Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

getaudproc(2) [hpux man page]

getaudproc(2)							System Calls Manual						     getaudproc(2)

NAME
getaudproc() - get the audit process flag for the calling process SYNOPSIS
DESCRIPTION
returns the audit process flag for the calling process. The audit process flag (u_audproc) determines whether the process run by a given user should be audited. The process is audited if the returned flag is 1. If the returned flag is 0, the process is not audited. This call is restricted to users with the privilege. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
Upon successful completion, the audit process flag is returned; otherwise, a is returned and is set to indicate the error. ERRORS
fails if the following is true: The caller does not have the privilege. AUTHOR
was developed by HP. SEE ALSO
setaudproc(2), privileges(5). getaudproc(2)

Check Out this Related Man Page

audwrite(2)							System Calls Manual						       audwrite(2)

NAME
audwrite() - write an audit record for a self-auditing process SYNOPSIS
DESCRIPTION
is called by self-auditing processes, which are capable of turning off the regular auditing using the system call (see audswitch(2)) and doing higher-level auditing on their own. is restricted to users with the privilege. checks to see if the auditing system is on and the calling process and the event specified are being audited. If these conditions are met, writes the audit record pointed to by audrec_p into the audit trail. The record consists of an audit record body and a header with the following fields: /* Date/time (tv_sec of timeval) */ /* Process ID */ /* Success/failure */ /* Event being audited */ /* Length of variant part */ The body contains additional information about the high-level audit event. The header fields and are specified by the calling process. fills in and fields with the correct values. this is done to reduce the risk of forgery. Beginning with 11i version 3 release, converts the record into a different format before writing it into the current audit trail. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
If the write is successful, a value of is returned. Otherwise, a value of is returned and is set to indicate the reason for the failure. ERRORS
fails if one of the following is true: The caller does not possess the privilege. The event number in the audit record is invalid. WARNINGS
If causes a file space overflow, the calling process might be suspended until the file space is cleaned up. However, a returned call with the return value of indicates that the audit record has been successfully written. AUTHOR
was developed by HP. SEE ALSO
audswitch(2), audit(4), privileges(5). audwrite(2)
Man Page

7 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Dead pseudo-ttys

We are having a problem on an AIX 4.3 system, whereby users somehow exit the system in a way such that their process continues to run. In the who listing, the user may or may not be listed. Processes are still listed in ps, and are still assigned to the pseudo-tty. Processes continue to... (1 Reply)
Discussion started by: markat2k
1 Replies

2. UNIX for Dummies Questions & Answers

Processes

Can someone tell how to find out how long a process has been running? I want to find something that is usually there that the paging system can check on. Thanks (4 Replies)
Discussion started by: Beetlejuice
4 Replies

3. Emergency UNIX and Linux Support

List of users on an AIX system

Is there a way to generate a list of users with name, user ID, and Security Group? It is urgent for audit purposes. Please help. (5 Replies)
Discussion started by: ggayathri
5 Replies

4. Solaris

fbconsole process owned by user

I did a ps-ef on a host and discovered many /usr/openwin/bin/fbconsole processes running. They were owned by several users and its parent PID in etc/init. I bellieve that this process should be owned by root and not the user, and also the parent PID should be the dtlogin. Any ideas of how this... (0 Replies)
Discussion started by: amp4cats
0 Replies

5. UNIX for Dummies Questions & Answers

if then else logic with while loop problem

Hi Friends, I have to do write a shell file based on one flag.If that flag value is 'N' then process look in $DATA are and the normal process continue.If vaule is 'P' then it check for the files in different location $CONV and move those file in $DATA area and rest of the process... (2 Replies)
Discussion started by: Param0073
2 Replies

6. AIX

sudo - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (9 Replies)
Discussion started by: Daniel Gate
9 Replies

7. Cybersecurity

sudo - AIX - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (1 Reply)
Discussion started by: Daniel Gate
1 Replies