priv.9 (171058) | priv.9 (183113) |
---|---|
1.\"- 2.\" Copyright (c) 2006 nCircle Network Security, Inc. 3.\" All rights reserved. 4.\" 5.\" This software was developed by Robert N. M. Watson for the TrustedBSD 6.\" Project under contract to nCircle Network Security, Inc. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 12 unchanged lines hidden (view full) --- 21.\" INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 22.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 23.\" TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 24.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 25.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 26.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 27.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28.\" | 1.\"- 2.\" Copyright (c) 2006 nCircle Network Security, Inc. 3.\" All rights reserved. 4.\" 5.\" This software was developed by Robert N. M. Watson for the TrustedBSD 6.\" Project under contract to nCircle Network Security, Inc. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 12 unchanged lines hidden (view full) --- 21.\" INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 22.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 23.\" TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 24.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 25.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 26.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 27.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 28.\" |
29.\" $FreeBSD: head/share/man/man9/priv.9 171058 2007-06-26 23:12:05Z rwatson $ | 29.\" $FreeBSD: head/share/man/man9/priv.9 183113 2008-09-17 15:49:44Z attilio $ |
30.\" 31.Dd August 30, 2006 32.Dt PRIV 9 33.Os 34.Sh NAME 35.Nm priv 36.Nd kernel privilege checking API 37.Sh SYNOPSIS --- 5 unchanged lines hidden (view full) --- 43.Sh DESCRIPTION 44The 45.Nm 46interfaces check to see if specific system privileges are granted to the 47passed thread, 48.Fa td , 49or credential, 50.Fa cred . | 30.\" 31.Dd August 30, 2006 32.Dt PRIV 9 33.Os 34.Sh NAME 35.Nm priv 36.Nd kernel privilege checking API 37.Sh SYNOPSIS --- 5 unchanged lines hidden (view full) --- 43.Sh DESCRIPTION 44The 45.Nm 46interfaces check to see if specific system privileges are granted to the 47passed thread, 48.Fa td , 49or credential, 50.Fa cred . |
51This interface replaces the | 51This interface replaces the now removed |
52.Xr suser 9 53privilege checking interface. 54Privileges typically represent rights in one of two categories: the right to 55manage a particular component of the system, or an exemption to a specific 56policy or access control list. 57The caller identifies the desired privilege via the 58.Fa priv 59argument. --- 47 unchanged lines hidden (view full) --- 107.Xr stat 2 , 108in which the generation field is optionally zero'd out when there is 109insufficient privilege is highly undesirable, as it results in frequent 110privilege checks, and the caller is unable to tell if an access control 111failure occurred. 112.Sh SEE ALSO 113.Xr jail 2 , 114.Xr mac 9 , | 52.Xr suser 9 53privilege checking interface. 54Privileges typically represent rights in one of two categories: the right to 55manage a particular component of the system, or an exemption to a specific 56policy or access control list. 57The caller identifies the desired privilege via the 58.Fa priv 59argument. --- 47 unchanged lines hidden (view full) --- 107.Xr stat 2 , 108in which the generation field is optionally zero'd out when there is 109insufficient privilege is highly undesirable, as it results in frequent 110privilege checks, and the caller is unable to tell if an access control 111failure occurred. 112.Sh SEE ALSO 113.Xr jail 2 , 114.Xr mac 9 , |
115.Xr suser 9 , | |
116.Xr ucred 9 117.Sh AUTHORS 118The 119.Nm 120API and implementation were created by 121.An Robert Watson 122under contract to 123nCircle Network Security, Inc. | 115.Xr ucred 9 116.Sh AUTHORS 117The 118.Nm 119API and implementation were created by 120.An Robert Watson 121under contract to 122nCircle Network Security, Inc. |