Museum

Home

Lab Overview

Retrotechnology Articles

⇒ Online Manual

Media Vault

Software Library

Restoration Projects

Artifacts Sought

Related Articles

audit(2)

getaudit(2)

getauid(2)

NAME

getauid, setauid − get and set user audit identity

SYNOPSIS

cc [ flag ... ] file ... −lbsm −lsocket −lnsl −lintl [ library ... ]

#include <sys/param.h>
#include <bsm/audit.h>

int getauid( au_id_t ∗auid);

int setauid( au_id_t ∗auid);

AVAILABILITY

The functionality described in this man page is available only if the Basic Security Module (BSM) has been enabled.  See bsmconv(1M) for more information. 

DESCRIPTION

The getauid() system call returns the audit user ID for the current process.  This value is initially set at login time and inherited by all child processes.  This value does not change when the real/effective user IDs change, so it can be used to identify the logged-in user, even when running a setuid program.  The audit user ID governs audit decisions for a process. 

The setauid() system call sets the audit user ID for the current process. 

Only the super-user may successfully execute these calls. 

RETURN VALUES

getauid() returns the audit user ID of the current process on success.  On failure, it returns −1 and sets errno to indicate the error. 

setauid() returns:

0 on success. 

−1 on failure and sets errno to indicate the error. 

ERRORS

EFAULT auid points to an invalid address. 

EPERM The process’s effective user ID is not super-user. 

SEE ALSO

audit(2), getaudit(2)

NOTES

These system calls have been superseded by getaudit() and setaudit(). 

SunOS 5.4  —  Last change: 5 Apr 1994

Typewritten Software • bear@typewritten.org • Edmonds, WA 98026