T?T> VLHV V-wdV#^a>^a-wdircleanupreclassify_segreclassify_dirlinkage_errorreclassify_sys_segThis command requires privileged access not given to this user. @G@H@{(@|(@}(@@P%@ @@~{@ P%@ @@~|@ 'P%@ @@~}@@@@@@@B@@F@@@$PP@F@F@@~@@@@@$P P@@PB@ F` F`B(@I@@s@@@@@B@@@@@@F@@@$P P@F@Ӂ x@ B@P'@@_@ I@P'@@H@@@$PP@G@@@$PP@|@=@I@@s@@@@F@@,@)@&@)@@$PP@@@@@@@B@@F@@@$PP@F@5$PNPy}@@I@@s@@@@F@@@@@@@P@}(@.I@@s@@D@@F@@@@@@@P@F@IB@V@D@@@P@F@@@@@@@ $PP@F@2{@I@@s@@D@@F@@@@@@@$PP@}@I@@s@@D@@F@@@@@@@$PP@F@# F@I @@I@F@@~@ª@@Ī@I@ƪ@s@Ȫ@ʪ@̪@vΪ@yЪ@vҪ@@$P P@G@F@@@$PP@H@F@@@$P P@@(@@@z@@@@~@ª@@Ī@Mƪ@SȪ@Hʪ@@ $P P@@T?TTV V-wdT #V-wdircleanupreset_sooslinkage_errorThis command requires privileged access not given to this user.P%@v@w@x@@@@@@@B@@C@@@P@C@ϟ@os@C@@@@@@@$P P@@@PB@ F` F`B(@B@V@@@D@@n@@C@@@@@@@@$P"P@C@ B@V@@os@^a@C@@@@@@@P@@~@x@@@@$P P@@ {@z @P'@@g@ @P'@V@v@@@$PP@x@@@$P$P@w@@@$PP@D@@n@@C@@;@4@6@@ $P&P@C@,3@os@^a@D@@n@@@@"@@@@ $P(P@C@@@@@@@@@ @@@@$P P@v@C@@@$PP@x@C@@@$P*P@w@C@@@$P P@@(@@os@@@@@@@@@@@@@@@ $P P@@set_system_privT?T(VT^rcprcpsoos^segseg^dirdir^ipcipcTTV#^comm^ring1ring1^soos^communicationscommunicationslinkage_error^/Accessing argument ^d.Privilege already in state requested: ^aThis command requires privileged access not given to this user.^/Usage: set_system_priv privnames^/^7xwhere a privname can be: ipc, dir, seg, soos, ring1, rcp, or comm.^/^7xEach may be preceeded by "^" for negation.πP%@E@R@C@T@P@,P@C@C@X@|Z@\@^@V@$P P@@E@@@`$PP@h@`@@z@w@t@@  P@@ @H ܀@P'@@E@N@F@F@NN@F@X@@@Z@B@\@C@^@V@$PP@C@`P@`R@`T@C@b@,d@P@f@F@h@<j@9l@5n@2p@`@$P P@@@PB@ F`' D@R@P@$P.P@ F` D@R@P@$P0P@ F`  D@R@P@$PP@ F` D@R@P@$PP@ F` D@R@P@$P$P@ F` D@R@P@$P*P@ F` D@R@P@$PP@z F` D@R@P@$P P@n F` D@R@P@$P2P@b F` D@R@P@$P4P@V F` D@R@P@$P6P@J F` D@R@P@$P8P@> F` F` D@R@P@$P:P@. F` F` D@R@P@$PPC@B@VO@^a@C@b@[d@@f@@h@kj@hl@Yn@O@p@`@ P@D@B@VO@@@v(V(V@@@P@C@O@@@$P@P@F,@@O(@@@l@`@O@@+@`@@,@:@'@@ $P P@@V?VT$-usa-nsaT"-saT-cchTTT4T*T2TT'V VLHLT/T,TT&#-nusa-ncchsystem_low-covert_channelL@$-unsuccessful_access-successful_access-no_covert_channel threshold = ^a.-no_unsuccessful_access-no_successful_accessnext control argumentset_system_audit_flagsdisplay_system_audit_flagscovert channel threshold stringUnable to get argument count.unsuccessful access threshold stringsuccessful access threshold stringIllegal covert channel threshold ^w ^w.Could not set access audit parameters.Illegal unsuccessful access threshold ^w ^w.Illegal successful access threshold ^w ^w.No arguments are recognized by this command.Covert channel auditing ^[enabled,^;disabled.^]Unsuccessful access auditing ^[enabled,^;disabled.^]Successful access auditing ^[enabled,^;disabled.^]PP%@$PP%@ @@iL OT@@@$PBP@i@@@B@@D@@F@@H@@J@@@@@$PDP@@@@((@G@@PP%@EPP%@ @@:L @@@@@$P,P@@@(@@@z,,m@ @@@$PFP@@HP@@B@JPD@LP@@@@F@NPH@PP@@J@@@@@e00@Ҫ@@@Ԫ@֪@ت@Б@$P@P@@@GB@ܪ@Z@ު@@@@@@ڑ@ $PRP@ F@ZJ @@ Z@@@((@@L@@@@B@@@@@@@$P P@@@a.@@ƪ@Z@Ȫ@pʪ@q̪@đ@$P@P@@@%44@Ҫ@D@Ԫ@_֪@cت@Б@$P@P@D@GF@ܪ@Z@ު@@@R@O@T@ڑ@ $PRP@ F@Z @@O Z@@@,,@@L@@@@F@@9@/@)@@@@$P P@K@K@a.@@ƪ@Z@Ȫ@ʪ@̪@đ@$P@P@@@44@Ҫ@H@Ԫ@֪@ ت@Б@$P@P@H@GJ@ܪ@Z@ު@@@@@@ڑ@ $PRP@ F@Z @@ Z@@@e,,@@L@@@@J@@@@@@@$P P@@@a.@@ƪ@Z@Ȫ@ʪ@̪@đ@$P@P@@@@@T@@@@@ $PTP@@@@ )@@N$PP@@@ @ @@@ָ@@N@l@@@XPV@ F` F`y @@ @W@@Q F` F`|@(@G F` F`\ @@$$@<D@6 F` F`ID(@, F`h F`> @@$$@!H@ F`k F`DH(@V@V@$PVP@@@4 @@ @@@h,@@@@A@P@@,@PP@P@P@@@(V@V@PP@XP@@ @"@@$@&@@ $PXP@@V@V@@@XP@ @@"@@@+@@@A@P@(@@,@X@.@V@0@@2@T@4@*@$PZP@@@,@PP.@0@P@P2@*@@@@@A@P@6@PP:@L@<@P>@@@B@P@PD@8@ $P P@!!J!!F!!B!!!!!!!!!admin_op priv_op fault small_cc moderate_cc Administrative_Operation Privileged_Operation ACV/IPR_Fault Small_Covert_Channel Moderate_Covert_Channel N MAM R No_Audit Modify_Access Modify Read fsobj fsattr rcp admin special other File_System_Object File_System_Attribute RCP_Object Administrative_Object Special_Object Other_Object ^va ^va ^va LTVV 4VVV TT^/^aT T TVTN#L$V?ObjectDeny LevelGrant LevelAudited Events:^[^14t^^^;^15t^]^aABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzA@?aP&@PP^@"PP\@P`@Pb@I(@aP&@PP^@"PP\@P`@Pb@`PI@J(@\P@L@^PN@t`.@.@@>B@N~@hB@L(@NPL@t`.@.@@>C@N~L@C@=@@ER@B@C>@@\P@~@>P@t`z.@.@@>$PVPJ@L@AJ@?R@L@P@H(@J(@H@8J@6RPP@t`V.@.@@>D@NPN@$PVPJ@Z@D@P@X@H@~X@ZPT`@=.@.@>0H@ЁJ@΁X@>@J@bPI@`P@@A?P&@PP`@P^@"P@P\@Pb@J(@`PI@K(@֝@*d@A@ A@dN@A,@e@@@ @@eN@r@,@\P@KN@@$P\PJ@ ^PK@ `@`L$PVPJ@J@bP@@A>?dP&@"PP@@P@P`@@Pb@J(@`PI@מ@T@PPV@֝@lT@E@Nu >@.@.@@@ ~@@>@T@T@V@ٞ@i@؝@ `@$ E@@@@@@el@VP@E@@F@@@@G@@@@G@@@@@@@@y@s@@ @n@k@h @@$$P^P@ @C0f@A@ A@fN@EBA,@T@E@V@M@_@_@@@VP@E@@@@>@@@C@7@@$P^P@g@@@@@gN@ Y@,@$PVPJ@J@bPמ@T~@PP@$P\PbP@PP(@"PP@@@VP@@i@P@P `p`g@h@X@ N$PVPJ@jZP F@~ x(@~!@T @!@i@&@ `@`0@(@ @,@2@.@$@@2@@0P @@`n  @x@V @@&@0@(@ @,@2@.@$@@2@@0P @@`n  @w(@v@v@N"w@ &@0@(@,@ @.@$@@ @@0P `F@n  @w@v@O0@xIv,@w@$PVPJ@h@z@X@(N$PVPJ@z@ZPT`=.@.@>@NXN@~4@T3@4@i@:@ `@`D@<@3@@@5@B@8@O@5@@DP @@`( @(@@@N @:@D@<@H@@3@B@8@1@3@@DP `F@( @@@@,@@$PVPJ@@ZP@F@X@~@@V3@@:@P<@%>@3@@@8@@z@@@A@P@F@ N$PVPJ@PPT`@/.@.@>$PVPJ@F@T`@/.@.@H@TG@H@i@N@ `@`@X@P@G@T@I@V@L@@I@@XP @@`  @P@PF@T`/.@.@>I@F@I~@H@TG@H@i@N@I@ `@eJ@P@G@T@I@V@L@@I@@JP @@`  @ F@ 6<(@(@@N2@0@FN@J@P@T@G@V@L@@G@@JP `F@  @@P@P@F.@O0@.H@PN@N$PVPJ@,@@$PVPJ@ F@ =(@(@ @N2@0@FN@J@P@XT@G@V@L@B@G@@JP `F@  @@P@P@F.@O0@.H@PN@N$PVPJ@,@@$PVPJ@@@@PPP@EP@P@P@.P@@@I@Z@@P@0@@@0F.$.@\@FNP@0@@\@@0O.$.@FNP@0@@P@0@@@@K@ F`L|K@NK,@ F@xLP@0FH.$.@Fu>@.@.@@_@_~@@0OH.$.@]@F_@u>@.@.@@`@`~@`@Pa@u@>@.@.@@b@b~@b@a@K@b>@i@K@ `@`LK@b@ n@-b@>a@@b@ E@-a@`>@b@@a@_@`@ e@.b@>a@@b@ E@a@]>@b@@a@]@ e@,b@NK@ `@`L @@@@K@ F`LK@NK,@ F@LP6OIK@NK,@ F@LPc@u@ >@.@.@@d@ d~@d@c@K~@dN@d@K@K.@ m@.L@¨@F(@@Ȟ@Ne@u@ >@.@.@@f@ f~@E@FN@F@,@G(@(@ Ȟ@Nf@u@>@.@.@@g@g~@E@GN@G@,@ˆ@ʨ@̪@T@E@T@Vh@PP@0FH.$.@F@0OH.$.@Fn@VPp@E@r@F@t@v@G@x@ z@G@|@~@@@h@@@@@@@@l@$$P^P@ʈ@Ш@Ҫ@T@E@T@V@@@^a@P@0OI.$.@@@P@@VP@E@@@@@@@@@@@@$P^P@qЈ@  !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~!V!T!E!@!A!!R!P!!N!L!/^^/=,L$PP%@PP@@PA@B(@E@C@C@EN@+@0F@.$.@FH@@0O?.$.@FHN@H@F.@O0@.A@0O@.$.@FH@@0O?.$.@FHN@H@F.@O0@.AC,@F@D@ D@FN@@0FAH$@0F@.$.@H@.@F0@.BD,@B@PP@sys_admin_data >udd>SysAdmin>admin @Enter audit flags string or "." to exit.^/ TTNTnoneallVT5TT-bf-lgT"V?TTTT)TV 4TT#VLL$VTTVcleanupdefault-brief-long?#Input was: ^a.enter flags: Could not open ^a.^/new flags: ^acurrent flags: ^aedit_process_audit_flagsset_process_audit_flagsUsage is: ^a {FLAGS_STR}Usage is: ^a {-long|-brief}display_process_audit_flagsUnexpected error getting arg.Process audit flags in error.Unexpected error getting argument.Internal error: converted flags in error.Internal error: Error occurred during error handling. @(@(@@@@@(@*@'@$@!@@@@ @ЗP%@ ЗP%@J@@@$PBP@@@@zP(@ЗP%@ЗP%@J@@@$PBP@@@^@\P@ @@QϸN@@@$P`P@ F@Q @Q@@N@@ @@ @"@$@@ @~N@@@$PbP@N@@Q@@O@@ @"@$@@ $P@O@@@C  O@*@@,@0@2@(@@@@a@@*@Q@,@.@0@(@$P@P@ @@Q@׭@׭@׭@@u2>@.@.@@ @2 ~@@ F@Qke@4@ȟ@ȟ@4@8@Q@:@@@<@@>@@@B@D@F@6@$PdP@ F@QLހ @Q@@N@@ @@ @"@$@@ @N@@Q@@O@@} @y"@v$@@ $P@O@@@,(,O@@(@@f @^"@@K@@@@*@Q@,@P.@V0@(@$P@P@N@@@$PbP@@6ЗP%@;ЗP%@J@@@$PBP@@@u(@YzN@@@$P`P@ @@Qѝ@ (@N@8@Q@:@ @<@O@>@@@B@D@ F@6@$Pi@N@@Q@@O@@ @"@$@@ $P@O@@@G ( O@@(@@ @"@@@^a @ @*@Q@,@.@0@(@$P@P@@@@@A@P@H@PP @@`@@ @L@O@N@J@$P,P@O@ O@R@V@P@@@@(@Ҟ@@@@N@9@Z@L@\@H@^@O@`@J@b@X@$PZP@O@@@$X$O@f@X@h@l@n@d@s@LPH@ F` F`s@  F` F`g(@,@@@@d$PVPr@d@t@@@v@cz@R|@[~@p@ F@@@Ҟ@N*(@@@L@@H@@O@@J@@@$PZP@O@@@ O@@@@9@6@@@LPH@ @@`Q@(@@@b@@@@@@@@@@@ @@E P'@B@K P'@B(@G@ȫ@@D@Ϊ@̑@$PBP@@@Ҫ@@@Ԫ@C@֪@F@ت@D@ڪ@Б@$PZP@F@@@Y88F@@ P@@@@@@@@@ $P P@@ʞ@V@@@@@D@@@@@@P@@@@@@ @ @@@@@@@@@$PfP@ʞ@V@@P@ P@@@P@@@@@@ $P P@B@@@@@A@P@@PP F`@P@@s@o F`@aP@@@d F`@UP@@@YP@P@P@O@@PP@X@S@@ $Px@P@P@O@@PP@E@@@@ $Pe@O@0PPH@H@O@ª@@Ī@Pƪ@)ʪ@̪@P@PΪ@@ @2@2@O@ª@@Ī@Pƪ@ʪ@̪@P@PΪ@@ @@VP'@ P@@B ^@P'@.@W@@J@L@N@ P@P@@@R@O@T@V@X@Z@\@^@`@H@$PhP@ PO@*H@J@a.L@r@h@b@@@@@@ $P(P@ PO@@H@@b@@@@@@ @ P@@PP.@@@k`P'@ P PP@@@@0@ P P@B(@@@F@B@H@YJ@O@L@{N@cP@bR@xT@D@jP@@@@$@ @@P@@@(P@!(s!!.  bound_security_tools_ symbol_table bind_map ?`reclassify_dir'L`#reclassify_segB Y`*reclassify_sys_seg023cu_arg_ptr688com_err_<>> expand_path_I'Elinkage_error.1BL cleanup.2PRWsystem_privilege_ soos_priv_on\R^ dir_priv_onbRdreclassify_branchjlp error_table_noargsuwhcs_get_access_class}convert_authorization_ from_stringRreclassify_nodeR*R dir_priv_offR soos_priv_off` reset_soosexpand_pathname_\EkLR seg_priv_onRcheck_mode_reset pathname_R seg_priv_offo`set_system_priv2 arg_countER ipc_priv_onR ipc_priv_offR ring1_priv_onRring1_priv_offR rcp_priv_onR rcp_priv_offR comm_priv_onR comm_priv_offlbadoptioa_$"ssaf@`'set_system_audit_flags.20 arg_list_ptr579hphcs_set_sys_audit_thresholdsE$Cdsaf@`Hdisplay_system_audit_flagsPRUsys_infoaudit_covert_channel\R^covert_channel_thresholdfRhaudit_successful_accessoRqsuccessful_access_thresholdyR{audit_unsuccessful_accessRunsuccessful_access_thresholdconvert_access_class_to_string_short2 arg_count_rellbad_arg2 arg_ptr_rele'convert_access_audit_flags_$from_stringx,convert_access_audit_flags_$edit_from_string%convert_access_audit_flags_$to_stringlsmallargi*convert_access_audit_flags_$to_string_longrsnpx! lowercase`merge_access_audit_flags_  `set_process_audit_flags  spaf 4epaf6 <`edit_process_audit_flags!&access_audit_gate_get_process_audit_flags-R022command_query_; 79dpafE6 ?`>display_process_audit_flagsK; fH FATAL_ERRORVE oNWARNINGQS general_rs^K uYGET_DEFAULT_FLAGSkV a cleanup.1egginitiate_file_^ nCLEAN_UPrttterminate_file_{e@xx@~edit_from_string{@ to_stringi@to_string_longI'HEconvert_access_audit_flags_$;Ex{ '  2l&/&5&;&O&[&a&i&r&|&&&&&&&&&&&&&&&&&&&&&-&4&O&[&e&n&x&&&&&&&&&&,&/&P&d&qbind_map Lp NJbinder @Multics Binder, Version 12 of Tuesday, March 26, 1985 symbtreeKMR#KʴzJ,PL/I 6"' ,;@sGVipGGMultics PL/I Compiler, Release 28d, of October 4, 1983GJohnson.SysMaint.moptimize list2"[-Ky>spec>temp>41-5>reclassify_dir.pl1pl1info Creclassify_dirsymbtreeMx NJ΍rPL/I 3!& *<lGSbiGGMultics PL/I Compiler, Release 29, of July 28, 1986GJohnson.SysMaint.aoptimize map0/q80NJԀ>special_ldd>install>MR12.2-1022>reset_soos.pl1pl1info D reset_soossymbtreeKMR#KʴPL/I 6"' ,;yGXlvGGMultics PL/I Compiler, Release 28d, of October 4, 1983GJohnson.SysMaint.moptimize list2#[-Ky>spec>temp>41-5>set_system_priv.pl1pl1info Cset_system_privsymbtreeKMR#Kʴ+PL/I 6"' ,=dKcxKKMultics PL/I Compiler, Release 28d, of October 4, 1983GJohnson.SysMaint.moptimize list2*[-Ky>spec>temp>41-5>set_system_audit_flags.pl1pl1info Eset_system_audit_flagssymbtreeKMR#KʴFSCPL/I 6"' ,\dkkkMultics PL/I Compiler, Release 28d, of October 4, 1983GJohnson.SysMaint.moptimize list:/[-KyF+[-K}4Q+[-K}>spec>temp>41-5>convert_access_audit_flags_.pl1>spec>temp>41-5>access_audit_flags.incl.pl1>spec>temp>41-5>access_audit_names.incl.pl1pl1info dconvert_access_audit_flags_symbtreeKMR#KʴrPL/I 6"' ,Mk,\`eh\\Multics PL/I Compiler, Release 28d, of October 4, 1983GJohnson.SysMaint.moptimize list6-[-KyB+[-K}4>spec>temp>41-5>merge_access_audit_flags_.pl1>spec>temp>41-5>access_audit_flags.incl.pl1pl1info Umerge_access_audit_flags_symbtreeK˥1L0އPL/I 8"' *,Multics PL/I Compiler, Release 28e, of February 14, 1985GJohnson.SysMaint.aoptimize mapDULS([^K5](\gqK-Lg$NIXp M{Io繀x$[^}K3>special_ldd>install>MR12.0-1045>set_process_audit_flags.pl1>ldd>include>access_audit_flags.incl.pl1>ldd>include>access_mode_values.incl.pl1>ldd>include>terminate_file.incl.pl1>ldd>include>query_info.incl.pl1>ldd>include>sys_admin_data.incl.pl1pl1info set_process_audit_flagsGJohnson.SysMaint.a >q8NJ>special_ldd>install>MR12.2-1022>bound_security_tools_.archive PL/I @H PL/I <HPL/I H#PL/I L)PL/I &dl0PL/I \\7PL/I  ,=04/23/86 1032.7 mst Wed04/23/86 1029.0 mst Wedreclassify_dir reset_soos set_system_priv set_system_audit_flags convert_access_audit_flags_ merge_access_audit_flags_ set_process_audit_flags bound_security_tools_.bind obj_map 2 2 l  jD`