Searched refs:privileges (Results 1 – 25 of 59) sorted by relevance
123
| /Linux-v6.6/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as 14 to switch to a different user must be spawned with CAP_SETUID privileges. 19 privileges opens up possible security holes since any user with access to the 20 file can exec() that program to gain the elevated privileges. 27 especially since programs often only call setuid() to drop privileges to a 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 107 privileges, such as allowing a user to set up user namespace UID/GID mappings. 111 In v5.9 we are adding support for limiting CAP_SETGID privileges as was done
|
| /Linux-v6.6/Documentation/userspace-api/ |
| D | no_new_privs.rst | 5 The execve system call can grant a newly-started program privileges that 8 gaining these privileges as well, the kernel and user code must be 55 escalate its privileges by directly attacking setuid, setgid, and
|
| D | landlock.rst | 148 restrict the current thread from gaining more privileges (e.g. thanks to a SUID 154 perror("Failed to restrict privileges"); 262 A sandboxed process has less privileges than a non-sandboxed process and must
|
| D | seccomp_filter.rst | 72 run with ``CAP_SYS_ADMIN`` privileges in its namespace. If these are not 74 programs cannot be applied to child processes with greater privileges
|
| /Linux-v6.6/Documentation/ABI/testing/ |
| D | sysfs-bus-event_source-devices-hv_gpci | 94 * User needs root privileges to read data from this sysfs file. 126 * User needs root privileges to read data from this sysfs file. 158 * User needs root privileges to read data from this sysfs file. 190 * User needs root privileges to read data from this sysfs file. 222 * User needs root privileges to read data from this sysfs file.
|
| D | sysfs-bus-coreboot | 44 requires root privileges given this is exposing a small subset
|
| /Linux-v6.6/security/safesetid/ |
| D | Kconfig | 11 the given UIDs/GIDs from obtaining auxiliary privileges associated
|
| /Linux-v6.6/Documentation/userspace-api/media/v4l/ |
| D | vidioc-dbg-g-register.rst | 49 superuser privileges. Additionally the Linux kernel must be compiled 159 Insufficient permissions. Root privileges are required to execute
|
| D | open.rst | 205 descriptor. Applications can request additional access privileges using
|
| /Linux-v6.6/Documentation/trace/ |
| D | mmiotrace.rst | 51 If not (requires root privileges):: 57 Activate mmiotrace (requires root privileges):: 76 Shut down mmiotrace (requires root privileges)::
|
| /Linux-v6.6/Documentation/arch/ia64/ |
| D | efirtc.rst | 101 Root privileges are required to be able to set the time of day. 137 Root privileges are required to be able to set the alarm.
|
| /Linux-v6.6/Documentation/userspace-api/media/drivers/ |
| D | uvcvideo.rst | 142 Insufficient privileges (super user privileges are required).
|
| /Linux-v6.6/Documentation/dev-tools/ |
| D | kselftest.rst | 50 Note that some tests will require root privileges. 131 Note that some tests will require root privileges. 156 note some tests will require root privileges::
|
| /Linux-v6.6/Documentation/firmware-guide/acpi/ |
| D | method-customizing.rst | 87 memory and gain additional rights, if root's privileges got
|
| /Linux-v6.6/Documentation/filesystems/ |
| D | fuse.rst | 20 The filesystem daemon is running with the privileges of the mounting 214 A) mount owner should not be able to get elevated privileges with the 226 A) The mount owner could gain elevated privileges by either:
|
| D | overlayfs.rst | 290 2) task creating the overlay mount MUST NOT gain additional privileges 292 3) non-mounting task MAY gain additional privileges through the overlay, 311 however, the mounting task will have sufficient privileges to perform all
|
| /Linux-v6.6/security/keys/ |
| D | Kconfig | 52 it is or by a process with administrative privileges. The active
|
| /Linux-v6.6/drivers/net/ethernet/emulex/benet/ |
| D | be_main.c | 1939 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt() 1940 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt() 1943 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt() 1961 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt() 1962 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt() 1965 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt() 4255 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup() 4257 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup() 4259 vf_cfg->privileges | in be_vf_setup() 4263 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
|
| /Linux-v6.6/Documentation/admin-guide/ |
| D | perf-security.rst | 64 Linux divides the privileges traditionally associated with superuser 129 privileges [6]_ :
|
| /Linux-v6.6/Documentation/arch/s390/ |
| D | monreader.rst | 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to
|
| /Linux-v6.6/tools/testing/selftests/tc-testing/ |
| D | README | 51 To use tdc, root privileges are required. This is because the
|
| /Linux-v6.6/Documentation/security/ |
| D | credentials.rst | 102 'group' and 'other'), each of which may be granted certain privileges 244 extra privileges, based on the annotations on the executable file.
|
| /Linux-v6.6/tools/power/cpupower/po/ |
| D | ka.po | 245 msgid "Subcommand %s needs root privileges\n" 819 msgid "Intel's performance bias setting needs root privileges\n"
|
| /Linux-v6.6/Documentation/virt/uml/ |
| D | user_mode_linux_howto_v2.rst | 250 Network configuration privileges 253 The majority of the supported networking modes need ``root`` privileges. 552 no special privileges for the UDP mode. 576 BESS transport does not require any special privileges.
|
| /Linux-v6.6/Documentation/powerpc/ |
| D | vas-api.rst | 100 privileges are needed to open the device. Each window corresponds to one
|
123