/freebsd-11.0-release/lib/libc/compat-43/ |
H A D | setrgid.c | 39 setrgid(gid_t rgid) argument 42 return (setregid(rgid, -1));
|
/freebsd-11.0-release/bin/pkill/tests/ |
H A D | pgrep-_g_test.sh | 9 rgid=`id -gr` 15 pid=`pgrep -f -G $rgid $sleep` 25 rgid=`id -grn` 31 pid=`pgrep -f -G $rgid $sleep`
|
H A D | pkill-_g_test.sh | 9 rgid=`id -gr` 14 pkill -f -G $rgid $sleep 27 rgid=`id -grn` 32 pkill -f -G $rgid $sleep
|
/freebsd-11.0-release/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 31 setresgid(gid_t rgid, gid_t egid, gid_t sgid) argument 35 if (rgid != sgid) { 40 if (setregid(rgid, egid) < 0) { 42 error("setregid %u: %.100s", rgid, strerror(errno)); 53 if (setgid(rgid) < 0) { 55 error("setgid %u: %.100s", rgid, strerror(errno));
|
/freebsd-11.0-release/contrib/openbsm/sys/bsm/ |
H A D | audit_record.h | 236 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 238 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 240 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 242 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); 244 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 247 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); 259 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 261 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 263 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 265 gid_t rgid, pid_ [all...] |
/freebsd-11.0-release/sys/bsm/ |
H A D | audit_record.h | 248 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 250 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 252 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 254 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); 256 uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 259 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid); 272 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 274 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 276 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid); 278 gid_t rgid, pid_ [all...] |
/freebsd-11.0-release/contrib/openbsm/bin/auditdistd/ |
H A D | sandbox.c | 72 gid_t rgid, egid; local 201 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0); 204 rgid = getgid(); 207 PJDLOG_VERIFY(rgid == pw->pw_gid);
|
/freebsd-11.0-release/sys/security/mac/ |
H A D | mac_cred.c | 298 mac_cred_check_setregid(struct ucred *cred, gid_t rgid, gid_t egid) argument 302 MAC_POLICY_CHECK_NOSLEEP(cred_check_setregid, cred, rgid, egid); 303 MAC_CHECK_PROBE3(cred_check_setregid, error, cred, rgid, egid); 328 mac_cred_check_setresgid(struct ucred *cred, gid_t rgid, gid_t egid, argument 333 MAC_POLICY_CHECK_NOSLEEP(cred_check_setresgid, cred, rgid, egid, sgid); 334 MAC_CHECK_PROBE4(cred_check_setresgid, error, cred, rgid, egid,
|
/freebsd-11.0-release/contrib/openbsm/libbsm/ |
H A D | bsm_token.c | 748 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 763 ADD_U_INT32(dptr, rgid); 780 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 796 ADD_U_INT32(dptr, rgid); 813 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 817 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 837 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) 860 ADD_U_INT32(dptr, rgid); 877 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) 902 ADD_U_INT32(dptr, rgid); 836 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 876 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 918 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1159 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1184 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1210 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1233 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1271 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1311 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | bsm_wrappers.c | 352 gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 359 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, 396 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, 402 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, tid); 351 audit_write_success(short event_code, token_t *tok, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 395 audit_write_failure(short event_code, char *errmsg, int errcode, au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument
|
H A D | bsm_io.c | 2507 * rgid 4 bytes 2535 READ_TOKEN_U_INT32(buf, len, tok->tt.proc32.rgid, tok->len, err); 2577 open_attr(fp, "rgid"); 2578 print_group(fp, tok->tt.proc32.rgid, oflags); 2601 print_group(fp, tok->tt.proc32.rgid, oflags); 2619 * rgid 4 bytes 2647 READ_TOKEN_U_INT32(buf, len, tok->tt.proc64.rgid, tok->len, err); 2688 open_attr(fp, "rgid"); 2689 print_group(fp, tok->tt.proc64.rgid, oflags); 2712 print_group(fp, tok->tt.proc64.rgid, oflag [all...] |
/freebsd-11.0-release/sys/security/audit/ |
H A D | bsm_token.c | 669 au_to_process32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 682 ADD_U_INT32(dptr, rgid); 699 au_to_process64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 713 ADD_U_INT32(dptr, rgid); 730 au_to_process(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, argument 734 return (au_to_process32(auid, euid, egid, ruid, rgid, pid, sid, 754 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) 773 ADD_U_INT32(dptr, rgid); 790 gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) 812 ADD_U_INT32(dptr, rgid); 753 au_to_process32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 789 au_to_process64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 828 au_to_process_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1098 au_to_subject32(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1121 au_to_subject64(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1145 au_to_subject(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_t *tid) argument 1168 au_to_subject32_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1203 au_to_subject64_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument 1240 au_to_subject_ex(au_id_t auid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_t pid, au_asid_t sid, au_tid_addr_t *tid) argument [all...] |
H A D | audit.h | 82 void audit_arg_rgid(gid_t rgid); 235 #define AUDIT_ARG_RGID(rgid) do { \ 237 audit_arg_rgid((rgid)); \ 361 #define AUDIT_ARG_RGID(rgid)
|
/freebsd-11.0-release/sys/kern/ |
H A D | kern_prot.c | 949 gid_t rgid; member in struct:setregid_args 959 gid_t egid, rgid; local 963 rgid = uap->rgid; 965 AUDIT_ARG_RGID(rgid); 971 error = mac_cred_check_setregid(oldcred, rgid, egid); 976 if (((rgid != (gid_t)-1 && rgid != oldcred->cr_rgid && 977 rgid != oldcred->cr_svgid) || 987 if (rgid ! 1095 gid_t rgid; member in struct:setresgid_args 1106 gid_t egid, rgid, sgid; local 1189 gid_t *rgid; member in struct:getresgid_args 2215 change_rgid(struct ucred *newcred, gid_t rgid) argument [all...] |
/freebsd-11.0-release/contrib/openbsm/bsm/ |
H A D | libbsm.h | 461 u_int32_t rgid; member in struct:__anon5192 472 u_int32_t rgid; member in struct:__anon5193 496 u_int32_t rgid; member in struct:__anon5194 507 u_int32_t rgid; member in struct:__anon5195 611 u_int32_t rgid; member in struct:__anon5204 622 u_int32_t rgid; member in struct:__anon5205 646 u_int32_t rgid; member in struct:__anon5206 657 u_int32_t rgid; member in struct:__anon5207 1115 * @param rgid - The subject's real group ID. 1129 uid_t euid, gid_t egid, uid_t ruid, gid_t rgid, pid_ [all...] |
/freebsd-11.0-release/sys/compat/linux/ |
H A D | linux_uid16.c | 380 LIN_SDT_PROBE2(uid16, linux_setregid16, entry, args->rgid, args->egid); 382 bsd.rgid = CAST_NOCHG(args->rgid); 412 LIN_SDT_PROBE3(uid16, linux_setresgid16, entry, args->rgid, args->egid, 415 bsd.rgid = CAST_NOCHG(args->rgid);
|
/freebsd-11.0-release/sys/sys/ |
H A D | ucred.h | 101 void change_rgid(struct ucred *newcred, gid_t rgid);
|
/freebsd-11.0-release/sbin/hastd/ |
H A D | subr.c | 159 gid_t rgid, egid, sgid; local 286 PJDLOG_VERIFY(getresgid(&rgid, &egid, &sgid) == 0); 287 PJDLOG_VERIFY(rgid == pw->pw_gid);
|
/freebsd-11.0-release/tools/regression/security/access/ |
H A D | testaccess.c | 125 gid_t egid, rgid, sgid; local 134 error = getresgid(&rgid, &egid, &sgid); 143 printf("rgid: %d, egid: %d, sgid: %d\n", rgid, egid, sgid);
|
/freebsd-11.0-release/contrib/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 83 #define __sanitizer_syscall_pre_getresgid(rgid, egid, sgid) \ 84 __sanitizer_syscall_pre_impl_getresgid((long)(rgid), (long)(egid), \ 86 #define __sanitizer_syscall_post_getresgid(res, rgid, egid, sgid) \ 87 __sanitizer_syscall_post_impl_getresgid(res, (long)(rgid), (long)(egid), \ 105 #define __sanitizer_syscall_pre_setregid(rgid, egid) \ 106 __sanitizer_syscall_pre_impl_setregid((long)(rgid), (long)(egid)) 107 #define __sanitizer_syscall_post_setregid(res, rgid, egid) \ 108 __sanitizer_syscall_post_impl_setregid(res, (long)(rgid), (long)(egid)) 127 #define __sanitizer_syscall_pre_setresgid(rgid, egid, sgid) \ 128 __sanitizer_syscall_pre_impl_setresgid((long)(rgid), (lon [all...] |
/freebsd-11.0-release/contrib/libreadline/examples/rlfe/ |
H A D | os.h | 161 # define setregid(rgid, egid) setresgid(rgid, egid, -1)
|
/freebsd-11.0-release/sys/dev/mlx5/ |
H A D | qp.h | 239 u8 rgid[16]; member in struct:mlx5_av 403 u8 rgid[16]; member in union:mlx5_qp_path::__anon10889
|
/freebsd-11.0-release/contrib/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_syscalls.inc | 306 PRE_SYSCALL(getresgid)(void *rgid, void *egid, void *sgid) {} 308 POST_SYSCALL(getresgid)(long res, void *rgid, void *egid, void *sgid) { 310 if (rgid) POST_WRITE(rgid, sizeof(unsigned)); 337 PRE_SYSCALL(setregid)(long rgid, long egid) {} 339 POST_SYSCALL(setregid)(long res, long rgid, long egid) {} 357 PRE_SYSCALL(setresgid)(long rgid, long egid, long sgid) {} 359 POST_SYSCALL(setresgid)(long res, long rgid, long egid, long sgid) {} 1467 PRE_SYSCALL(setregid16)(long rgid, long egid) {} 1469 POST_SYSCALL(setregid16)(long res, long rgid, lon [all...] |
/freebsd-11.0-release/sys/ofed/include/linux/mlx4/ |
H A D | qp.h | 158 u8 rgid[16]; member in struct:mlx4_qp_path
|
/freebsd-11.0-release/contrib/openbsm/bin/auditreduce/ |
H A D | auditreduce.c | 227 * Check if the given rgid matches the selection criteria. 233 /* Check if we want to select on rgid. */ 248 /* Check if we want to select on rgid. */ 429 * rgid, 445 if (!select_rgid(tok.tt.proc32.rgid)) 459 * rgid, 475 if (!select_rgid(tok.tt.subj32.rgid))
|