/openbmc/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | no_new_privs.rst | 15 例子就是setuid/setgid控制程序和文件的能力。为了避免父程序也获得这些权限,内 29 不会授予权限去做任何没有execve调用就不能做的事情。比如, setuid 和 setgid 51 setgid 和使用文件能力的二进制来提权;它需要先攻击一些没有被设置 ``no_new_privs``
|
/openbmc/linux/fs/devpts/ |
H A D | inode.c | 77 int setgid; member 235 opts->setgid = 0; in parse_mount_options() 275 opts->setgid = 1; in parse_mount_options() 393 if (opts->setgid) in devpts_show_options() 562 inode->i_gid = opts->setgid ? opts->gid : current_fsgid(); in devpts_pty_new()
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 6 its parent did not have. The most obvious examples are setuid/setgid 27 been done without the execve call. For example, the setuid and setgid 55 escalate its privileges by directly attacking setuid, setgid, and
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/ |
H A D | notroot.py | 27 os.setgid(uid)
|
/openbmc/linux/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 333 if (setgid(child_gid) < 0) in test_setgid() 490 if (setgid(NO_POLICY_UGID) < 0) in main() 505 if (setgid(RESTRICTED_PARENT_UGID) < 0) in main()
|
/openbmc/openbmc/poky/meta/recipes-core/base-passwd/base-passwd/ |
H A D | 0001-base-passwd-Add-the-sgx-group.patch | 8 causes images which have CONFIG_MULTIUSER unset to fail with `setgid:
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/gosu/ |
H A D | gosu_1.17.bb | 1 SUMMARY = "Simple Go-based setuid+setgid+setgroups+exec"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/open-vm-tools/open-vm-tools/ |
H A D | 0004-Use-configure-to-test-for-feature-instead-of-platfor.patch | 87 - * setuid or setgid. Alternatives include, 88 + * setuid or setgid, when issetugid or getauxval(AT_SECURE) is not
|
/openbmc/linux/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 169 EXPECT_EQ(setgid(65534), 0) in TEST()
|
/openbmc/linux/tools/testing/selftests/rlimits/ |
H A D | rlimits-per-userns.c | 65 if (setgid(group) < 0) in fork_child()
|
/openbmc/linux/tools/testing/selftests/mount/ |
H A D | nosymfollow-test.c | 106 if (setgid(0) != 0) in create_and_enter_ns()
|
H A D | unprivileged-remount-test.c | 171 if (setgid(0) != 0) { in create_and_enter_userns()
|
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/sthttpd/ |
H A D | sthttpd_2.27.1.bb | 29 # Note that `${sbindir}/makeweb' is installed setgid to this group,
|
/openbmc/qemu/ |
H A D | os-posix.c | 146 if (setgid(intended_gid) < 0) { in change_process_uid()
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/ |
H A D | cronie_1.7.2.bb | 74 # setgid for crontab binary
|
/openbmc/linux/tools/testing/selftests/move_mount_set_group/ |
H A D | move_mount_set_group_test.c | 101 if (setgid(0)) in create_and_enter_userns()
|
/openbmc/qemu/linux-user/mips/ |
H A D | syscall-args-o32.c.inc | 47 [ 46] = 1, /* setgid */
|
/openbmc/qemu/bsd-user/ |
H A D | bsd-proc.h | 247 return get_errno(setgid(arg1)); in do_bsd_setgid()
|
/openbmc/linux/kernel/ |
H A D | sys_ni.c | 96 COND_SYSCALL(setgid);
|
/openbmc/linux/arch/sparc/kernel/syscalls/ |
H A D | syscall.tbl | 65 46 32 setgid sys_setgid16 66 46 64 setgid sys_setgid
|
/openbmc/qemu/linux-user/sparc/ |
H A D | syscall.tbl | 65 46 32 setgid sys_setgid16 66 46 64 setgid sys_setgid
|
/openbmc/qemu/linux-user/s390x/ |
H A D | syscall.tbl | 49 46 32 setgid - sys_setgid16 223 214 64 setgid sys_setgid -
|
/openbmc/linux/arch/s390/kernel/syscalls/ |
H A D | syscall.tbl | 49 46 32 setgid - sys_setgid16 223 214 64 setgid sys_setgid -
|
/openbmc/linux/tools/perf/arch/s390/entry/syscalls/ |
H A D | syscall.tbl | 49 46 32 setgid - sys_setgid16 223 214 64 setgid sys_setgid -
|
/openbmc/qemu/system/ |
H A D | qemu-seccomp.c | 197 { SCMP_SYS(setgid), QEMU_SECCOMP_SET_PRIVILEGED,
|