Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 19 of 19) sorted by relevance

/linux-4.4.14/Documentation/prctl/
Dno_new_privs.txt2 its parent did not have. The most obvious examples are setuid/setgid
9 a program is setuid.
23 been done without the execve call. For example, the setuid and setgid
37 setuid(2) and receive SCM_RIGHTS datagrams.
49 escalate its privileges by directly attacking setuid, setgid, and
/linux-4.4.14/fs/devpts/
Dinode.c101 int setuid; member
168 opts->setuid = 0; in parse_mount_options()
197 opts->setuid = 1; in parse_mount_options()
339 if (opts->setuid) in devpts_show_options()
630 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
/linux-4.4.14/tools/testing/selftests/mount/
Dunprivileged-remount-test.c174 if (setuid(0) != 0) { in create_and_enter_userns()
/linux-4.4.14/arch/parisc/kernel/
Dsyscall_table.S87 ENTRY_SAME(setuid)
/linux-4.4.14/Documentation/sysctl/
Dfs.txt193 from "pinning" vulnerable setuid/setgid files against being upgraded by
227 This value can be used to query and set the core dump mode for setuid
Dkernel.txt380 a setuid binary) then %pK will not leak kernel pointers to unprivileged
/linux-4.4.14/arch/powerpc/include/asm/
Dsystbl.h29 SYSCALL_SPU(setuid)
/linux-4.4.14/Documentation/filesystems/
Dfuse.txt222 program (fusermount) is needed, which is installed setuid root.
249 setuid and setgid bits when executing programs. To ensure this
Daffs.txt41 setuid[=uid] This sets the owner of all files and directories in the file
/linux-4.4.14/arch/x86/entry/syscalls/
Dsyscall_64.tbl114 105 common setuid sys_setuid
Dsyscall_32.tbl32 23 i386 setuid sys_setuid16
/linux-4.4.14/Documentation/
Dbinfmt_misc.txt67 will run with root permissions when a setuid binary owned by root
Dkernel-parameters.txt2469 is to be setuid root or executed by root.
/linux-4.4.14/arch/um/
DKconfig.net187 privleges, setuid binaries, or SLIP devices on the host. This
/linux-4.4.14/Documentation/virtual/uml/
DUserModeLinux-HOWTO.txt901 preconfigured device, allowing it to avoid using the setuid uml_net
1000 You will likely need the setuid helper, or the switch daemon, or both.
1010 to be setuid root.
1203 The easiest way to get up and running is to let the setuid uml_net
1208 the setuid helper, use it to get up and running, then read the next
1511 setuid root if you're not running UML as root. This is because the
1691 root access or setuid binaries on the host.
/linux-4.4.14/kernel/
Dsys.c533 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME280 is configured setuid for user mounts) unless the "uid="
DCHANGES834 Fix search handle leak on rewind. Fix setuid and gid so that they are
/linux-4.4.14/init/
DKconfig1381 system calls related to UIDs, GIDs, and capabilities, such as setuid,