Date: Tue, 14 Jul 1998 10:27:08 -0500 (EST) From: Alfred Perlstein <bright@hotjobs.com> To: Stephen Hocking-Senior Programmer PGS Tensor Perth <shocking@prth.pgs.com> Cc: hackers@FreeBSD.ORG Subject: Re: How do you tell (within the kernel) if we started setuid? Message-ID: <Pine.BSF.3.96.980714102640.5923F-100000@bright.ny.otec.com> In-Reply-To: <199807140237.KAA10232@ariadne.tensor.pgs.com>
next in thread | previous in thread | raw e-mail | index | archive | help
don't crosspost please. NAME issetugid - is current process tainted by uid or gid changes DESCRIPTION The issetugid() function returns 1 if the process environment or memory address space is considered ``tainted'', and returns 0 otherwise. A process is tainted if it was created as a result of an execve(2) system call which had either of the setuid or setgid bits set (and extra privi- leges were given as a result) or if it has changed any of it's real, ef- fective or saved user or group ID's since it began execution. -alfred On Tue, 14 Jul 1998, Stephen Hocking-Senior Programmer PGS Tensor Perth wrote: > > If you're executing a program that was started setuid root but has > subsequently given up its privileges, is there anyway to tell if it was > originally set uid? > > > Stephen > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-current" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980714102640.5923F-100000>