Robert Watson 9c94f7731e o Introduce eaccess(2), a version of access(2) that uses the effective
credentials rather than the real credentials.  This is useful for
  implementing GUI's which need to modify icons based on access rights,
  but where use of open(2) is too expensive, use of stat(2) doesn't
  reflect the file system's real protection model, and use of
  access() suffers from real/effective credential confusion.  This
  implementation provides the same semantics as the call of the same
  name on SCO OpenServer.  Note: using this call improperly can
  leave you subject to some of the same races present in the
  access(2) call.
o To implement this, break out the basic logic of access(2) into
  vpaccess(), which accepts a passed credential to perform the
  invocation of VOP_ACCESS().  Add eaccess(2) to invoke vpaccess(),
  and modify access(2) to use vpaccess().

Obtained from:	TrustedBSD Project
2001-09-21 21:33:22 +00:00
..
2001-09-20 08:22:56 +00:00
2001-09-13 21:59:40 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-20 08:04:21 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-08-21 09:16:57 +00:00
2001-09-12 08:38:13 +00:00
2001-09-20 15:32:56 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00
2001-09-12 08:38:13 +00:00