Home
last modified time | relevance | path

Searched refs:setgid (Results 1 – 19 of 19) sorted by relevance

/Linux-v4.19/fs/devpts/
Dinode.c98 int setgid; member
256 opts->setgid = 0; in parse_mount_options()
296 opts->setgid = 1; in parse_mount_options()
414 if (opts->setgid) in devpts_show_options()
582 inode->i_gid = opts->setgid ? opts->gid : current_fsgid(); in devpts_pty_new()
/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst6 its parent did not have. The most obvious examples are setuid/setgid
27 been done without the execve call. For example, the setuid and setgid
55 escalate its privileges by directly attacking setuid, setgid, and
/Linux-v4.19/Documentation/filesystems/
Dmandatory-locking.txt75 a setgid file is written to. This is a security measure. The kernel has been
78 to run mandatory lock candidates with setgid privileges.
169 permissions (remove the setgid bit) before trying to read or write to it.
Dxfs.txt72 setgid bit set, in which case it takes the gid from the
73 parent directory, and also gets the setgid bit set if it is
Daffs.txt44 setgid[=gid] Same as above, but for gid.
Dfuse.txt249 setuid and setgid bits when executing programs. To ensure this
/Linux-v4.19/tools/testing/selftests/mount/
Dunprivileged-remount-test.c171 if (setgid(0) != 0) { in create_and_enter_userns()
/Linux-v4.19/kernel/
Dsys_ni.c169 COND_SYSCALL(setgid);
Dsys.c441 SYSCALL_DEFINE1(setgid, gid_t, gid) in SYSCALL_DEFINE1() argument
/Linux-v4.19/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl49 46 32 setgid - compat_sys_s390_setgid16
223 214 64 setgid sys_setgid -
/Linux-v4.19/arch/s390/kernel/syscalls/
Dsyscall.tbl49 46 32 setgid - compat_sys_s390_setgid16
223 214 64 setgid sys_setgid -
/Linux-v4.19/arch/powerpc/include/asm/
Dsystbl.h53 SYSCALL_SPU(setgid)
/Linux-v4.19/arch/parisc/kernel/
Dsyscall_table.S116 ENTRY_SAME(setgid)
/Linux-v4.19/arch/x86/entry/syscalls/
Dsyscall_64.tbl117 106 common setgid __x64_sys_setgid
Dsyscall_32.tbl60 46 i386 setgid sys_setgid16 __ia32_sys_setgid16
/Linux-v4.19/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl117 106 common setgid __x64_sys_setgid
/Linux-v4.19/arch/arm/tools/
Dsyscall.tbl60 46 common setgid sys_setgid16
/Linux-v4.19/Documentation/sysctl/
Dfs.txt213 from "pinning" vulnerable setuid/setgid files against being upgraded by
/Linux-v4.19/init/
DKconfig1177 setgid, and capset.