Searched refs:setuid (Results 1 – 25 of 39) sorted by relevance
12
6 its parent did not have. The most obvious examples are setuid/setgid13 a program is setuid.27 been done without the execve call. For example, the setuid and setgid43 ``setuid(2)`` and receive SCM_RIGHTS datagrams.55 escalate its privileges by directly attacking setuid, setgid, and
216 setuid(child_uid); in test_setuid()294 setuid(NO_POLICY_USER); in main()309 setuid(RESTRICTED_PARENT); in main()
94 int setuid; member252 opts->setuid = 0; in parse_mount_options()284 opts->setuid = 1; in parse_mount_options()408 if (opts->setuid) in devpts_show_options()579 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
27 especially since programs often only call setuid() to drop privileges to a30 switch to through setuid() beyond allowing a switch to any user on the system.39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user92 "Since setuid only affects the current process, and since the SELinux controls
136 if (setuid(USHRT_MAX)) in run_tests()
107 ret = setuid(0); in change_to_userns()
228 if (setuid(1000) < 0) { in main()
175 if (setuid(0) != 0) { in create_and_enter_userns()
176 COND_SYSCALL(setuid);
37 23 32 setuid sys_setuid1638 23 64 setuid sys_setuid
31 23 32 setuid - compat_sys_s390_setuid16221 213 64 setuid sys_setuid -
31 23 32 setuid - sys_setuid16221 213 64 setuid sys_setuid -
228 from "pinning" vulnerable setuid/setgid files against being upgraded by278 This value can be used to query and set the core dump mode for setuid
222 program (fusermount) is needed, which is installed setuid root.249 setuid and setgid bits when executing programs. To ensure this
81 will run with root permissions when a setuid binary owned by root
113 103 n32 setuid sys_setuid
113 103 n64 setuid sys_setuid
34 23 o32 setuid sys_setuid
33 21 common setuid sys_setuid
150 136 common setuid sys_setuid
116 105 common setuid __x64_sys_setuid
33 23 common setuid sys_setuid16
34 23 common setuid sys_setuid