Deleted Added
full compact
priv.9 (171058) priv.9 (183113)
1.\"-
2.\" Copyright (c) 2006 nCircle Network Security, Inc.
3.\" All rights reserved.
4.\"
5.\" This software was developed by Robert N. M. Watson for the TrustedBSD
6.\" Project under contract to nCircle Network Security, Inc.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 12 unchanged lines hidden (view full) ---

21.\" INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
22.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
23.\" TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
24.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
25.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
26.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28.\"
1.\"-
2.\" Copyright (c) 2006 nCircle Network Security, Inc.
3.\" All rights reserved.
4.\"
5.\" This software was developed by Robert N. M. Watson for the TrustedBSD
6.\" Project under contract to nCircle Network Security, Inc.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 12 unchanged lines hidden (view full) ---

21.\" INC., OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
22.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
23.\" TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
24.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
25.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
26.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28.\"
29.\" $FreeBSD: head/share/man/man9/priv.9 171058 2007-06-26 23:12:05Z rwatson $
29.\" $FreeBSD: head/share/man/man9/priv.9 183113 2008-09-17 15:49:44Z attilio $
30.\"
31.Dd August 30, 2006
32.Dt PRIV 9
33.Os
34.Sh NAME
35.Nm priv
36.Nd kernel privilege checking API
37.Sh SYNOPSIS

--- 5 unchanged lines hidden (view full) ---

43.Sh DESCRIPTION
44The
45.Nm
46interfaces check to see if specific system privileges are granted to the
47passed thread,
48.Fa td ,
49or credential,
50.Fa cred .
30.\"
31.Dd August 30, 2006
32.Dt PRIV 9
33.Os
34.Sh NAME
35.Nm priv
36.Nd kernel privilege checking API
37.Sh SYNOPSIS

--- 5 unchanged lines hidden (view full) ---

43.Sh DESCRIPTION
44The
45.Nm
46interfaces check to see if specific system privileges are granted to the
47passed thread,
48.Fa td ,
49or credential,
50.Fa cred .
51This interface replaces the
51This interface replaces the now removed
52.Xr suser 9
53privilege checking interface.
54Privileges typically represent rights in one of two categories: the right to
55manage a particular component of the system, or an exemption to a specific
56policy or access control list.
57The caller identifies the desired privilege via the
58.Fa priv
59argument.

--- 47 unchanged lines hidden (view full) ---

107.Xr stat 2 ,
108in which the generation field is optionally zero'd out when there is
109insufficient privilege is highly undesirable, as it results in frequent
110privilege checks, and the caller is unable to tell if an access control
111failure occurred.
112.Sh SEE ALSO
113.Xr jail 2 ,
114.Xr mac 9 ,
52.Xr suser 9
53privilege checking interface.
54Privileges typically represent rights in one of two categories: the right to
55manage a particular component of the system, or an exemption to a specific
56policy or access control list.
57The caller identifies the desired privilege via the
58.Fa priv
59argument.

--- 47 unchanged lines hidden (view full) ---

107.Xr stat 2 ,
108in which the generation field is optionally zero'd out when there is
109insufficient privilege is highly undesirable, as it results in frequent
110privilege checks, and the caller is unable to tell if an access control
111failure occurred.
112.Sh SEE ALSO
113.Xr jail 2 ,
114.Xr mac 9 ,
115.Xr suser 9 ,
116.Xr ucred 9
117.Sh AUTHORS
118The
119.Nm
120API and implementation were created by
121.An Robert Watson
122under contract to
123nCircle Network Security, Inc.
115.Xr ucred 9
116.Sh AUTHORS
117The
118.Nm
119API and implementation were created by
120.An Robert Watson
121under contract to
122nCircle Network Security, Inc.