From owner-man-jp-reviewer@jp.FreeBSD.org Mon Feb 24 14:03:51 2003
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id h1O53pP11633;
	Mon, 24 Feb 2003 14:03:51 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from rwcrmhc53.attbi.com (rwcrmhc53.attbi.com [204.127.198.39])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id h1O53oi11628
	for <man-jp-reviewer@jp.freebsd.org>; Mon, 24 Feb 2003 14:03:50 +0900 (JST)
	(envelope-from horikawa@jp.freebsd.org)
Received: from localhost (12-252-35-167.client.attbi.com[12.252.35.167])
          by rwcrmhc53.attbi.com (rwcrmhc53) with SMTP
          id <2003022405034105300goskve>; Mon, 24 Feb 2003 05:03:41 +0000
Message-Id: <20030223.220313.59649849.horikawa@attbi.com>
To: man-jp-reviewer@jp.FreeBSD.org
From: Kazuo Horikawa <horikawa@jp.FreeBSD.org>
X-Mailer: Mew version 3.1 on Emacs 21.2 / Mule 5.0 (SAKAKI)
In-Reply-To: <20030221.195934.59464664.horikawa@attbi.com>
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
Date: Sun, 23 Feb 2003 22:03:13 -0700
X-Sequence: man-jp-reviewer 4360
Subject: [man-jp-reviewer 4360] (new) [get|set]facl.1, [get|set][f|p]mac.8, rmextattr.8
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: horikawa@jp.FreeBSD.org
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+030107

$B2<5-$N$b$N$N(B 5.0-RELEASE $B$KBP1~$9$kK]Lu$G$9!#(B
>   man8/getfmac.8
>   man8/getpmac.8
>   man8/setfmac.8
>   man8/setfsmac.8 -> setfmac.8
>   man8/setpmac.8
>   man1/getfacl.1
>   man1/setfacl.1
>   man8/getextattr.8 -> rmextarttr.8
>   man8/lsextattr.8 -> rmextarttr.8
>   man8/rmextattr.8
>   man8/setextattr.8 -> rmextarttr.8

$B:G6a$N(B HEAD $B$X$N:9J,$OL$E,MQ$J$N$G!"$3$l$O%3%_%C%H;~$K$G$bDI2C(B
$B$7$h$&$H9M$($F$$$^$9!#(B

diff -u bak/getfacl.1 new/getfacl.1
--- bak/getfacl.1	Sun Feb 23 12:28:01 2003
+++ new/getfacl.1	Sun Feb 23 12:55:33 2003
@@ -33,82 +33,83 @@
 .Dd March 30, 2000
 .Dt GETFACL 1
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm getfacl
-.Nd get ACL information
-.Sh SYNOPSIS
+.Nd ACL $B>pJs$N<hF@(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl d
 .Op Ar
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility writes discretionary access control information associated with
-the specified file(s) to standard output.
-If the
-.Xr getconf 1
-utility indicates that
-.Eq { } Va _POSIX_ACL_EXTENDED
-is not in effect for a
+$B%f!<%F%#%j%F%#$O!"(B
+$B;XDj$5$l$?%U%!%$%k$K4X$9$k!"(B
+$B:[NLE*$J%"%/%;%9@)8f>pJs$rI8=`=PNO$XI=<($7$^$9!#(B
+$B;XDj$7$?(B
 .Ar file
-then the standard discretionary access permissions are interpreted as
-an ACL containing only the required ACL entries.
+$B$KBP$9$k(B
+.Eq { } Va _POSIX_ACL_EXTENDED
+$B$N8z2L$,L5$$$3$H$r(B
+.Xr getconf 1
+$B%f!<%F%#%j%F%#$,<($9>l9g!"(B
+$BI8=`$N:[NLE*$J%"%/%;%9%Q!<%_%C%7%g%s$,!"(B
+$BI,?\$N(B ACL $B%(%s%H%j$N$_$r;}$D(B ACL $B$H$7$F2r<a$5$l$^$9!#(B
 .Pp
-The following option is available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl d
-The operation applies to the default ACL of a directory instead of the
-access ACL.
-An error is generated if a default ACL cannot be associated with
-.Ar file .
+$B%"%/%;%9(B ACL $B$NBe$j$K!"%G%#%l%/%H%j$N%G%U%)%k%H(B ACL $B$KBP$7!"(B
+$BA`:n$,E,MQ$5$l$^$9!#(B
+$B%G%U%)%k%H(B ACL $B$r(B
+.Ar file
+$B$K4XO"IU$1$i$l$J$$>l9g!"%(%i!<$,@8@.$5$l$^$9!#(B
 .El
 .Pp
-The following operand is available:
+$B<!$N%*%Z%i%s%I$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Ar file
-A pathname of a file whose ACL shall be retrieved.
-If
+ACL $B<hF@BP>]%U%!%$%k$N%Q%9L>!#(B
 .Ar file
-is not specified, or a
+$B$,;XDj$5$l$J$$>l9g$d(B
 .Ar file
-is specified as
-.Fl ,
-then
+$B$H$7$F(B
+.Fl
+$B$,;XDj$5$l$k>l9g!"(B
 .Nm
-reads a list of pathnames, each terminated by one newline character,
-from the standard input.
+$B$O!"(B
+$B3F%Q%9L>$,(B 1 $B8D$N2~9TJ8;z$G=*C<$5$l$?%Q%9L>%j%9%H$rI8=`F~NO$+$iFI$_<h$j$^$9!#(B
 .El
-.Sh EXAMPLES
+.Sh $B;HMQNc(B
 .Dl getfacl /
 .Pp
-Retrieve ACL for the directory
-.Pa / .
+$B%G%#%l%/%H%j(B
+.Pa /
+$B$N(B ACL $B$r<hF@$7$^$9!#(B
 .Pp
 .Dl getfacl -d /
 .Pp
-Retrieve the default ACL for the directory
-.Pa / ,
-if any.
-.Sh DIAGNOSTICS
+$B%G%#%l%/%H%j(B
+.Pa /
+$B$N%G%U%)%k%H(B ACL $B$,B8:_$9$l$P!"$=$l$r<hF@$7$^$9!#(B
+.Sh $B?GCG(B
 .Ex -std
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr setfacl 1 ,
 .Xr acl 3 ,
 .Xr getextattr 8 ,
 .Xr setextattr 8 ,
 .Xr acl 9 ,
 .Xr extattr 9
-.Sh STANDARDS
-The
+.Sh $B5,3J(B
 .Nm
-utility is expected to be
+$B%f!<%F%#%j%F%#$O(B
 .Tn IEEE
-Std 1003.2c compliant.
-.Sh HISTORY
-Extended Attribute and Access Control List support was developed as part
-of the
+Std 1003.2c $B$K=>$C$F$$$k$3$H$,4|BT$5$l$^$9!#(B
+.Sh $BNr;K(B
+$B3HD%B0@-$*$h$S%"%/%;%9@)8f%j%9%H$N%5%]!<%H$O!"(B
 .Tn TrustedBSD
-Project and introduced in
-.Fx 5.0 .
-.Sh AUTHORS
+Project $B$N0lIt$H$7$F3+H/$5$l!"(B
+.Fx 5.0
+$B$GF3F~$5$l$^$7$?!#(B
+.Sh $B:n<T(B
 .An Robert N M Watson
diff -u bak/getfmac.8 new/getfmac.8
--- bak/getfmac.8	Sun Feb 23 12:28:01 2003
+++ new/getfmac.8	Sun Feb 23 14:56:35 2003
@@ -36,20 +36,19 @@
 .Dd June 27, 2002
 .Dt GETFMAC 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm getfmac
-.Nd print MAC label for a file system object
-.Sh SYNOPSIS
+.Nd $B%U%!%$%k%7%9%F%`%*%V%8%'%/%H$N(B MAC $B%i%Y%k$NI=<((B
+.Sh $B=q<0(B
 .Nm
 .Op Fl h
 .Op Fl l Ar list,of,labels
 .Op Ar
-.Sh DESCRIPTION
-The
+.Sh $B5-=R(B
 .Nm
-utility prints the text representation of the MAC label associated with the
-specified files.
-.Sh SEE ALSO
+$B%f!<%F%#%j%F%#$O!"(B
+$B;XDj$5$l$?%U%!%$%k$N(B MAC $B%i%Y%k$N%F%-%9%HI=8=$rI=<($7$^$9!#(B
+.Sh $B4XO"9`L\(B
 .Xr mac 3 ,
 .Xr mac_get_file 3 ,
 .Xr mac 4 ,
diff -u bak/getpmac.8 new/getpmac.8
--- bak/getpmac.8	Sun Feb 23 12:28:01 2003
+++ new/getpmac.8	Sun Feb 23 15:41:29 2003
@@ -32,21 +32,18 @@
 .Dd JANUARY 14, 2003
 .Dt GETPMAC 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm getpmac
-.Nd print process-related MAC labels
-.Sh SYNOPSIS
+.Nd $B%W%m%;%9$K4X$9$k(B MAC $B%i%Y%k$NI=<((B
+.Sh $B=q<0(B
 .Nm
 .Op Fl l Ar list,of,labels
 .Op Ar
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility prints the text representation of the MAC label associated with the
-specified processes.
-If no processes are specified, it prints the label associated with its own
-process.
-.Sh SEE ALSO
+$B%f!<%F%#%j%F%#$O!";XDj$5$l$?%W%m%;%9$N(B MAC $B%i%Y%k$N%F%-%9%HI=8=$rI=<($7$^$9!#(B
+$B%W%m%;%9$r;XDj$7$J$$$H!"<+8J%W%m%;%9%i%Y%k$rI=<($7$^$9!#(B
+.Sh $B4XO"9`L\(B
 .Xr mac 3 ,
 .Xr mac_get_pid 3 ,
 .Xr mac_get_proc 3 ,
diff -u bak/rmextattr.8 new/rmextattr.8
--- bak/rmextattr.8	Sun Feb 23 12:28:01 2003
+++ new/rmextattr.8	Sun Feb 23 16:10:13 2003
@@ -34,13 +34,13 @@
 .Dd August 30, 2000
 .Dt RMEXTATTR 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm getextattr ,
 .Nm lsextattr ,
 .Nm rmextattr ,
 .Nm setextattr
-.Nd manipulated extended attributes
-.Sh SYNOPSIS
+.Nd $B3HD%B0@-$NA`:n(B
+.Sh $B=q<0(B
 .Nm getextattr
 .Op Fl fhqsx
 .Ar attrnamespace
@@ -61,60 +61,55 @@
 .Ar attrname
 .Ar attrvalue
 .Ar filename ...
-.Sh DESCRIPTION
-These
-utilities
-are user tools to manipulated a named extended attributes on files and
-directories.
-The
+.Sh $B2r@b(B
+$B$3$l$i$N%f!<%F%#%j%F%#$O!"(B
+$B%U%!%$%k$*$h$S%G%#%l%/%H%jCf$N;XDj$5$l$?3HD%B0@-$rA`:n$9$k$?$a$N(B
+$B%f!<%6%D!<%k$G$9!#(B
 .Ar attrnamespace
-argument should be the namespace of the attribute to retrieve: legal
-values are "user" and "system".
-The
+$B0z?t$O<h$j=P$7BP>]$NB0@-$NL>A06u4V$G$"$j!"(B
+$B@5Ev$JCM$O(B "user" $B$*$h$S(B "system" $B$G$9!#(B
 .Ar attrname
-argument should be the name of the attribute,
+$B0z?t$OB0@-L>!"(B
 .Ar filename
-the name of the target file or directory,
+$B0z?t$O%?!<%2%C%H%U%!%$%k$^$?$O%G%#%l%/%H%j$NL>A0!"(B
 .Ar attrvalue
-a string to store in the attribute.
+$B0z?t$OB0@-$K3JG<$9$kJ8;zNs$G$9!#(B
 .Pp
-The following options are available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width flag
 .It Fl f
-(Force) Ignore errors on individual filenames and continue with
-the remaining arguments.
+($B6/@)(B) $B3F%U%!%$%kL>$KBP$9$k%(%i!<$rL5;k$7!";D$j$N0z?t$KBP$7$F=hM}$rB39T$7$^$9!#(B
 .It Fl h
-(No follow) If the file is a symbolic link, perform the operation on the
-link itself rather than the file that the link points to.
+($BHsDI@W(B) $B%U%!%$%k$,%7%s%\%j%C%/%j%s%/$N>l9g!"(B
+$B%j%s%/$G;X$5$l$k%U%!%$%k$G$O$J$/%j%s%/<+?H$KBP$7$FA`:n$r<B9T$7$^$9!#(B
 .It Fl n
-(Nul-terminate) Nul-terminate the extent content written out.
+($B%L%k=*C<(B) $B=PNOCf$NFbMF$NItJ,$r%L%k=*C<$7$^$9!#(B
 .It Fl q
-(Quiet) Do not print out the pathname and suppress error messages.
+($B@E<d(B) $B%Q%9L>$rI=<($;$:!"%(%i!<%a%C%;!<%8$rM^@)$7$^$9!#(B
 .It Fl s
-(Stringify) Escape nonprinting characters and put quotes around the output.
+($BJ8;zNs2=(B) $BHsI=<(J8;z$r%(%9%1!<%W$7!"=PNO$r%/%)!<%H$G3g$j$^$9!#(B
 .It Fl x
-(Hex) Print the output in hexadecimal.
+(16 $B?J?t(B) $B=PNO$r(B 16 $B?J?t$GI=<($7$^$9!#(B
 .El
-.Sh EXAMPLES
+.Sh $B;HMQNc(B
 .Dl # setextattr system md5 `md5 -q /boot/kernel/kernel` /boot/kernel/kernel 
 .Dl # getextattr system md5 /boot/kernel/kernel
 .Dl # lsextattr system /boot/kernel/kernel
 .Dl # rmextattr system md5 /boot/kernel/kernel
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr extattr 2 ,
 .Xr extattr 3 ,
 .Xr extattrctl 8 ,
 .Xr extattr 9
-.Sh HISTORY
-Extended attribute support was developed as part of the TrustedBSD Project,
-and introduced in
-.Fx 5.0 .
-It was developed to support security extensions requiring additional labels
-to be associated with each file or directory.
-.Sh AUTHORS
-Robert N M Watson and
+.Sh $BNr;K(B
+$B3HD%B0@-%5%]!<%H$O!"(BTrustedBSD Project $B$N0lIt$H$7$F3+H/$5$l!"(B
+.Fx 5.0
+$B$GF3F~$5$l$^$7$?!#(B
+$B3F%U%!%$%k$d%G%#%l%/%H%j$,DI2C%i%Y%k$r;}$D$3$H$rI,MW$H$9$k$h$&$J(B
+$B%;%-%e%j%F%#3HD%$N$?$a$K!"$3$N3+H/$,9T$o$l$^$7$?!#(B
+.Sh $B:n<T(B
+Robert N M Watson $B$*$h$S(B
 Poul-Henning Kamp
-.Sh BUGS
-The
+.Sh $B%P%0(B
 .Nm setextattr
-utility can only be used to set attributes to strings.
+$B%f!<%F%#%j%F%#$O!"B0@-$KBP$7$FJ8;zNs$r@_Dj$9$k$?$a$@$1$K;HMQ$G$-$^$9!#(B
diff -u bak/setfacl.1 new/setfacl.1
--- bak/setfacl.1	Sun Feb 23 12:28:01 2003
+++ new/setfacl.1	Sun Feb 23 16:03:59 2003
@@ -28,10 +28,10 @@
 .Dd January 7, 2001
 .Dt SETFACL 1
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm setfacl
-.Nd set ACL information
-.Sh SYNOPSIS
+.Nd ACL $B>pJs$N@_Dj(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl bdkn
 .Op Fl m Ar entries
@@ -39,226 +39,219 @@
 .Op Fl x Ar entries
 .Op Fl X Ar file1
 .Op Ar
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility sets discretionary access control information on
-the specified file(s).
+$B%f!<%F%#%j%F%#$O;XDj$5$l$?%U%!%$%k$KBP$7!"(B
+$B:[NLE*$J%"%/%;%9@)8f>pJs$r@_Dj$7$^$9!#(B
 .Pp
-The following options are available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl b
-Remove all ACL entries except for the three required entries.
-If the ACL contains a
+$BI,?\$N(B 3 $B%(%s%H%j$r=|$-!"A4(B ACL $B%(%s%H%j$r:o=|$7$^$9!#(B
+ACL $B$,(B
 .Dq Li mask
-entry, the permissions of the
+$B%(%s%H%j$r4^$`>l9g!":G=*E*$J(B ACL $BCf$N(B
 .Dq Li group
-entry in the resulting ACL will be set to the permission
-associated with both the
+$B%(%s%H%j$N%Q!<%_%C%7%g%s$O!"8=:_$N(B ACL $B$K$*$1$k(B
 .Dq Li group
-and
+$B$H(B
 .Dq Li mask
-entries of the current ACL.
+$B$NN>J}$rAH$_9g$o$;$?%Q!<%_%C%7%g%s$K$J$j$^$9!#(B
 .It Fl d
-The operations apply to the default ACL entries instead of
-access ACL entries.  Currently only directories may have
-default ACL's.
+$B%"%/%;%9(B ACL $B$NBe$j$K!"%G%#%l%/%H%j$N%G%U%)%k%H(B ACL $B$KBP$7!"(B
+$BA`:n$,E,MQ$5$l$^$9!#(B
+$B8=;~E@$G$O!"%G%#%l%/%H%j$N$_$,%G%U%)%k%H(B ACL $B$rJ];}2DG=$G$9!#(B
 .It Fl k
-Delete any default ACL entries on the specified files.  It
-is not considered an error if the specified files do not have
-any default ACL entries.  An error will be reported if any of
-the specified files cannot have a default entry (i.e.\&
-non-directories).
+$B;XDj$5$l$?%U%!%$%k$N%G%U%)%k%H(B ACL $B%(%s%H%j$r:o=|$7$^$9!#(B
+$B;XDj$5$l$?%U%!%$%k$,%G%U%)%k%H(B ACL $B%(%s%H%j$r;}$?$J$$>l9g$G$b!"(B
+$B%(%i!<$H$O$_$J$5$l$^$;$s!#(B
+$B;XDj$5$l$?%U%!%$%k$,%G%U%)%k%H%(%s%H%j$r;}$AF@$J$$>l9g(B
+($B$9$J$o$A%G%#%l%/%H%j$G$O$J$$>l9g(B)$B!"%(%i!<$,Js9p$5$l$^$9!#(B
 .It Fl m Ar entries
-Modify the ACL entries on the specified files by adding new
-entries and modifying existing ACL entries with the ACL entries
-specified in
-.Ar entries .
+.Ar entries
+$B$G;XDj$5$l$k(B ACL $B%(%s%H%j$K$F!"(B
+$B?75,%(%s%H%j$NDI2C$H4{B8$N%(%s%H%j$N=$@5$r9T$&$3$H$K$h$j!"(B
+$B;XDj$5$l$?%U%!%$%k$N(B ACL $B%(%s%H%j$r=$@5$7$^$9!#(B
 .It Fl M Ar file
-Modify the ACL entries on the specified files by adding new
-ACL entries and modifying existing ACL entries with the ACL
-entries specified in the file
-.Ar file .
-If
 .Ar file
-is
-.Fl ,
-the input is taken from stdin.
+$B%U%!%$%kCf$G;XDj$5$l$k(B ACL $B%(%s%H%j$K$F!"(B
+$B?75,%(%s%H%j$NDI2C$H4{B8$N%(%s%H%j$N=$@5$r9T$&$3$H$K$h$j!"(B
+$B;XDj$5$l$?%U%!%$%k$N(B ACL $B%(%s%H%j$r=$@5$7$^$9!#(B
+.Ar file
+$B$,(B
+.Fl
+$B$N>l9g!"F~NO$OI8=`F~NO$+$iF@$i$l$^$9!#(B
 .It Fl n
-Do not recalculate the permissions associated with the ACL
-mask entry.
+ACL mask $B%(%s%H%j$K4X$9$k%Q!<%_%C%7%g%s$r:F7W;;$7$^$;$s!#(B
 .It Fl x Ar entries
-Remove the ACL entries specified in
+$B;XDj$5$l$?%U%!%$%k$N%"%/%;%9(B ACL $B$^$?$O%G%U%)%k%H(B ACL $B$+$i!"(B
 .Ar entries
-from the access or default ACL of the specified files.
+$B$G;XDj$5$l$k(B ACL $B%(%s%H%j$r:o=|$7$^$9!#(B
 .It Fl X Ar file
-Remove the ACL entries specified in the file
+$B;XDj$5$l$?%U%!%$%k$N%"%/%;%9(B ACL $B$^$?$O%G%U%)%k%H(B ACL $B$+$i!"(B
 .Ar file
-from the access or default ACL of the specified files.
+$B%U%!%$%kCf$G;XDj$5$l$k(B ACL $B%(%s%H%j$r:o=|$7$^$9!#(B
 .El
 .Pp
-The above options are evaluated in the order specified
-on the command-line.
-.Sh ACL ENTRIES
-An ACL entry contains three colon-separated fields:
-an ACL tag, an ACL qualifier, and discretionary access
-permissions:
+$B>e=R$N%*%W%7%g%s$O!"%3%^%s%I9T$G;XDj$5$l$?=gHV$KI>2A$5$l$^$9!#(B
+.Sh ACL $B%(%s%H%j(B
+$B$R$H$D$N(B ACL $B%(%s%H%j$K$O!"%3%m%s$G6h@Z$i$l$?<!$N(B 3 $B8D$NMs$,$"$j$^$9!#(B
+$B$=$l$i$O!"(BACL $B%?%0!"(BACL $B=$>~;R!":[NLE*$J%"%/%;%9%Q!<%_%C%7%g%s$G$"$j!"(B
+$B<!$N0UL#$G$9(B:
 .Bl -tag -width indent
-.It Ar "ACL tag"
-The ACL tag specifies the ACL entry type and consists of
-one of the following:
+.It Ar "ACL $B%?%0(B"
 .Dq Li user
-or
+$B$^$?$O(B
 .Ql u
-specifying the access
-granted to the owner of the file or a specified user;
+$B$O!"(B
+$B%U%!%$%k=jM-<T$^$?$O;XDj$5$l$?%f!<%6$K5v2D$5$l$?%"%/%;%9$r;XDj$7$^$9!#(B
 .Dq Li group
-or
+$B$^$?$O(B
 .Ql g
-specifying the access granted to the file owning group
-or a specified group;
+$B$O!"%U%!%$%k=jM-%0%k!<%W$^$?$O;XDj$5$l$?%0%k!<%W$K(B
+$B5v2D$5$l$?%"%/%;%9$r;XDj$7$^$9!#(B
 .Dq Li other
-or
+$B$^$?$O(B
 .Ql o
-specifying the access
-granted to any process that does not match any user or group
-ACL entry;
+$B$O!"(B
+$B$$$+$J$k(B user $B$*$h$S(B group $B$KE,9g$7$J$$%W%m%;%9$K(B
+$B5v2D$5$l$?%"%/%;%9$r;XDj$7$^$9!#(B
 .Dq Li mask
-or
+$B$^$?$O(B
 .Ql m
-specifying the maximum access
-granted to any ACL entry except the
+$B$O!"%U%!%$%k=jM-<T(B
 .Dq Li user
-ACL entry for the file owner and the
+ACL $B%(%s%H%j$*$h$S(B
 .Dq Li other
-ACL entry.
-.It Ar "ACL qualifier"
-The ACL qualifier field describes the user or group associated with
-the ACL entry.  It may consist of one of the following: uid or
-user name, gid or group name, or empty.  For
+ACL $B%(%s%H%j0J30$N$9$Y$F$N(B ACL $B%(%s%H%j$KBP$7$F5v2D$5$l$k!"(B
+$B:GBg%"%/%;%9$r;XDj$7$^$9!#(B
+.It Ar "ACL $B=$>~;R(B"
+ACL $B=$>~;RMs$O!"(B
+$B$"$k(B ACL $B%(%s%H%j$N%f!<%6$^$?$O%0%k!<%W$r5-=R$7$^$9!#(B
+$B$=$l$O<!$N$&$A$N$I$l$+$R$H$D$G$9(B:
+UID $B$+%f!<%6L>!"(BGID $B$+%0%k!<%WL>!"$^$?$O6u!#(B
 .Dq Li user
-ACL entries, an empty field specifies access granted to the
-file owner.  For
+ACL $B%(%s%H%j$KBP$7$F$O!"(B
+$B6u$NMs$O%U%!%$%k=jM-<T$KBP$7$F5v2D$5$l$k%"%/%;%9$r;XDj$7$^$9!#(B
 .Dq Li group
-ACL entries, an empty field specifies access granted to the
-file owning group.
+ACL $B%(%s%H%j$KBP$7$F$O!"(B
+$B6u$NMs$O%U%!%$%k=jM-%0%k!<%W$KBP$7$F5v2D$5$l$k%"%/%;%9$r;XDj$7$^$9!#(B
 .Dq Li mask
-and
+$B$*$h$S(B
 .Dq Li other
-ACL entries do not use this field.
-.It Ar "access permissions"
-The access permissions field contains up to one of each of
-the following:
+$B$N(B ACL $B%(%s%H%j$O!"$3$NMs$r;HMQ$7$^$;$s!#(B
+.It Ar "$B%"%/%;%9%Q!<%_%C%7%g%s(B"
+$B%"%/%;%9%Q!<%_%C%7%g%sMs$O(B
+$B%"%/%;%9%Q!<%_%C%7%g%sMs$O!"(B
+$B<!$NJ8;z$N$=$l$>$l$r:GBg$R$H$D$^$GJ];}2DG=$G$9(B:
 .Ql r ,
 .Ql w ,
-and
 .Ql x
-to set read, write, and
-execute permissions, respectively.  Each of these may be excluded
-or replaced with a
+$B$O!"$=$l$>$l!"FI$_<h$j!&=q$-9~$_!&<B9T$N%Q!<%_%C%7%g%s$r@_Dj$7$^$9!#(B
+$B$3$l$i$NJ8;z$r<h$j=|$$$?$j(B
 .Ql -
-character to indicate no access.
+$BJ8;z$GCV$-49$($k$3$H$G!"%"%/%;%9L5$7$r<($;$^$9!#(B
 .El
 .Pp
-A
 .Dq Li mask
-ACL entry is required on a file with any ACL entries other than
-the default
+ACL $B%(%s%H%j$O!"%G%U%)%k%H$N(B
 .Dq Li user ,
 .Dq Li group ,
-and
 .Dq Li other
-ACL entries.  If the
+ACL $B%(%s%H%j0J30$G$OI,?\$G$9!#(B
 .Fl n
-option is not specified and no
+$B%*%W%7%g%s$,;XDj$5$l$:!"(B
 .Dq Li mask
-ACL entry was specified, the
+ACL $B%(%s%H%j$,;XDj$5$l$J$$>l9g!"(B
 .Nm
-utility
-will apply a
-.Dq Li mask
-ACL entry consisting of the union of the permissions associated
-with all
+$B%f!<%F%#%j%F%#$O!"(B
+$B:G=*E*$J(B ACL $B%(%s%H%jCf$N$9$Y$F$N(B
 .Dq Li group
-ACL entries in the resulting ACL.
+ACL $B%(%s%H%j$N%Q!<%_%C%7%g%s$NOB$+$i$J$k(B
+.Dq Li mask
+ACL $B%(%s%H%j$r;HMQ$7$^$9!#(B
 .Pp
-ACL entries applied from a file using the
 .Fl M
-or
+$B$^$?$O(B
 .Fl X
-options shall be of the following form: one ACL entry per line, as
-previously specified; whitespace is ignored; any text after a
+$B$N%*%W%7%g%s$r;HMQ$7$F%U%!%$%k$+$iE,MQ$5$l$k(B ACL $B%(%s%H%j$O!"(B
+$B<!$N7A<0$G$9(B:
+$BA0=R$N$h$&$K(B 1 ACL $B%(%s%H%j$"$?$j(B 1 $B9T!"(B
+$B6uGr$OL5;k!"(B
 .Ql #
-is ignored (comments).
+$B$N8e$N%F%-%9%H$OL5;k(B ($B%3%a%s%H(B)$B!#(B
 .Pp
-When ACL entries are evaluated, the access check algorithm checks
-the ACL entries in the following order: file owner,
+ACL $B%(%s%H%j$,I>2A$5$l$k$H$-!"(B
+$B%"%/%;%9%A%'%C%/%"%k%4%j%:%`$O<!$N=gHV$G(B ACL $B%(%s%H%j$r%A%'%C%/$7$^$9(B:
+$B%U%!%$%k=jM-<T!"(B
 .Dq Li user
-ACL entries, file owning group,
+ACL $B%(%s%H%j!"%U%!%$%k=jM-%0%k!<%W!"(B
 .Dq Li group
-ACL entries, and
+ACL $B%(%s%H%j!"(B
 .Dq Li other
-ACL entry.
+ACL $B%(%s%H%j!#(B
 .Pp
-Multiple ACL entries specified on the command line are
-separated by commas.
-.Sh DIAGNOSTICS
+$B%3%^%s%I9T>e$GJ#?t$N(B ACL $B%(%s%H%j$r;XDj$9$k$K$O!"%3%s%^$G6h@Z$j$^$9!#(B
+.Sh $B?GCG(B
 .Ex -std
-.Sh EXAMPLES
+.Sh $B;HMQNc(B
 .Dl setfacl -m u::rwx,g:mail:rw file
 .Pp
-Sets read, write, and execute permissions for the
 .Pa file
-owner's ACL entry and read and write permissions for group mail on
-.Pa file .
+$B$KBP$7!"(B
+.Pa file
+$B=jM-<T$N(B ACL $B%(%s%H%j$K(B
+$BFI$_<h$j$H=q$-9~$_$H<B9T$N%Q!<%_%C%7%g%s$r@_Dj$7!"(B
+mail $B%0%k!<%W$KFI$_<h$j$H=q$-9~$_$N%Q!<%_%C%7%g%s$r@_Dj$7$^$9!#(B
 .Pp
 .Dl setfacl -M file1 file2
 .Pp
-Sets/updates the ACL entries contained in
 .Pa file1
-on
-.Pa file2 .
+$BCf$N(B ACL $B%(%s%H%j$N@_Dj(B/$B99?7$r(B
+.Pa file2
+$B$KE,MQ$7$^$9!#(B
 .Pp
 .Dl setfacl -x g:mail:rw file
 .Pp
-Remove the group mail ACL entry containing read/write permissions
-from
-.Pa file.
+$BFI$_=q$-%Q!<%_%C%7%g%s$r;}$D(B mail $B%0%k!<%W$N(B ACL $B%(%s%H%j$r!"(B
+.Pa file
+$B$+$i:o=|$7$^$9!#(B
 .Pp
 .Dl setfacl -bn file
 .Pp
-Remove all
+$BI,?\$N(B 3 $B8D$N%(%s%H%j$r=|$/$9$Y$F$N(B
 .Dq Li access
-ACL entries except for the three required from
-.Pa file .
+ACL $B%(%s%H%j$r!"(B
+.Pa file
+$B$+$i:o=|$7$^$9!#(B
 .Pp
 .Dl getfacl file1 | setfacl -b -n -M - file2
 .Pp
-Copy ACL entries from
+ACL $B%(%s%H%j$r!"(B
 .Pa file1
-to
-.Pa file2 .
-.Sh SEE ALSO
+$B$+$i(B
+.Pa file2
+$B$X%3%T!<$7$^$9!#(B
+.Sh $B4XO"9`L\(B
 .Xr getfacl 1 ,
 .Xr acl 3 ,
 .Xr getextattr 8 ,
 .Xr setextattr 8 ,
 .Xr acl 9 ,
 .Xr extattr 9
-.Sh STANDARDS
-The
+.Sh $B5,3J(B
 .Nm
-utility is expected to be
+$B%f!<%F%#%j%F%#$O(B
 .Tn IEEE
-Std 1003.2c compliant.
-.Sh HISTORY
-Extended Attribute and Access Control List support was developed
-as part of the
+Std 1003.2c $B$K=>$C$F$$$k$3$H$,4|BT$5$l$^$9!#(B
+.Sh $BNr;K(B
+$B3HD%B0@-$*$h$S%"%/%;%9@)8f%j%9%H$N%5%]!<%H$O!"(B
 .Tn TrustedBSD
-Project and introduced in
-.Fx 5.0 .
-.Sh AUTHORS
-The
+Project $B$N0lIt$H$7$F3+H/$5$l!"(B
+.Fx 5.0
+$B$GF3F~$5$l$^$7$?!#(B
+.Sh $B:n<T(B
 .Nm
-utility was written by
-.An Chris D. Faulhaber Aq jedgar@fxp.org .
+$B%f!<%F%#%j%F%#$O(B
+.An Chris D. Faulhaber Aq jedgar@fxp.org
+$B$,=q$-$^$7$?!#(B
diff -u bak/setfmac.8 new/setfmac.8
--- bak/setfmac.8	Sun Feb 23 12:28:01 2003
+++ new/setfmac.8	Sun Feb 23 15:39:46 2003
@@ -32,11 +32,11 @@
 .Dd June 27, 2002
 .Dt SETFMAC 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm setfmac ,
 .Nm setfsmac
-.Nd set MAC label for a file system object
-.Sh SYNOPSIS
+.Nd $B%U%!%$%k%7%9%F%`%*%V%8%'%/%H$X$N(B MAC $B%i%Y%k$N@_Dj(B
+.Sh $B=q<0(B
 .Nm setfmac
 .Op Fl hR
 .Ar label
@@ -46,75 +46,71 @@
 .Op Fl f Ar specfile
 .Op Fl s Ar specfile
 .Ar
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm setfmac
-utility assigns the specified MAC label to the specified files.
-The following options are available:
+$B%f!<%F%#%j%F%#$O!"(B
+$B;XDj$5$l$?(B MAC $B%i%Y%k$r;XDj$5$l$?%U%!%$%k$X3d$jEv$F$^$9!#(B
+$B<!$N%*%W%7%g%s$,MxMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl R
-Set the labels on the file hierarchies rooted in the files instead of
-just the files themselves.
+$B%U%!%$%k<+?H$@$1$G$O$J$/!"(B
+$B;XDj$5$l$?%U%!%$%k$r:,$H$9$k%U%!%$%k3,AX$KBP$7!"%i%Y%k$r@_Dj$7$^$9!#(B
 .It Fl h
-If the file is a symbolic link, change the label of the link rather
-than the file that the link points to.
+$B%U%!%$%k$,%7%s%\%j%C%/%j%s%/$N>l9g!"(B
+$B%j%s%/$G;X$5$l$k%U%!%$%k$G$O$J$/%j%s%/$N%i%Y%k$rJQ99$7$^$9!#(B
 .El
 .Pp
-The
 .Nm setfsmac
-utility accepts a list of specification files as input and sets the MAC
-labels on the specified file system hierarchies.
-Path names specified will be visited in order as given on the command line,
-and each tree will be traversed in pre-order.
-(Generally, it will not be very useful to use relative, instead of absolute,
-paths.)
-The labels that match a file will be combined and set in a single
-transaction.
+$B%f!<%F%#%j%F%#$O!"F~NO$H$7$F;EMM%U%!%$%k$N%j%9%H$r<u$1<h$j!"(B
+$B;XDj$5$l$?%U%!%$%k%7%9%F%`3,AX$KBP$7$F(B MAC $B%i%Y%k$r@_Dj$7$^$9!#(B
+$B;XDj$5$l$?%Q%9L>$O!"%3%^%s%I9T$G;XDj$5$l$?=gHV$K=hM}$5$l!"(B
+$B3F%D%j!<$OA0=g=x(B (pre-order) $B$G=d2s$5$l$^$9(B
+($B0lHLE*$K$O!"(B
+$B@dBP%Q%9$NBe$j$KAjBP%Q%9$r;H$C$F$b$"$^$jM-MQ$G$O$J$$$G$7$g$&(B)$B!#(B
+$B$"$k%U%!%$%k$K%^%C%A$9$k%i%Y%k$O!"AH$_9g$o$;$F0l3g@_Dj$5$l$^$9!#(B
 .Pp
-The following options are available:
+$B<!$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl e
-Treat any file systems encountered which do not support MAC labelling as
-errors, instead of warning and skipping past them.
+MAC $B%i%Y%k$r%5%]!<%H$7$J$$%U%!%$%k%7%9%F%`$K=P2q$&$H!"(B
+$B7Y9p$7$F$=$l0J9_$r%9%-%C%W$9$k$N$G$O$J$/!"(B
+$B%(%i!<$K$7$^$9!#(B
 .It Fl f Ar specfile
-Add the specifications in
 .Ar specfile
-as a set of which at most one will be applied to each file traversed per
+$BCf$N;EMM$r%;%C%H$H$7$FDI2C$7$^$9!#(B
+$B=d2s$5$l$k3F%U%!%$%k$K$O!";XDj$5$l$?(B
 .Fl f Ar specfile
-given.
+$B$KBP$7!"$=$N$&$A$N:GBg(B 1 $B;EMM$N$_$,E,MQ$5$l$^$9!#(B
 .It Fl h
-If the file is a symbolic link, change the label of the link rather
-than the file that the link points to.
+$B%U%!%$%k$,%7%s%\%j%C%/%j%s%/$N>l9g!"(B
+$B%j%s%/$G;X$5$l$k%U%!%$%k$G$O$J$/%j%s%/$N%i%Y%k$rJQ99$7$^$9!#(B
 .It Fl s Ar specfile
-Add the specification in
-.Ar specfile ,
-but assume that the specification format is that used in the port
-of
+.Ar specfile
+$BCf$N;EMM$rDI2C$7$^$9$,!";EMM=q<0$O!"(B
 .Tn SELinux
-to
-.Fx ,
-.Tn SEBSD .
-At most one of the specifications will be applied to each file traversed per
+$B$N(B
+.Fx
+$B0\?"$G$"$k(B
+.Tn SEBSD
+$B$G$"$k$b$N$H2>Dj$5$l$^$9!#(B
+$B=d2s$5$l$k3F%U%!%$%k$K$O!";XDj$5$l$?(B
 .Fl f Ar specfile
-given.
-The prefix
+$B$KBP$7!":GBg(B 1 $B;EMM$N$_$,E,MQ$5$l$^$9!#(B
+$B%W%l%U%#%C%/%9(B
 .Dq Li sebsd/
-will automatically be prepended to the labels in this file, and labels
-matching
+$B$,$3$N%U%!%$%kCf$N%i%Y%k$NA0$K<+F0E*$KIU2C$5$l!"(B
 .Dq Li <<none>>
-will be explicitly not relabeled.
-This permits SEBSD to re-use existing
+$B$K%^%C%A$9$k%i%Y%k$OL@<(E*$K:F%i%Y%k$5$l$^$;$s!#(B
+$B$3$l$K$h$j!"(BSEBSD $B$K$*$$$F!"4{B8$N(B
 .Tn SELinux
-policy specification files
-unmodified.
+$B%]%j%7;EMM%U%!%$%k$rL5=$@5$G:FMxMQ2DG=$K$J$j$^$9!#(B
 .It Fl v
-Increase the degree of verbosity.
-When given, information detailing the labelling operation is printed while
-in progress.
+$B>iD9@-$rA}2C$5$;$^$9!#(B
+$B;XDj$9$k$H!"=hM}Cf$K%i%Y%kA`:n$N>\:Y>pJs$,I=<($5$l$^$9!#(B
 .It Fl x
-Do not cross recurse into new file systems when traversing them.
+$B%U%!%$%k%7%9%F%`=d2sCf$K!"?75,%U%!%$%k%7%9%F%`$X$OF~$j$^$;$s!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr mac 3 ,
 .Xr mac_set_file 3 ,
 .Xr mac_set_link 3 ,
diff -u bak/setpmac.8 new/setpmac.8
--- bak/setpmac.8	Sun Feb 23 12:28:01 2003
+++ new/setpmac.8	Sun Feb 23 16:04:29 2003
@@ -32,31 +32,32 @@
 .Dd JANUARY 14, 2003
 .Os
 .Dt SETPMAC 8
-.Sh NAME
+.Sh $BL>>N(B
 .Nm setpmac
-.Nd run a command with a different MAC process label
-.Sh SYNOPSIS
+.Nd $BJL$N(B MAC $B%W%m%;%9%i%Y%k$K$*$1$k%3%^%s%I<B9T(B
+.Sh $B=q<0(B
 .Nm
 .Ar label
 .Ar command
 .Op Ar args Op Ar ...
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
 .Nm
-utility forks a new process, attempts to set the label to
+$B%f!<%F%#%j%F%#$O!"?75,%W%m%;%9$r%U%)!<%/$7!"%i%Y%k$r(B
 .Ar label
-and if successful, runs
-.Ar command .
-.Sh SEE ALSO
+$B$K@_Dj$7$h$&$H$7!"@.8y$9$k$H(B
+.Ar command
+$B$r<B9T$7$^$9!#(B
+.Sh $B4XO"9`L\(B
 .Xr mac 4 ,
 .Xr maclabel 7 ,
 .Xr getfmac 8 ,
 .Xr getpmac 8 ,
 .Xr setfmac 8
-.Sh AUTHORS
-This software was contributed to the
+.Sh $B:n<T(B
+$B$3$N%=%U%H%&%'%"$O!"(B
+Network Associates Labs,
+the Security Research Division of Network Associates Inc.
+$B$,!"(BDARPA CHATS $B8&5f%W%m%0%i%`$N0lIt$H$7$F!"(B
+DARPA/SPAWAR $B7@Ls(B N66001-01-C-8035 ("CBOSS") $B$N$b$H$K!"(B
 .Fx
-Project by Network Associates Labs,
-the Security Research Division of Network Associates
-Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
-as part of the DARPA CHATS research program.
+Project $B$K4sB#$7$^$7$?!#(B
--
$BKY@nOBM:(B
