Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

getauid(2) [opensolaris man page]

getauid(2)							   System Calls 							getauid(2)

NAME
getauid, setauid - get or set user audit identity SYNOPSIS
cc [ flag ... ] file ... -lbsm -lsocket -lnsl [ library ... ] #include <sys/param.h> #include <bsm/libbsm.h> int getauid(au_id_t *auid); int setauid(au_id_t *auid); DESCRIPTION
The getauid() function returns the audit user ID for the current process. This value is initially set at login time and inherited by all child processes. This value does not change when the real/effective user IDs change, so it can be used to identify the logged-in user even when running a setuid program. The audit user ID governs audit decisions for a process. The setauid() function sets the audit user ID for the current process. RETURN VALUES
Upon successful completion, the getauid() function returns the audit user ID of the current process on success. Otherwise, it returns -1 and sets errno to indicate the error. Upon successful completion the setauid() function returns 0. Otherwise, -1 is returned and errno is set to indicate the error. ERRORS
The getauid() and setauid() functions will fail if: EFAULT The auid argument points to an invalid address. EPERM The {PRIV_SYS_AUDIT} privilege is not asserted in the effective set of the calling process. The getauid() function will fail if: EPERM The {PRIV_PROC_AUDIT} privilege is not asserted in the effective set of the calling process. USAGE
Only a process with appropriate privileges can successfully execute these calls. SEE ALSO
bsmconv(1M), audit(2), getaudit(2), privileges(5) NOTES
The functionality described on this manual page is available only if the Solaris Auditing has been enabled. See bsmconv(1M) for more information. These functions have been superseded by getaudit(2) and setaudit(). SunOS 5.11 16 Apr 2008 getauid(2)

Check Out this Related Man Page

getaudit(2)							   System Calls 						       getaudit(2)

NAME
getaudit, setaudit, getaudit_addr, setaudit_addr - get or set process audit information SYNOPSIS
cc [ flag ... ] file ... -lbsm -lsocket -lnsl [ library ... ] #include <sys/param.h> #include <bsm/libbsm.h> int getaudit(struct auditinfo *info); int setaudit(struct auditinfo *info); int getaudit_addr(struct auditinfo_addr *info, int length); int setaudit_addr(struct auditinfo_addr *info, int length); DESCRIPTION
The getaudit() function gets the audit ID, the preselection mask, the terminal ID and the audit session ID for the current process. The getaudit() function can fail and return an E2BIG errno if the address field in the terminal ID is larger than 32 bits. In this case, getaudit_addr() should be used. The setaudit() function sets the audit ID, the preselection mask, the terminal ID and the audit session ID for the current process. The getaudit_addr() function returns a variable length auditinfo_addr structure that contains the audit ID, the preselection mask, the ter- minal ID, and the audit session ID for the current process. The terminal ID contains a size field that indicates the size of the network address. The setaudit_addr() function sets the audit ID, the preselection mask, the terminal ID, and the audit session ID for the current process. The values are taken from the variable length struture auditinfo_addr. The terminal ID contains a size field that indicates the size of the network address. The auditinfo structure is used to pass the process audit information and contains the following members: au_id_t ai_auid; /* audit user ID */ au_mask_t ai_mask; /* preselection mask */ au_tid_t ai_termid; /* terminal ID */ au_asid_t ai_asid; /* audit session ID */ The auditinfo_addr structure is used to pass the process audit information and contains the following members: au_id_t ai_auid; /* audit user ID */ au_mask_t ai_mask; /* preselection mask */ au_tid_addr_t ai_termid; /* terminal ID */ au_asid_t ai_asid; /* audit session ID */ RETURN VALUES
Upon successful completion, getaudit() and setaudit() return 0. Otherwise, -1 is returned and errno is set to indicate the error. ERRORS
The getaudit() and setaudit() functions will fail if: EFAULT The info parameter points outside the process's allocated address space. EPERM The {PRIV_SYS_AUDIT} privilege is not asserted in the effective set of the calling process. USAGE
The calling process must have the {PRIV_SYS_AUDIT} privilege asserted in its effective set. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Stable | +-----------------------------+-----------------------------+ |MT-Level |MT-Safe | +-----------------------------+-----------------------------+ SEE ALSO
bsmconv(1M), audit(2), attributes(5) NOTES
The functionality described in this man page is available only if the Solaris Auditing has been enabled. See bsmconv(1M) for more informa- tion. SunOS 5.11 16 Apr 2008 getaudit(2)
Man Page