summaryrefslogtreecommitdiffstats
path: root/templates/man2/setfsuid.2.pot
diff options
context:
space:
mode:
Diffstat (limited to 'templates/man2/setfsuid.2.pot')
-rw-r--r--templates/man2/setfsuid.2.pot319
1 files changed, 319 insertions, 0 deletions
diff --git a/templates/man2/setfsuid.2.pot b/templates/man2/setfsuid.2.pot
new file mode 100644
index 00000000..afa050bc
--- /dev/null
+++ b/templates/man2/setfsuid.2.pot
@@ -0,0 +1,319 @@
+# SOME DESCRIPTIVE TITLE
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the PACKAGE package.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: PACKAGE VERSION\n"
+"POT-Creation-Date: 2024-03-01 17:07+0100\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: TH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "setfsuid"
+msgstr ""
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "2023-10-31"
+msgstr ""
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "Linux man-pages 6.06"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NAME"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "setfsuid - set user identity used for filesystem checks"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "LIBRARY"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Standard C library (I<libc>, I<-lc>)"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SYNOPSIS"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<#include E<lt>sys/fsuid.hE<gt>>\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<[[deprecated]] int setfsuid(uid_t >I<fsuid>B<);>\n"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "DESCRIPTION"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"On Linux, a process has both a filesystem user ID and an effective user ID. "
+"The (Linux-specific) filesystem user ID is used for permissions checking "
+"when accessing filesystem objects, while the effective user ID is used for "
+"various other kinds of permissions checks (see B<credentials>(7))."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Normally, the value of the process's filesystem user ID is the same as the "
+"value of its effective user ID. This is so, because whenever a process's "
+"effective user ID is changed, the kernel also changes the filesystem user ID "
+"to be the same as the new value of the effective user ID. A process can "
+"cause the value of its filesystem user ID to diverge from its effective user "
+"ID by using B<setfsuid>() to change its filesystem user ID to the value "
+"given in I<fsuid>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Explicit calls to B<setfsuid>() and B<setfsgid>(2) are (were) usually used "
+"only by programs such as the Linux NFS server that need to change what user "
+"and group ID is used for file access without a corresponding change in the "
+"real and effective user and group IDs. A change in the normal user IDs for "
+"a program such as the NFS server is (was) a security hole that can expose it "
+"to unwanted signals. (However, this issue is historical; see below.)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"B<setfsuid>() will succeed only if the caller is the superuser or if "
+"I<fsuid> matches either the caller's real user ID, effective user ID, saved "
+"set-user-ID, or current filesystem user ID."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "RETURN VALUE"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"On both success and failure, this call returns the previous filesystem user "
+"ID of the caller."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "STANDARDS"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Linux."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "HISTORY"
+msgstr ""
+
+#. Linux 1.1.44
+#. and in libc since libc 4.7.6.
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Linux 1.2."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"At the time when this system call was introduced, one process could send a "
+"signal to another process with the same effective user ID. This meant that "
+"if a privileged process changed its effective user ID for the purpose of "
+"file permission checking, then it could become vulnerable to receiving "
+"signals sent by another (unprivileged) process with the same user ID. The "
+"filesystem user ID attribute was thus added to allow a process to change its "
+"user ID for the purposes of file permission checking without at the same "
+"time becoming vulnerable to receiving unwanted signals. Since Linux 2.0, "
+"signal permission handling is different (see B<kill>(2)), with the result "
+"that a process can change its effective user ID without being vulnerable to "
+"receiving signals from unwanted processes. Thus, B<setfsuid>() is nowadays "
+"unneeded and should be avoided in new applications (likewise for "
+"B<setfsgid>(2))."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The original Linux B<setfsuid>() system call supported only 16-bit user "
+"IDs. Subsequently, Linux 2.4 added B<setfsuid32>() supporting 32-bit IDs. "
+"The glibc B<setfsuid>() wrapper function transparently deals with the "
+"variation across kernel versions."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "C library/kernel differences"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"In glibc 2.15 and earlier, when the wrapper for this system call determines "
+"that the argument can't be passed to the kernel without integer truncation "
+"(because the kernel is old and does not support 32-bit user IDs), it will "
+"return -1 and set I<errno> to B<EINVAL> without attempting the system call."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "BUGS"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"No error indications of any kind are returned to the caller, and the fact "
+"that both successful and unsuccessful calls return the same value makes it "
+"impossible to directly determine whether the call succeeded or failed. "
+"Instead, the caller must resort to looking at the return value from a "
+"further call such as I<setfsuid(-1)> (which will always fail), in order to "
+"determine if a preceding call to B<setfsuid>() changed the filesystem user "
+"ID. At the very least, B<EPERM> should be returned when the call fails "
+"(because the caller lacks the B<CAP_SETUID> capability)."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SEE ALSO"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "B<kill>(2), B<setfsgid>(2), B<capabilities>(7), B<credentials>(7)"
+msgstr ""
+
+#. type: TH
+#: debian-bookworm
+#, no-wrap
+msgid "2022-12-04"
+msgstr ""
+
+#. type: TH
+#: debian-bookworm
+#, no-wrap
+msgid "Linux man-pages 6.03"
+msgstr ""
+
+#. type: Plain text
+#: debian-bookworm
+#, no-wrap
+msgid "B<int setfsuid(uid_t >I<fsuid>B<);>\n"
+msgstr ""
+
+#. type: SH
+#: debian-bookworm
+#, no-wrap
+msgid "VERSIONS"
+msgstr ""
+
+#. This system call is present since Linux 1.1.44
+#. and in libc since libc 4.7.6.
+#. type: Plain text
+#: debian-bookworm
+msgid "This system call is present since Linux 1.2."
+msgstr ""
+
+#. type: Plain text
+#: debian-bookworm
+msgid ""
+"B<setfsuid>() is Linux-specific and should not be used in programs intended "
+"to be portable."
+msgstr ""
+
+#. type: SH
+#: debian-bookworm
+#, no-wrap
+msgid "NOTES"
+msgstr ""
+
+#. type: TH
+#: debian-unstable opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "2023-03-30"
+msgstr ""
+
+#. type: TH
+#: debian-unstable opensuse-tumbleweed
+#, no-wrap
+msgid "Linux man-pages 6.05.01"
+msgstr ""
+
+#. type: TH
+#: opensuse-leap-15-6
+#, no-wrap
+msgid "Linux man-pages 6.04"
+msgstr ""