/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-scanners/checksecurity/ |
H A D | checksecurity_2.0.16.bb | 8 file://check-setuid-use-more-portable-find-args.patch \ 20 sed -i -e "s;LOGDIR=/var/log/setuid;LOGDIR=${LOGDIR};g" ${B}/etc/check-setuid.conf 21 sed -i -e "s;LOGDIR=/var/log/setuid;LOGDIR=${LOGDIR};g" ${B}/plugins/check-setuid 22 sed -i -e "s;LOGDIR:=/var/log/setuid;LOGDIR:=${LOGDIR};g" ${B}/plugins/check-setuid
|
/openbmc/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | no_new_privs.rst | 15 例子就是setuid/setgid控制程序和文件的能力。为了避免父程序也获得这些权限,内 18 - 程序在setuid后,动态装载器处理 ``LD_*`` 环境变量的不同方式。 29 不会授予权限去做任何没有execve调用就不能做的事情。比如, setuid 和 setgid 42 适当权限的任务仍然可以调用 ``setuid(2)`` 并接收 SCM_RIGHTS 数据报。 50 运行的程序都设置了 ``no_new_privs`` ,那么那个 uid 将无法通过攻击 setuid,
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-scanners/checksecurity/files/ |
H A D | check-setuid-use-more-portable-find-args.patch | 4 Subject: [PATCH] check-setuid: use more portable find args 9 plugins/check-setuid | 6 +++--- 12 Index: checksecurity-2.0.16+nmu1/plugins/check-setuid 14 --- checksecurity-2.0.16+nmu1.orig/plugins/check-setuid 15 +++ checksecurity-2.0.16+nmu1/plugins/check-setuid
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 6 its parent did not have. The most obvious examples are setuid/setgid 13 a program is setuid. 27 been done without the execve call. For example, the setuid and setgid 43 ``setuid(2)`` and receive SCM_RIGHTS datagrams. 55 escalate its privileges by directly attacking setuid, setgid, and
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/bubblewrap/ |
H A D | bubblewrap_0.8.0.bb | 18 PACKAGECONFIG[setuid] = "--with-priv-mode=setuid,--with-priv-mode=none"
|
/openbmc/linux/fs/devpts/ |
H A D | inode.c | 76 int setuid; member 234 opts->setuid = 0; in parse_mount_options() 266 opts->setuid = 1; in parse_mount_options() 390 if (opts->setuid) in devpts_show_options() 561 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/openbmc/openbmc/meta-raspberrypi/recipes-graphics/wayland/ |
H A D | weston_%.bbappend | 8 --disable-setuid-install \
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/ |
H A D | notroot.py | 28 os.setuid(uid)
|
/openbmc/linux/tools/testing/selftests/cgroup/ |
H A D | test_cpuset.c | 19 if (setuid(TEST_UID)) in do_migration_fn() 35 if (setuid(TEST_UID)) in do_controller_fn()
|
/openbmc/qemu/ |
H A D | os-posix.c | 163 if (setuid(intended_uid) < 0) { in change_process_uid() 167 if (setuid(0) != -1) { in change_process_uid()
|
/openbmc/linux/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 277 if (setuid(child_uid) < 0) in test_setuid() 492 if (setuid(NO_POLICY_UGID) < 0) in main() 507 if (setuid(RESTRICTED_PARENT_UGID) < 0) in main()
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 27 especially since programs often only call setuid() to drop privileges to a 30 switch to through setuid() beyond allowing a switch to any user on the system. 39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user 92 "Since setuid only affects the current process, and since the SELinux controls
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/gosu/ |
H A D | gosu_1.17.bb | 1 SUMMARY = "Simple Go-based setuid+setgid+setgroups+exec"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/open-vm-tools/open-vm-tools/ |
H A D | 0004-Use-configure-to-test-for-feature-instead-of-platfor.patch | 87 - * setuid or setgid. Alternatives include, 88 + * setuid or setgid, when issetugid or getauxval(AT_SECURE) is not
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/xorg-app/ |
H A D | xterm_388.bb | 24 --disable-setuid \
|
/openbmc/linux/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 171 ASSERT_EQ(setuid(65534), 0); in TEST()
|
/openbmc/linux/tools/testing/selftests/rlimits/ |
H A D | rlimits-per-userns.c | 67 if (setuid(user) < 0) in fork_child()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/atop/atop/ |
H A D | fix-permissions.patch | 6 Update permissions of executable files that remove setuid bit and make
|
/openbmc/qemu/fsdev/ |
H A D | file-op-9p.h | 136 int (*setuid)(FsContext *, uid_t); member
|
/openbmc/linux/tools/testing/selftests/mount/ |
H A D | nosymfollow-test.c | 108 if (setuid(0) != 0) in create_and_enter_ns()
|
H A D | unprivileged-remount-test.c | 175 if (setuid(0) != 0) { in create_and_enter_userns()
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | ipv6_flowlabel_mgr.c | 136 if (setuid(USHRT_MAX)) in run_tests()
|
/openbmc/linux/tools/testing/selftests/move_mount_set_group/ |
H A D | move_mount_set_group_test.c | 104 if (setuid(0)) in create_and_enter_userns()
|
/openbmc/linux/samples/seccomp/ |
H A D | user-trap.c | 228 if (setuid(1000) < 0) { in main()
|
/openbmc/qemu/linux-user/mips/ |
H A D | syscall-args-o32.c.inc | 24 [ 23] = 1, /* setuid */
|