1 .\" Copyright (C) 1997 Andries Brouwer (aeb@cwi.nl)
2 .\" and Copyright (C) 2005, 2010, 2014, 2015, Michael Kerrisk <mtk.manpages@gmail.com>
4 .\" %%%LICENSE_START(VERBATIM)
5 .\" Permission is granted to make and distribute verbatim copies of this
6 .\" manual provided the copyright notice and this permission notice are
7 .\" preserved on all copies.
9 .\" Permission is granted to copy and distribute modified versions of this
10 .\" manual under the conditions for verbatim copying, provided that the
11 .\" entire resulting derived work is distributed under the terms of a
12 .\" permission notice identical to this one.
14 .\" Since the Linux kernel and libraries are constantly changing, this
15 .\" manual page may be incorrect or out-of-date. The author(s) assume no
16 .\" responsibility for errors or omissions, or for damages resulting from
17 .\" the use of the information contained herein. The author(s) may not
18 .\" have taken the same level of care in the production of this manual,
19 .\" which is licensed free of charge, as they might when working
22 .\" Formatted or processed versions of this manual, if unaccompanied by
23 .\" the source, must acknowledge the copyright and authors of this work.
26 .\" Modified, 2003-05-26, Michael Kerrisk, <mtk.manpages@gmail.com>
27 .TH SETRESUID 2 2021-03-22 "Linux" "Linux Programmer's Manual"
29 setresuid, setresgid \- set real, effective, and saved user or group ID
32 .BR "#define _GNU_SOURCE" " /* See feature_test_macros(7) */"
33 .B #include <unistd.h>
35 .BI "int setresuid(uid_t " ruid ", uid_t " euid ", uid_t " suid );
36 .BI "int setresgid(gid_t " rgid ", gid_t " egid ", gid_t " sgid );
40 sets the real user ID, the effective user ID, and the
41 saved set-user-ID of the calling process.
43 An unprivileged process may change its real UID,
44 effective UID, and saved set-user-ID, each to one of:
45 the current real UID, the current effective UID, or the
46 current saved set-user-ID.
48 A privileged process (on Linux, one having the \fBCAP_SETUID\fP capability)
49 may set its real UID, effective UID, and
50 saved set-user-ID to arbitrary values.
52 If one of the arguments equals \-1, the corresponding value is not changed.
54 Regardless of what changes are made to the real UID, effective UID,
55 and saved set-user-ID, the filesystem UID is always set to the same
56 value as the (possibly new) effective UID.
58 Completely analogously,
60 sets the real GID, effective GID, and saved set-group-ID
61 of the calling process (and always modifies the filesystem GID
62 to be the same as the effective GID),
63 with the same restrictions for unprivileged processes.
65 On success, zero is returned.
66 On error, \-1 is returned, and
68 is set to indicate the error.
73 can fail even when the caller is UID 0;
74 it is a grave security error to omit checking for a failure return from
79 The call would change the caller's real UID (i.e.,
81 does not match the caller's real UID),
82 but there was a temporary failure allocating the
83 necessary kernel data structures.
87 does not match the caller's real UID and this call would
88 bring the number of processes belonging to the real user ID
93 Since Linux 3.1, this error case no longer occurs
94 (but robust applications should check for this error);
95 see the description of
101 One or more of the target user or group IDs
102 is not valid in this user namespace.
105 The calling process is not privileged (did not have the necessary
106 capability in its user namespace)
107 and tried to change the IDs to values that are not permitted.
110 the necessary capability is
117 These calls are available under Linux since Linux 2.1.44.
119 These calls are nonstandard;
120 they also appear on HP-UX and some of the BSDs.
122 Under HP-UX and FreeBSD, the prototype is found in
124 Under Linux, the prototype is provided by glibc since version 2.3.2.
130 system calls supported only 16-bit user and group IDs.
131 Subsequently, Linux 2.4 added
135 supporting 32-bit IDs.
140 wrapper functions transparently deal with the variations across kernel versions.
142 .SS C library/kernel differences
143 At the kernel level, user IDs and group IDs are a per-thread attribute.
144 However, POSIX requires that all threads in a process
145 share the same credentials.
146 The NPTL threading implementation handles the POSIX requirements by
147 providing wrapper functions for
148 the various system calls that change process UIDs and GIDs.
149 These wrapper functions (including those for
153 employ a signal-based technique to ensure
154 that when one thread changes credentials,
155 all of the other threads in the process also change their credentials.
165 .BR capabilities (7),
167 .BR user_namespaces (7)