Searched refs:setuid (Results 1 – 20 of 20) sorted by relevance
/linux-4.1.27/Documentation/prctl/ |
D | no_new_privs.txt | 2 its parent did not have. The most obvious examples are setuid/setgid 9 a program is setuid. 23 been done without the execve call. For example, the setuid and setgid 37 setuid(2) and receive SCM_RIGHTS datagrams. 49 escalate its privileges by directly attacking setuid, setgid, and
|
/linux-4.1.27/fs/devpts/ |
D | inode.c | 101 int setuid; member 166 opts->setuid = 0; in parse_mount_options() 195 opts->setuid = 1; in parse_mount_options() 337 if (opts->setuid) in devpts_show_options() 617 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/linux-4.1.27/tools/testing/selftests/mount/ |
D | unprivileged-remount-test.c | 174 if (setuid(0) != 0) { in create_and_enter_userns()
|
/linux-4.1.27/Documentation/sysctl/ |
D | fs.txt | 170 from "pinning" vulnerable setuid/setgid files against being upgraded by 204 This value can be used to query and set the core dump mode for setuid
|
D | kernel.txt | 368 a setuid binary) then %pK will not leak kernel pointers to unprivileged
|
/linux-4.1.27/arch/parisc/kernel/ |
D | syscall_table.S | 87 ENTRY_SAME(setuid)
|
/linux-4.1.27/arch/powerpc/include/asm/ |
D | systbl.h | 29 SYSCALL_SPU(setuid)
|
/linux-4.1.27/Documentation/filesystems/ |
D | fuse.txt | 222 program (fusermount) is needed, which is installed setuid root. 249 setuid and setgid bits when executing programs. To ensure this
|
D | affs.txt | 41 setuid[=uid] This sets the owner of all files and directories in the file
|
/linux-4.1.27/arch/s390/kernel/ |
D | compat_wrapper.c | 144 COMPAT_SYSCALL_WRAP1(setuid, uid_t, uid);
|
/linux-4.1.27/Documentation/ |
D | binfmt_misc.txt | 67 will run with root permissions when a setuid binary owned by root
|
D | kernel-parameters.txt | 2392 is to be setuid root or executed by root.
|
/linux-4.1.27/arch/x86/syscalls/ |
D | syscall_64.tbl | 114 105 common setuid sys_setuid
|
D | syscall_32.tbl | 32 23 i386 setuid sys_setuid16
|
/linux-4.1.27/arch/um/ |
D | Kconfig.net | 187 privleges, setuid binaries, or SLIP devices on the host. This
|
/linux-4.1.27/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 901 preconfigured device, allowing it to avoid using the setuid uml_net 1000 You will likely need the setuid helper, or the switch daemon, or both. 1010 to be setuid root. 1203 The easiest way to get up and running is to let the setuid uml_net 1208 the setuid helper, use it to get up and running, then read the next 1511 setuid root if you're not running UML as root. This is because the 1691 root access or setuid binaries on the host.
|
/linux-4.1.27/kernel/ |
D | sys.c | 533 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | README | 280 is configured setuid for user mounts) unless the "uid="
|
D | CHANGES | 834 Fix search handle leak on rewind. Fix setuid and gid so that they are
|
/linux-4.1.27/init/ |
D | Kconfig | 1370 system calls related to UIDs, GIDs, and capabilities, such as setuid,
|