From 7e0f021a9aec35fd8e6725e87e3313b101d26f5e Mon Sep 17 00:00:00 2001 From: Tobias Klauser Date: Sun, 27 Jan 2008 11:37:44 +0100 Subject: Initial import (2.0.2-6) --- reference/C/MAN/setgid.htm | 99 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 99 insertions(+) create mode 100644 reference/C/MAN/setgid.htm (limited to 'reference/C/MAN/setgid.htm') diff --git a/reference/C/MAN/setgid.htm b/reference/C/MAN/setgid.htm new file mode 100644 index 0000000..c41be33 --- /dev/null +++ b/reference/C/MAN/setgid.htm @@ -0,0 +1,99 @@ +setgid + +
+
+
+
+
+

SETGID(2) Linux Programmer's Manual SETGID(2) +

+ +

NAME +

setgid - set group identity + +

SYNOPSIS +

#include <unistd.h> + + int setgid(gid_t gid) + +

DESCRIPTION +

setgid sets the effective group ID of the current process. + If the caller is the superuser, the real and saved group + ID's are also set. + + Under Linux, setgid is implemented like SYSV with + SAVED_IDS. This allows a setgid (other than root) program + to drop all of it's group privileges, do some un-privi- + leged work, and then re-engage the original effective + group ID in a secure manner. + + If the user is root or the program is setgid root, special + care must be taken. The setgid function checks the effec- + tive gid of the caller and if it is the superuser, all + process related group ID's are set to gid. After this has + occurred, it is impossible for the program to regain root + privileges. + +

RETURN VALUE +

On success, zero is returned. On error, -1 is returned, + and errno is set appropriately. + +

ERRORS +

EPERM The user is not the super-user, and gid does not + match the effective or saved group ID of the call- + ing process. + +

CONFORMING TO +

System V + +
+
+

SEE ALSO +

+getgid, +setregid, +setegid, +

+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+

Linux 1.1.36 29 July 1994 1 +

+ +
+

+


+

+

+ + + + +
+Top + +Master Index + +Keywords + +Functions +
+
+

+


+ +This manual page was brought to you by mjl_man V-2.0 -- cgit v1.2.3-54-g00ecf