MACRO NAME,VALUE,ORIGIN,CLASS,DESCRIPITON AUDIT_GET,1000,USER,CTL,Get status AUDIT_SET,1001,USER,CTL,Set status (enable/disable/auditd) AUDIT_LIST,1002,USER,DEP,List syscall rules -- deprecated AUDIT_ADD,1003,USER,DEP,Add syscall rule -- deprecated AUDIT_DEL,1004,USER,DEP,Delete syscall rule -- deprecated AUDIT_USER,1005,USER,DEP,Message from userspace -- deprecated AUDIT_LOGIN,1006,KERN,IND,Define the login ID and information AUDIT_WATCH_INS,1007,USER,DEP,Insert file/dir watch entry AUDIT_WATCH_REM,1008,USER,DEP,Remove file/dir watch entry AUDIT_WATCH_LIST,1009,USER,DEP,List all file/dir watches AUDIT_SIGNAL_INFO,1010,USER,CTL,Get info about sender of signal to auditd AUDIT_ADD_RULE,1011,USER,CTL,Add syscall filtering rule AUDIT_DEL_RULE,1012,USER,CTL,Delete syscall filtering rule AUDIT_LIST_RULES,1013,USER,CTL,List syscall filtering rules AUDIT_TRIM,1014,USER,CTL,Trim junk from watched tree AUDIT_MAKE_EQUIV,1015,USER,CTL,Append to watched tree AUDIT_TTY_GET,1016,USER,CTL,Get TTY auditing status AUDIT_TTY_SET,1017,USER,CTL,Set TTY auditing status AUDIT_SET_FEATURE,1018,USER,CTL,Turn an audit feature on or off AUDIT_GET_FEATURE,1019,USER,CTL,Get which features are enabled AUDIT_USER_AUTH,1100,USER,IND,User system access authentication AUDIT_USER_ACCT,1101,USER,IND,User system access authorization AUDIT_USER_MGMT,1102,USER,IND,User account attribute change AUDIT_CRED_ACQ,1103,USER,IND,User credential acquired AUDIT_CRED_DISP,1104,USER,IND,User credential disposed AUDIT_USER_START,1105,USER,IND,User session start AUDIT_USER_END,1106,USER,IND,User session end AUDIT_USER_AVC,1107,USER,IND,User space AVC (Access Vector Cache) message AUDIT_USER_CHAUTHTOK,1108,USER,IND,User account password or PIN changed AUDIT_USER_ERR,1109,USER,IND,User account state error AUDIT_CRED_REFR,1110,USER,IND,User credential refreshed AUDIT_USYS_CONFIG,1111,USER,IND,User space system config change AUDIT_USER_LOGIN,1112,USER,IND,User has logged in AUDIT_USER_LOGOUT,1113,USER,IND,User has logged out AUDIT_ADD_USER,1114,USER,IND,User account added AUDIT_DEL_USER,1115,USER,IND,User account deleted AUDIT_ADD_GROUP,1116,USER,IND,Group account added AUDIT_DEL_GROUP,1117,USER,IND,Group account deleted AUDIT_DAC_CHECK,1118,USER,IND,User space DAC check results AUDIT_CHGRP_ID,1119,USER,IND,User space group ID changed AUDIT_TEST,1120,USER,IND,Used for test success messages AUDIT_TRUSTED_APP,1121,USER,IND,Trusted app msg - freestyle text AUDIT_USER_SELINUX_ERR,1122,USER,IND,SELinux user space error AUDIT_USER_CMD,1123,USER,IND,User shell command and args AUDIT_USER_TTY,1124,USER,IND,Non-ICANON TTY input meaning AUDIT_CHUSER_ID,1125,USER,IND,Changed user ID supplemental data AUDIT_GRP_AUTH,1126,USER,IND,Authentication for group password AUDIT_SYSTEM_BOOT,1127,USER,IND,System boot AUDIT_SYSTEM_SHUTDOWN,1128,USER,IND,System shutdown AUDIT_SYSTEM_RUNLEVEL,1129,USER,IND,System runlevel change AUDIT_SERVICE_START,1130,USER,IND,Service (daemon) start AUDIT_SERVICE_STOP,1131,USER,IND,Service (daemon) stop AUDIT_GRP_MGMT,1132,USER,IND,Group account attribute was modified AUDIT_GRP_CHAUTHTOK,1133,USER,IND,Group account password or PIN changed AUDIT_MAC_CHECK,1134,USER,IND,User space MAC (Mandatory Access Control) decision results AUDIT_ACCT_LOCK,1135,USER,IND,User's account locked by admin AUDIT_ACCT_UNLOCK,1136,USER,IND,User's account unlocked by admin AUDIT_USER_DEVICE,1137,USER,IND,User space hotplug device changes AUDIT_SOFTWARE_UPDATE,1138,USER,IND,Software update event AUDIT_DAEMON_START,1200,USER,IND,Daemon startup record AUDIT_DAEMON_END,1201,USER,IND,Daemon normal stop record AUDIT_DAEMON_ABORT,1202,USER,IND,Daemon error stop record AUDIT_DAEMON_CONFIG,1203,USER,IND,Daemon config change AUDIT_DAEMON_RECONFIG,1204,USER,IND,Auditd should reconfigure AUDIT_DAEMON_ROTATE,1205,USER,IND,Auditd should rotate logs AUDIT_DAEMON_RESUME,1206,USER,IND,Auditd should resume logging AUDIT_DAEMON_ACCEPT,1207,USER,IND,Auditd accepted remote connection AUDIT_DAEMON_CLOSE,1208,USER,IND,Auditd closed remote connection AUDIT_DAEMON_ERR,1209,USER,IND,Auditd internal error AUDIT_SYSCALL,1300,KERN,SC,System call event information AUDIT_FS_WATCH,1301,KERN,DEP,Deprecated AUDIT_PATH,1302,KERN,SC,Filename path information AUDIT_IPC,1303,KERN,SC,System call IPC (Inter-Process Communication) object AUDIT_SOCKETCALL,1304,KERN,SC,System call socketcall arguments AUDIT_CONFIG_CHANGE,1305,KERN,IND,Audit system configuration change AUDIT_SOCKADDR,1306,KERN,SC,System call socket address argument information AUDIT_CWD,1307,KERN,SC,Current working directory AUDIT_EXECVE,1309,KERN,SC,Arguments supplied to the execve system call AUDIT_IPC_SET_PERM,1311,KERN,SC,IPC new permissions record type AUDIT_MQ_OPEN,1312,KERN,SC,POSIX MQ open record type AUDIT_MQ_SENDRECV,1313,KERN,SC,POSIX MQ send/receive record type AUDIT_MQ_NOTIFY,1314,KERN,SC,POSIX MQ notify record type AUDIT_MQ_GETSETATTR,1315,KERN,SC,POSIX MQ get/set attribute record type AUDIT_KERNEL_OTHER,1316,KERN,IND,For use by 3rd party modules AUDIT_FD_PAIR,1317,KERN,SC,Information for pipe and socketpair system calls AUDIT_OBJ_PID,1318,KERN,SC,ptrace target AUDIT_TTY,1319,KERN,IND,Input on an administrative TTY AUDIT_EOE,1320,KERN,CTL,End of multi-record event AUDIT_BPRM_FCAPS,1321,KERN,SC,Information about file system capabilities increasing permissions AUDIT_CAPSET,1322,KERN,SC,Record showing argument to sys_capset setting process-based capabilities AUDIT_MMAP,1323,KERN,SC,Mmap system call file descriptor and flags AUDIT_NETFILTER_PKT,1324,KERN,IND,Packets traversing netfilter chains AUDIT_NETFILTER_CFG,1325,KERN,IND/SC,Netfilter chain modifications AUDIT_SECCOMP,1326,KERN,IND,Secure Computing event AUDIT_PROCTITLE,1327,KERN,SC,Process Title info AUDIT_FEATURE_CHANGE,1328,KERN,IND,Audit feature changed value AUDIT_REPLACE,1329,KERN,CTL,Replace auditd if this probe unanswerd AUDIT_KERN_MODULE,1330,KERN,SC,Kernel Module events AUDIT_FANOTIFY,1331,KERN,SC,Fanotify access decision AUDIT_TIME_INJOFFSET,1332,KERN,SC,Timekeeping offset injected AUDIT_TIME_ADJNTPVAL,1333,KERN,SC,NTP value adjustment AUDIT_BPF,1334,KERN,SC,BPF load/unload AUDIT_EVENT_LISTENER,1335,KERN,SC,audit mcast sock join/part AUDIT_URINGOP,1336,KERN,SC,io_uring operation AUDIT_OPENAT2,1337,KERN,SC,Record showing openat2 how args AUDIT_DM_CTRL,1338,KERN,SC,Device Mapper target control AUDIT_DM_EVENT,1339,KERN,SC,Device Mapper events AUDIT_AVC,1400,KERN,SC,SELinux AVC (Access Vector Cache) denial or grant AUDIT_SELINUX_ERR,1401,KERN,SC,Internal SELinux errors AUDIT_AVC_PATH,1402,KERN,SC,"dentry, vfsmount pair from AVC" AUDIT_MAC_POLICY_LOAD,1403,KERN,SC,SELinux Policy file load AUDIT_MAC_STATUS,1404,KERN,SC,"SELinux mode (enforcing, permissive, off) changed" AUDIT_MAC_CONFIG_CHANGE,1405,KERN,SC,SELinux Boolean value modification AUDIT_MAC_UNLBL_ALLOW,1406,KERN,SC,NetLabel: allow unlabeled traffic AUDIT_MAC_CIPSOV4_ADD,1407,KERN,SC,NetLabel: add CIPSOv4 (Commercial Internet Protocol Security Option) DOI (Domain of Interpretation) entry AUDIT_MAC_CIPSOV4_DEL,1408,KERN,SC,NetLabel: del CIPSOv4 (Commercial Internet Protocol Security Option) DOI (Domain of Interpretation) entry AUDIT_MAC_MAP_ADD,1409,KERN,SC,NetLabel: add LSM (Linux Security Module) domain mapping AUDIT_MAC_MAP_DEL,1410,KERN,SC,NetLabel: del LSM (Linux Security Module) domain mapping AUDIT_MAC_IPSEC_ADDSA,1411,KERN,DEP,Not used AUDIT_MAC_IPSEC_DELSA,1412,KERN,DEP,Not used AUDIT_MAC_IPSEC_ADDSPD,1413,KERN,DEP,Not used AUDIT_MAC_IPSEC_DELSPD,1414,KERN,DEP,Not used AUDIT_MAC_IPSEC_EVENT,1415,KERN,SC,Audit an IPsec event AUDIT_MAC_UNLBL_STCADD,1416,KERN,SC,NetLabel: add a static label AUDIT_MAC_UNLBL_STCDEL,1417,KERN,SC,NetLabel: del a static label AUDIT_MAC_CALIPSO_ADD,1418,KERN,SC,NetLabel: add CALIPSO DOI (Domain of Interpretation) entry AUDIT_MAC_CALIPSO_DEL,1419,KERN,SC,NetLabel: delete CALIPSO DOI (Domain of Interpretation) entry AUDIT_MAC_TASK_CONTEXTS,1420,KERN,SC,Multiple LSM contexts AUDIT_MAC_OBJ_CONTEXTS,1421,KERN,SC,Multiple LSM object contexts AUDIT_AA,1500,KERN,?, AUDIT_APPARMOR_AUDIT,1501,KERN,SC, AUDIT_APPARMOR_ALLOWED,1502,KERN,SC, AUDIT_APPARMOR_DENIED,1503,KERN,SC, AUDIT_APPARMOR_HINT,1504,KERN,SC, AUDIT_APPARMOR_STATUS,1505,KERN,SC, AUDIT_APPARMOR_ERROR,1506,KERN,SC, AUDIT_APPARMOR_KILL,1507,KERN,SC, AUDIT_ANOM_PROMISCUOUS,1700,KERN,SC/IND,Device changed promiscuous mode AUDIT_ANOM_ABEND,1701,KERN,IND,Process ended abnormally AUDIT_ANOM_LINK,1702,KERN,SC?,Suspicious use of file links AUDIT_ANOM_CREAT,1703,KERN,SC?,Suspicious file creation AUDIT_INTEGRITY_DATA,1800,KERN,SC,Data integrity verification AUDIT_INTEGRITY_METADATA,1801,KERN,SC,Metadata integrity verification AUDIT_INTEGRITY_STATUS,1802,KERN,SC,Integrity enable status AUDIT_INTEGRITY_HASH,1803,KERN,SC,Integrity HASH type AUDIT_INTEGRITY_PCR,1804,KERN,SC,PCR (Platform Configuration Register) invalidation messages AUDIT_INTEGRITY_RULE,1805,KERN,SC/IND,Integrity Policy action AUDIT_INTEGRITY_EVM_XATTR,1806,KERN,SC,EVM XATTRS modifications AUDIT_INTEGRITY_POLICY_RULE,1807,KERN,SC,Integrity Policy rule AUDIT_KERNEL,2000,KERN,IND,Kernel audit status AUDIT_ANOM_LOGIN_FAILURES,2100,USER,IND,Failed login limit reached AUDIT_ANOM_LOGIN_TIME,2101,USER,IND,Login attempted at bad time AUDIT_ANOM_LOGIN_SESSIONS,2102,USER,IND,Maximum concurrent sessions reached AUDIT_ANOM_LOGIN_ACCT,2103,USER,IND,Login attempted to watched account AUDIT_ANOM_LOGIN_LOCATION,2104,USER,IND,Login from forbidden location AUDIT_ANOM_MAX_DAC,2105,USER,IND,Max DAC (Discretionary Access Control) failures reached AUDIT_ANOM_MAX_MAC,2106,USER,IND,Max MAC (Mandatory Access Control) failures reached AUDIT_ANOM_AMTU_FAIL,2107,USER,IND,AMTU (Abstract Machine Test Utility) failure AUDIT_ANOM_RBAC_FAIL,2108,USER,IND,RBAC (Role-Based Access Control) self test failure AUDIT_ANOM_RBAC_INTEGRITY_FAIL,2109,USER,IND,RBAC (Role-Based Access Control) file integrity test failure AUDIT_ANOM_CRYPTO_FAIL,2110,USER,IND,Crypto system test failure AUDIT_ANOM_ACCESS_FS,2111,USER,IND,Access of file or directory ended abnormally AUDIT_ANOM_EXEC,2112,USER,IND,Execution of file ended abnormally AUDIT_ANOM_MK_EXEC,2113,USER,IND,Make an executable AUDIT_ANOM_ADD_ACCT,2114,USER,IND,Adding a user account ended abnormally AUDIT_ANOM_DEL_ACCT,2115,USER,IND,Deleting a user account ended abnormally AUDIT_ANOM_MOD_ACCT,2116,USER,IND,Changing an account ended abnormally AUDIT_ANOM_ROOT_TRANS,2117,USER,IND,User became root AUDIT_ANOM_LOGIN_SERVICE,2118,USER,IND,Service acct attempted login AUDIT_RESP_ANOMALY,2200,USER,IND,Anomaly not reacted to AUDIT_RESP_ALERT,2201,USER,IND,Alert email was sent AUDIT_RESP_KILL_PROC,2202,USER,IND,Kill program AUDIT_RESP_TERM_ACCESS,2203,USER,IND,Terminate session AUDIT_RESP_ACCT_REMOTE,2204,USER,IND,User account locked from remote access AUDIT_RESP_ACCT_LOCK_TIMED,2205,USER,IND,User account locked for time AUDIT_RESP_ACCT_UNLOCK_TIMED,2206,USER,IND,User account unlocked from time AUDIT_RESP_ACCT_LOCK,2207,USER,IND,User account was locked AUDIT_RESP_TERM_LOCK,2208,USER,IND,Terminal was locked AUDIT_RESP_SEBOOL,2209,USER,IND,Set an SELinux boolean AUDIT_RESP_EXEC,2210,USER,IND,Execute a script AUDIT_RESP_SINGLE,2211,USER,IND,Go to single user mode AUDIT_RESP_HALT,2212,USER,IND,Take the system down AUDIT_RESP_ORIGIN_BLOCK,2213,USER,IND,Address blocked by iptables AUDIT_RESP_ORIGIN_BLOCK_TIMED,2214,USER,IND,Address blocked for time AUDIT_USER_ROLE_CHANGE,2300,USER,IND,User changed to a new SELinux role AUDIT_ROLE_ASSIGN,2301,USER,IND,Administrator assigned user to SELinux role AUDIT_ROLE_REMOVE,2302,USER,IND,Administrator removed user from SELinux role AUDIT_LABEL_OVERRIDE,2303,USER,IND,Administrator is overriding a SELinux label AUDIT_LABEL_LEVEL_CHANGE,2304,USER,IND,Object level SELinux label modified AUDIT_USER_LABELED_EXPORT,2305,USER,IND,Object exported with SELinux label AUDIT_USER_UNLABELED_EXPORT,2306,USER,IND,Object exported without SELinux label AUDIT_DEV_ALLOC,2307,USER,IND,Device was allocated AUDIT_DEV_DEALLOC,2308,USER,IND,Device was deallocated AUDIT_FS_RELABEL,2309,USER,IND,Filesystem relabeled AUDIT_USER_MAC_POLICY_LOAD,2310,USER,IND,Usersapce daemon loaded SELinux policy AUDIT_ROLE_MODIFY,2311,USER,IND,Administrator modified an SELinux role AUDIT_USER_MAC_CONFIG_CHANGE,2312,USER,IND,Change made to MAC (Mandatory Access Control) policy AUDIT_USER_MAC_STATUS,2313,USER,IND,Userspc daemon enforcing change AUDIT_CRYPTO_TEST_USER,2400,USER,IND,Cryptographic test results AUDIT_CRYPTO_PARAM_CHANGE_USER,2401,USER,IND,Cryptographic attribute change AUDIT_CRYPTO_LOGIN,2402,USER,IND,Cryptographic officer login AUDIT_CRYPTO_LOGOUT,2403,USER,IND,Cryptographic officer logout AUDIT_CRYPTO_KEY_USER,2404,USER,IND,"Create, delete, negotiate cryptographic key identifier" AUDIT_CRYPTO_FAILURE_USER,2405,USER,IND,"Fail decrypt, encrypt or randomize operation" AUDIT_CRYPTO_REPLAY_USER,2406,USER,IND,Cryptographic replay attack detected AUDIT_CRYPTO_SESSION,2407,USER,IND,Parameters set during TLS session establishment AUDIT_CRYPTO_IKE_SA,2408,USER,IND,Parameters related to IKE SA AUDIT_CRYPTO_IPSEC_SA,2409,USER,IND,Parameters related to IPSEC SA AUDIT_VIRT_CONTROL,2500,USER,IND,"Start, Pause, Stop VM" AUDIT_VIRT_RESOURCE,2501,USER,IND,Resource assignment AUDIT_VIRT_MACHINE_ID,2502,USER,IND,Binding of label to VM AUDIT_VIRT_INTEGRITY_CHECK,2503,USER,IND,Guest integrity results AUDIT_VIRT_CREATE,2504,USER,IND,Creation of guest image AUDIT_VIRT_DESTROY,2505,USER,IND,Destruction of guest image AUDIT_VIRT_MIGRATE_IN,2506,USER,IND,Inbound guest migration info AUDIT_VIRT_MIGRATE_OUT,2507,USER,IND,Outbound guest migration info