pkcheck - Check whether a process is authorized


   pkcheck [--version] [--help]

   pkcheck [--list-temp]

   pkcheck [--revoke-temp]

   pkcheck --action-id action
           {--process { pid | pid,pid-start-time | pid,pid-start-time,uid }
           | --system-bus-name busname} [--allow-user-interaction]
           [--enable-internal-agent] [--detail key value...]


   pkcheck is used to check whether a process, specified by either
   --process (see below) or --system-bus-name, is authorized for action.
   The --detail option can be used zero or more times to pass details
   about action. If --allow-user-interaction is passed, pkcheck blocks
   while waiting for authentication.

   The invocation pkcheck --list-temp will list all temporary
   authorizations for the current session and pkcheck --revoke-temp will
   revoke all temporary authorizations for the current session.

   This command is a simple wrapper around the PolicyKit D-Bus interface;
   see the D-Bus interface documentation for details.


   If the specified process is authorized, pkcheck exits with a return
   value of 0. If the authorization result contains any details, these are
   printed on standard output as key/value pairs using environment style
   reporting, e.g. first the key followed by a an equal sign, then the
   value followed by a newline.


   Octects that are not in [a-zA-Z0-9_] are escaped using octal codes
   prefixed with \. For example, the UTF-8 string fl, will be printed
   as f\303\270l\54\344\275\240\345\245\275.

   If the specificied process is not authorized, pkcheck exits with a
   return value of 1 and a diagnostic message is printed on standard
   error. Details are printed on standard output.

   If the specificied process is not authorized because no suitable
   authentication agent is available or if the --allow-user-interaction
   wasn't passed, pkcheck exits with a return value of 2 and a diagnostic
   message is printed on standard error. Details are printed on standard

   If the specificied process is not authorized because the authentication
   dialog / request was dismissed by the user, pkcheck exits with a return
   value of 3 and a diagnostic message is printed on standard error.
   Details are printed on standard output.

   If an error occured while checking for authorization, pkcheck exits
   with a return value of 127 with a diagnostic message printed on
   standard error.

   If one or more of the options passed are malformed, pkcheck exits with
   a return value of 126. If stdin is a tty, then this manual page is also


   Do not use either the bare pid or pid,start-time syntax forms for
   --process. There are race conditions in both. New code should always
   use pid,pid-start-time,uid. The value of start-time can be determined
   by consulting e.g. the proc(5) file system depending on the operating
   system. If fewer than 3 arguments are passed, pkcheck will attempt to
   look up them up internally, but note that this may be racy.

   If your program is a daemon with e.g. a custom Unix domain socket, you
   should determine the uid parameter via operating system mechanisms such


   pkcheck, like any other PolicyKit application, will use the
   authentication agent registered for the process in question. However,
   if no authentication agent is available, then pkcheck can register its
   own textual authentication agent if the option --enable-internal-agent
   is passed.


   Written by David Zeuthen <> with a lot of help from
   many others.


   Please send bug reports to either the distribution or the polkit-devel
   mailing list, see the link on how to


   polkit(8), pkaction(1), pkexec(1), pkttyagent(1)


Personal Opportunity - Free software gives you access to billions of dollars of software at no cost. Use this software for your business, personal use or to develop a profitable skill. Access to source code provides access to a level of capabilities/information that companies protect though copyrights. Open source is a core component of the Internet and it is available to you. Leverage the billions of dollars in resources and capabilities to build a career, establish a business or change the world. The potential is endless for those who understand the opportunity.

Business Opportunity - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies know about open source and how open source can give you the advantage.

Free Software

Free Software provides computer programs and capabilities at no cost but more importantly, it provides the freedom to run, edit, contribute to, and share the software. The importance of free software is a matter of access, not price. Software at no cost is a benefit but ownership rights to the software and source code is far more significant.

Free Office Software - The Libre Office suite provides top desktop productivity tools for free. This includes, a word processor, spreadsheet, presentation engine, drawing and flowcharting, database and math applications. Libre Office is available for Linux or Windows.

Free Books

The Free Books Library is a collection of thousands of the most popular public domain books in an online readable format. The collection includes great classical literature and more recent works where the U.S. copyright has expired. These books are yours to read and use without restrictions.

Source Code - Want to change a program or know how it works? Open Source provides the source code for its programs so that anyone can use, modify or learn how to write those programs themselves. Visit the GNU source code repositories to download the source.


Study at Harvard, Stanford or MIT - Open edX provides free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses for almost all major subjects and course levels. Open edx also offers some paid courses and selected certifications.

Linux Manual Pages - A man or manual page is a form of software documentation found on Linux/Unix operating systems. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts.