Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 332) sorted by relevance

12345678910>>...14

/external/mtools/
Dprivileges.c105 setuid(uid); in Setuid()
133 setuid(0); /* get the necessary privs to drop real root id */ in destroy_privs()
134 setuid(ruid); /* this should be enough to get rid of the three in destroy_privs()
182 setuid(0); /* set real uid to 0 */ in init_privs()
Dprivtest.c23 setuid(strtoul(argv[1], 0,0)); in main()
/external/clang/test/Analysis/
Dsecurity-syntax-checks.m63 int setuid(uid_t); function
71setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
72setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
73 if (setuid (2) != 0)
76 // Currently the 'setuid' check is not flow-sensitive, and only looks
79 int t = setuid(2); // no-warning
80 (void)setuid (2); // no-warning
82 check(setuid (2)); // no-warning
/external/autotest/client/site_tests/security_ProcessManagementPolicy/
Dcontrol11 services in ChromeOS that spawn programs which setuid() to a different user.
19 privileges to root through a simple setuid() call.
22 This autotest ensures that restricted users can only setuid() to UIDs approved
/external/selinux/python/sepolicy/sepolicy/help/
Dlogin.txt9 - No Network, No setuid, no exec in homedir
12 - Web access ports only. No setuid, no exec in homedir
Dusers.txt8 - No Network, No setuid, no exec in homedir
11 - Web access ports only. No setuid, no exec in homedir
/external/llvm-project/clang/test/Analysis/
Dsecurity-syntax-checks.m116 int setuid(uid_t); function
124setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
125setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
126 if (setuid (2) != 0)
129 // Currently the 'setuid' check is not flow-sensitive, and only looks
132 int t = setuid(2); // no-warning
133 (void)setuid (2); // no-warning
135 check(setuid (2)); // no-warning
/external/linux-kselftest/tools/testing/selftests/safesetid/
Dsafesetid-test.c216 if (setuid(child_uid) < 0) in test_setuid()
295 if (setuid(NO_POLICY_USER) < 0) in main()
312 if (setuid(RESTRICTED_PARENT) < 0) in main()
/external/openssh/
Duidswap.c142 if (setuid(geteuid()) == -1) in temporarily_use_uid()
180 if (setuid(getuid()) == -1) in restore_uid()
267 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
/external/libfuse/lib/
Dmount_util.c111 if(setuid(geteuid()) == -1) { in add_mount()
170 if(setuid(geteuid()) == -1) { in exec_umount()
242 if(setuid(geteuid()) == -1) { in remove_mount()
/external/ltp/testcases/kernel/security/smack/
Dsmack_notroot.c23 setuid(1); in main()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/kill/
D3-1.c26 setuid(1); in main()
D2-2.c58 setuid(1); in main()
/external/llvm-project/compiler-rt/test/tsan/
Dsetuid2.c21 setuid(0); in main()
Dsetuid.c26 setuid(0); in main()
/external/compiler-rt/test/tsan/
Dsetuid2.c21 setuid(0); in main()
Dsetuid.c26 setuid(0); in main()
/external/strace/xlat/
Dpr_dumpable.in2 SUID_DUMP_DISABLE 0 /* No setuid dumping */
/external/ltp/testcases/kernel/syscalls/setuid/
Dsetuid01.c24 UID16_CHECK(uid, setuid); in verify_setuid()
/external/python/cpython2/Lib/
Dsmtpd.py464 setuid = 1 variable in Options
485 options.setuid = 0
537 if options.setuid:
546 os.setuid(nobody)
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/
D5-1.c39 setuid(pwd->pw_uid); in main()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/
D3-1.c45 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
D12-1.c42 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/
D20-1.c44 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getparam/
D6-1.c55 if (setuid(pw->pw_uid) != 0) { in set_nonroot()

12345678910>>...14