Print this page
11842 Want audit events for auditon(A_SETPMASK) and friends
Reviewed by: John Levon <john.levon@joyent.com>
Reviewed by: Andy Fiddaman <andy@omniosce.org>

Split Close
Expand all
Collapse all
          --- old/usr/src/lib/libbsm/audit_event.txt
          +++ new/usr/src/lib/libbsm/audit_event.txt
↓ open down ↓ 355 lines elided ↑ open up ↑
 356  356  305:AUE_PORTFS_ASSOCIATE:portfs(2) - file events source - PORT_ASSOCIATE:fa
 357  357  306:AUE_PORTFS_DISSOCIATE:portfs(2) - file events source - PORT_DISSOCIATE:fa
 358  358  #
 359  359  307:AUE_SETSID:setsid(2):pm
 360  360  308:AUE_SETPGID:setpgid(2):pm
 361  361  309:AUE_FACCESSAT:faccessat(2):no
 362  362  310:AUE_AUDITON_GETAMASK:auditon(2) - get default user preselection mask:aa
 363  363  311:AUE_AUDITON_SETAMASK:auditon(2) - set default user preselection mask:as
 364  364  312:AUE_PSECFLAGS:psecflags(2) - set process security flags:pm
 365  365  313:AUE_SACL:SACL-based File Access Auditing:sa
      366 +314:AUE_AUDITON_GETPINFO:auditon(2) - get process info:aa
      367 +315:AUE_AUDITON_SETPMASK:auditon(2) - set process preselection mask:as
      368 +316:AUE_AUDITON_GETKAUDIT:auditon(2) - get kernel audit characteristics:aa
      369 +317:AUE_AUDITON_SETKAUDIT:auditon(2) - set kernel audit characteristics:as
      370 +318:AUE_AUDITON_OTHER:auditon(2) - other event:aa
 366  371  #
 367  372  # user level audit events
 368  373  #       2048 -  6143    Reserved
 369  374  #
 370  375  #       6000 -  7999    allocated for Solaris
 371  376  #
 372  377  6144:AUE_at_create:at-create atjob:ua
 373  378  6145:AUE_at_delete:at-delete atjob (at or atrm):ua
 374  379  6146:AUE_at_perm:at-permission:no
 375  380  6147:AUE_cron_invoke:cron-invoke:ua
↓ open down ↓ 308 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX