Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 39) sorted by relevance

12

/Linux-v5.4/Documentation/userspace-api/
Dno_new_privs.rst6 its parent did not have. The most obvious examples are setuid/setgid
13 a program is setuid.
27 been done without the execve call. For example, the setuid and setgid
43 ``setuid(2)`` and receive SCM_RIGHTS datagrams.
55 escalate its privileges by directly attacking setuid, setgid, and
/Linux-v5.4/tools/testing/selftests/safesetid/
Dsafesetid-test.c216 setuid(child_uid); in test_setuid()
294 setuid(NO_POLICY_USER); in main()
309 setuid(RESTRICTED_PARENT); in main()
/Linux-v5.4/fs/devpts/
Dinode.c94 int setuid; member
252 opts->setuid = 0; in parse_mount_options()
284 opts->setuid = 1; in parse_mount_options()
408 if (opts->setuid) in devpts_show_options()
579 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
/Linux-v5.4/Documentation/admin-guide/LSM/
DSafeSetID.rst27 especially since programs often only call setuid() to drop privileges to a
30 switch to through setuid() beyond allowing a switch to any user on the system.
39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user
92 "Since setuid only affects the current process, and since the SELinux controls
/Linux-v5.4/tools/testing/selftests/net/
Dipv6_flowlabel_mgr.c136 if (setuid(USHRT_MAX)) in run_tests()
/Linux-v5.4/tools/testing/selftests/filesystems/binderfs/
Dbinderfs_test.c107 ret = setuid(0); in change_to_userns()
/Linux-v5.4/samples/seccomp/
Duser-trap.c228 if (setuid(1000) < 0) { in main()
/Linux-v5.4/tools/testing/selftests/mount/
Dunprivileged-remount-test.c175 if (setuid(0) != 0) { in create_and_enter_userns()
/Linux-v5.4/kernel/
Dsys_ni.c176 COND_SYSCALL(setuid);
/Linux-v5.4/arch/sparc/kernel/syscalls/
Dsyscall.tbl37 23 32 setuid sys_setuid16
38 23 64 setuid sys_setuid
/Linux-v5.4/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl31 23 32 setuid - compat_sys_s390_setuid16
221 213 64 setuid sys_setuid -
/Linux-v5.4/arch/s390/kernel/syscalls/
Dsyscall.tbl31 23 32 setuid - sys_setuid16
221 213 64 setuid sys_setuid -
/Linux-v5.4/Documentation/admin-guide/sysctl/
Dfs.rst228 from "pinning" vulnerable setuid/setgid files against being upgraded by
278 This value can be used to query and set the core dump mode for setuid
/Linux-v5.4/Documentation/filesystems/
Dfuse.txt222 program (fusermount) is needed, which is installed setuid root.
249 setuid and setgid bits when executing programs. To ensure this
/Linux-v5.4/Documentation/admin-guide/
Dbinfmt-misc.rst81 will run with root permissions when a setuid binary owned by root
/Linux-v5.4/arch/mips/kernel/syscalls/
Dsyscall_n32.tbl113 103 n32 setuid sys_setuid
Dsyscall_n64.tbl113 103 n64 setuid sys_setuid
Dsyscall_o32.tbl34 23 o32 setuid sys_setuid
/Linux-v5.4/arch/ia64/kernel/syscalls/
Dsyscall.tbl33 21 common setuid sys_setuid
/Linux-v5.4/arch/xtensa/kernel/syscalls/
Dsyscall.tbl150 136 common setuid sys_setuid
/Linux-v5.4/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl116 105 common setuid __x64_sys_setuid
/Linux-v5.4/arch/x86/entry/syscalls/
Dsyscall_64.tbl116 105 common setuid __x64_sys_setuid
/Linux-v5.4/arch/m68k/kernel/syscalls/
Dsyscall.tbl33 23 common setuid sys_setuid16
/Linux-v5.4/arch/sh/kernel/syscalls/
Dsyscall.tbl33 23 common setuid sys_setuid16
/Linux-v5.4/arch/parisc/kernel/syscalls/
Dsyscall.tbl34 23 common setuid sys_setuid

12