Home
last modified time | relevance | path

Searched refs:setuid (Results 1 – 25 of 248) sorted by relevance

12345678910

/external/autotest/client/site_tests/security_SuidBinaries/
Dcontrol8 Enforces a whitelist of known, allowed setuid/gid binaries on the system
11 PURPOSE = "To maintain a minimal set of setuid/gid binaries on the system"
13 Fail if the list of setuid/gid binaries doesn't match the baseline
/external/clang/test/Analysis/
Dsecurity-syntax-checks.m63 int setuid(uid_t); function
71setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
72setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an …
73 if (setuid (2) != 0)
76 // Currently the 'setuid' check is not flow-sensitive, and only looks
79 int t = setuid(2); // no-warning
80 (void)setuid (2); // no-warning
82 check(setuid (2)); // no-warning
/external/openssh/
Duidswap.c133 if (setuid(geteuid()) < 0) in temporarily_use_uid()
158 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_drop_suid()
196 setuid(getuid()); in restore_uid()
281 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
Dauth-sia.c110 setuid(0); in session_setup_sia()
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
Dusers.txt8 - No Network, No setuid, no exec in homedir
11 - Web access ports only. No setuid, no exec in homedir
Dlogin.txt9 - No Network, No setuid, no exec in homedir
12 - Web access ports only. No setuid, no exec in homedir
/external/v8/build/config/gcc/
DBUILD.gn36 # Chrome uses some setuid binaries, and hard links preserve setuid bits. An
37 # unprivileged user could gain root privileges by hardlinking a setuid
/external/compiler-rt/test/tsan/
Dsetuid2.c15 setuid(0); in main()
Dsetuid.c20 setuid(0); in main()
/external/ipsec-tools/
Dracoon.rc4 # IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
Dmain.c194 setuid(AID_VPN); in main()
/external/dbus/bus/
DMakefile.am239 echo "Not installing $(DESTDIR)$(libexecdir)/dbus-daemon-launch-helper binary setuid!"; \
/external/tlsdate/
Dapparmor-profile17 capability setuid,
78 capability setuid,
135 capability setuid,
/external/openssh/openbsd-compat/
Dbsd-setres_id.c91 if (setuid(ruid) < 0) { in setresuid()
/external/dbus/doc/
Dsystem-activation.txt9 In the next few paragraphs I will outline a simpler setuid approach for
27 This has the permissions 4750, i.e. u+rwx g+rx +setuid.
/external/tlsdate/src/
Dutil-plan9.c111 if (0 != (setuid (uid) | seteuid (uid))) in drop_privs_to()
/external/autotest/utils/
Dservice_helper.py86 os.setuid(uid)
/external/libcap-ng/libcap-ng-0.7/utils/
Dcaptest.c74 setuid(0); in report()
/external/libcap/progs/
Dcapsh.c349 status = setuid(value); in main()
440 status = setuid(pwd->pw_uid); in main()
/external/toybox/
Dmain.c110 if (setuid(uid)) perror_exit("setuid %d->%d", euid, uid); // drop root in toy_init()
/external/mdnsresponder/mDNSPosix/
DPosixDaemon.c216 setuid(pw->pw_uid); in main()
/external/fio/os/
Dos-windows.h98 int setuid(uid_t uid);
/external/strace/
Duid.c84 SYS_FUNC(setuid) in SYS_FUNC() argument
/external/libchrome/sandbox/linux/
Dsandbox_linux.gypi40 # the setuid sandbox and is its own target.
196 # The setuid sandbox, for Linux
/external/iputils/
Darping.c189 if (setuid(getuid()) < 0) { in limit_capabilities()
228 if (setuid(on ? euid : getuid())) { in modify_capability_raw()
263 if (setuid(getuid()) < 0) { in drop_capabilities()

12345678910