Hi, the issetugid(2) manpage only mentions the real and effective uid and gid, yet the implementation in kern_exec.c compares not only those two but also the saved uid and gid.
Which of these is desired? Should an executable (as opposed to library code) use issetugid() to check whether it's called in "privileged" mode? (Thinking of ksh here.) Or is issetugid() only for library code that checks environment variables, such as LD_*? Thanks in advance, //mirabilos -- This space for rent.