Home
last modified time | relevance | path

Searched refs:privileges (Results 1 – 25 of 48) sorted by relevance

12

/Linux-v5.4/Documentation/admin-guide/LSM/
DSafeSetID.rst7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as
14 to switch to a different user must be spawned with CAP_SETUID privileges.
19 privileges opens up possible security holes since any user with access to the
20 file can exec() that program to gain the elevated privileges.
27 especially since programs often only call setuid() to drop privileges to a
28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
106 obtaining auxiliary setid privileges, such as allowing a user to set up user
/Linux-v5.4/Documentation/userspace-api/
Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
8 gaining these privileges as well, the kernel and user code must be
55 escalate its privileges by directly attacking setuid, setgid, and
Dseccomp_filter.rst72 run with ``CAP_SYS_ADMIN`` privileges in its namespace. If these are not
74 programs cannot be applied to child processes with greater privileges
/Linux-v5.4/security/safesetid/
DKconfig11 the given UIDs/GIDs from obtaining auxiliary privileges associated
/Linux-v5.4/Documentation/media/uapi/v4l/
Dvidioc-dbg-g-register.rst56 superuser privileges. Additionally the Linux kernel must be compiled
170 Insufficient permissions. Root privileges are required to execute
Dopen.rst130 descriptor. Applications can request additional access privileges using
/Linux-v5.4/Documentation/trace/
Dmmiotrace.rst51 If not (requires root privileges)::
57 Activate mmiotrace (requires root privileges)::
76 Shut down mmiotrace (requires root privileges)::
/Linux-v5.4/Documentation/ia64/
Defirtc.rst101 Root privileges are required to be able to set the time of day.
137 Root privileges are required to be able to set the alarm.
/Linux-v5.4/Documentation/dev-tools/
Dkselftest.rst41 Note that some tests will require root privileges.
122 Note that some tests will require root privileges.
149 note some tests will require root privileges::
/Linux-v5.4/Documentation/media/v4l-drivers/
Duvcvideo.rst142 Insufficient privileges (super user privileges are required).
/Linux-v5.4/Documentation/firmware-guide/acpi/
Dmethod-customizing.rst87 memory and gain additional rights, if root's privileges got
/Linux-v5.4/Documentation/filesystems/
Dfuse.txt17 The filesystem daemon is running with the privileges of the mounting
228 A) mount owner should not be able to get elevated privileges with the
240 A) The mount owner could gain elevated privileges by either:
Dmandatory-locking.txt78 to run mandatory lock candidates with setgid privileges.
/Linux-v5.4/Documentation/driver-api/
Dpti_intel_mid.rst47 privileges to successfully manipulate the ldisc drivers
/Linux-v5.4/Documentation/admin-guide/
Dperf-security.rst64 Linux divides the privileges traditionally associated with superuser
112 privileges [6]_ :
/Linux-v5.4/security/keys/
DKconfig56 it is or by a process with administrative privileges. The active
/Linux-v5.4/drivers/net/ethernet/emulex/benet/
Dbe_main.c1940 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt()
1941 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt()
1944 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt()
1962 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt()
1963 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt()
1966 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt()
4238 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup()
4240 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup()
4242 vf_cfg->privileges | in be_vf_setup()
4246 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
Dbe.h353 u32 privileges; member
/Linux-v5.4/Documentation/s390/
Dmonreader.rst79 DCSS if your z/VM doesn't have one already, you need Class E privileges to
/Linux-v5.4/tools/testing/selftests/tc-testing/
DREADME51 To use tdc, root privileges are required. This is because the
/Linux-v5.4/Documentation/security/
Dcredentials.rst102 'group' and 'other'), each of which may be granted certain privileges
244 extra privileges, based on the annotations on the executable file.
/Linux-v5.4/Documentation/process/
D3.Early-stage.rst32 misuse of the LSM framework (which is not intended to confer privileges
/Linux-v5.4/tools/power/cpupower/po/
Dcs.po229 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dfr.po224 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dit.po224 msgid "Subcommand %s needs root privileges\n"
776 msgid "Intel's performance bias setting needs root privileges\n"

12