setuid.2: Remove crufty statement that seteuid() is not in POSIX

See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569812

Reported-by: Ansgar Burchardt <ansgar@2008.43-1.org>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2010-02-21 14:43:05 +01:00
parent 5d469421e6
commit 821c035685
1 changed files with 2 additions and 2 deletions

View File

@ -25,7 +25,7 @@
.\" <richard@greenend.org.uk>, aeb 970616. .\" <richard@greenend.org.uk>, aeb 970616.
.\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com> .\" Modified, 27 May 2004, Michael Kerrisk <mtk.manpages@gmail.com>
.\" Added notes on capability requirements .\" Added notes on capability requirements
.TH SETUID 2 2004-05-27 "Linux" "Linux Programmer's Manual" .TH SETUID 2 2010-02-21 "Linux" "Linux Programmer's Manual"
.SH NAME .SH NAME
setuid \- set user identity setuid \- set user identity
.SH SYNOPSIS .SH SYNOPSIS
@ -63,7 +63,7 @@ Thus, a set-user-ID-root program wishing to temporarily drop root
privileges, assume the identity of an unprivileged user, and then regain privileges, assume the identity of an unprivileged user, and then regain
root privileges afterwards cannot use root privileges afterwards cannot use
.BR setuid (). .BR setuid ().
You can accomplish this with the (non-POSIX, BSD) call You can accomplish this with
.BR seteuid (2). .BR seteuid (2).
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success, zero is returned. On success, zero is returned.