Searched refs:setuid (Results 1 – 19 of 19) sorted by relevance
/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 2 its parent did not have. The most obvious examples are setuid/setgid 9 a program is setuid. 23 been done without the execve call. For example, the setuid and setgid 37 setuid(2) and receive SCM_RIGHTS datagrams. 49 escalate its privileges by directly attacking setuid, setgid, and
|
/linux-4.4.14/fs/devpts/ |
D | inode.c | 101 int setuid; member 168 opts->setuid = 0; in parse_mount_options() 197 opts->setuid = 1; in parse_mount_options() 339 if (opts->setuid) in devpts_show_options() 630 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/linux-4.4.14/tools/testing/selftests/mount/ |
D | unprivileged-remount-test.c | 174 if (setuid(0) != 0) { in create_and_enter_userns()
|
/linux-4.4.14/arch/parisc/kernel/ |
D | syscall_table.S | 87 ENTRY_SAME(setuid)
|
/linux-4.4.14/Documentation/sysctl/ |
D | fs.txt | 193 from "pinning" vulnerable setuid/setgid files against being upgraded by 227 This value can be used to query and set the core dump mode for setuid
|
D | kernel.txt | 380 a setuid binary) then %pK will not leak kernel pointers to unprivileged
|
/linux-4.4.14/arch/powerpc/include/asm/ |
D | systbl.h | 29 SYSCALL_SPU(setuid)
|
/linux-4.4.14/Documentation/filesystems/ |
D | fuse.txt | 222 program (fusermount) is needed, which is installed setuid root. 249 setuid and setgid bits when executing programs. To ensure this
|
D | affs.txt | 41 setuid[=uid] This sets the owner of all files and directories in the file
|
/linux-4.4.14/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 114 105 common setuid sys_setuid
|
D | syscall_32.tbl | 32 23 i386 setuid sys_setuid16
|
/linux-4.4.14/Documentation/ |
D | binfmt_misc.txt | 67 will run with root permissions when a setuid binary owned by root
|
D | kernel-parameters.txt | 2469 is to be setuid root or executed by root.
|
/linux-4.4.14/arch/um/ |
D | Kconfig.net | 187 privleges, setuid binaries, or SLIP devices on the host. This
|
/linux-4.4.14/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 901 preconfigured device, allowing it to avoid using the setuid uml_net 1000 You will likely need the setuid helper, or the switch daemon, or both. 1010 to be setuid root. 1203 The easiest way to get up and running is to let the setuid uml_net 1208 the setuid helper, use it to get up and running, then read the next 1511 setuid root if you're not running UML as root. This is because the 1691 root access or setuid binaries on the host.
|
/linux-4.4.14/kernel/ |
D | sys.c | 533 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | README | 280 is configured setuid for user mounts) unless the "uid="
|
D | CHANGES | 834 Fix search handle leak on rewind. Fix setuid and gid so that they are
|
/linux-4.4.14/init/ |
D | Kconfig | 1381 system calls related to UIDs, GIDs, and capabilities, such as setuid,
|