Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 223) sorted by relevance

123456789

/external/clang/test/Analysis/
Dsecurity-syntax-checks.m63 int setuid(uid_t); function
71setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
72setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
73 if (setuid (2) != 0)
76 // Currently the 'setuid' check is not flow-sensitive, and only looks
79 int t = setuid(2); // no-warning
80 (void)setuid (2); // no-warning
82 check(setuid (2)); // no-warning
/external/openssh/
Duidswap.c129 if (setuid(geteuid()) < 0) in temporarily_use_uid()
154 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_drop_suid()
192 setuid(getuid()); in restore_uid()
277 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
Dauth-sia.c110 setuid(0); in session_setup_sia()
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
Dusers.txt8 - No Network, No setuid, no exec in homedir
11 - Web access ports only. No setuid, no exec in homedir
Dlogin.txt9 - No Network, No setuid, no exec in homedir
12 - Web access ports only. No setuid, no exec in homedir
/external/sepolicy/
Drunas.te20 allow runas self:capability { setuid setgid };
34 neverallow runas self:capability ~{ setuid setgid };
Dracoon.te18 allow racoon self:capability { net_admin net_bind_service net_raw setuid };
Ddnsmasq.te10 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
Ddhcp.te9 allow dhcp self:capability { setgid setuid net_admin net_raw net_bind_service };
Dhostapd.te7 allow hostapd self:capability { net_admin net_raw setuid setgid };
Dlogd.te7 allow logd self:capability { setuid setgid sys_nice audit_control };
Dwpa.te10 allow wpa self:capability { setuid net_admin setgid net_raw };
Dsdcardd.te11 allow sdcardd self:capability { setuid setgid dac_override sys_admin sys_resource };
Dclatd.te18 allow clatd self:capability { net_admin net_raw setuid setgid };
Drild.te9 allow rild self:capability { setuid net_admin net_raw };
/external/openssh/openbsd-compat/
Dbsd-setres_id.c91 if (setuid(ruid) < 0) { in setresuid()
/external/libcap-ng/libcap-ng-0.7/utils/
Dcaptest.c74 setuid(0); in report()
/external/ipsec-tools/
Dmain.c193 setuid(AID_VPN); in main()
/external/mdnsresponder/mDNSPosix/
DPosixDaemon.c216 setuid(pw->pw_uid); in main()
/external/toybox/
Dmain.c107 if (!setuid(uid)) perror_exit("setuid %d->%d", euid, uid); // drop root in toy_init()
/external/fio/os/
Dos-windows.h98 int setuid(uid_t uid);
/external/strace/
Duid.c56 SYS_FUNC(setuid) in SYS_FUNC() argument
/external/iputils/
Darping.c189 if (setuid(getuid()) < 0) { in limit_capabilities()
228 if (setuid(on ? euid : getuid())) { in modify_capability_raw()
263 if (setuid(getuid()) < 0) { in drop_capabilities()
/external/selinux/libsepol/tests/policies/test-hooks/
Dsmall-base.conf365 setuid
Dcmp_policy.conf365 setuid

123456789