Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 52) sorted by relevance

123

/linux/Documentation/translations/zh_CN/userspace-api/
H A Dno_new_privs.rst15 例子就是setuid/setgid控制程序和文件的能力。为了避免父程序也获得这些权限,内
18 - 程序在setuid后,动态装载器处理 ``LD_*`` 环境变量的不同方式。
29 不会授予权限去做任何没有execve调用就不能做的事情。比如, setuid 和 setgid
42 适当权限的任务仍然可以调用 ``setuid(2)`` 并接收 SCM_RIGHTS 数据报。
50 运行的程序都设置了 ``no_new_privs`` ,那么那个 uid 将无法通过攻击 setuid
/linux/Documentation/userspace-api/
H A Dno_new_privs.rst6 its parent did not have. The most obvious examples are setuid/setgid
13 a program is setuid.
27 been done without the execve call. For example, the setuid and setgid
43 ``setuid(2)`` and receive SCM_RIGHTS datagrams.
55 escalate its privileges by directly attacking setuid, setgid, and
/linux/fs/devpts/
H A Dinode.c76 int setuid; member
235 opts->setuid = 1; in devpts_parse_param()
317 fsi->mount_opts.setuid = new->mount_opts.setuid; in devpts_reconfigure()
341 if (opts->setuid) in devpts_show_options()
515 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
/linux/tools/testing/selftests/cgroup/
H A Dtest_cpuset.c19 if (setuid(TEST_UID)) in do_migration_fn()
35 if (setuid(TEST_UID)) in do_controller_fn()
/linux/tools/testing/selftests/safesetid/
H A Dsafesetid-test.c277 if (setuid(child_uid) < 0) in test_setuid()
492 if (setuid(NO_POLICY_UGID) < 0) in main()
507 if (setuid(RESTRICTED_PARENT_UGID) < 0) in main()
/linux/tools/testing/selftests/namespaces/
H A Dcred_change_test.c102 if (setuid(target_uid) < 0) { in TEST()
496 setuid(0); in TEST()
643 setuid(change_count % 50); in TEST()
/linux/tools/testing/selftests/clone3/
H A Dclone3_cap_checkpoint_restore.c167 ASSERT_EQ(setuid(65534), 0); in TEST()
/linux/tools/testing/selftests/rlimits/
H A Drlimits-per-userns.c67 if (setuid(user) < 0) in fork_child()
/linux/tools/testing/selftests/mount/
H A Dnosymfollow-test.c108 if (setuid(0) != 0) in create_and_enter_ns()
H A Dunprivileged-remount-test.c175 if (setuid(0) != 0) { in create_and_enter_userns()
/linux/tools/testing/selftests/net/
H A Dipv6_flowlabel_mgr.c136 if (setuid(USHRT_MAX)) in run_tests()
/linux/tools/testing/selftests/move_mount_set_group/
H A Dmove_mount_set_group_test.c104 if (setuid(0)) in create_and_enter_userns()
/linux/samples/seccomp/
H A Duser-trap.c232 if (setuid(1000) < 0) { in main()
/linux/kernel/
H A Dsys_ni.c97 COND_SYSCALL(setuid);
/linux/arch/sparc/kernel/syscalls/
H A Dsyscall.tbl37 23 32 setuid sys_setuid16
38 23 64 setuid sys_setuid
/linux/tools/perf/arch/sparc/entry/syscalls/
H A Dsyscall.tbl37 23 32 setuid sys_setuid16
38 23 64 setuid sys_setuid
/linux/tools/perf/arch/s390/entry/syscalls/
H A Dsyscall.tbl31 23 32 setuid - sys_setuid16
221 213 64 setuid sys_setuid -
/linux/tools/testing/selftests/tty/
H A Dtty_tiocsti_test.c327 ASSERT_EQ(setuid(1000), 0); in drop_all_privs()
/linux/tools/testing/selftests/filesystems/binderfs/
H A Dbinderfs_test.c209 if (setuid(0)) in setid_userns_root()
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst222 program (fusermount) is needed, which is installed setuid root.
247 setuid and setgid bits when executing programs. To ensure this
/linux/Documentation/admin-guide/
H A Dbinfmt-misc.rst81 will run with root permissions when a setuid binary owned by root
/linux/arch/mips/kernel/syscalls/
H A Dsyscall_n64.tbl113 103 n64 setuid sys_setuid
H A Dsyscall_n32.tbl113 103 n32 setuid sys_setuid
/linux/tools/perf/arch/mips/entry/syscalls/
H A Dsyscall_n64.tbl113 103 n64 setuid sys_setuid
/linux/scripts/
H A Dsyscall.tbl183 146 common setuid sys_setuid

123