Hi,

the issetugid(2) manpage only mentions the real and effective uid
and gid, yet the implementation in kern_exec.c compares not only
those two but also the saved uid and gid.

Which of these is desired?

Should an executable (as opposed to library code) use issetugid()
to check whether it's called in "privileged" mode? (Thinking of
ksh here.) Or is issetugid() only for library code that checks
environment variables, such as LD_*?

Thanks in advance,
//mirabilos
-- 
This space for rent.

Reply via email to