Deleted Added
full compact
su.1 (222759) su.1 (222770)
1.\" Copyright (c) 1988, 1990, 1993, 1994
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 12 unchanged lines hidden (view full) ---

21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\" @(#)su.1 8.2 (Berkeley) 4/18/94
1.\" Copyright (c) 1988, 1990, 1993, 1994
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 12 unchanged lines hidden (view full) ---

21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\" @(#)su.1 8.2 (Berkeley) 4/18/94
29.\" $FreeBSD: head/usr.bin/su/su.1 222759 2011-06-06 15:21:53Z gjb $
29.\" $FreeBSD: head/usr.bin/su/su.1 222770 2011-06-06 19:33:19Z gjb $
30.\"
31.Dd June 6, 2011
32.Dt SU 1
33.Os
34.Sh NAME
35.Nm su
36.Nd substitute user identity
37.Sh SYNOPSIS

--- 160 unchanged lines hidden (view full) ---

198and runs the command
199.Li catman .
200You will be asked for man's password unless your real UID is 0.
201Note that the
202.Fl m
203option is required since user
204.Dq man
205does not have a valid shell by default.
30.\"
31.Dd June 6, 2011
32.Dt SU 1
33.Os
34.Sh NAME
35.Nm su
36.Nd substitute user identity
37.Sh SYNOPSIS

--- 160 unchanged lines hidden (view full) ---

198and runs the command
199.Li catman .
200You will be asked for man's password unless your real UID is 0.
201Note that the
202.Fl m
203option is required since user
204.Dq man
205does not have a valid shell by default.
206In this example,
207.Fl c
208is passed to the shell of the user
209.Dq man ,
210and is not interpreted as an argument to
211.Nm .
206.It Li "su -m man -c 'catman /usr/share/man /usr/local/man'"
207Same as above, but the target command consists of more than a
208single word and hence is quoted for use with the
209.Fl c
210option being passed to the shell.
211(Most shells expect the argument to
212.Fl c
213to be a single word).

--- 29 unchanged lines hidden ---
212.It Li "su -m man -c 'catman /usr/share/man /usr/local/man'"
213Same as above, but the target command consists of more than a
214single word and hence is quoted for use with the
215.Fl c
216option being passed to the shell.
217(Most shells expect the argument to
218.Fl c
219to be a single word).

--- 29 unchanged lines hidden ---