Searched refs:setuid (Results 76 – 86 of 86) sorted by relevance
1234
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/ltrace/ltrace/ |
H A D | 0001-Add-support-for-mips64-n32-n64.patch | 564 + "setuid", /* 103 */
|
/openbmc/linux/kernel/ |
H A D | sys.c | 657 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
|
/openbmc/qemu/linux-user/ |
H A D | strace.list | 1389 { TARGET_NR_setuid, "setuid" , NULL, NULL, NULL },
|
/openbmc/openbmc/poky/meta/recipes-bsp/lrzsz/lrzsz-0.12.20/ |
H A D | autotools-update.patch | 4948 - {"this program was never intended to be used setuid\n", 25}, 5264 msgid "this program was never intended to be used setuid\n" 5265 msgstr "dieses Programm darf nicht setuid laufen\n" 5510 msgid "this program was never intended to be used setuid\n"
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 309 is configured setuid for user mounts) unless the ``uid=``
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | kernel.rst | 531 (e.g via a setuid binary) then %pK will not leak kernel pointers to
|
/openbmc/linux/init/ |
H A D | Kconfig | 1488 system calls related to UIDs, GIDs, and capabilities, such as setuid,
|
/openbmc/openbmc/poky/documentation/ref-manual/ |
H A D | variables.rst | 1237 ``setuid root``, and one for the remaining features (i.e. those that 1238 do not require ``setuid root``).
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.txt | 3750 is to be setuid root or executed by root.
|
/openbmc/ |
H A D | opengrok1.0.log | 43249 …rity/dynamic-layers/meta-perl/recipes-scanners/checksecurity/files/check-setuid-use-more-portable-…
|
H A D | opengrok2.0.log | 43924 …rity/dynamic-layers/meta-perl/recipes-scanners/checksecurity/files/check-setuid-use-more-portable-…
|
1234