Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 306) sorted by relevance

12345678910>>...13

/external/clang/test/Analysis/
Dsecurity-syntax-checks.m63 int setuid(uid_t); function
71setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
72setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
73 if (setuid (2) != 0)
76 // Currently the 'setuid' check is not flow-sensitive, and only looks
79 int t = setuid(2); // no-warning
80 (void)setuid (2); // no-warning
82 check(setuid (2)); // no-warning
/external/autotest/client/site_tests/security_ProcessManagementPolicy/
Dcontrol11 services in ChromeOS that spawn programs which setuid() to a different user.
19 privileges to root through a simple setuid() call.
22 This autotest ensures that restricted users can only setuid() to UIDs approved
/external/openssh/
Duidswap.c133 if (setuid(geteuid()) < 0) in temporarily_use_uid()
164 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_drop_suid()
202 setuid(getuid()); in restore_uid()
287 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
/external/syzkaller/sys/linux/test/
Dfile_immutable3 # It also requires root, so will fail with setuid.
4 # requires: -sandbox=namespace -sandbox=setuid
Dcgroup3 # TODO(dvyukov): sandbox=setuid has some permissions setup problems.
4 # requires: -sandbox= -sandbox=setuid -C,norepeat
/external/selinux/python/sepolicy/sepolicy/help/
Dlogin.txt9 - No Network, No setuid, no exec in homedir
12 - Web access ports only. No setuid, no exec in homedir
Dusers.txt8 - No Network, No setuid, no exec in homedir
11 - Web access ports only. No setuid, no exec in homedir
/external/python/cpython2/Lib/
Dsmtpd.py464 setuid = 1 variable in Options
485 options.setuid = 0
537 if options.setuid:
546 os.setuid(nobody)
/external/syzkaller/docs/
Dtroubleshooting.md21 … In this case, running the `syz-execprog` test with the `-sandbox=setuid` option fixes the problem,
22 so the main configuration needs to be updated to set `sandbox` to `setuid`.
Dexecuting_syzkaller_programs.md45 sandbox for fuzzing (none/setuid/namespace) (default "setuid")
/external/ltp/testcases/kernel/security/smack/
Dsmack_notroot.c23 setuid(1); in main()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/kill/
D3-1.c26 setuid(1); in main()
D2-2.c58 setuid(1); in main()
/external/compiler-rt/test/tsan/
Dsetuid2.c21 setuid(0); in main()
Dsetuid.c26 setuid(0); in main()
/external/strace/xlat/
Dpr_dumpable.in2 SUID_DUMP_DISABLE 0 /* No setuid dumping */
/external/ltp/testcases/kernel/syscalls/setuid/
Dsetuid01.c36 UID16_CHECK(uid, setuid); in verify_setuid()
Dsetuid04.c74 UID16_CHECK(uid, setuid); in setup()
/external/ltp/include/lapi/syscalls/
Ds390.in253 setuid 23
321 setuid 213
Ds390x.in253 setuid 23
321 setuid 213
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/
D5-1.c39 setuid(pwd->pw_uid); in main()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/
D3-1.c45 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
D12-1.c42 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/
D20-1.c44 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getparam/
D6-1.c55 if (setuid(pw->pw_uid) != 0) { in set_nonroot()

12345678910>>...13