Searched refs:setuid (Results 1 – 25 of 306) sorted by relevance
12345678910>>...13
/external/clang/test/Analysis/ |
D | security-syntax-checks.m | 63 int setuid(uid_t); function 71 …setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an … 72 …setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an … 73 if (setuid (2) != 0) 76 // Currently the 'setuid' check is not flow-sensitive, and only looks 79 int t = setuid(2); // no-warning 80 (void)setuid (2); // no-warning 82 check(setuid (2)); // no-warning
|
/external/autotest/client/site_tests/security_ProcessManagementPolicy/ |
D | control | 11 services in ChromeOS that spawn programs which setuid() to a different user. 19 privileges to root through a simple setuid() call. 22 This autotest ensures that restricted users can only setuid() to UIDs approved
|
/external/openssh/ |
D | uidswap.c | 133 if (setuid(geteuid()) < 0) in temporarily_use_uid() 164 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_drop_suid() 202 setuid(getuid()); in restore_uid() 287 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
|
/external/syzkaller/sys/linux/test/ |
D | file_immutable | 3 # It also requires root, so will fail with setuid. 4 # requires: -sandbox=namespace -sandbox=setuid
|
D | cgroup | 3 # TODO(dvyukov): sandbox=setuid has some permissions setup problems. 4 # requires: -sandbox= -sandbox=setuid -C,norepeat
|
/external/selinux/python/sepolicy/sepolicy/help/ |
D | login.txt | 9 - No Network, No setuid, no exec in homedir 12 - Web access ports only. No setuid, no exec in homedir
|
D | users.txt | 8 - No Network, No setuid, no exec in homedir 11 - Web access ports only. No setuid, no exec in homedir
|
/external/python/cpython2/Lib/ |
D | smtpd.py | 464 setuid = 1 variable in Options 485 options.setuid = 0 537 if options.setuid: 546 os.setuid(nobody)
|
/external/syzkaller/docs/ |
D | troubleshooting.md | 21 … In this case, running the `syz-execprog` test with the `-sandbox=setuid` option fixes the problem, 22 so the main configuration needs to be updated to set `sandbox` to `setuid`.
|
D | executing_syzkaller_programs.md | 45 sandbox for fuzzing (none/setuid/namespace) (default "setuid")
|
/external/ltp/testcases/kernel/security/smack/ |
D | smack_notroot.c | 23 setuid(1); in main()
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/kill/ |
D | 3-1.c | 26 setuid(1); in main()
|
D | 2-2.c | 58 setuid(1); in main()
|
/external/compiler-rt/test/tsan/ |
D | setuid2.c | 21 setuid(0); in main()
|
D | setuid.c | 26 setuid(0); in main()
|
/external/strace/xlat/ |
D | pr_dumpable.in | 2 SUID_DUMP_DISABLE 0 /* No setuid dumping */
|
/external/ltp/testcases/kernel/syscalls/setuid/ |
D | setuid01.c | 36 UID16_CHECK(uid, setuid); in verify_setuid()
|
D | setuid04.c | 74 UID16_CHECK(uid, setuid); in setup()
|
/external/ltp/include/lapi/syscalls/ |
D | s390.in | 253 setuid 23 321 setuid 213
|
D | s390x.in | 253 setuid 23 321 setuid 213
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/ |
D | 5-1.c | 39 setuid(pwd->pw_uid); in main()
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/ |
D | 3-1.c | 45 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
D | 12-1.c | 42 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/ |
D | 20-1.c | 44 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getparam/ |
D | 6-1.c | 55 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
12345678910>>...13