The pam_loginuid module sets the loginuid process attribute for the
process that was authenticated. This is necessary for applications to
be correctly audited. This PAM module should only be used for entry
point applications like: login, sshd, gdm, vsftpd, crond and atd.
There are probably other entry point applications besides these. You
should not use it for applications like sudo or su as that defeats
the purpose by changing the loginuid to the account they just
The loginuid value is set and auditd is running if check
The /proc/self/loginuid file is not present on the system or the
login process runs inside uid namespace and kernel does not
support overwriting loginuid.
Any other error prevented setting loginuid or auditd is not
This page is part of the linux-pam (Pluggable Authentication Modules
for Linux) project. Information about the project can be found at
⟨https://fedorahosted.org/linux-pam/⟩. If you have a bug report for
this manual page, see ⟨https://fedorahosted.org/linux-pam/report⟩.
This page was obtained from the tarball Linux-PAM-1.3.0.tar.gz
fetched from ⟨http://www.linux-pam.org/library/⟩ on 2017-03-13. If
you discover any rendering problems in this HTML version of the page,
or you believe there is a better or more up-to-date source for the
page, or you have corrections or improvements to the information in
this COLOPHON (which is not part of the original manual page), send a
mail to firstname.lastname@example.org
Linux-PAM Manual 04/01/2016 PAM_LOGINUID(8)