Searched refs:setgid (Results 1 – 19 of 19) sorted by relevance
98 int setgid; member256 opts->setgid = 0; in parse_mount_options()296 opts->setgid = 1; in parse_mount_options()414 if (opts->setgid) in devpts_show_options()582 inode->i_gid = opts->setgid ? opts->gid : current_fsgid(); in devpts_pty_new()
6 its parent did not have. The most obvious examples are setuid/setgid27 been done without the execve call. For example, the setuid and setgid55 escalate its privileges by directly attacking setuid, setgid, and
75 a setgid file is written to. This is a security measure. The kernel has been78 to run mandatory lock candidates with setgid privileges.169 permissions (remove the setgid bit) before trying to read or write to it.
72 setgid bit set, in which case it takes the gid from the73 parent directory, and also gets the setgid bit set if it is
44 setgid[=gid] Same as above, but for gid.
249 setuid and setgid bits when executing programs. To ensure this
171 if (setgid(0) != 0) { in create_and_enter_userns()
169 COND_SYSCALL(setgid);
441 SYSCALL_DEFINE1(setgid, gid_t, gid) in SYSCALL_DEFINE1() argument
49 46 32 setgid - compat_sys_s390_setgid16223 214 64 setgid sys_setgid -
53 SYSCALL_SPU(setgid)
116 ENTRY_SAME(setgid)
117 106 common setgid __x64_sys_setgid
60 46 i386 setgid sys_setgid16 __ia32_sys_setgid16
60 46 common setgid sys_setgid16
213 from "pinning" vulnerable setuid/setgid files against being upgraded by
1177 setgid, and capset.