NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO
#include <sys/param.h> #include <bsm/audit.h>int getauid(au_id_t * auid);
The getauid() function returns the audit user ID for the current process. This value is initially set at login time and inherited by all child processes. This value does not change when the real/effective user ID s change, so it can be used to identify the logged-in user even when running a setuid program. The audit user ID governs audit decisions for a process.
The setauid() function sets the audit user ID for the current process.
Only a process with the
PRIV_SYS_AUDIT
privilege asserted may successfully set its user identity. To get its
identity successfully, a process must have
PRIV_SYS_AUDIT
,
PRIV_PROC_AUDIT_TCB
, or
PRIV_PROC_AUDIT_APPL
in its set of effective privileges.
Upon successful completion, the getauid() function returns the audit user ID of the current process on success. Otherwise, it returns -1 and sets errno to indicate the error.
Upon successful completion the setauid() function returns 0 . Otherwise, -1 is returned and errno is set to indicate the error.
The getauid() and setauid() functions will fail if:
The auid argument points to an invalid address.
The process does not have the appropriate privileges.
This functionality is active only if auditing is enabled. By default, auditing is enabled in the Trusted Solaris environment. See Trusted Solaris Audit Administration for more information.
The privileges explained in DESCRIPTION are needed to run this command successfully.
These system calls have been superseded by getaudit() and setaudit() .
NAME | SYNOPSIS | DESCRIPTION | RETURN VALUES | ERRORS | SUMMARY OF TRUSTED SOLARIS CHANGES | SEE ALSO