diff options
| author | Russ Cox <rsc@golang.org> | 2016-10-18 22:56:14 -0400 |
|---|---|---|
| committer | Russ Cox <rsc@golang.org> | 2016-10-19 13:33:18 +0000 |
| commit | 6c295a9a71924478a344e7b447ff3b44b1e94511 (patch) | |
| tree | 11948bc8d8ea3945df320186b23a1e7b93c1bd2e /src/syscall/exec_linux.go | |
| parent | f2f8d58b92cd7fd9616c98fb012467656de5a3cb (diff) | |
| download | go-6c295a9a71924478a344e7b447ff3b44b1e94511.tar.xz | |
syscall: for ForkExec on Linux, always use 32-bit setgroups system call
Fixes #17092.
Change-Id: If203d802a919e00594ddc1282782fc59a083fd63
Reviewed-on: https://go-review.googlesource.com/31458
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
Diffstat (limited to 'src/syscall/exec_linux.go')
| -rw-r--r-- | src/syscall/exec_linux.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/syscall/exec_linux.go b/src/syscall/exec_linux.go index 39764f7076..b0cad52f7b 100644 --- a/src/syscall/exec_linux.go +++ b/src/syscall/exec_linux.go @@ -214,7 +214,7 @@ func forkAndExecInChild(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr // and disabled setgroups, because otherwise unprivileged user namespace // will fail with any non-empty SysProcAttr.Credential. if !(sys.GidMappings != nil && !sys.GidMappingsEnableSetgroups && ngroups == 0) { - _, _, err1 = RawSyscall(SYS_SETGROUPS, ngroups, groups, 0) + _, _, err1 = RawSyscall(_SYS_setgroups, ngroups, groups, 0) if err1 != 0 { goto childerror } |
