aboutsummaryrefslogtreecommitdiff
path: root/src/syscall/exec_linux.go
diff options
context:
space:
mode:
authorRuss Cox <rsc@golang.org>2016-10-18 22:56:14 -0400
committerRuss Cox <rsc@golang.org>2016-10-19 13:33:18 +0000
commit6c295a9a71924478a344e7b447ff3b44b1e94511 (patch)
tree11948bc8d8ea3945df320186b23a1e7b93c1bd2e /src/syscall/exec_linux.go
parentf2f8d58b92cd7fd9616c98fb012467656de5a3cb (diff)
downloadgo-6c295a9a71924478a344e7b447ff3b44b1e94511.tar.xz
syscall: for ForkExec on Linux, always use 32-bit setgroups system call
Fixes #17092. Change-Id: If203d802a919e00594ddc1282782fc59a083fd63 Reviewed-on: https://go-review.googlesource.com/31458 Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
Diffstat (limited to 'src/syscall/exec_linux.go')
-rw-r--r--src/syscall/exec_linux.go2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/syscall/exec_linux.go b/src/syscall/exec_linux.go
index 39764f7076..b0cad52f7b 100644
--- a/src/syscall/exec_linux.go
+++ b/src/syscall/exec_linux.go
@@ -214,7 +214,7 @@ func forkAndExecInChild(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr
// and disabled setgroups, because otherwise unprivileged user namespace
// will fail with any non-empty SysProcAttr.Credential.
if !(sys.GidMappings != nil && !sys.GidMappingsEnableSetgroups && ngroups == 0) {
- _, _, err1 = RawSyscall(SYS_SETGROUPS, ngroups, groups, 0)
+ _, _, err1 = RawSyscall(_SYS_setgroups, ngroups, groups, 0)
if err1 != 0 {
goto childerror
}