/linux-6.3-rc2/Documentation/translations/zh_CN/userspace-api/ |
A D | no_new_privs.rst | 15 例子就是setuid/setgid控制程序和文件的能力。为了避免父程序也获得这些权限,内 18 - 程序在setuid后,动态装载器处理 ``LD_*`` 环境变量的不同方式。 29 不会授予权限去做任何没有execve调用就不能做的事情。比如, setuid 和 setgid 42 适当权限的任务仍然可以调用 ``setuid(2)`` 并接收 SCM_RIGHTS 数据报。 50 运行的程序都设置了 ``no_new_privs`` ,那么那个 uid 将无法通过攻击 setuid,
|
/linux-6.3-rc2/Documentation/userspace-api/ |
A D | no_new_privs.rst | 6 its parent did not have. The most obvious examples are setuid/setgid 13 a program is setuid. 27 been done without the execve call. For example, the setuid and setgid 43 ``setuid(2)`` and receive SCM_RIGHTS datagrams. 55 escalate its privileges by directly attacking setuid, setgid, and
|
/linux-6.3-rc2/fs/devpts/ |
A D | inode.c | 94 int setuid; member 252 opts->setuid = 0; in parse_mount_options() 284 opts->setuid = 1; in parse_mount_options() 408 if (opts->setuid) in devpts_show_options() 579 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/linux-6.3-rc2/tools/testing/selftests/safesetid/ |
A D | safesetid-test.c | 277 if (setuid(child_uid) < 0) in test_setuid() 492 if (setuid(NO_POLICY_UGID) < 0) in main() 507 if (setuid(RESTRICTED_PARENT_UGID) < 0) in main()
|
/linux-6.3-rc2/Documentation/admin-guide/LSM/ |
A D | SafeSetID.rst | 27 especially since programs often only call setuid() to drop privileges to a 30 switch to through setuid() beyond allowing a switch to any user on the system. 39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user 92 "Since setuid only affects the current process, and since the SELinux controls
|
/linux-6.3-rc2/tools/testing/selftests/clone3/ |
A D | clone3_cap_checkpoint_restore.c | 171 ASSERT_EQ(setuid(65534), 0); in TEST()
|
/linux-6.3-rc2/tools/testing/selftests/rlimits/ |
A D | rlimits-per-userns.c | 67 if (setuid(user) < 0) in fork_child()
|
/linux-6.3-rc2/tools/testing/selftests/mount/ |
A D | nosymfollow-test.c | 108 if (setuid(0) != 0) in create_and_enter_ns()
|
A D | unprivileged-remount-test.c | 175 if (setuid(0) != 0) { in create_and_enter_userns()
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | ipv6_flowlabel_mgr.c | 136 if (setuid(USHRT_MAX)) in run_tests()
|
/linux-6.3-rc2/tools/testing/selftests/move_mount_set_group/ |
A D | move_mount_set_group_test.c | 104 if (setuid(0)) in create_and_enter_userns()
|
/linux-6.3-rc2/samples/seccomp/ |
A D | user-trap.c | 228 if (setuid(1000) < 0) { in main()
|
/linux-6.3-rc2/kernel/ |
A D | sys_ni.c | 180 COND_SYSCALL(setuid);
|
/linux-6.3-rc2/arch/sparc/kernel/syscalls/ |
A D | syscall.tbl | 37 23 32 setuid sys_setuid16 38 23 64 setuid sys_setuid
|
/linux-6.3-rc2/arch/s390/kernel/syscalls/ |
A D | syscall.tbl | 31 23 32 setuid - sys_setuid16 221 213 64 setuid sys_setuid -
|
/linux-6.3-rc2/tools/perf/arch/s390/entry/syscalls/ |
A D | syscall.tbl | 31 23 32 setuid - sys_setuid16 221 213 64 setuid sys_setuid -
|
/linux-6.3-rc2/tools/testing/selftests/filesystems/binderfs/ |
A D | binderfs_test.c | 208 if (setuid(0)) in setid_userns_root()
|
/linux-6.3-rc2/Documentation/admin-guide/sysctl/ |
A D | fs.rst | 197 from "pinning" vulnerable setuid/setgid files against being upgraded by 247 This value can be used to query and set the core dump mode for setuid
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | fuse.rst | 208 program (fusermount) is needed, which is installed setuid root. 233 setuid and setgid bits when executing programs. To ensure this
|
/linux-6.3-rc2/arch/ia64/kernel/syscalls/ |
A D | syscall.tbl | 33 21 common setuid sys_setuid
|
/linux-6.3-rc2/tools/perf/arch/mips/entry/syscalls/ |
A D | syscall_n64.tbl | 113 103 n64 setuid sys_setuid
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | binfmt-misc.rst | 81 will run with root permissions when a setuid binary owned by root
|
/linux-6.3-rc2/arch/mips/kernel/syscalls/ |
A D | syscall_n64.tbl | 113 103 n64 setuid sys_setuid
|
/linux-6.3-rc2/arch/x86/entry/syscalls/ |
A D | syscall_64.tbl | 116 105 common setuid sys_setuid
|
/linux-6.3-rc2/arch/xtensa/kernel/syscalls/ |
A D | syscall.tbl | 150 136 common setuid sys_setuid
|