Searched refs:privileges (Results 1 – 25 of 48) sorted by relevance
12
| /Linux-v5.4/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as 14 to switch to a different user must be spawned with CAP_SETUID privileges. 19 privileges opens up possible security holes since any user with access to the 20 file can exec() that program to gain the elevated privileges. 27 especially since programs often only call setuid() to drop privileges to a 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 106 obtaining auxiliary setid privileges, such as allowing a user to set up user
|
| /Linux-v5.4/Documentation/userspace-api/ |
| D | no_new_privs.rst | 5 The execve system call can grant a newly-started program privileges that 8 gaining these privileges as well, the kernel and user code must be 55 escalate its privileges by directly attacking setuid, setgid, and
|
| D | seccomp_filter.rst | 72 run with ``CAP_SYS_ADMIN`` privileges in its namespace. If these are not 74 programs cannot be applied to child processes with greater privileges
|
| /Linux-v5.4/security/safesetid/ |
| D | Kconfig | 11 the given UIDs/GIDs from obtaining auxiliary privileges associated
|
| /Linux-v5.4/Documentation/media/uapi/v4l/ |
| D | vidioc-dbg-g-register.rst | 56 superuser privileges. Additionally the Linux kernel must be compiled 170 Insufficient permissions. Root privileges are required to execute
|
| D | open.rst | 130 descriptor. Applications can request additional access privileges using
|
| /Linux-v5.4/Documentation/trace/ |
| D | mmiotrace.rst | 51 If not (requires root privileges):: 57 Activate mmiotrace (requires root privileges):: 76 Shut down mmiotrace (requires root privileges)::
|
| /Linux-v5.4/Documentation/ia64/ |
| D | efirtc.rst | 101 Root privileges are required to be able to set the time of day. 137 Root privileges are required to be able to set the alarm.
|
| /Linux-v5.4/Documentation/dev-tools/ |
| D | kselftest.rst | 41 Note that some tests will require root privileges. 122 Note that some tests will require root privileges. 149 note some tests will require root privileges::
|
| /Linux-v5.4/Documentation/media/v4l-drivers/ |
| D | uvcvideo.rst | 142 Insufficient privileges (super user privileges are required).
|
| /Linux-v5.4/Documentation/firmware-guide/acpi/ |
| D | method-customizing.rst | 87 memory and gain additional rights, if root's privileges got
|
| /Linux-v5.4/Documentation/filesystems/ |
| D | fuse.txt | 17 The filesystem daemon is running with the privileges of the mounting 228 A) mount owner should not be able to get elevated privileges with the 240 A) The mount owner could gain elevated privileges by either:
|
| D | mandatory-locking.txt | 78 to run mandatory lock candidates with setgid privileges.
|
| /Linux-v5.4/Documentation/driver-api/ |
| D | pti_intel_mid.rst | 47 privileges to successfully manipulate the ldisc drivers
|
| /Linux-v5.4/Documentation/admin-guide/ |
| D | perf-security.rst | 64 Linux divides the privileges traditionally associated with superuser 112 privileges [6]_ :
|
| /Linux-v5.4/security/keys/ |
| D | Kconfig | 56 it is or by a process with administrative privileges. The active
|
| /Linux-v5.4/drivers/net/ethernet/emulex/benet/ |
| D | be_main.c | 1940 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt() 1941 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt() 1944 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt() 1962 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt() 1963 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt() 1966 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt() 4238 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup() 4240 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup() 4242 vf_cfg->privileges | in be_vf_setup() 4246 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
|
| D | be.h | 353 u32 privileges; member
|
| /Linux-v5.4/Documentation/s390/ |
| D | monreader.rst | 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to
|
| /Linux-v5.4/tools/testing/selftests/tc-testing/ |
| D | README | 51 To use tdc, root privileges are required. This is because the
|
| /Linux-v5.4/Documentation/security/ |
| D | credentials.rst | 102 'group' and 'other'), each of which may be granted certain privileges 244 extra privileges, based on the annotations on the executable file.
|
| /Linux-v5.4/Documentation/process/ |
| D | 3.Early-stage.rst | 32 misuse of the LSM framework (which is not intended to confer privileges
|
| /Linux-v5.4/tools/power/cpupower/po/ |
| D | cs.po | 229 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
| D | fr.po | 224 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
| D | it.po | 224 msgid "Subcommand %s needs root privileges\n" 776 msgid "Intel's performance bias setting needs root privileges\n"
|
12