For sticky, set-UID, and set-GID mode bits (as used in POSIX).
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
.\" 2007-07-08, mtk, added an example program; updated SYNOPSIS
.\" 2008-05-08, mtk, Describe rules governing ownership of new files
.\" (bsdgroups versus sysvgroups, and the effect of the parent
-.\" directory's set-group-ID permission bit).
+.\" directory's set-group-ID mode bit).
.\"
.TH CHOWN 2 2014-08-19 "Linux" "Linux Programmer's Manual"
.SH NAME
The group of the file depends on a range of factors,
including the type of filesystem,
the options used to mount the filesystem,
-and whether or not the set-group-ID permission bit is enabled
+and whether or not the set-group-ID mode bit is enabled
on the parent directory.
If the filesystem supports the
.I "\-o\ grpid"
The effective user ID of the process is copied to the saved set-user-ID;
similarly, the effective group ID is copied to the saved set-group-ID.
This copying takes place after any effective ID changes that occur
-because of the set-user-ID and set-group-ID permission bits.
+because of the set-user-ID and set-group-ID mode bits.
If the executable is an a.out dynamically linked
binary executable containing
otherwise be closed after a successful
.BR execve (),
and the process would gain privilege because the set-user_ID or
-set-group_ID permission bit was set on the executed file,
+set-group_ID mode bit was set on the executed file,
then the system may open an unspecified file for each of these
file descriptors.
As a general principle, no portable program, whether privileged or not,
that could not have been done without the
.BR execve (2)
call (for example,
-rendering the set-user-ID and set-group-ID permission bits,
+rendering the set-user-ID and set-group-ID mode bits,
and file capabilities non-functional).
Once set, this bit cannot be unset.
The setting of this bit is inherited by children created by
time of last modification; see
.BR stat (2))
for the file are updated,
-and the set-user-ID and set-group-ID permission bits may be cleared.
+and the set-user-ID and set-group-ID mode bits may be cleared.
.LP
With
.BR ftruncate (),
.IP \(bu 3
the target is a regular file;
.IP \(bu
-the target file does not have its set-user-ID permission bit enabled;
+the target file does not have its set-user-ID mode bit enabled;
.IP \(bu
the target file does not have both its set-group-ID and
-group-executable permission bits enabled; and
+group-executable mode bits enabled; and
.IP \(bu
the caller has permission to read and write the target file
(either via the file's permissions mask or because it has
.PD
.TP
.B CAP_FSETID
-Don't clear set-user-ID and set-group-ID permission
+Don't clear set-user-ID and set-group-ID mode
bits when a file is modified;
set the set-group-ID bit for a file whose GID does not match
the filesystem or any of the supplementary GIDs of the calling process.
For set-user-ID/set-group-ID ELF binaries,
preload pathnames containing slashes are ignored,
and libraries in the standard search directories are loaded
-only if the set-user-ID permission bit is enabled on the library file.
+only if the set-user-ID mode bit is enabled on the library file.
.TP
.B LD_TRACE_LOADED_OBJECTS
(ELF only)