/openbmc/qemu/bsd-user/ |
H A D | bsd-proc.h | 293 static inline abi_long do_bsd_setresuid(uid_t ruid, uid_t euid, uid_t suid) in do_bsd_setresuid() argument 295 return get_errno(setresuid(ruid, euid, suid)); in do_bsd_setresuid() 303 uid_t ruid, euid, suid; in do_bsd_getresuid() local 305 ret = get_errno(getresuid(&ruid, &euid, &suid)); in do_bsd_getresuid() 315 if (put_user_s32(suid, arg3)) { in do_bsd_getresuid() 326 uid_t ruid, euid, suid; in do_bsd_getresgid() local 328 ret = get_errno(getresgid(&ruid, &euid, &suid)); in do_bsd_getresgid() 338 if (put_user_s32(suid, arg3)) { in do_bsd_getresgid()
|
/openbmc/linux/kernel/ |
H A D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 61 low2highuid(suid)); in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
H A D | sys.c | 563 !uid_eq(old->suid, keuid) && in __sys_setreuid() 575 new->suid = new->euid; in __sys_setreuid() 629 new->suid = new->uid = kuid; in __sys_setuid() 678 ksuid = make_kuid(ns, suid); in __sys_setresuid() 695 (suid == (uid_t) -1 || uid_eq(ksuid, old->suid))) in __sys_setresuid() 722 if (suid != (uid_t) -1) in __sys_setresuid() 723 new->suid = ksuid; in __sys_setresuid() 751 uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 755 suid = from_kuid_munged(cred->user_ns, cred->suid); in SYSCALL_DEFINE3() 761 return put_user(suid, suidp); in SYSCALL_DEFINE3() [all …]
|
H A D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | cred.c | 48 .suid = GLOBAL_ROOT_UID, 270 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 442 !uid_eq(new->suid, old->suid) || in commit_creds()
|
H A D | auditsc.c | 399 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 413 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 422 cred->suid); in audit_field_compare() 428 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 511 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules() 1013 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1668 from_kuid(&init_user_ns, cred->suid), in audit_log_uring()
|
H A D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member
|
/openbmc/openbmc/poky/meta/recipes-core/busybox/ |
H A D | busybox.inc | 16 # Whether to split the suid apps into a seperate binary 162 oe_runmake busybox.cfg.suid 165 # workaround for suid bug 10346 167 echo "CONFIG_SH_IS_NONE" >> busybox.cfg.suid 175 for s in suid nosuid; do 180 # workaround for suid bug 10346 181 if [ "$s" = "suid" ] ; then 194 if grep -q -x "/bin/sh" busybox.links.suid; then 268 # add suid bit where needed 398 set_alternative_vars("${sysconfdir}/busybox.links.suid", "${base_bindir}/busybox.suid") [all …]
|
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 154 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred() 174 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred() 201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
|
/openbmc/qemu/fsdev/ |
H A D | virtfs-proxy-helper.c | 288 static int setugid(int uid, int gid, int *suid, int *sgid) in setugid() argument 292 *suid = geteuid(); in setugid() 299 if (setresuid(-1, uid, *suid) == -1) { in setugid() 323 if (setresuid(-1, *suid, *suid) == -1) { in setugid() 337 static void resetugid(int suid, int sgid) in resetugid() argument 342 if (setresuid(-1, suid, suid) == -1) { in resetugid()
|
/openbmc/linux/include/linux/ |
H A D | cred.h | 114 kuid_t suid; /* saved UID of the task */ member 334 #define current_suid() (current_cred_xxx(suid))
|
H A D | syscalls.h | 655 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 656 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1110 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1112 old_uid_t __user *euid, old_uid_t __user *suid);
|
/openbmc/linux/drivers/connector/ |
H A D | Kconfig | 21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/openbmc/openbmc/meta-security/recipes-security/Firejail/ |
H A D | firejail_0.9.72.bb | 41 PACKAGECONFIG[nosuid] = ", --disable-suid, "
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to 102 Note that when the mount.cifs utility is run suid (allowing user mounts), 104 disallow execution of an suid program mounted on the remote target. 106 and execution of suid programs on the remote target would be enabled 109 though to be able to pass the suid flag to mount requires rebuilding 124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions 126 equivalent suid effect). For this utility to succeed the target path 131 (instead of using mount.cifs and unmount.cifs as suid) to add a line 415 Do not allow remote executables with the suid bit 429 suid [all …]
|
/openbmc/linux/security/ |
H A D | commoncap.c | 929 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1090 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 1093 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
H A D | samhain-configure-add-option-for-ps.patch | 97 …ty khide suidcheck base largefile mail external-scripts encrypt srp dnmalloc ipv6 shellexpand suid"
|
/openbmc/linux/Documentation/security/ |
H A D | credentials.rst | 420 uid_t task_cred_xxx(task, suid); 422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 494 int alter_suid(uid_t suid) 503 new->suid = suid;
|
/openbmc/linux/io_uring/ |
H A D | fdinfo.c | 30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid)); in io_uring_show_cred()
|
/openbmc/linux/security/keys/ |
H A D | process_keys.c | 930 new-> suid = old-> suid; in key_change_session_keyring()
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | rootfs-postcommands.bbclass | 139 (suid, sgid) = resolve_sysusers_id(d, sid) 147 suid = '-' 155 elif not compare_users((sname, suid, sgid, scomment, shomedir, sshell), e_user): 158 ', '.join((sname, suid, sgid, scomment, shomedir, sshell))))
|
/openbmc/linux/net/core/ |
H A D | scm.c | 58 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/openbmc/linux/fs/ |
H A D | fcntl.c | 702 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 703 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/openbmc/openbmc/poky/documentation/migration-guides/ |
H A D | migration-1.5.rst | 234 By default, we now split BusyBox into two binaries: one that is suid 302 - ``tinylogin`` has been removed. It has been replaced by a suid
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | build-quality.rst | 96 FILELIST = /bin/busybox /bin/busybox.nosuid /bin/busybox.suid /bin/sh \ 97 /etc/busybox.links.nosuid /etc/busybox.links.suid
|