GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
CR_CANSEEOTHERGIDS(9) FreeBSD Kernel Developer's Manual CR_CANSEEOTHERGIDS(9)

cr_canseeothergidsdetermine if subjects may see entities in a disjoint group set

int
cr_canseeothergids(struct ucred *u1, struct ucred *u2);

This function is internal. Its functionality is integrated into the function cr_bsd_visible(9), which should be called instead.

This function checks if a subject associated to credentials u1 is denied seeing a subject or object associated to credentials u2 by a policy that requires both credentials to have at least one group in common. For this determination, the real and supplementary group IDs are used, but not the effective group IDs, as per realgroupmember(9).

This policy is active if and only if the sysctl(8) variable security.bsd.see_other_gids is set to zero.

As usual, the superuser (effective user ID 0) is exempt from this policy provided that the sysctl(8) variable security.bsd.suser_enabled is non-zero and no active MAC policy explicitly denies the exemption (see priv_check_cred(9)).

The cr_canseeothergids() function returns 0 if the policy is disabled, the credentials share at least one common group, or if u1 has privilege exempting it from the policy. Otherwise, it returns ESRCH.

cr_bsd_visible(9), priv_check_cred(9), realgroupmember(9)

August 18, 2023 FreeBSD 14.3-RELEASE

Search for    or go to Top of page |  Section 9 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.