Home
last modified time | relevance | path

Searched refs:privileges (Results 1 – 25 of 54) sorted by relevance

123

/linux/Documentation/admin-guide/LSM/
A DSafeSetID.rst7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as
14 to switch to a different user must be spawned with CAP_SETUID privileges.
19 privileges opens up possible security holes since any user with access to the
20 file can exec() that program to gain the elevated privileges.
27 especially since programs often only call setuid() to drop privileges to a
28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
107 privileges, such as allowing a user to set up user namespace UID/GID mappings.
111 In v5.9 we are adding support for limiting CAP_SETGID privileges as was done
/linux/Documentation/userspace-api/
A Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
8 gaining these privileges as well, the kernel and user code must be
55 escalate its privileges by directly attacking setuid, setgid, and
A Dlandlock.rst97 restrict the current thread from gaining more privileges (e.g. thanks to a SUID
103 perror("Failed to restrict privileges");
189 A sandboxed process has less privileges than a non-sandboxed process and must
A Dseccomp_filter.rst72 run with ``CAP_SYS_ADMIN`` privileges in its namespace. If these are not
74 programs cannot be applied to child processes with greater privileges
/linux/security/safesetid/
A DKconfig11 the given UIDs/GIDs from obtaining auxiliary privileges associated
/linux/Documentation/userspace-api/media/v4l/
A Dvidioc-dbg-g-register.rst49 superuser privileges. Additionally the Linux kernel must be compiled
159 Insufficient permissions. Root privileges are required to execute
A Dopen.rst205 descriptor. Applications can request additional access privileges using
/linux/Documentation/trace/
A Dmmiotrace.rst51 If not (requires root privileges)::
57 Activate mmiotrace (requires root privileges)::
76 Shut down mmiotrace (requires root privileges)::
/linux/Documentation/ia64/
A Defirtc.rst101 Root privileges are required to be able to set the time of day.
137 Root privileges are required to be able to set the alarm.
/linux/tools/testing/selftests/resctrl/
A DREADME23 To use resctrl_tests, root or sudoer privileges are required. This is because
/linux/Documentation/dev-tools/
A Dkselftest.rst41 Note that some tests will require root privileges.
122 Note that some tests will require root privileges.
147 note some tests will require root privileges::
/linux/Documentation/userspace-api/media/drivers/
A Duvcvideo.rst142 Insufficient privileges (super user privileges are required).
/linux/Documentation/filesystems/
A Dfuse.rst20 The filesystem daemon is running with the privileges of the mounting
214 A) mount owner should not be able to get elevated privileges with the
226 A) The mount owner could gain elevated privileges by either:
A Doverlayfs.rst291 2) task creating the overlay mount MUST NOT gain additional privileges
293 3) non-mounting task MAY gain additional privileges through the overlay,
312 however, the mounting task will have sufficient privileges to perform all
/linux/Documentation/firmware-guide/acpi/
A Dmethod-customizing.rst87 memory and gain additional rights, if root's privileges got
/linux/drivers/net/ethernet/emulex/benet/
A Dbe_main.c1939 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt()
1940 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt()
1943 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt()
1961 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt()
1962 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt()
1965 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt()
4254 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup()
4256 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup()
4258 vf_cfg->privileges | in be_vf_setup()
4262 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
/linux/security/keys/
A DKconfig52 it is or by a process with administrative privileges. The active
/linux/Documentation/admin-guide/
A Dperf-security.rst64 Linux divides the privileges traditionally associated with superuser
129 privileges [6]_ :
/linux/Documentation/s390/
A Dmonreader.rst79 DCSS if your z/VM doesn't have one already, you need Class E privileges to
/linux/scripts/
A Dspelling.txt1144 priviledges||privileges
1145 privleges||privileges
/linux/Documentation/security/
A Dcredentials.rst102 'group' and 'other'), each of which may be granted certain privileges
244 extra privileges, based on the annotations on the executable file.
/linux/tools/testing/selftests/tc-testing/
A DREADME51 To use tdc, root privileges are required. This is because the
/linux/Documentation/networking/device_drivers/ethernet/marvell/
A Docteontx2.rst26 and has privileges to provision RVU functional block's LFs to each of the
/linux/Documentation/virt/uml/
A Duser_mode_linux_howto_v2.rst250 Network configuration privileges
253 The majority of the supported networking modes need ``root`` privileges.
552 no special privileges for the UDP mode.
576 BESS transport does not require any special privileges.
/linux/Documentation/admin-guide/mm/
A Dhugetlbpage.rst84 privileges can dynamically allocate more or free some persistent huge pages
275 is used to demote a number of huge pages. A user with root privileges

Completed in 216 milliseconds

123