xref: /titanic_50/usr/src/man/man2/getauid.2 (revision f38cb554a534c6df738be3f4d23327e69888e634)
te
Copyright (c) 2008, Sun Microsystems, Inc. All Rights Reserved.
The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
GETAUID 2 "Apr 16, 2008"
NAME
getauid, setauid - get or set user audit identity
SYNOPSIS

cc [ flag ... ] file ... -lbsm  -lsocket   -lnsl  [ library ... ]
#include <sys/param.h>
#include <bsm/libbsm.h>

int getauid(au_id_t *auid);

int setauid(au_id_t *auid);
DESCRIPTION

The getauid() function returns the audit user ID for the current process. This value is initially set at login time and inherited by all child processes. This value does not change when the real/effective user IDs change, so it can be used to identify the logged-in user even when running a setuid program. The audit user ID governs audit decisions for a process.

The setauid() function sets the audit user ID for the current process.

RETURN VALUES

Upon successful completion, the getauid() function returns the audit user ID of the current process on success. Otherwise, it returns -1 and sets errno to indicate the error.

Upon successful completion the setauid() function returns 0. Otherwise, -1 is returned and errno is set to indicate the error.

ERRORS

The getauid() and setauid() functions will fail if: EFAULT

The auid argument points to an invalid address.

EPERM

The {PRIV_SYS_AUDIT} privilege is not asserted in the effective set of the calling process.

The getauid() function will fail if: EPERM

The {PRIV_PROC_AUDIT} privilege is not asserted in the effective set of the calling process.

USAGE

Only a process with appropriate privileges can successfully execute these calls.

SEE ALSO

bsmconv(1M), audit(2), getaudit(2), privileges(5)

NOTES

The functionality described on this manual page is available only if the Solaris Auditing has been enabled. See bsmconv(1M) for more information.

These functions have been superseded by getaudit(2) and setaudit().