Event 28(1C)–58(3A): z/OS UNIX EVENT TYPES

Events 28 through 58 apply to z/OS® UNIX. The following qualifier codes are used for each event:

28(1C)
DIRECTORY SEARCH
0(0)
Access allowed
1(1)
Not authorized to search directory
2(2)
Security label failure
29(1D)
CHECK ACCESS TO DIRECTORY
0(0)
Access allowed
1(1)
Caller does not have requested access authority
2(2)
Security label failure
30(1E)
CHECK ACCESS TO FILE
0(0)
Access allowed
1(1)
Caller does not have requested access authority
2(2)
Security label failure
31(1F)
CHAUDIT
0(0)
File's audit options changed
1(1)
Caller does not have authority to change user audit options of specified file
2(2)
Caller does not have authority to change auditor audit options
3(3)
Security label failure
32(20)
CHDIR
0(0)
Current working directory changed
*
Failures logged as directory search event types
33(21)
CHMOD
0(0)
File's mode changed
1(1)
Caller does not have authority to change mode of specified file
2(2)
Security label failure
34(22)
CHOWN
0(0)
File's owner or group owner changed
1(1)
Caller does not have authority to change owner or group owner of specified file
2(2)
Security label failure
35(23)
CLEAR SETID BITS FOR FILE
0(0)
S_ISUID, S_ISGID, and S_ISVTX bits changed to zero (write)
 
No failure cases
36(24)
EXEC WITH SETUID/SETGID
0(0)
Successful change of UIDs and GIDs
 
No failure cases
37(25)
GETPSENT
0(0)
Access allowed
1(1)
Not authorized to access specified process
38(26)
INITIALIZE z/OS UNIX PROCESS (DUB)
0(0)
z/OS UNIX process successfully initiated
1(1)
User not defined as a z/OS UNIX user (no user profile or no OMVS segment)
2(2)
User incompletely defined as a z/OS UNIX user (no UID in user profile)
3(3)
User's current group has no GID
39(27)
z/OS UNIX PROCESS COMPLETION (UNDUB)
0(0)
Process completed
 
No failure cases
40(28)
KILL
0(0)
Access allowed
1(1)
Not authorized to access specified process
2(2)
Security label failure
41(29)
LINK
0(0)
New link created
*
Failures logged as directory search or check access event types
42(2A)
MKDIR
0(0)
Directory successfully created
*
Failures logged as directory search or check access event types
43(2B)
MKNOD
0(0)
Successful creation of a node
*
Failures logged as directory search or check access event types
44(2C)
MOUNT FILE SYSTEM
0(0)
Successful mount
*
Failures logged as ck_priv event type
45(2D)
OPEN (NEW FILE)
0(0)
File successfully created
*
Failures logged as directory search or check access event types
46(2E)
PTRACE
0(0)
Access allowed
1(1)
Not authorized to access specified process
2(2)
Security label failure
47(2F)
RENAME
0(0)
Rename successful
*
Failures logged as directory search or check access event types
48(30)
RMDIR
0(0)
Successful rmdir
*
Failures logged as directory search or check access event types
49(31)
SETEGID
0(0)
Successful change of effective GID
1(1)
Not authorized to setegid
50(32)
SETEUID
0(0)
Successful change of effective UID
1(1)
Not authorized to seteuid
51(33)
SETGID
0(0)
Successful change of GIDs
1(1)
Not authorized to setgid
52(34)
SETUID
0(0)
Successful change of UIDs
1(1)
Not authorized to setuid
53(35)
SYMLINK
0(0)
Successful symlink
*
Failures logged as directory search or check access event types
54(36)
UNLINK
0(0)
Successful unlink
*
Failures logged as directory search or check access event types
55(37)
UNMOUNT FILE SYSTEM
0(0)
Successful unmount
*
Failures logged as ck_priv event type
56(38)
CHECK FILE OWNER
0(0)
User is the owner
1(1)
User is not the owner
2(2)
Security label failure
57(39)
CK_PRIV
0(0)
User is authorized
1(1)
User not authorized to use requested function
58(3A)
OPEN SLAVE TTY
0(0)
Access allowed
1(1)
Not authorized to access specified process