Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

audit-3.0.6-150400.4.16.1 RPM for ppc64le

From OpenSuSE Leap 15.6 for ppc64le

Name: audit Distribution: SUSE Linux Enterprise 15
Version: 3.0.6 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150400.4.16.1 Build date: Tue Feb 6 17:43:55 2024
Group: System/Monitoring Build host: nebbiolo
Size: 1190836 Source RPM: audit-secondary-3.0.6-150400.4.16.1.src.rpm
Packager: https://www.suse.com/
Url: https://people.redhat.com/sgrubb/audit/
Summary: User Space Tools for Kernel Auditing
The audit package contains the user space utilities for storing and
processing the audit records generated by the audit subsystem in the
Linux kernel.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Thu Feb 01 2024 ematsumiya@suse.de
  - Fix plugin termination when using systemd service units (bsc#1215377)
    * add auditd.service-fix-plugin-termination.patch
* Tue Aug 15 2023 ematsumiya@suse.de
  - Update audit-secondary.spec: create symbolic link from
    /sbin/audisp-syslog to /usr/sbin/audisp-syslog (bsc#1201519).
* Tue Aug 15 2023 ematsumiya@suse.de
  - Fix rules not loaded when restarting auditd.service(bsc#1204844)
* Wed Jun 07 2023 ematsumiya@suse.de
  - Check for AF_UNIX unnamed sockets (bsc#1210004)
    * add check-for-AF_UNIX-unnamed-sockets.patch
* Mon Apr 11 2022 jengelh@inai.de
  - Drop buildrequire on C++ compiler.
  - Modernize specfile constructs.
* Sat Mar 26 2022 coolo@suse.com
  - Fix buildrequire for openldap2-devel - audit doesn't require the
    (outdated) C++ binding, but the C headers that happen to be pulled
    in by buildrequiring the C++ devel package
* Fri Mar 25 2022 ematsumiya@suse.com
  - Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645)
    * add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
  - Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517)
    * add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
* Wed Mar 23 2022 dmueller@suse.com
  - add audit-userspace-517-compat.patch
* Mon Nov 29 2021 fvogt@suse.com
  - Use %autosetup
  - Don't include sample rules as %doc, they're already installed
    as normal files
  - Fix create-augenrules-service.patch:
    * auditd.service needs to require augenrules.service,
      not the other way around
  - Fix documentation for enable-stop-rules.patch
* Sun Nov 07 2021 gmbr3@opensuse.org
  - Update to version 3.0.6:
    * fixes a segfault on some SELINUX_ERR records
    * makes IPX packet interpretation dependent on the ipx header
      file existing
    * adds b32/b64 support to ausyscall
    * adds support for armv8l
    * fixes auditctl list of syscalls on PPC
    * auditd.service now restarts auditd under some conditions
* Fri Oct 15 2021 gmbr3@opensuse.org
  - Add CONFIG parameter to %sysusers_generate_pre
* Wed Oct 13 2021 ematsumiya@suse.com
  - Create separate service for augenrules (bsc#1191614, bsc#1181400)
    * add create-augenrules-service.patch
    Remove ReadWritePaths=/etc/audit from auditd.service, also removes
    augenrules call from ExecStartPost.
    Create augenrules.service with the ReadWritePaths directive above.
    This makes /etc/audit only accessible by augenrules.service and
    let auditd.service (and daemon) to be sandboxed again.
  - Update audit-secondary.spec to accomodate the new service file.
* Mon Sep 20 2021 ematsumiya@suse.com
  - Fix hardened auditd.service (bsc#1181400)
    * add fix-hardened-service.patch
      Make /etc/audit read-write from the service.
      Remove PrivateDevices=true to expose /dev/* to auditd.service.
  - Enable stop rules for audit.service (cf. bsc#1190227)
    * add enable-stop-rules.patch
* Thu Sep 16 2021 ematsumiya@suse.com
  - Change default log_format from ENRICHED to RAW (bsc#1190500):
    * add change-default-log_format.patch (SUSE-specific patch)
  - Update to version 3.0.5:
    * In auditd, flush uid/gid caches when user/group added/deleted/modified
    * Fixed various issues when dealing with corrupted logs
    * In auditd, check if log_file is valid before closing handle
  - Include fixed from 3.0.4:
    * Apply performance speedups to auparse library
    * Optimize rule loading in auditctl
    * Fix an auparse memory leak caused by glibc-2.33 by replacing realpath
    * Update syscall table to the 5.14 kernel
    * Fixed various issues when dealing with corrupted logs
* Mon Aug 16 2021 meissner@suse.com
  - harden_auditd.service.patch: automatic hardening applied to systemd
    services
* Fri Jul 30 2021 ematsumiya@suse.com
  - Update to version 3.0.3:
    * Dont interpret audit netlink groups unless AUDIT_NLGRP_MAX is defined
    * Add support for AUDIT_RESP_ORIGIN_UNBLOCK_TIMED to ids
    * Change auparse_feed_has_data in auparse to include incomplete events
    * Auditd, stop linking against -lrt
    * Add ProtectHome and RestrictRealtime to auditd.service
    * In auditd, read up to 3 netlink packets in a row
    * In auditd, do not validate path to plugin unless active
    * In auparse, only emit config errors when AUPARSE_DEBUG env variable exists
  - use https source urls
* Mon Jun 14 2021 ematsumiya@suse.com
  - Adjust audit.spec and audit-secondary.spec to support new version
  - Include fix for libev
    * add libev-werror.patch
  - Update to version 3.0.2
  - In audispd-statsd pluging, use struct sockaddr_storage (Ville Heikkinen)
  - Optionally interpret auid in auditctl -l
  - Update some syscall argument interpretations
  - In auditd, do not allow spaces in the hostname name format
  - Big documentation cleanup (MIZUTA Takeshi)
  - Update syscall table to the 5.12 kernel
  - Update the auparse normalizer for new event types
  - Fix compiler warnings in ids subsystem
  - Block a couple signals from flush & reconfigure threads
  - In auditd, don't wait on flush thread when exiting
  - Output error message if the path of input files are too long ausearch/report
    Included fixes from 3.0.1
  - Update syscall table to the 5.11 kernel
  - Add new --eoe-timeout option to ausearch and aureport (Burn Alting)
  - Only enable periodic timers when listening on the network
  - Upgrade libev to 4.33
  - Add auparse_new_buffer function to auparse library
  - Use the select libev backend unless aggregating events
  - Add sudoers to some base audit rules
  - Update the auparse normalizer for some new syscalls and event types
    Included fixes from 3.0
  - Generate checkpoint file even when no results are returned (Burn Alting)
  - Fix log file creation when file logging is disabled entirely (Vlad Glagolev)
  - Convert auparse_test to run with python3 (Tomáš Chvátal)
  - Drop support for prelude
  - Adjust backlog_wait_time in rules to the kernel default (#1482848)
  - Remove ids key syntax checking of rules in auditctl
  - Use SIGCONT to dump auditd internal state (#1504251)
  - Fix parsing of virtual timestamp fields in ausearch_expression (#1515903)
  - Fix parsing of uid & success for ausearch
  - Add support for not equal operator in audit by executable (Ondrej Mosnacek)
  - Hide lru symbols in auparse
  - Add systemd process protections
  - Fix aureport summary time range reporting
  - Allow unlimited retries on startup for remote logging
  - Add queue_depth to remote logging stats and increase default queue_depth size
  - Fix segfault on shutdown
  - Merge auditd and audispd code
  - Close on execute init_pipe fd (#1587995)
  - Breakout audisp syslog plugin to be standalone program
  - Create a common internal library to reduce code
  - Move all audispd config files under /etc/audit/
  - Move audispd.conf settings into auditd.conf
  - Add queue depth statistics to internal state dump report
  - Add network statistics to internal state dump report
  - SIGUSR now also restarts queue processing if its suspended
  - Update lookup tables for the 4.18 kernel
  - Add auparse_normalizer support for SOFTWARE_UPDATE event
  - Add 30-ospp-v42.rules to meet new Common Criteria requirements
  - Deprecate enable_krb and replace with transport config opt for remote logging
  - Mark netlabel events as simple events so that get processed quicker
  - When auditd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
  - In aureport, fix segfault in file report
  - Add auparse_normalizer support for labeled networking events
  - Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
  - In ausearch/auparse, event aging is off by a second
  - In ausearch/auparse, correct event ordering to process oldest first
  - Migrate auparse python test to python3
  - auparse_reset was not clearing everything it should
  - Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
  - In ausearch/report, lightly parse selinux portion of USER_AVC events
  - Add bpf syscall command argument interpretation to auparse
  - In ausearch/report, limit record size when malformed
  - Port af_unix plugin to libev
  - In auditd, fix extract_type function for network originating events
  - In auditd, calculate right size and location for network originating events
  - Make legacy script wait for auditd to terminate (#1643567)
  - Treat all network originating events as VER2 so dispatcher doesn't format it
  - If an event has a node name make it VER2 so dispatcher doesnt format it
  - In audisp-remote do an initial connection attempt (#1625156)
  - In auditd, allow expression of space left as a percentage (#1650670)
  - On PPC64LE systems, only allow 64 bit rules (#1462178)
  - Make some parts of auditd state report optional based on config
  - Update to libev-4.25
  - Fix ausearch when checkpointing a single file (Burn Alting)
  - Fix scripting in 31-privileged.rules wrt filecap (#1662516)
  - In ausearch, do not checkpt if stdin is input source
  - In libev, remove __cold__ attribute for functions to allow proper hardening
  - Add tests to configure.ac for openldap support
  - Make systemd support files use /run rather than /var/run (Christian Hesse)
  - Fix minor memory leak in auditd kerberos credentials code
  - Allow exclude and user filter by executable name (Ondrej Mosnacek)
  - Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
  - In ausearch/report fix --end to use midnight time instead of now (#1671338)
  - Add substitue functions for strndupa & rawmemchr
  - Fix memleak in auparse caused by corrected event ordering
  - Fix legacy reload script to reload audit rules when daemon is reloaded
  - Support for unescaping in trusted messages (Dmitry Voronin)
  - In auditd, use standard template for DEAMON events (Richard Guy Briggs)
  - In aureport, fix segfault for malformed USER_CMD events
  - Add exe field to audit_log_user_command in libaudit
  - In auditctl support filter on socket address families (Richard Guy Briggs)
  - Deprecate support for Alpha & IA64 processors
  - If space_left_action is rotate, allow it every time (#1718444)
  - In auparse, drop standalone EOE events
  - Add milliseconds column for ausearch extra time csv format
  - Fix aureport first event reporting when no start given
  - In audisp-remote, add new config item for startup connection errors
  - Remove dependency on chkconfig
  - Install rules to /usr/share/audit/sample-rules/
  - Split up ospp rules to make SCAP scanning easier (#1746018)
  - In audisp-syslog, support interpreting records (#1497279)
  - Audit USER events now sends msg as name value pair
  - Add support for AUDIT_BPF event
  - Auditd should not process AUDIT_REPLACE events
  - Update syscall tables to the 5.5 kernel
  - Improve personality interpretation by using PERS_MASK
  - Speedup ausearch/report parsing RAW logging format by caching uid/name lookup
  - Change auparse python bindings to shared object (Issue #121)
  - Add error messages for watch permissions
  - If audit rules file doesn't exist log error message instead of info message
  - Revise error message for unmatched options in auditctl
  - In audisp-remote, fixup remote endpoint disappearin in ascii format
  - Add backlog_wait_time_actual reporting / resetting to auditctl (Max Englander)
  - In auditctl, add support for sending a signal to auditd
  - Removes audit-fno-common.patch: fixed in upstream
  - Removes audit-python3.patch: fixed in upstream
* Mon Feb 01 2021 dimstar@opensuse.org
  - Do not explicitly provide group(audit) in system-users-audit:
    this is automatically handled by rpm/providers.
* Thu Jan 28 2021 ematsumiya@suse.com
  - Create new "audit" group for read access to logs (bsc#1178154)
    * add change-default-log_group.patch
    * update audit-secondary.spec
* Wed Dec 02 2020 abergmann@suse.com
  - Enable Aarch64 processor support. (bsc#1179515 bsc#1179806)
* Fri Oct 16 2020 lnussel@suse.de
  - prepare usrmerge (boo#1029961)
* Mon Jan 13 2020 tonyj@suse.com
  - Update to version 2.8.5:
    * Fix segfault on shutdown
    * Fix hang on startup (#1587995)
    * Add sleep to script to dump state so file is ready when needed
    * Add auparse_normalizer support for SOFTWARE_UPDATE event
    * Mark netlabel events as simple events so that get processed quicker
    * When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
    * Add 30-ospp-v42.rules to meet new Common Criteria requirements
    * Update lookup tables for the 4.18 kernel
    * In aureport, fix segfault in file report
    * Add auparse_normalizer support for labeled networking events
    * Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
    * Event aging is off by a second
    * In ausearch/auparse, correct event ordering to process oldest first
    * auparse_reset was not clearing everything it should
    * Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
    * In ausearch/report, lightly parse selinux portion of USER_AVC events
    * In ausearch/report, limit record size when malformed
    * In auditd, fix extract_type function for network originating events
    * In auditd, calculate right size and location for network originating events
    * Treat all network originating events as VER2 so dispatcher doesn't format it
    * In audisp-remote do an initial connection attempt (#1625156)
    * In auditd, allow expression of space left as a percentage (#1650670)
    * On PPC64LE systems, only allow 64 bit rules (#1462178)
    * Make some parts of auditd state report optional based on config
    * Fix ausearch when checkpointing a single file (Burn Alting)
    * Fix scripting in 31-privileged.rules wrt filecap (#1662516)
    * In ausearch, do not checkpt if stdin is input source
    * In libev, remove __cold__ attribute for functions to allow proper hardening
    * Add tests to configure.ac for openldap support
    * Make systemd support files use /run rather than /var/run (Christian Hesse)
    * Fix minor memory leak in auditd kerberos credentials code
    * Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
    * In ausearch/report fix --end to use midnight time instead of now (#1671338)
  - Fix build errors when using gcc-10 no-common default (bsc#1160384)
    New patch: audit-fno-common.patch
  - Refresh audit-allow-manual-stop.patch
* Thu Mar 21 2019 jengelh@inai.de
  - Reduce scriptlets' hard dependency on systemd.
* Sat Jun 23 2018 antoine.belvire@opensuse.org
  - Update to version 2.8.4:
    * Generate checkpoint file even when not results are returned
      (Burn Alting).
    * Fix log file creation when file logging is disabled entirely
      (Vlad Glagolev).
    * Use SIGCONT to dump auditd internal state (rh#1504251).
    * Fix parsing of virtual timestamp fields in ausearch_expression
      (rh#1515903).
    * Fix parsing of uid & success for ausearch.
    * Hide lru symbols in auparse.
    * Fix aureport summary time range reporting.
    * Allow unlimited retries on startup for remote logging.
    * Add queue_depth to remote logging stats and increase default
      queue_depth size.
* Sun Jun 17 2018 antoine.belvire@opensuse.org
  - Update to version 2.8.3:
    * Correct msg function name in lru debug code.
    * Fix a segfault in auditd when dns resolution isn't available.
    * Make a reload legacy service for auditd.
    * In auparse python bindings, expose some new types that were
      missing.
    * In normalizer, pickup subject kind for user_login events.
    * Fix interpretation of unknown ioctcmds (rh#1540507).
    * Add ANOM_LOGIN_SERVICE, RESP_ORIGIN_BLOCK, &
      RESP_ORIGIN_BLOCK_TIMED events.
    * In auparse_normalize for USER_LOGIN events, map acct for
      subj_kind.
    * Fix logging of IPv6 addresses in DAEMON_ACCEPT events
      (rh#1534748).
    * Do not rotate auditd logs when num_logs < 2 (brozs).
* Tue Apr 03 2018 kukuk@suse.de
  - Use %license instead of %doc [bsc#1082318]
* Fri Mar 16 2018 tonyj@suse.com
  - Change openldap dependency to client only (bsc#1085003)
  - Resolve issue with previous change if both Python2 and Python3 are
    present, tests were failing as python2 bindings are preferred in this
    case.
* Thu Feb 22 2018 meissner@suse.com
  - reverted -j1 force ppc specific only
* Wed Feb 07 2018 tchvatal@suse.com
  - Add patch to fix test run without python2 interpreter:
    * audit-python3.patch
  - Update to 2.8.2 release:
    * Update tables for 4.14 kernel
    * Fixup ipv6 server side binding
    * AVC report from aureport was missing result column header (#1511606)
    * Add SOFTWARE_UPDATE event
    * In ausearch/report pickup any path and new-disk fields as a file
    * Fix value returned by auditctl --reset-lost (Richard Guy Briggs)
    * In auparse, fix expr_create_timestamp_comparison_ex to be numeric field
    * Fix building on old systems without linux/fanotify.h
    * Fix shell portability issues reported by shellcheck
    * Auditd validate_email should not use gethostbyname
* Tue Feb 06 2018 normand@linux.vnet.ibm.com
  - force -j1 for PowerPC make check to avoid build failure
    (lookup_test.o: file not recognized: File truncated)
* Wed Jan 17 2018 tchvatal@suse.com
  - Add conditions around python plugins to allow us to conditionalize
    them in enviroment without python2
* Thu Nov 09 2017 mpluskal@suse.com
  - Rename python binding packages to match current python packaging
    standards
  - Update python build dependencies to resolve future split of
    python2/3
* Sat Nov 04 2017 aavindraa@gmail.com
  - Update to version 2.8.1. See audit.spec (libaudit1) for upstream
    changelog
  - Remove audit-implicit-writev.patch (fixed upstream across 2
    commits)
    * 3b30db20ad983274989ce9a522120c3c225436b3
    * 07132c22314e9abbe64d1031fd8734243285bb3f
  - Cleanup with spec-cleaner
* Fri Aug 18 2017 dimstar@opensuse.org
  - Add audit-implicit-writev.patch: include sys/uio.h to ensure
    readv and writev are declared.
* Mon Jul 24 2017 jengelh@inai.de
  - Rectify RPM groups, diversify descriptions.
  - Remove mentions of static libraries because they are not built.
* Tue Jul 18 2017 tonyj@suse.com
  - Update to version 2.7.7. See audit.spec (libaudit1) for upstream
    changelog
    Since commit 6cf57d27 (2.7.4) audit is now started as an non-forking
    service (bsc#1042781).
    Add config: audit-stop.rules
    Refresh patch: audit-allow-manual-stop.patch
    Refresh patch: audit-no-gss.patch
* Fri Apr 01 2016 tchvatal@suse.com
  - Version update to 2.5. See audit.spec (libaudit1) for upstream
    changelog
  - Cleanup with spec-cleaner
  - Sort out bit /sbin /usr/sbin/ installation
  - Install the rules as documentation
  - Remove needless %py_requires from python subpkgs
* Fri Aug 21 2015 tonyj@suse.com
  - Update to version 2.4.4. See audit.spec (libaudit1) for upstream
    changelog
  - Add python3 bindings for libaudit and libauparse
  - Remove patch 'audit-no_m4_dir.patch'
    (added Fri Apr 26 11:14:39 UTC 2013 by mmeister@suse.com)
    No idea what earlier 'automake' build error this was trying to fix but
    it broke the handling of "--without-libcap-ng". Anyways, no build error
    occurs now and m4 path is also needed in v2.4.4 to find ax_prog_cc_for_build

Files

/etc/audit
/etc/audit.rules
/etc/audit/audit-stop.rules
/etc/audit/auditd.conf
/etc/audit/plugins.d
/etc/audit/plugins.d/af_unix.conf
/etc/audit/plugins.d/syslog.conf
/etc/audit/rules.d
/etc/audit/rules.d/audit.rules
/etc/auditd.conf
/sbin/audisp-syslog
/sbin/auditctl
/sbin/auditd
/sbin/augenrules
/sbin/aureport
/sbin/ausearch
/sbin/autrace
/usr/bin/aulast
/usr/bin/aulastlog
/usr/bin/ausyscall
/usr/bin/auvirt
/usr/lib/systemd/system/auditd.service
/usr/lib/systemd/system/augenrules.service
/usr/sbin/audisp-syslog
/usr/sbin/auditctl
/usr/sbin/auditd
/usr/sbin/augenrules
/usr/sbin/aureport
/usr/sbin/ausearch
/usr/sbin/autrace
/usr/sbin/rcauditd
/usr/share/audit
/usr/share/audit/sample-rules
/usr/share/audit/sample-rules/10-base-config.rules
/usr/share/audit/sample-rules/10-no-audit.rules
/usr/share/audit/sample-rules/11-loginuid.rules
/usr/share/audit/sample-rules/12-cont-fail.rules
/usr/share/audit/sample-rules/12-ignore-error.rules
/usr/share/audit/sample-rules/20-dont-audit.rules
/usr/share/audit/sample-rules/21-no32bit.rules
/usr/share/audit/sample-rules/22-ignore-chrony.rules
/usr/share/audit/sample-rules/23-ignore-filesystems.rules
/usr/share/audit/sample-rules/30-nispom.rules
/usr/share/audit/sample-rules/30-ospp-v42-1-create-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-1-create-success.rules
/usr/share/audit/sample-rules/30-ospp-v42-2-modify-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-2-modify-success.rules
/usr/share/audit/sample-rules/30-ospp-v42-3-access-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-3-access-success.rules
/usr/share/audit/sample-rules/30-ospp-v42-4-delete-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-4-delete-success.rules
/usr/share/audit/sample-rules/30-ospp-v42-5-perm-change-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-5-perm-change-success.rules
/usr/share/audit/sample-rules/30-ospp-v42-6-owner-change-failed.rules
/usr/share/audit/sample-rules/30-ospp-v42-6-owner-change-success.rules
/usr/share/audit/sample-rules/30-ospp-v42.rules
/usr/share/audit/sample-rules/30-pci-dss-v31.rules
/usr/share/audit/sample-rules/30-stig.rules
/usr/share/audit/sample-rules/31-privileged.rules
/usr/share/audit/sample-rules/32-power-abuse.rules
/usr/share/audit/sample-rules/40-local.rules
/usr/share/audit/sample-rules/41-containers.rules
/usr/share/audit/sample-rules/42-injection.rules
/usr/share/audit/sample-rules/43-module-load.rules
/usr/share/audit/sample-rules/44-installers.rules
/usr/share/audit/sample-rules/70-einval.rules
/usr/share/audit/sample-rules/71-networking.rules
/usr/share/audit/sample-rules/99-finalize.rules
/usr/share/audit/sample-rules/README-rules
/usr/share/doc/packages/audit
/usr/share/doc/packages/audit/ChangeLog
/usr/share/doc/packages/audit/README
/usr/share/doc/packages/audit/auditd.cron
/usr/share/licenses/audit
/usr/share/licenses/audit/COPYING
/usr/share/man/man5/auditd.conf.5.gz
/usr/share/man/man5/ausearch-expression.5.gz
/usr/share/man/man7/audit.rules.7.gz
/usr/share/man/man8/auditctl.8.gz
/usr/share/man/man8/auditd.8.gz
/usr/share/man/man8/augenrules.8.gz
/usr/share/man/man8/aulast.8.gz
/usr/share/man/man8/aulastlog.8.gz
/usr/share/man/man8/aureport.8.gz
/usr/share/man/man8/ausearch.8.gz
/usr/share/man/man8/ausyscall.8.gz
/usr/share/man/man8/autrace.8.gz
/usr/share/man/man8/auvirt.8.gz
/var/log/audit
/var/log/audit/audit.log
/var/spool/audit


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 19:51:39 2024