From d3c8b3e9b7e056e82709f60f864adbff963321c5 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Mon, 13 Dec 2004 08:58:09 +0000 Subject: [PATCH] minor wording chnages --- man2/setgid.2 | 3 ++- man2/setresuid.2 | 4 ++-- man2/setuid.2 | 4 ++-- 3 files changed, 6 insertions(+), 5 deletions(-) diff --git a/man2/setgid.2 b/man2/setgid.2 index dfcc9bc46..0a19c9388 100644 --- a/man2/setgid.2 +++ b/man2/setgid.2 @@ -51,7 +51,8 @@ is set appropriately. .SH ERRORS .TP .B EPERM -The user is not the superuser (does not have the CAP_SETGID capability), and +The calling process is not privileged (does not have the +CAP_SETGID capability), and .I gid does not match the effective group ID or saved set-group-ID of the calling process. diff --git a/man2/setresuid.2 b/man2/setresuid.2 index e51b938d5..2dd0b46f4 100644 --- a/man2/setresuid.2 +++ b/man2/setresuid.2 @@ -66,8 +66,8 @@ does not match the current uid and this call would bring that userID over its NPROC rlimit. .TP .B EPERM -The current process was not privileged (did not have the CAP_SETUID -capability) and tried to change the IDs is a not allowed way. +The calling process is not privileged (did not have the CAP_SETUID +capability) and tried to change the IDs to values that are not permitted. .SH "CONFORMING TO" This call is nonstandard. .SH HISTORY diff --git a/man2/setuid.2 b/man2/setuid.2 index 27424ccda..e7266b1fe 100644 --- a/man2/setuid.2 +++ b/man2/setuid.2 @@ -50,8 +50,8 @@ effective user ID in a secure manner. If the user is root or the program is setuid root, special care must be taken. The .B setuid -function checks the effective user ID of the caller and if it is the superuser, -all process related user ID's are set to +function checks the effective user ID of the caller and if it is +the superuser, all process related user ID's are set to .IR uid . After this has occurred, it is impossible for the program to regain root privileges.