Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

getevent(2) [hpux man page]

getevent(2)							System Calls Manual						       getevent(2)

NAME
getevent() - get events and system calls that are currently being audited SYNOPSIS
Remarks This function is provided purely for backward compatibility. HP recommends that new applications use the command to get events and system calls that are currently being audited. See audevent(1M). DESCRIPTION
gets the events and system calls being audited. The events are returned in a table pointed to by a_event. The system calls are returned in a table pointed to by a_syscall. This call is restricted to users with the privilege. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
Upon successful completion, a value of 0 is returned; otherwise, a -1 is returned and is set to indicate the error. ERRORS
fails if the following is true: The caller does not have the privilege. AUTHOR
was developed by HP. SEE ALSO
audevent(1M), setevent(2), privileges(5). TO BE OBSOLETED getevent(2)

Check Out this Related Man Page

setaudproc(2)							System Calls Manual						     setaudproc(2)

NAME
setaudproc() - controls process level auditing for the current process and its decendents SYNOPSIS
DESCRIPTION
controls process level auditing for the current process and its decendents. It accomplishes this by setting or clearing the flag in the area of the calling process. When this flag is set, the system audits the process; when it is cleared, the process is not audited. This call is restricted to users with the privilege. One of the following flags must be used for aflag: Audit the calling process and its decendents. Do not audit the calling process and its decendents. The flag is inherited by the descendents of a process. consequently, the effect of a call to is not limited to the current process, but propagates to all its decendents as well. For example, if is called with the flag, all subsequent audited system calls in the current process are audited until is called with the flag. Further, performs its action regardless of whether the user executing the process has been selected to be audited or not. For example, if is called with the (or the flag, all subsequent audited system calls will be audited (or not audited), regardless of whether the user exe- cuting the process has been selected for auditing or not. Due to these features, should not be used in most self-auditing applications. should be used (see audswitch(2)) when the objective is to suspend auditing within a process without affecting its decendents or overriding the user selection aspect of the auditing system. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
Upon successful completion, returns 0; otherwise, it returns -1 and sets to indicate the error. AUTHOR
was developed by HP. SEE ALSO
audevent(1M), audusr(1M), audswitch(2), getaudproc(2), audit(5), privileges(5). setaudproc(2)
Man Page

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

shell script conversion to binary

My question is: i have a script called getevent to run i just call ./getevent can i convert this to make it binary executable and not letting my clients open it and see the code.??:( I am using Solaris 8. (3 Replies)
Discussion started by: bcheaib
3 Replies

2. HP-UX

Hpux C2 Auditing

I am trying to find out if there are any recommendations regarding what events/system calls should be audited as a starting point. I am new to the auditing side of things and am not really to sure what best to log - any ideas or know of any resources which make recommendations in this respect ??? (1 Reply)
Discussion started by: gmh
1 Replies

3. UNIX for Dummies Questions & Answers

System calls for cp and mv

Which system calls are made for operations cp and mv (2 Replies)
Discussion started by: gaurava99
2 Replies

4. Programming

c system call

How the c compiler differentiates the system calls and function calls? (1 Reply)
Discussion started by: rangaswamy
1 Replies

5. UNIX for Dummies Questions & Answers

About system calls.

Hi all, I am new here . I want to know about system call in detail. As system calls are also function .How system identifies it.:) (2 Replies)
Discussion started by: vishwasrao
2 Replies

6. HP-UX

Monitor file changed / created events on big FS

Hi all, The configuration: We are useing a HP-UX Server with vxfs File System. The files on this server have normally a umask of 022 (owned by a administrative account) users who have write access to certain files get custom ACL entries that add these rights for the specific user. Now a... (0 Replies)
Discussion started by: magics
0 Replies

7. AIX

sudo - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (9 Replies)
Discussion started by: Daniel Gate
9 Replies

8. Cybersecurity

sudo - AIX - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (1 Reply)
Discussion started by: Daniel Gate
1 Replies

9. Emergency UNIX and Linux Support

Privilege ids list

I would like to capture the list of all users that belong to the "system" group. Or in other words all those who have privilege access on the system. Can someone please help me with a shell script/sed/awk code to obtain this please. (3 Replies)
Discussion started by: ggayathri
3 Replies