diff options
| author | Mark Johnston <markj@FreeBSD.org> | 2024-11-03 14:39:32 +0000 |
|---|---|---|
| committer | Mark Johnston <markj@FreeBSD.org> | 2024-12-03 01:03:26 +0000 |
| commit | da44138dc2adefb698bd34c9cff73e1a5588ef26 (patch) | |
| tree | cd20ebe3c0be31a62ae77457eb1d086250dfb9fa /lib/libc/sys/chmod.2 | |
| parent | fd313924563917857e3567a62e405252cf2bafaf (diff) | |
Diffstat (limited to 'lib/libc/sys/chmod.2')
| -rw-r--r-- | lib/libc/sys/chmod.2 | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/lib/libc/sys/chmod.2 b/lib/libc/sys/chmod.2 index 7bcf19d50a1d..b3cb8aad0230 100644 --- a/lib/libc/sys/chmod.2 +++ b/lib/libc/sys/chmod.2 @@ -27,7 +27,7 @@ .\" .\" @(#)chmod.2 8.1 (Berkeley) 6/4/93 .\" -.Dd March 30, 2021 +.Dd October 31, 2024 .Dt CHMOD 2 .Os .Sh NAME @@ -216,6 +216,13 @@ This makes the system somewhat more secure by protecting set-user-id (set-group-id) files from remaining set-user-id (set-group-id) if they are modified, at the expense of a degree of compatibility. +.Pp +While it is normally an error to invoke +.Fn fchmod +on a socket, it is possible to do so on +.Dv AF_LOCAL +sockets before they are bound to a file name; see +.Xr unix 4 . .Sh RETURN VALUES .Rv -std .Sh ERRORS |
