Name

seteuid, setegid — set effective user or group ID

Synopsis

#include <sys/types.h>
#include <unistd.h>
int seteuid( uid_t euid);
 
int setegid( gid_t egid);
 
[Note] Note
Feature Test Macro Requirements for glibc (see feature_test_macros(7)):
seteuid(), setegid():
_POSIX_C_SOURCE >= 200112L || /* Glibc versions <= 2.19:
*/ _BSD_SOURCE

DESCRIPTION

seteuid() sets the effective user ID of the calling process. Unprivileged user processes may only set the effective user ID to the real user ID, the effective user ID or the saved set-user-ID.

Precisely the same holds for setegid() with "group" instead of "user".

RETURN VALUE

On success, zero is returned. On error, −1 is returned, and errno is set appropriately.

[Note] Note

there are cases where seteuid() can fail even when the caller is UID 0; it is a grave security error to omit checking for a failure return from seteuid().

ERRORS

EINVAL

The target user or group ID is not valid in this user namespace.

EPERM

The calling process is not privileged (Linux: does not have the CAP_SETUID capability in the case of seteuid(), or the CAP_SETGID capability in the case of setegid()) and euid (respectively, egid) is not the real user (group) ID, the effective user (group) ID, or the saved set-user-ID (saved set-group-ID).

CONFORMING TO

POSIX.1-2001, POSIX.1-2008, 4.3BSD.

NOTES

Setting the effective user (group) ID to the saved set-user-ID (saved set-group-ID) is possible since Linux 1.1.37 (1.1.38). On an arbitrary system one should check _POSIX_SAVED_IDS.

Under glibc 2.0 seteuid(euid) is equivalent to setreuid(−1, euid) and hence may change the saved set-user-ID. Under glibc 2.1 and later it is equivalent to setresuid(−1, euid, −1) and hence does not change the saved set-user-ID. Analogous remarks hold for setegid(), with the difference that the change in implementation from setregid(−1, egid) to setresgid(−1, egid, −1) occurred in glibc 2.2 or 2.3 (depending on the hardware architecture).

According to POSIX.1, seteuid() (setegid()) need not permit euid (egid) to be the same value as the current effective user (group) ID, and some implementations do not permit this.

C library/kernel differences

On Linux, seteuid() and setegid() are implemented as library functions that call, respectively, setreuid(2) and setregid(2).

SEE ALSO

geteuid(2), setresuid(2), setreuid(2), setuid(2), capabilities(7), credentials(7), user_namespaces(7)

COLOPHON

This page is part of release 4.07 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man−pages/.


  Copyright (C) 2001 Andries Brouwer (aebcwi.nl)

%%%LICENSE_START(VERBATIM)
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
preserved on all copies.

Permission is granted to copy and distribute modified versions of this
manual under the conditions for verbatim copying, provided that the
entire resulting derived work is distributed under the terms of a
permission notice identical to this one.

Since the Linux kernel and libraries are constantly changing, this
manual page may be incorrect or out-of-date.  The author(s) assume no
responsibility for errors or omissions, or for damages resulting from
the use of the information contained herein.  The author(s) may not
have taken the same level of care in the production of this manual,
which is licensed free of charge, as they might when working
professionally.

Formatted or processed versions of this manual, if unaccompanied by
the source, must acknowledge the copyright and authors of this work.
%%%LICENSE_END

[should really be seteuid.3]
Modified, 27 May 2004, Michael Kerrisk <mtk.manpagesgmail.com>
    Added notes on capability requirements