/linux-4.4.14/include/uapi/linux/ |
H A D | personality.h | 28 * cleared upon setuid or setgid exec:
|
H A D | securebits.h | 24 /* When set, setuid to/from uid 0 does not trigger capability-"fixup".
|
H A D | prctl.h | 21 /* Get/set whether or not to drop capabilities on setuid() away from
|
H A D | sysctl.h | 148 KERN_SETUID_DUMPABLE=69, /* int: behaviour of dumps for setuid core */
|
/linux-4.4.14/arch/xtensa/platforms/iss/include/platform/ |
H A D | simcall.h | 42 #define SYS_time 23 /* 13 - setuid */
|
/linux-4.4.14/fs/hostfs/ |
H A D | hostfs.h | 33 * callers of notify_change() to notify that the setuid/setgid bits must be
|
/linux-4.4.14/security/ |
H A D | commoncap.c | 35 * If a non-root user executes a setuid-root binary in 38 * the file capabilities to be applied, and the setuid-root 49 printk(KERN_INFO "warning: `%s' has both setuid-root and" warn_setuid_and_fcaps_mixed() 510 * for a setuid root binary run by a non-root user. Do set it cap_bprm_set_creds() 700 * a process after a call to setuid, setreuid, or setresuid. 719 * calls setuid() and switches away from uid==0. Both permitted and 722 * of its privilege. The call to setuid(!=0) would drop all privileges! 756 * cap_task_fix_setuid - Fix up the results of setuid() call 761 * Fix up the results of setuid() call before the credential changes are
|
/linux-4.4.14/security/selinux/include/ |
H A D | classmap.h | 38 "fowner", "fsetid", "kill", "setgid", "setuid", "setpcap",
|
/linux-4.4.14/tools/testing/selftests/mount/ |
H A D | unprivileged-remount-test.c | 174 if (setuid(0) != 0) { create_and_enter_userns() 175 die("setuid(0) failed %s\n", create_and_enter_userns()
|
/linux-4.4.14/fs/devpts/ |
H A D | inode.c | 101 int setuid; member in struct:pts_mount_opts 168 opts->setuid = 0; parse_mount_options() 197 opts->setuid = 1; parse_mount_options() 339 if (opts->setuid) devpts_show_options() 630 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); devpts_pty_new()
|
/linux-4.4.14/kernel/ |
H A D | user.c | 67 * when changing user ID's (ie setuid() and friends).
|
H A D | sys.c | 454 * This makes it possible for a setuid program to completely drop its 459 * 100% compatible with BSD. A program which uses just setuid() will be 523 * setuid() is implemented like SysV with SAVED_IDS 525 * Note that SAVED_ID's is deficient in that a setuid root program 527 * user and then switch back, because if you're root, setuid() sets 533 SYSCALL_DEFINE1(setuid, uid_t, uid) SYSCALL_DEFINE1()
|
/linux-4.4.14/fs/xfs/libxfs/ |
H A D | xfs_trans_resv.h | 47 struct xfs_trans_res tr_writeid; /* write setuid/setgid file */
|
H A D | xfs_trans_resv.c | 586 * Logging the inode mode bits when writing a setuid/setgid file
|
/linux-4.4.14/fs/freevxfs/ |
H A D | vxfs.h | 180 VXFS_ISUID = 0x00000800, /* setuid */
|
/linux-4.4.14/fs/proc/ |
H A D | fd.c | 290 * access /proc/self/fd after it has executed a setuid().
|
H A D | base.c | 1725 * performed a setuid(), etc.
|
/linux-4.4.14/arch/powerpc/include/asm/ |
H A D | systbl.h | 29 SYSCALL_SPU(setuid)
|
/linux-4.4.14/fs/ |
H A D | binfmt_aout.c | 41 * Note that setuid/setgid files won't make a core-dump if the uid/gid
|
H A D | exec.c | 1230 * when executing setuid binaries. Must install_exec_creds() 1501 * don't check setuid() return code. Here we additionally recheck do_execveat_common()
|
H A D | namei.c | 921 * - inode is setuid
|
/linux-4.4.14/arch/x86/ia32/ |
H A D | ia32_aout.c | 143 * Note that setuid/setgid files won't make a core-dump if the uid/gid
|
/linux-4.4.14/fs/affs/ |
H A D | super.c | 180 {Opt_setuid, "setuid=%u"},
|
/linux-4.4.14/arch/parisc/kernel/ |
H A D | syscall_table.S | 87 ENTRY_SAME(setuid)
|
/linux-4.4.14/security/keys/ |
H A D | process_keys.c | 72 * may have been destroyed by setuid */ install_user_keyrings()
|
/linux-4.4.14/include/net/9p/ |
H A D | 9p.h | 248 * @P9_DMSETUID: mode bit for setuid (9P2000.u)
|
/linux-4.4.14/fs/cifs/ |
H A D | inode.c | 2150 /* skip mode change if it's just for clearing setuid/setgid */ cifs_setattr_unix() 2315 /* skip mode change if it's just for clearing setuid/setgid */ cifs_setattr_nounix()
|
/linux-4.4.14/fs/xfs/ |
H A D | xfs_file.c | 666 * If we're writing the file then make sure to clear the setuid and xfs_file_aio_write_checks() 668 * people from modifying setuid and setgid binaries. xfs_file_aio_write_checks()
|
/linux-4.4.14/fs/ecryptfs/ |
H A D | inode.c | 961 * mode change is for clearing setuid/setgid bits. Allow lower fs ecryptfs_setattr()
|
/linux-4.4.14/arch/ia64/kernel/ |
H A D | fsys.S | 573 data8 0 // setuid // 1045
|
/linux-4.4.14/include/linux/ |
H A D | security.h | 122 /* setuid or setgid, id0 == uid or gid */
|
H A D | lsm_hooks.h | 394 * The setuid bit is being removed. Remove similar security labels. 398 * causing setuid bit removal is failed.
|
H A D | sched.h | 452 #define SUID_DUMP_DISABLE 0 /* No setuid dumping */ arch_pick_mmap_layout()
|
/linux-4.4.14/fs/nfs/ |
H A D | inode.c | 511 /* skip mode change if it's just for clearing setuid/setgid */ nfs_setattr()
|
/linux-4.4.14/fs/nfsd/ |
H A D | vfs.c | 311 /* Revoke setuid/setgid on chown */ nfsd_sanitize_attrs()
|
/linux-4.4.14/security/tomoyo/ |
H A D | common.c | 92 [TOMOYO_MODE_SETUID] = "setuid",
|
/linux-4.4.14/security/smack/ |
H A D | smack_lsm.c | 1240 * Need to allow for clearing the setuid bit. smack_inode_setattr()
|
/linux-4.4.14/security/selinux/ |
H A D | hooks.c | 2073 * Since setuid only affects the current process, and since the SELinux
|