Manpage of SETEUID
SETEUIDSection: Linux Programmer's Manual (2)
NAMEseteuid, setegid - set effective user or group ID
int seteuid(uid_t euid);
int setegid(gid_t egid);
Feature Test Macro Requirements for glibc (see feature_test_macros(7)):
- _POSIX_C_SOURCE >= 200112L
|| /* Glibc versions <= 2.19: */ _BSD_SOURCE
DESCRIPTIONseteuid() sets the effective user ID of the calling process. Unprivileged user processes may only set the effective user ID to the real user ID, the effective user ID or the saved set-user-ID.
RETURN VALUEOn success, zero is returned. On error, -1 is returned, and errnois set appropriately.
- The target user or group ID is not valid in this user namespace.
- The calling process is not privileged (Linux: does not have the CAP_SETUIDcapability in the case of seteuid(), or the CAP_SETGIDcapability in the case of setegid()) and euid(respectively, egid) is not the real user (group) ID, the effective user (group) ID, or the saved set-user-ID (saved set-group-ID).
CONFORMING TOPOSIX.1-2001, POSIX.1-2008, 4.3BSD.
NOTESSetting the effective user (group) ID to the saved set-user-ID (saved set-group-ID) is possible since Linux 1.1.37 (1.1.38). On an arbitrary system one should check _POSIX_SAVED_IDS.
Under glibc 2.0 seteuid(euid)is equivalent to setreuid(-1, euid)and hence may change the saved set-user-ID. Under glibc 2.1 and later it is equivalent to setresuid(-1, euid, -1)and hence does not change the saved set-user-ID. Analogous remarks hold for setegid(), with the difference that the change in implementation from setregid(-1, egid)to setresgid(-1, egid, -1)occurred in glibc 2.2 or 2.3 (depending on the hardware architecture).
C library/kernel differencesOn Linux, seteuid() and setegid() are implemented as library functions that call, respectively, setreuid(2) and setregid(2).
SEE ALSOgeteuid(2), setresuid(2), setreuid(2), setuid(2), capabilities(7), credentials(7), user_namespaces(7)
This document was created by man2html, using the manual pages.
Time: 22:27:43 GMT, June 20, 2016