*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: cr_canseeothergids | Section: 9 | Source: FreeBSD | File: cr_canseeothergids.9.gz
CR_CANSEEOTHERGIDS(9) FreeBSD Kernel Developer's Manual CR_CANSEEOTHERGIDS(9) NAME cr_canseeothergids - determine if subjects may see entities in a disjoint group set SYNOPSIS int cr_canseeothergids(struct ucred *u1, struct ucred *u2); DESCRIPTION This function is internal. Its functionality is integrated into the function cr_bsd_visible(9), which should be called instead. This function checks if a subject associated to credentials u1 is denied seeing a subject or object associated to credentials u2 by a policy that requires both credentials to have at least one group in common. For this determination, the real and supplementary group IDs are used, but not the effective group IDs, as per realgroupmember(9). This policy is active if and only if the sysctl(8) variable security.bsd.see_other_gids is set to zero. As usual, the superuser (effective user ID 0) is exempt from this policy provided that the sysctl(8) variable security.bsd.suser_enabled is non- zero and no active MAC policy explicitly denies the exemption (see priv_check_cred(9)). RETURN VALUES The cr_canseeothergids() function returns 0 if the policy is disabled, the credentials share at least one common group, or if u1 has privilege exempting it from the policy. Otherwise, it returns ESRCH. SEE ALSO cr_bsd_visible(9), priv_check_cred(9), realgroupmember(9) FreeBSD 14.1-RELEASE-p8 August 18, 2023 FreeBSD 14.1-RELEASE-p8

Navigation Options