"
1780 
1781 label=AUE_SETPGRP
1782   format=kernel
1783 
1784 label=AUE_SETPRIORITY
1785   skip=Not used.
1786 
1787 label=AUE_SETPPRIV
1788   case=operation privileges off
1789   format=arg1:privset2
1790     comment=setppriv operation:
1791     comment=privileges actually switched off
1792   case=operation privileges on
1793   format=arg1:privset2
1794     comment=setppriv operation:
1795     comment=privileges actually switched on
1796   case=operation privileges off
1797   format=arg1:privset2:privset3
1798     comment=setppriv operation:
1799     comment=privileges before privset:
1800     comment=privileges after privset
1801 #header,220,2,settppriv(2),,test1,Mon Oct  6 10:09:05 PDT 2003, + 753 msec
1802 #argument,2,0x2,op
1803 #privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1804 #privilege,Inheritable,file_link_any,proc_exec,proc_fork,proc_session
1805 #subject,tuser,root,staff,tuser,staff,444,426,200 131585 test0
1806 #return,success,0
1807 
1808 label=AUE_SETREGID
1809   format=arg1:arg2
1810     comment=1, real group ID, "rgid":
1811     comment=2, effective group ID, "egid"
1812 
1813 label=AUE_SETREUID
1814   format=arg1:arg2
1815     comment=1, real user ID, "ruid":
1816     comment=2, effective user ID, "euid"
1817 
1818 label=AUE_SETRLIMIT
1819   format=kernel
1820 #       header,73,2,setrlimit(2),,Thu Nov 08 15:14:17 2001, + 0 msec
1821 #       subject,tuser1,tuser1,staff,tuser1,staff,9707,497,0 0 tmach2
1822 #       return,success,0
1823 
1824 label=AUE_SETSID
1825   format=kernel
1826 
1827 label=AUE_SETSOCKOPT
1828   case=Invalid file descriptor
1829     format=arg1:arg2
1830       comment=1, file descriptor, "so":
1831       comment=2, level, "level"
1832   case=Valid file descriptor
1833   case=...and socket is AF_UNIX
1834     format=path1:arg2:arg3:arg4:arg5:arg6:[arg]7:[data]8
1835       comment=if no path, will be argument&colon; 1, "nopath&colon; fd", \
1836         file descriptor:
1837       comment=1, file descriptor, "so":
1838       comment=1, family, "family":
1839       comment=1, type, "type":
1840       comment=2, protocol level, "level":
1841       comment=3, option name, "optname":
1842       comment=5, option length, "optlen":
1843       comment=option data
1844   case=...and socket is AF_INET or AF_INET6
1845     format=arg1:arg2:arg3:[arg]4:[data]5:inet
1846       comment=1, file descriptor, "so":
1847       comment=2, protocol level, "level":
1848       comment=3, option name, "optname":
1849       comment=5, option length, "optlen":
1850       comment=option data
1851   case=...and socket adddress family is unknown
1852     format=arg1:arg2:arg3:arg4:arg5:[arg]6:[data]7
1853       comment=1, file descriptor, "so":
1854       comment=1, family, "family":
1855       comment=1, type, "type":
1856       comment=2, protocol level, "level":
1857       comment=3, option name, "optname":
1858       comment=5, option length, "optlen":
1859       comment=option data
1860 
1861 label=AUE_SETTIMEOFDAY
1862   skip=Not used.
1863 
1864 label=AUE_SETUID
1865   syscall=setuid
1866   format=arg1
1867     comment=1, "uid" to be set
1868 
1869 label=AUE_SETUSERAUDIT
1870   skip=Not used.
1871 
1872 label=AUE_SHMAT
1873   format=arg1:arg2:[ipc]:[ipc_perm]
1874     comment=1, shared memory ID, "shm ID":
1875     comment=2, shared mem addr, "shm addr"
1876   note=ipc_perm
1877 # ipc, ipc_perm token: shmat -> ipc_lookup -> audit_ipc
1878 
1879 label=AUE_SHMCTL
1880   format=arg1:[ipc]:[ipc_perm]
1881     comment=1, shared memory ID, "shm ID"
1882   note=ipc_perm
1883 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1884 
1885 label=AUE_SHMCTL_RMID
1886   format=arg1:[ipc]:[ipc_perm]
1887   comment=1, shared memory ID, "shm ID"
1888   note=ipc_perm
1889   syscall=semctl:  IPC_RMID
1890 # ipc, ipc_perm token: shmctl -> ipc_rmid -> ipc_lookup -> audit_ipc
1891 
1892 label=AUE_SHMCTL_SET
1893   format=arg1:[ipc]:[ipc_perm]
1894     comment=1, shared memory ID, "shm ID"
1895   note=ipc_perm
1896   syscall=semctl:  IPC_SET
1897 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1898 
1899 label=AUE_SHMCTL_STAT
1900   format=arg1:[ipc]:[ipc_perm]
1901     comment=1, shared memory ID, "shm ID"
1902   note=ipc_perm
1903   syscall=semctl:  IPC_STAT
1904 # ipc, ipc_perm token: shmctl -> ipc_lookup -> audit_ipc
1905 
1906 label=AUE_SHMDT
1907   format=arg1
1908     comment=1, shared memory address, "shm adr"
1909 
1910 label=AUE_SHMGET
1911   format=arg1:[ipc_perm]:[ipc]
1912     comment=0, shared memory key, "shm key"
1913   note=ipc_perm
1914 # ipc_perm: shmget -> audit_ipcget
1915 
1916 label=AUE_SHMGETL
1917   skip=Not used.
1918 
1919 label=AUE_SHMSYS
1920   skip=Not used.  (Placeholder for shmget and shmctl*)
1921 
1922 label=AUE_SHUTDOWN
1923   case=If the socket address is invalid
1924     format=[arg]1:[text]2:[text]3
1925       comment=1, file descriptor, "fd":
1926       comment=bad socket address:
1927       comment=bad peer address
1928   case=If the socket address is part of the AF_INET family
1929     case=..with zero file descriptor
1930       format=arg1:[arg]2:[arg]3:[arg]4
1931         comment=1, file descriptor, "so":
1932         comment=1, family, "family":
1933         comment=1, type, "type":
1934         comment=2, how shutdown code, "how"
1935     case=...with non-zero file descriptor
1936       format=arg1:arg2:inet
1937         comment=1, file descriptor, "so":
1938         comment=2, how shutdown code, "how"
1939   case=If the socket address is AF_UNIX
1940     case=...with zero file descriptor
1941       format=path1:arg2:[arg]3:[arg]4:[arg]5
1942         comment=If error&colon; argument&colon; \
1943           1, "no path&colon; fd", file descriptor:
1944         comment=1, file descriptor, "so":
1945         comment=1, family, "family":
1946         comment=1, type, "type":
1947         comment=2, how shutdown code, "how"
1948     case=...with non-zero file descriptor
1949       format=path1:arg2:arg3:inet
1950         comment=If error&colon; argument&colon; \
1951           1, file descriptor, "no path&colon; fd":
1952         comment=1, file descriptor, "so":
1953         comment=2, how shutdown code, "how"
1954 #old BSM manual wrong; used audit_event.c
1955 
1956 label=AUE_SOCKACCEPT
1957   syscall=getmsg:  socket accept
1958   format=inet:arg1:[path]:attr:arg2
1959     comment=1, file descriptor, "fd":
1960     comment=4, priority, "pri"
1961 # see putmsg and getmsg for record format
1962 # See audit.c for inet token and audit_start.c for other reference
1963 
1964 label=AUE_SOCKCONFIG
1965   format=arg1:arg2:arg3:[path]4
1966     comment=1, domain address, "domain":
1967     comment=2, type, "type":
1968     comment=3, protocol, "protocol":
1969     comment=If no path&colon;argument -- 3, 0, "devpath"
1970 
1971 label=AUE_SOCKCONNECT
1972   syscall=putmsg:  socket connect
1973   format=inet:arg1:[path]:attr:arg2
1974     comment=1, file descriptor, "fd":
1975     comment=4, priority, "pri"
1976 # same as AUE_SOCKACCEPT
1977 
1978 label=AUE_SOCKET
1979   format=arg1:[arg]2:arg3
1980     comment=1, socket domain, "domain":
1981     comment=2, socket type, "type":
1982     comment=3, socket protocol, "protocol"
1983 
1984 label=AUE_SOCKETPAIR
1985   skip=Not used.
1986 # unreferenced
1987 
1988 label=AUE_SOCKRECEIVE
1989   syscall=getmsg
1990   format=inet:arg1:[path]:attr:arg2
1991     comment=1, file descriptor, "fd":
1992     comment=4, priority, "pri"
1993 # see AUE_SOCKACCEPT
1994 
1995 label=AUE_SOCKSEND
1996 syscall=putmsg
1997   format=inet:arg1:[path]:attr:arg2
1998     comment=1, file descriptor, "fd":
1999     comment=4, priority, "pri"
2000 # see AUE_SOCKACCEPT
2001 
2002 label=AUE_STAT
2003   format=path:[attr]
2004 
2005 label=AUE_STATFS
2006   format=path:[attr]
2007 
2008 label=AUE_STATVFS
2009   format=path:[attr]
2010 
2011 label=AUE_STIME
2012   format=kernel
2013 
2014 label=AUE_SWAPON
2015   skip=Not used.
2016 
2017 label=AUE_SYMLINK
2018   format=path:text1:[attr]
2019     comment=symbolic link string
2020 
2021 label=AUE_SYSINFO
2022   note=Only SI_SET_HOSTNAME and SI_SET_SRPC_DOMAIN commands
2023   note=are currently audited.
2024   format=arg1:[text]2
2025     comment=1, command, "cmd":
2026     comment=name
2027 
2028 label=AUE_SYSTEMBOOT
2029   title=system booted
2030   syscall=none
2031   format=head:text1
2032     comment="booting kernel"
2033 # see audit_start.c and audit_io.c
2034 # no subject or return / exit token
2035 #       header,44,2,system booted,na,Fri Nov 09 13:53:42 2001, + 0 msec
2036 #       text,booting kernel
2037 
2038 label=AUE_TRUNCATE
2039   skip=Not used.
2040 
2041 label=AUE_UMOUNT
2042   syscall=umount: old version
2043   note=Implemented as call of the newer umount2(2).
2044   format=path:arg1:[path]:[attr]
2045     comment=2, mflag value = 0, "flags"
2046 
2047 label=AUE_UMOUNT2
2048   syscall=umount2
2049   format=path:arg1:[path]:[attr]
2050     comment=2, mflag value, "flags"
2051 
2052 label=AUE_UNLINK
2053   format=path:[attr]
2054 
2055 label=AUE_UNLINKAT
2056 # obsolete
2057   see=openat(2)
2058   format=path:[attr]
2059 
2060 label=AUE_UNMOUNT
2061   skip=Not used.
2062 
2063 label=AUE_UTIME
2064 # obsolete
2065   format=path:[attr]
2066 
2067 label=AUE_UTIMES
2068   see=futimens(2)
2069   format=path:[attr]
2070 
2071 label=AUE_VFORK
2072   format=arg1
2073     comment=0, pid, "child PID"
2074   note=The vfork(2) return values are undefined because the audit record is
2075   note=produced at the point that the child process is spawned.
2076 
2077 label=AUE_VPIXSYS
2078   skip=Not used.
2079 
2080 label=AUE_VTRACE
2081   skip=Not used.
2082 
2083 label=AUE_WRITE
2084   format=path1:attr
2085     comment=if no path, argument -- "1, file descriptor, "no path: fd"
2086   note:An audit record is generated for write only once per file close.
2087 
2088 label=AUE_WRITEV
2089   skip=Not used. (obsolete)
2090 
2091 label=AUE_XMKNOD
2092 # obsolete
2093   skip=Not used.
2094 
2095 label=AUE_XSTAT
2096 # obsolete
2097   skip=Not Used.
2098 
2099 label=AUE_PF_POLICY_ADDRULE
2100   title=Add IPsec policy rule
2101   see=
2102   syscall=none
2103   format=arg1:arg2:[zone]3:[text]4
2104   comment=Operation applied to active policy (1 is active, 0 is inactive):
2105   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2106   comment=affected zone:
2107   comment=Name of target tunnel
2108 
2109 label=AUE_PF_POLICY_DELRULE
2110   title=Delete IPsec policy rule
2111   see=
2112   syscall=none
2113   format=arg1:arg2:[zone]3:[text]4
2114   comment=Operation applied to active policy (1 is active, 0 is inactive):
2115   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2116   comment=affected zone:
2117   comment=Name of target tunnel
2118 
2119 label=AUE_PF_POLICY_CLONE
2120   title=Clone IPsec policy
2121   see=
2122   syscall=none
2123   format=arg1:arg2:[zone]3:[text]4
2124   comment=Operation applied to active policy (1 is active, 0 is inactive):
2125   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2126   comment=affected zone:
2127   comment=Name of target tunnel
2128 
2129 label=AUE_PF_POLICY_FLIP
2130   title=Flip IPsec policy
2131   see=
2132   syscall=none
2133   format=arg1:arg2:[zone]3:[text]4
2134   comment=Operation applied to active policy (1 is active, 0 is inactive):
2135   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2136   comment=affected zone:
2137   comment=Name of target tunnel
2138 
2139 label=AUE_PF_POLICY_FLUSH
2140   title=Flip IPsec policy rules
2141   see=
2142   syscall=none
2143   format=arg1:arg2:[zone]3:[text]4
2144   comment=Operation applied to active policy (1 is active, 0 is inactive):
2145   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2146   comment=affected zone:
2147   comment=Name of target tunnel
2148 
2149 label=AUE_PF_POLICY_ALGS
2150   title=Update IPsec algorithms
2151   see=
2152   syscall=none
2153   format=arg1:arg2:[zone]3:[text]4
2154   comment=Operation applied to active policy (1 is active, 0 is inactive):
2155   comment=Operation applied to global policy (1 is global, 0 is tunnel):
2156   comment=affected zone:
2157   comment=Name of target tunnel
2158 
2159 label=AUE_allocate_fail
2160   program=/usr/sbin/allocate
2161   title=allocate: allocate-device failure
2162   format=(0..n)[text]1
2163     comment=command line arguments
2164 # see audit_allocate.c
2165 
2166 label=AUE_allocate_succ
2167   program=/usr/sbin/allocate
2168   title=allocate: allocate-device success
2169   format=(0..n)[text]1
2170     comment=command line arguments
2171 # see audit_allocate.c
2172 
2173 label=AUE_at_create
2174   program=/usr/bin/at
2175   title=at: at-create crontab
2176   format=path
2177 
2178 label=AUE_at_delete
2179   program=/usr/bin/at
2180   title=at: at-delete atjob (at or atrm)
2181   format=text1:path
2182   comment="ancillary file&colon;" filename or "bad format of at-job name"
2183 
2184 label=AUE_at_perm
2185   skip=Not used.
2186 # not referenced outside uevents.h
2187 
2188 label=AUE_create_user
2189   skip=Not used.
2190 
2191 label=AUE_cron_invoke
2192   program=/usr/sbin/cron
2193   title=cron: cron-invoke at or cron
2194   case=If issue with account find
2195   format=text1
2196     comment="bad user" name or "user <name> account expired"
2197   case=else
2198   format=text1:text2
2199     comment="at-job", "batch-job", "crontab-job", "queue-job (<queue_name>)", \
2200       or "unknown job type (<job_type_id>)":
2201     comment=command
2202 
2203 label=AUE_crontab_create
2204   program=/usr/bin/crontab
2205   title=crontab: crontab created
2206   format=path
2207 # See audit_crontab.c
2208 
2209 label=AUE_crontab_delete
2210   program=/usr/bin/crontab
2211   title=crontab: crontab delete
2212   format=path
2213 # See audit_crontab.c
2214 
2215 label=AUE_crontab_mod
2216   program=/usr/bin/crontab
2217   title=crontab:  crontab modify
2218   format=path
2219 # See audit_crontab.c
2220 
2221 label=AUE_crontab_perm
2222   skip=Not used.
2223 
2224 label=AUE_deallocate_fail
2225   program=/usr/sbin/deallocate
2226   title=deallocate-device failure
2227   format=(0..n)[text]1
2228     comment=command line arguments
2229 # See audit_allocate.c
2230 
2231 label=AUE_deallocate_succ
2232   program=/usr/sbin/deallocate
2233   title=deallocate-device success
2234   format=(0..n)[text]1
2235     comment=command line arguments
2236 # See audit_allocate.c
2237 
2238 label=AUE_delete_user
2239   skip=Not used.
2240 
2241 label=AUE_disable_user
2242   skip=Not used.
2243 
2244 label=AUE_enable_user
2245   skip=Not used.
2246 
2247 label=AUE_ftpd
2248   program=/usr/sbin/in.ftpd
2249   title=in.ftpd
2250   format=[text]1
2251     comment=error message
2252 # See audit_ftpd
2253 
2254 label=AUE_ftpd_logout
2255   program=/usr/sbin/in.ftpd
2256   title=in.ftpd
2257   format=user
2258 # See audit_ftpd
2259 
2260 label=AUE_halt_solaris
2261   program=/usr/sbin/halt
2262   title=halt
2263   format=user
2264 # See audit_halt.c
2265 
2266 label=AUE_kadmind_auth
2267   format=text1:text2:text3
2268     comment=Op&colon; <requested information>:
2269     comment=Arg&colon; <argument for Op>:
2270     comment=Client&colon; <client principal name>
2271 # See audit_kadmin.c / common_audit()
2272 
2273 label=AUE_kadmind_unauth
2274   format=text1:text2:text3
2275     comment=Op&colon; <requested information>:
2276     comment=Arg&colon; <argument for Op>:
2277     comment=Client&colon; <client principal name>
2278 # See audit_kadmin.c / common_audit()
2279 
2280 label=AUE_krb5kdc_as_req
2281   format=text1:text2
2282     comment=Client&colon; <client principal name>:
2283     comment=Service&colon; <requested service name>
2284 # See audit_krb5kdc.c / common_audit()
2285 
2286 label=AUE_krb5kdc_tgs_req
2287   format=text1:text2
2288     comment=Client&colon; <client principal name>:
2289     comment=Service&colon; <requested service name>
2290 # See audit_krb5kdc.c / common_audit()
2291 
2292 label=AUE_krb5kdc_tgs_req_alt_tgt
2293   format=text1:text2
2294     comment=Client&colon; <client principal name>:
2295     comment=Service&colon; <requested service name>
2296 # See audit_krb5kdc.c / common_audit()
2297 
2298 label=AUE_krb5kdc_tgs_req_2ndtktmm
2299   format=text1:text2
2300     comment=Client&colon; <client principal name>:
2301     comment=Service&colon; <requested service name>
2302 # See audit_krb5kdc.c / common_audit()
2303 
2304 label=AUE_listdevice_fail
2305   title=allocate-list devices failure
2306   program=/usr/sbin/allocate
2307   format=(0..n)[text]1
2308     comment=command line arguments
2309 # See audit_allocate.c
2310 
2311 label=AUE_listdevice_succ
2312   title=allocate-list devices success
2313   program=/usr/sbin/allocate
2314   format=(0..n)[text]1
2315     comment=command line arguments
2316 # See audit_allocate.c
2317 
2318 label=AUE_modify_user
2319   skip=Not used.
2320 
2321 label=AUE_mountd_mount
2322   title=mountd: NFS mount
2323   program=/usr/lib/nfs/mountd
2324   see=mountd(1M)
2325   format=text1:path2
2326     comment=remote client hostname:
2327     comment=mount dir
2328 # See audit_mountd.c
2329 
2330 label=AUE_mountd_umount
2331   title=mountd: NFS unmount
2332   program=/usr/lib/nfs/mountd
2333   format=text1:path2
2334   comment=remote client hostname:
2335   comment=mount dir
2336 # See audit_mountd.c
2337 
2338 label=AUE_poweroff_solaris
2339   program=/usr/sbin/poweroff
2340   title=poweroff
2341   format=user
2342 # See audit_halt.c
2343 
2344 label=AUE_reboot_solaris
2345   program=/usr/sbin/reboot
2346   title=reboot
2347   format=user
2348 # See audit_reboot.c
2349 #       header,61,2,reboot(1m),,Fri Nov 09 13:52:34 2001, + 726 msec
2350 #       subject,tuser1,root,other,root,other,10422,497,0 0 tmach2
2351 #       return,success,0
2352 
2353 label=AUE_rexd
2354   program=/usr/sbin/rpc.rexd
2355   title=rpc.rexd
2356   format=[text]1:text2:text3:[text]4:[text]5
2357     comment=error message (failure only):
2358     comment="Remote execution requested by&colon;" hostname:
2359     comment="Username&colon;" username:
2360     comment="User id&colon;" user ID (failure only):
2361     comment="Command line&colon;" command attempted
2362 # See audit_rexd.c
2363 
2364 label=AUE_rexecd
2365   program=/usr/sbin/rpc.rexecd
2366   title=rpc.rexecd
2367   format=[text]1:text2:text3:text4
2368     comment=error message (failure only):
2369     comment="Remote execution requested by&colon;" hostname:
2370     comment="Username&colon;" username:
2371     comment="Command line&colon;" command attempted
2372 # See audit_rexecd.c
2373 
2374 label=AUE_rshd
2375   program=/usr/sbin/in.rshd
2376   title=in.rshd
2377   format=text1:text2:[text]3:[text]4
2378     comment="cmd" command:
2379     comment="remote user" remote user:
2380     comment="local user" local user:
2381     comment=failure message
2382 # See audit_rshd.c
2383 
2384 label=AUE_shutdown_solaris
2385   title=shutdown
2386   program=/usr/ucb/shutdown
2387   format=user
2388 # See audit_shutdown.c
2389 
2390 label=AUE_smserverd
2391   program=/usr/lib/smedia/rpc.smserverd
2392   format=[text]1:[text]2
2393     comment=state change:
2394     comment=vid, pid, major/minor device
2395 # see usr/src/cmd/smserverd
2396 # code shows a third token, path, but it isn't implemented.
2397 
2398 label=AUE_uadmin_solaris
2399   title=uadmin (obsolete)
2400   program=
2401   see=
2402   format=text1:text2
2403   comment=function code:
2404   comment=argument code
2405 # not used. Replaced by AUE_uadmin_* events, see uadmin.c, adt.xml
2406 
2407 label=AUE_LABELSYS_TNRH
2408   title=config Trusted Network remote host cache
2409   see=tnrh(2)
2410   syscall=labelsys: TSOL_TNRH
2411   case=With the flush command (cmd=3)
2412     format=arg1
2413       comment=1, command, "cmd"
2414   case=With the load (cmd=1) and delete (cmd=2) commands
2415     format=arg1:inaddr2:arg3
2416       comment=1, command, "cmd":
2417       comment=ip address of host:
2418       comment=2, prefix length, "prefix len"
2419 
2420 label=AUE_LABELSYS_TNRHTP
2421   title=config Trusted Network remote host template
2422   see=tnrhtp(2)
2423   syscall=labelsys: TSOL_TNRHTP
2424   case=With the flush command (cmd=3)
2425     format=arg1
2426       comment=1, command, "cmd"
2427   case=With the load (cmd=1) and delete (cmd=2) commands
2428     format=arg1:text2
2429       comment=1, command, "cmd":
2430       comment=name of template
2431 
2432 label=AUE_LABELSYS_TNMLP
2433   title=config Trusted Network multi-level port entry
2434   see=tnmlp(2)
2435   syscall=labelsys: TSOL_TNMLP
2436   case=With the flush command (cmd=3)
2437     format=arg1:text2
2438       comment=1, command, "cmd":
2439       comment="shared", or name of zone
2440   case=With the load (cmd=1) and delete (cmd=2) commands
2441     format=arg1:text2:arg3:arg4:[arg]5
2442       comment=1, command, "cmd":
2443       comment="shared", or name of zone:
2444       comment=2, protocol number, "proto num":
2445       comment=2, starting mlp port number, "mlp_port":
2446       comment=2, ending mlp port number, "mlp_port_upper"