Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 23 of 23) sorted by relevance

/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst6 its parent did not have. The most obvious examples are setuid/setgid
13 a program is setuid.
27 been done without the execve call. For example, the setuid and setgid
43 ``setuid(2)`` and receive SCM_RIGHTS datagrams.
55 escalate its privileges by directly attacking setuid, setgid, and
/Linux-v4.19/fs/devpts/
Dinode.c97 int setuid; member
255 opts->setuid = 0; in parse_mount_options()
287 opts->setuid = 1; in parse_mount_options()
411 if (opts->setuid) in devpts_show_options()
581 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
/Linux-v4.19/tools/testing/selftests/mount/
Dunprivileged-remount-test.c175 if (setuid(0) != 0) { in create_and_enter_userns()
/Linux-v4.19/kernel/
Dsys_ni.c171 COND_SYSCALL(setuid);
Dsys.c608 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
/Linux-v4.19/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl31 23 32 setuid - compat_sys_s390_setuid16
221 213 64 setuid sys_setuid -
/Linux-v4.19/arch/s390/kernel/syscalls/
Dsyscall.tbl31 23 32 setuid - compat_sys_s390_setuid16
221 213 64 setuid sys_setuid -
/Linux-v4.19/arch/powerpc/include/asm/
Dsystbl.h30 SYSCALL_SPU(setuid)
/Linux-v4.19/arch/parisc/kernel/
Dsyscall_table.S87 ENTRY_SAME(setuid)
/Linux-v4.19/Documentation/filesystems/
Dfuse.txt222 program (fusermount) is needed, which is installed setuid root.
249 setuid and setgid bits when executing programs. To ensure this
Daffs.txt41 setuid[=uid] This sets the owner of all files and directories in the file
/Linux-v4.19/Documentation/sysctl/
Dfs.txt213 from "pinning" vulnerable setuid/setgid files against being upgraded by
263 This value can be used to query and set the core dump mode for setuid
Dkernel.txt426 a setuid binary) then %pK will not leak kernel pointers to unprivileged
/Linux-v4.19/arch/x86/entry/syscalls/
Dsyscall_64.tbl116 105 common setuid __x64_sys_setuid
Dsyscall_32.tbl37 23 i386 setuid sys_setuid16 __ia32_sys_setuid16
/Linux-v4.19/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl116 105 common setuid __x64_sys_setuid
/Linux-v4.19/Documentation/admin-guide/
Dbinfmt-misc.rst81 will run with root permissions when a setuid binary owned by root
Dkernel-parameters.txt2834 is to be setuid root or executed by root.
/Linux-v4.19/arch/arm/tools/
Dsyscall.tbl37 23 common setuid sys_setuid16
/Linux-v4.19/arch/um/drivers/
DKconfig323 privleges, setuid binaries, or SLIP devices on the host. This
/Linux-v4.19/Documentation/virtual/uml/
DUserModeLinux-HOWTO.txt901 preconfigured device, allowing it to avoid using the setuid uml_net
1000 You will likely need the setuid helper, or the switch daemon, or both.
1010 to be setuid root.
1203 The easiest way to get up and running is to let the setuid uml_net
1208 the setuid helper, use it to get up and running, then read the next
1511 setuid root if you're not running UML as root. This is because the
1691 root access or setuid binaries on the host.
/Linux-v4.19/Documentation/filesystems/cifs/
DREADME279 is configured setuid for user mounts) unless the "uid="
/Linux-v4.19/init/
DKconfig1176 system calls related to UIDs, GIDs, and capabilities, such as setuid,