1 .\" Copyright (c) 1980, 1991, 1993, 1994
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)chown.2 8.4 (Berkeley) 4/19/94
41 .Nd change owner and group of a file
46 .Fa "const char *path"
58 .Fa "const char *path"
63 The owner ID and group ID of the file
68 is changed as specified by the arguments
72 The owner of a file may change the
75 he or she is a member,
78 capability is restricted to the super-user.
83 clears the set-user-id and set-group-id bits
85 to prevent accidental or mischievous creation of
86 set-user-id and set-group-id programs if not executed
91 follows symbolic links to operate on the target of the link
92 rather than the link itself.
97 is particularly useful when used in conjunction
98 with the file locking primitives (see
103 system call is similar to
105 but does not follow symbolic links.
107 One of the owner or group id's
108 may be left unchanged by specifying it as -1.
117 system calls will fail if:
121 Search permission is denied for a component of the path prefix.
126 points outside the process's allocated address space.
129 Too many symbolic links are encountered in translating the pathname.
130 This is taken to be indicative of a looping symbolic link.
132 .It Bq Er ENAMETOOLONG
133 A component of a pathname exceeded 255 characters,
134 or an entire path name exceeded 1023 characters.
142 A component of the path prefix is not a directory.
147 system call will fail if:
154 does not refer to a valid descriptor.
160 refers to a socket, not a file.
163 Any of these calls will fail if:
167 Its execution is interrupted by a signal.
170 An I/O error occurs while reading from or writing to the file system.
173 The effective user ID does not match the owner of the file
174 and the calling process does not have appropriate (i.e., root) privileges.
177 The named file resides on a read-only file system.
187 system call is expected to conform to
196 system call appeared in
203 system calls were changed to follow symbolic links in
207 system call was added in
209 to compensate for the loss of functionality.