Event 28(1C)–58(3A): z/OS UNIX EVENT TYPES
Events 28 through 58 apply to z/OS® UNIX. The following qualifier codes are used for each event:
- 28(1C)
- DIRECTORY SEARCH
- 0(0)
- Access allowed
- 1(1)
- Not authorized to search directory
- 2(2)
- Security label failure
- 29(1D)
- CHECK ACCESS TO DIRECTORY
- 0(0)
- Access allowed
- 1(1)
- Caller does not have requested access authority
- 2(2)
- Security label failure
- 30(1E)
- CHECK ACCESS TO FILE
- 0(0)
- Access allowed
- 1(1)
- Caller does not have requested access authority
- 2(2)
- Security label failure
- 31(1F)
- CHAUDIT
- 0(0)
- File's audit options changed
- 1(1)
- Caller does not have authority to change user audit options of specified file
- 2(2)
- Caller does not have authority to change auditor audit options
- 3(3)
- Security label failure
- 32(20)
- CHDIR
- 0(0)
- Current working directory changed
- *
- Failures logged as directory search event types
- 33(21)
- CHMOD
- 0(0)
- File's mode changed
- 1(1)
- Caller does not have authority to change mode of specified file
- 2(2)
- Security label failure
- 34(22)
- CHOWN
- 0(0)
- File's owner or group owner changed
- 1(1)
- Caller does not have authority to change owner or group owner of specified file
- 2(2)
- Security label failure
- 35(23)
- CLEAR SETID BITS FOR FILE
- 0(0)
- S_ISUID, S_ISGID, and S_ISVTX bits changed to zero (write)
- No failure cases
- 36(24)
- EXEC WITH SETUID/SETGID
- 0(0)
- Successful change of UIDs and GIDs
- No failure cases
- 37(25)
- GETPSENT
- 0(0)
- Access allowed
- 1(1)
- Not authorized to access specified process
- 38(26)
- INITIALIZE z/OS UNIX PROCESS
(DUB)
- 0(0)
- z/OS UNIX process successfully initiated
- 1(1)
- User not defined as a z/OS UNIX user (no user profile or no OMVS segment)
- 2(2)
- User incompletely defined as a z/OS UNIX user (no UID in user profile)
- 3(3)
- User's current group has no GID
- 39(27)
- z/OS UNIX PROCESS
COMPLETION (UNDUB)
- 0(0)
- Process completed
- No failure cases
- 40(28)
- KILL
- 0(0)
- Access allowed
- 1(1)
- Not authorized to access specified process
- 2(2)
- Security label failure
- 41(29)
- LINK
- 0(0)
- New link created
- *
- Failures logged as directory search or check access event types
- 42(2A)
- MKDIR
- 0(0)
- Directory successfully created
- *
- Failures logged as directory search or check access event types
- 43(2B)
- MKNOD
- 0(0)
- Successful creation of a node
- *
- Failures logged as directory search or check access event types
- 44(2C)
- MOUNT FILE SYSTEM
- 0(0)
- Successful mount
- *
- Failures logged as ck_priv event type
- 45(2D)
- OPEN (NEW FILE)
- 0(0)
- File successfully created
- *
- Failures logged as directory search or check access event types
- 46(2E)
- PTRACE
- 0(0)
- Access allowed
- 1(1)
- Not authorized to access specified process
- 2(2)
- Security label failure
- 47(2F)
- RENAME
- 0(0)
- Rename successful
- *
- Failures logged as directory search or check access event types
- 48(30)
- RMDIR
- 0(0)
- Successful rmdir
- *
- Failures logged as directory search or check access event types
- 49(31)
- SETEGID
- 0(0)
- Successful change of effective GID
- 1(1)
- Not authorized to setegid
- 50(32)
- SETEUID
- 0(0)
- Successful change of effective UID
- 1(1)
- Not authorized to seteuid
- 51(33)
- SETGID
- 0(0)
- Successful change of GIDs
- 1(1)
- Not authorized to setgid
- 52(34)
- SETUID
- 0(0)
- Successful change of UIDs
- 1(1)
- Not authorized to setuid
- 53(35)
- SYMLINK
- 0(0)
- Successful symlink
- *
- Failures logged as directory search or check access event types
- 54(36)
- UNLINK
- 0(0)
- Successful unlink
- *
- Failures logged as directory search or check access event types
- 55(37)
- UNMOUNT FILE SYSTEM
- 0(0)
- Successful unmount
- *
- Failures logged as ck_priv event type
- 56(38)
- CHECK FILE OWNER
- 0(0)
- User is the owner
- 1(1)
- User is not the owner
- 2(2)
- Security label failure
- 57(39)
- CK_PRIV
- 0(0)
- User is authorized
- 1(1)
- User not authorized to use requested function
- 58(3A)
- OPEN SLAVE TTY
- 0(0)
- Access allowed
- 1(1)
- Not authorized to access specified process