Home
last modified time | relevance | path

Searched refs:setuid (Results 76 – 86 of 86) sorted by relevance

1234

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/ltrace/ltrace/
H A D0001-Add-support-for-mips64-n32-n64.patch564 + "setuid", /* 103 */
/openbmc/linux/kernel/
H A Dsys.c657 SYSCALL_DEFINE1(setuid, uid_t, uid) in SYSCALL_DEFINE1() argument
/openbmc/qemu/linux-user/
H A Dstrace.list1389 { TARGET_NR_setuid, "setuid" , NULL, NULL, NULL },
/openbmc/openbmc/poky/meta/recipes-bsp/lrzsz/lrzsz-0.12.20/
H A Dautotools-update.patch4948 - {"this program was never intended to be used setuid\n", 25},
5264 msgid "this program was never intended to be used setuid\n"
5265 msgstr "dieses Programm darf nicht setuid laufen\n"
5510 msgid "this program was never intended to be used setuid\n"
/openbmc/linux/Documentation/admin-guide/cifs/
H A Dusage.rst309 is configured setuid for user mounts) unless the ``uid=``
/openbmc/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst531 (e.g via a setuid binary) then %pK will not leak kernel pointers to
/openbmc/linux/init/
H A DKconfig1488 system calls related to UIDs, GIDs, and capabilities, such as setuid,
/openbmc/openbmc/poky/documentation/ref-manual/
H A Dvariables.rst1237 ``setuid root``, and one for the remaining features (i.e. those that
1238 do not require ``setuid root``).
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt3750 is to be setuid root or executed by root.
/openbmc/
H A Dopengrok1.0.log43249 …rity/dynamic-layers/meta-perl/recipes-scanners/checksecurity/files/check-setuid-use-more-portable-…
H A Dopengrok2.0.log43924 …rity/dynamic-layers/meta-perl/recipes-scanners/checksecurity/files/check-setuid-use-more-portable-…

1234