From 19d701ddf07d855128ded0cf2b573ce468e3bdd6 Mon Sep 17 00:00:00 2001 From: Ashlee Young Date: Wed, 20 Jan 2016 01:10:01 +0000 Subject: Removing Suricata and Audit from source repo, and updated build.sh to avoid building suricata. Will re-address this in C release via tar balls. Change-Id: I3710076f8b7f3313cb3cb5260c4eb0a6834d4f6e Signed-off-by: Ashlee Young --- framework/src/audit/docs/audit_setloginuid.3 | 25 ------------------------- 1 file changed, 25 deletions(-) delete mode 100644 framework/src/audit/docs/audit_setloginuid.3 (limited to 'framework/src/audit/docs/audit_setloginuid.3') diff --git a/framework/src/audit/docs/audit_setloginuid.3 b/framework/src/audit/docs/audit_setloginuid.3 deleted file mode 100644 index c1a71e31..00000000 --- a/framework/src/audit/docs/audit_setloginuid.3 +++ /dev/null @@ -1,25 +0,0 @@ -.TH "AUDIT_SETLOGINUID" "3" "Oct 2006" "Red Hat" "Linux Audit API" -.SH NAME -audit_setloginuid \- Set a program's loginuid value -.SH SYNOPSIS -.B #include -.sp -int audit_setloginuid(uid_t uid); - -.SH "DESCRIPTION" - -This function sets the task attribute loginuid with the value of uid. The loginuid value may only be set by programs with the CAP_AUDIT_CONTROL capability. This normally means the root account. -.sp -The loginuid value is part of the task structure and is inheritted by child processes. It is used to track what account a user gained system access with. All system entry point programs should set this value right before changing to the uid of the user granted access so that audit events are properly attributed to the that user. - -.SH "RETURN VALUE" - -This function returns 0 on success and non-zero otherwise. - -.SH "SEE ALSO" - -.BR audit_getloginuid (3), -.BR pam_loginuid (8). - -.SH AUTHOR -Steve Grubb -- cgit 1.2.3-korg