Home
last modified time | relevance | path

Searched refs:setgid (Results 1 – 25 of 37) sorted by relevance

12

/kernel/liteos_a/testsuites/unittest/container/smoke/
DIt_user_container_003.cpp64 ret = setgid(TEST_SET_NEW_ID); in TestMap()
106 ret = setgid(TEST_SET_OLD_ID); in childFunc()
DIt_user_container_002.cpp100 ret = setgid(TEST_SET_NEW_ID); in childFunc()
126 ret = setgid(TEST_SET_OLD_ID); in ItUserContainer002()
/kernel/linux/linux-5.10/Documentation/userspace-api/
Dno_new_privs.rst6 its parent did not have. The most obvious examples are setuid/setgid
27 been done without the execve call. For example, the setuid and setgid
55 escalate its privileges by directly attacking setuid, setgid, and
/kernel/linux/linux-5.10/fs/devpts/
Dinode.c95 int setgid; member
253 opts->setgid = 0; in parse_mount_options()
293 opts->setgid = 1; in parse_mount_options()
411 if (opts->setgid) in devpts_show_options()
580 inode->i_gid = opts->setgid ? opts->gid : current_fsgid(); in devpts_pty_new()
/kernel/linux/linux-5.10/tools/testing/selftests/safesetid/
Dsafesetid-test.c297 if (setgid(NO_POLICY_USER) < 0) in main()
314 if (setgid(RESTRICTED_PARENT) < 0) in main()
/kernel/linux/linux-5.10/tools/testing/selftests/clone3/
Dclone3_cap_checkpoint_restore.c169 EXPECT_EQ(setgid(65534), 0) in TEST()
/kernel/linux/linux-5.10/tools/testing/selftests/mount/
Dnosymfollow-test.c106 if (setgid(0) != 0) in create_and_enter_ns()
Dunprivileged-remount-test.c171 if (setgid(0) != 0) { in create_and_enter_userns()
/kernel/linux/linux-5.10/Documentation/filesystems/
Dmandatory-locking.rst82 a setgid file is written to. This is a security measure. The kernel has been
85 to run mandatory lock candidates with setgid privileges.
176 permissions (remove the setgid bit) before trying to read or write to it.
/kernel/liteos_a/testsuites/unittest/security/reugid/smoke/
Dreugid_test_001.cpp109 ret = setgid(3000); in Child()
123 ret = setgid(-1); in Child()
/kernel/linux/linux-5.10/kernel/
Dsys_ni.c174 COND_SYSCALL(setgid);
/kernel/linux/linux-5.10/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl49 46 32 setgid - compat_sys_s390_setgid16
223 214 64 setgid sys_setgid -
/kernel/linux/linux-5.10/arch/s390/kernel/syscalls/
Dsyscall.tbl49 46 32 setgid - sys_setgid16
223 214 64 setgid sys_setgid -
/kernel/linux/linux-5.10/arch/sparc/kernel/syscalls/
Dsyscall.tbl65 46 32 setgid sys_setgid16
66 46 64 setgid sys_setgid
/kernel/linux/linux-5.10/tools/testing/selftests/filesystems/binderfs/
Dbinderfs_test.c192 if (setgid(0)) in setid_userns_root()
/kernel/linux/linux-5.10/arch/mips/kernel/syscalls/
Dsyscall_n64.tbl114 104 n64 setgid sys_setgid
Dsyscall_n32.tbl114 104 n32 setgid sys_setgid
Dsyscall_o32.tbl58 46 o32 setgid sys_setgid
/kernel/linux/linux-5.10/arch/ia64/kernel/syscalls/
Dsyscall.tbl49 37 common setgid sys_setgid
/kernel/linux/linux-5.10/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl117 106 common setgid sys_setgid
/kernel/linux/linux-5.10/arch/x86/entry/syscalls/
Dsyscall_64.tbl117 106 common setgid sys_setgid
/kernel/linux/linux-5.10/arch/xtensa/kernel/syscalls/
Dsyscall.tbl152 138 common setgid sys_setgid
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dxfs.rst69 ``setgid`` bit set, in which case it takes the ``gid`` from the
70 parent directory, and also gets the ``setgid`` bit set if it is
/kernel/linux/linux-5.10/arch/parisc/kernel/syscalls/
Dsyscall.tbl59 46 common setgid sys_setgid
/kernel/linux/linux-5.10/arch/microblaze/kernel/syscalls/
Dsyscall.tbl56 46 common setgid sys_setgid

12