Searched refs:setuid (Results 1 - 38 of 38) sorted by relevance

/linux-4.4.14/include/uapi/linux/
H A Dpersonality.h28 * cleared upon setuid or setgid exec:
H A Dsecurebits.h24 /* When set, setuid to/from uid 0 does not trigger capability-"fixup".
H A Dprctl.h21 /* Get/set whether or not to drop capabilities on setuid() away from
H A Dsysctl.h148 KERN_SETUID_DUMPABLE=69, /* int: behaviour of dumps for setuid core */
/linux-4.4.14/arch/xtensa/platforms/iss/include/platform/
H A Dsimcall.h42 #define SYS_time 23 /* 13 - setuid */
/linux-4.4.14/fs/hostfs/
H A Dhostfs.h33 * callers of notify_change() to notify that the setuid/setgid bits must be
/linux-4.4.14/security/
H A Dcommoncap.c35 * If a non-root user executes a setuid-root binary in
38 * the file capabilities to be applied, and the setuid-root
49 printk(KERN_INFO "warning: `%s' has both setuid-root and" warn_setuid_and_fcaps_mixed()
510 * for a setuid root binary run by a non-root user. Do set it cap_bprm_set_creds()
700 * a process after a call to setuid, setreuid, or setresuid.
719 * calls setuid() and switches away from uid==0. Both permitted and
722 * of its privilege. The call to setuid(!=0) would drop all privileges!
756 * cap_task_fix_setuid - Fix up the results of setuid() call
761 * Fix up the results of setuid() call before the credential changes are
/linux-4.4.14/security/selinux/include/
H A Dclassmap.h38 "fowner", "fsetid", "kill", "setgid", "setuid", "setpcap",
/linux-4.4.14/tools/testing/selftests/mount/
H A Dunprivileged-remount-test.c174 if (setuid(0) != 0) { create_and_enter_userns()
175 die("setuid(0) failed %s\n", create_and_enter_userns()
/linux-4.4.14/fs/devpts/
H A Dinode.c101 int setuid; member in struct:pts_mount_opts
168 opts->setuid = 0; parse_mount_options()
197 opts->setuid = 1; parse_mount_options()
339 if (opts->setuid) devpts_show_options()
630 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); devpts_pty_new()
/linux-4.4.14/kernel/
H A Duser.c67 * when changing user ID's (ie setuid() and friends).
H A Dsys.c454 * This makes it possible for a setuid program to completely drop its
459 * 100% compatible with BSD. A program which uses just setuid() will be
523 * setuid() is implemented like SysV with SAVED_IDS
525 * Note that SAVED_ID's is deficient in that a setuid root program
527 * user and then switch back, because if you're root, setuid() sets
533 SYSCALL_DEFINE1(setuid, uid_t, uid) SYSCALL_DEFINE1()
/linux-4.4.14/fs/xfs/libxfs/
H A Dxfs_trans_resv.h47 struct xfs_trans_res tr_writeid; /* write setuid/setgid file */
H A Dxfs_trans_resv.c586 * Logging the inode mode bits when writing a setuid/setgid file
/linux-4.4.14/fs/freevxfs/
H A Dvxfs.h180 VXFS_ISUID = 0x00000800, /* setuid */
/linux-4.4.14/fs/proc/
H A Dfd.c290 * access /proc/self/fd after it has executed a setuid().
H A Dbase.c1725 * performed a setuid(), etc.
/linux-4.4.14/arch/powerpc/include/asm/
H A Dsystbl.h29 SYSCALL_SPU(setuid)
/linux-4.4.14/fs/
H A Dbinfmt_aout.c41 * Note that setuid/setgid files won't make a core-dump if the uid/gid
H A Dexec.c1230 * when executing setuid binaries. Must install_exec_creds()
1501 * don't check setuid() return code. Here we additionally recheck do_execveat_common()
H A Dnamei.c921 * - inode is setuid
/linux-4.4.14/arch/x86/ia32/
H A Dia32_aout.c143 * Note that setuid/setgid files won't make a core-dump if the uid/gid
/linux-4.4.14/fs/affs/
H A Dsuper.c180 {Opt_setuid, "setuid=%u"},
/linux-4.4.14/arch/parisc/kernel/
H A Dsyscall_table.S87 ENTRY_SAME(setuid)
/linux-4.4.14/security/keys/
H A Dprocess_keys.c72 * may have been destroyed by setuid */ install_user_keyrings()
/linux-4.4.14/include/net/9p/
H A D9p.h248 * @P9_DMSETUID: mode bit for setuid (9P2000.u)
/linux-4.4.14/fs/cifs/
H A Dinode.c2150 /* skip mode change if it's just for clearing setuid/setgid */ cifs_setattr_unix()
2315 /* skip mode change if it's just for clearing setuid/setgid */ cifs_setattr_nounix()
/linux-4.4.14/fs/xfs/
H A Dxfs_file.c666 * If we're writing the file then make sure to clear the setuid and xfs_file_aio_write_checks()
668 * people from modifying setuid and setgid binaries. xfs_file_aio_write_checks()
/linux-4.4.14/fs/ecryptfs/
H A Dinode.c961 * mode change is for clearing setuid/setgid bits. Allow lower fs ecryptfs_setattr()
/linux-4.4.14/arch/ia64/kernel/
H A Dfsys.S573 data8 0 // setuid // 1045
/linux-4.4.14/include/linux/
H A Dsecurity.h122 /* setuid or setgid, id0 == uid or gid */
H A Dlsm_hooks.h394 * The setuid bit is being removed. Remove similar security labels.
398 * causing setuid bit removal is failed.
H A Dsched.h452 #define SUID_DUMP_DISABLE 0 /* No setuid dumping */ arch_pick_mmap_layout()
/linux-4.4.14/fs/nfs/
H A Dinode.c511 /* skip mode change if it's just for clearing setuid/setgid */ nfs_setattr()
/linux-4.4.14/fs/nfsd/
H A Dvfs.c311 /* Revoke setuid/setgid on chown */ nfsd_sanitize_attrs()
/linux-4.4.14/security/tomoyo/
H A Dcommon.c92 [TOMOYO_MODE_SETUID] = "setuid",
/linux-4.4.14/security/smack/
H A Dsmack_lsm.c1240 * Need to allow for clearing the setuid bit. smack_inode_setattr()
/linux-4.4.14/security/selinux/
H A Dhooks.c2073 * Since setuid only affects the current process, and since the SELinux

Completed in 1708 milliseconds