NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | USAGE | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO
#include <sys/param.h> #include <bsm/audit.h>int getaudit(struct auditinfo * info);
getaudit() gets the audit ID , the preselection mask, the terminal ID , and the audit session ID of the current process.
setaudit() sets the audit ID , the preselection mask, the terminal ID , and the audit session ID for the current process.
The info structure used to pass the process audit information contains the following members:
au_id_t ai_auid; /* audit user ID */ au_mask_t ai_mask; /* preselection mask */ au_tid_t ai_termid; /* terminal ID */ au_asid_t ai_asid; /* audit session ID */
To execute these commands successfully, a process needs certain privileges in its set of effective privileges: for
getaudit()
, a process needs
PRIV_SYS_AUDIT
,
PRIV_PROC_AUDIT_TCB
, or
PRIV_PROC_AUDIT_APPL
; for
setaudit()
,
PRIV_SYS_AUDIT
.
The getaudit() and setaudit() functions will fail if:
The info parameter points outside the process's allocated address space.
The process did not have the appropriate privilege.
Only processes with the appropriate privileges may successfully execute these calls.
This functionality is active only if auditing is enabled. By default, auditing is enabled in the Trusted Solaris environment. See Trusted Solaris Audit Administration for more information.
As explained in DESCRIPTION , privileges are needed to run this command successfully.
NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | USAGE | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO