home *** CD-ROM | disk | FTP | other *** search
/ IRIX Base Documentation 2001 May / SGI IRIX Base Documentation 2001 May.iso / usr / share / catman / a_man / cat1 / suattr.z / suattr
Encoding:
Text File  |  2001-04-17  |  5.0 KB  |  133 lines

  1.  
  2.  
  3.  
  4. ssssuuuuaaaattttttttrrrr((((1111MMMM))))                                                          ssssuuuuaaaattttttttrrrr((((1111MMMM))))
  5.  
  6.  
  7.  
  8. NNNNAAAAMMMMEEEE
  9.      suattr - Execute shell command with specified capabilities at specified
  10.      MAC label
  11.  
  12. SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
  13.      ssssuuuuaaaattttttttrrrr  [ ----MMMM label ] [ ----CCCC capability set ] [ ----mmmm ][ arg ... ]
  14.  
  15. DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
  16.      _s_u_a_t_t_r allows _r_o_o_t to execute a command using the given capabilities set
  17.      and at the given MAC label.
  18.  
  19.      _s_u_a_t_t_r is designed primarily for system initialization, to grant commands
  20.      executed by startup scripts the privileges they need.  To use _s_u_a_t_t_r, the
  21.      real user id must be 0.
  22.  
  23.  
  24. OOOOPPPPTTTTIIIIOOOONNNNSSSS
  25.      ----CCCC <<<<ccccaaaappppaaaabbbbiiiilllliiiittttyyyy sssseeeetttt>>>>
  26.           Execute the requested command with the specified _c_a_p_a_b_i_l_i_t_y _s_e_t . If
  27.           capabilities are not configured on your system, this option is
  28.           silently ignored.
  29.  
  30.      ----MMMM <<<<MMMMAAAACCCC llllaaaabbbbeeeellll>>>>
  31.           Execute the requested command at the specified _l_a_b_e_l . The invoker
  32.           of _s_u must be cleared to operate at the requested label. If that
  33.           label is different than the user's current label, stdin, stdout, and
  34.           stderr will be closed.  If MAC is not configured on your system,
  35.           this option is silently ignored.
  36.  
  37.      ----mmmm   Execute the command with a moldy process label.
  38.  
  39.  
  40.      The remaining arguments given on the command line are passed to /_b_i_n/_s_h.
  41.      An _a_r_g of the form ----cccc _s_t_r_i_n_g executes _s_t_r_i_n_g via the shell and an arg of
  42.      ----rrrr gives the user a restricted shell.
  43.  
  44.  
  45. EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
  46.           _////_ssss_bbbb_iiii_nnnn_////_ssss_uuuu_aaaa_tttt_tttt_rrrr _----_MMMM _dddd_bbbb_aaaa_dddd_mmmm_iiii_nnnn _----_cccc _""""_kkkk_iiii_llll_llll_aaaa_llll_llll _ssss_yyyy_ssss_llll_oooo_gggg_dddd_""""
  47.  
  48.  
  49.      The command kkkkiiiillllllllaaaallllllll ssssyyyyssssllllooooggggdddd is executed at the ddddbbbbaaaaddddmmmmiiiinnnn label.
  50.  
  51.  
  52.           _////_ssss_bbbb_iiii_nnnn_////_ssss_uuuu_aaaa_tttt_tttt_rrrr _----_CCCC _CCCC_AAAA_PPPP______SSSS_WWWW_AAAA_PPPP______MMMM_GGGG_TTTT_++++_iiii_pppp _----_cccc _""""_////_ssss_bbbb_iiii_nnnn_////_ssss_wwww_aaaa_pppp _----_mmmm_""""
  53.  
  54.  
  55.      Set the inherited and permitted capability set to  CCCCAAAAPPPP____SSSSWWWWAAAAPPPP____MMMMGGGGPPPP and
  56.      execute sssswwwwaaaapppp.  This has the effect of granting sssswwwwaaaapppp the  capability to
  57.      execute the sssswwwwaaaapppp((((2222)))) system call.
  58.  
  59.  
  60.  
  61.  
  62.  
  63.                                                                         PPPPaaaaggggeeee 1111
  64.  
  65.  
  66.  
  67.  
  68.  
  69.  
  70. ssssuuuuaaaattttttttrrrr((((1111MMMM))))                                                          ssssuuuuaaaattttttttrrrr((((1111MMMM))))
  71.  
  72.  
  73.  
  74.           _////_ssss_bbbb_iiii_nnnn_////_ssss_uuuu_aaaa_tttt_tttt_rrrr _----_mmmm _----_cccc _""""_mmmm_vvvv _////_tttt_mmmm_pppp _////_...._oooo_llll_dddd_tttt_mmmm_pppp_""""
  75.  
  76.  
  77.      Has the effect of preserving the moldy bit when ////ttttmmmmpppp is moved.
  78.  
  79.  
  80. FFFFIIIILLLLEEEESSSS
  81.      /etc/passwd     system's password file
  82.      /etc/capability system's capability file
  83.      /etc/clearance  user clearance label information file
  84.  
  85. SSSSEEEEEEEE AAAALLLLSSSSOOOO
  86.      capability(4), clearance(4), newlabel(1m), chcap(1).
  87.  
  88. DDDDIIIIAAAAGGGGNNNNOOOOSSSSTTTTIIIICCCCSSSS
  89.      Unexpected results, including a system which hangs during startup, may
  90.      occur if the user rrrrooooooootttt is removed from ////eeeettttcccc////ppppaaaasssssssswwwwdddd or if rrrrooooooootttt''''ssss
  91.      capability set or clearance range is altered.
  92.  
  93.  
  94.  
  95.  
  96.  
  97.  
  98.  
  99.  
  100.  
  101.  
  102.  
  103.  
  104.  
  105.  
  106.  
  107.  
  108.  
  109.  
  110.  
  111.  
  112.  
  113.  
  114.  
  115.  
  116.  
  117.  
  118.  
  119.  
  120.  
  121.  
  122.  
  123.  
  124.  
  125.  
  126.  
  127.  
  128.  
  129.                                                                         PPPPaaaaggggeeee 2222
  130.  
  131.  
  132.  
  133.