Home
last modified time | relevance | path

Searched refs:suid (Results 1 – 25 of 52) sorted by relevance

123

/OK3568_Linux_fs/yocto/meta-qt5/recipes-qt/qt5/qtwebengine/chromium/
H A D0013-chromium-musl-sandbox-Define-TEMP_FAILURE_RETRY-if-n.patch12 chromium/sandbox/linux/suid/sandbox.c | 9 +++++++++
15 diff --git a/chromium/sandbox/linux/suid/sandbox.c b/chromium/sandbox/linux/suid/sandbox.c
17 --- a/chromium/sandbox/linux/suid/sandbox.c
18 +++ b/chromium/sandbox/linux/suid/sandbox.c
/OK3568_Linux_fs/yocto/meta-browser/meta-chromium/recipes-browser/chromium/files/musl/
H A D0003-Define-TEMP_FAILURE_RETRY-and-__si_fields.patch14 sandbox/linux/suid/sandbox.c | 9 +++++++++
33 diff --git a/sandbox/linux/suid/sandbox.c b/sandbox/linux/suid/sandbox.c
35 --- a/sandbox/linux/suid/sandbox.c
36 +++ b/sandbox/linux/suid/sandbox.c
/OK3568_Linux_fs/kernel/kernel/
H A Duid16.c58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument
61 low2highuid(suid)); in SYSCALL_DEFINE3()
68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local
72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3()
76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
H A Dsys.c546 !uid_eq(old->suid, keuid) && in __sys_setreuid()
558 new->suid = new->euid; in __sys_setreuid()
607 new->suid = new->uid = kuid; in __sys_setuid()
613 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid()
640 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument
650 ksuid = make_kuid(ns, suid); in __sys_setresuid()
658 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid()
670 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) in __sys_setresuid()
673 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) in __sys_setresuid()
675 if (suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) && in __sys_setresuid()
[all …]
H A Dcred.c51 .suid = GLOBAL_ROOT_UID,
321 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
503 !uid_eq(new->suid, old->suid) || in commit_creds()
824 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
H A Duid16.h9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
H A Dauditsc.c402 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare()
416 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare()
425 cred->suid); in audit_field_compare()
431 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare()
436 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare()
511 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
H A Daudit.h128 kuid_t uid, euid, suid, fsuid; member
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/busybox/
H A Dbusybox.inc16 # Whether to split the suid apps into a seperate binary
158 rm -f .config.app.suid .config.app.nosuid .config.disable.apps .config.nonapps
161 oe_runmake busybox.cfg.suid
164 # workaround for suid bug 10346
166 echo "CONFIG_SH_IS_NONE" >> busybox.cfg.suid
169 for i in `cat busybox.cfg.suid busybox.cfg.nosuid`; do
174 for s in suid nosuid; do
179 # workaround for suid bug 10346
180 if [ "$s" = "suid" ] ; then
181 sed "s/.*CONFIG_SH_IS_NONE.*$/CONFIG_SH_IS_NONE=y/" -i .config.app.suid
[all …]
/OK3568_Linux_fs/kernel/security/safesetid/
H A Dlsm.c163 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred()
183 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred()
210 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
/OK3568_Linux_fs/kernel/arch/s390/kernel/
H A Dcompat_linux.h98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid);
99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
/OK3568_Linux_fs/kernel/include/linux/
H A Dcred.h122 kuid_t suid; /* saved UID of the task */ member
383 #define current_suid() (current_cred_xxx(suid))
H A Dsyscalls.h737 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
738 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid);
1197 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid);
1199 old_uid_t __user *euid, old_uid_t __user *suid);
/OK3568_Linux_fs/buildroot/package/ndisc6/
H A Dndisc6.mk11 NDISC6_CONF_OPTS = --disable-rpath --disable-suid-install
/OK3568_Linux_fs/kernel/drivers/connector/
H A DKconfig21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
/OK3568_Linux_fs/external/xserver/debian/
H A Drules.flags56 --enable-suid-wrapper \
88 --disable-suid-wrapper \
/OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/
H A Dusage.rst93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
102 Note that when the mount.cifs utility is run suid (allowing user mounts),
104 disallow execution of an suid program mounted on the remote target.
106 and execution of suid programs on the remote target would be enabled
109 though to be able to pass the suid flag to mount requires rebuilding
124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions
126 equivalent suid effect). For this utility to succeed the target path
131 (instead of using mount.cifs and unmount.cifs as suid) to add a line
415 Do not allow remote executables with the suid bit
429 suid
[all …]
/OK3568_Linux_fs/kernel/security/
H A Dcommoncap.c876 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file()
1028 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid()
1031 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
/OK3568_Linux_fs/kernel/Documentation/security/
H A Dcredentials.rst420 uid_t task_cred_xxx(task, suid);
422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU
494 int alter_suid(uid_t suid)
503 new->suid = suid;
/OK3568_Linux_fs/kernel/security/keys/
H A Dprocess_keys.c922 new-> suid = old-> suid; in key_change_session_keyring()
/OK3568_Linux_fs/external/xserver/os/
H A Dutils.c1740 uid_t ruid, euid, suid; in PrivsElevated()
1743 if ((getresuid(&ruid, &euid, &suid) == 0) && in PrivsElevated()
1745 privsElevated = (euid != suid) || (egid != sgid); in PrivsElevated()
/OK3568_Linux_fs/kernel/net/core/
H A Dscm.c57 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
/OK3568_Linux_fs/kernel/fs/
H A Dfcntl.c725 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
726 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
/OK3568_Linux_fs/yocto/poky/documentation/migration-guides/
H A Dmigration-1.5.rst230 By default, we now split BusyBox into two binaries: one that is suid
298 - ``tinylogin`` has been removed. It has been replaced by a suid
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dfuse.rst230 2. creating a filesystem containing a suid or sgid application, then executing this application
263 whole system. For example a suid application locking a

123