Searched refs:setuid (Results 1 – 25 of 248) sorted by relevance
12345678910
/external/autotest/client/site_tests/security_SuidBinaries/ |
D | control | 8 Enforces a whitelist of known, allowed setuid/gid binaries on the system 11 PURPOSE = "To maintain a minimal set of setuid/gid binaries on the system" 13 Fail if the list of setuid/gid binaries doesn't match the baseline
|
/external/clang/test/Analysis/ |
D | security-syntax-checks.m | 63 int setuid(uid_t); function 71 …setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an … 72 …setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an … 73 if (setuid (2) != 0) 76 // Currently the 'setuid' check is not flow-sensitive, and only looks 79 int t = setuid(2); // no-warning 80 (void)setuid (2); // no-warning 82 check(setuid (2)); // no-warning
|
/external/openssh/ |
D | uidswap.c | 133 if (setuid(geteuid()) < 0) in temporarily_use_uid() 158 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_drop_suid() 196 setuid(getuid()); in restore_uid() 281 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) in permanently_set_uid()
|
D | auth-sia.c | 110 setuid(0); in session_setup_sia()
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
D | users.txt | 8 - No Network, No setuid, no exec in homedir 11 - Web access ports only. No setuid, no exec in homedir
|
D | login.txt | 9 - No Network, No setuid, no exec in homedir 12 - Web access ports only. No setuid, no exec in homedir
|
/external/v8/build/config/gcc/ |
D | BUILD.gn | 36 # Chrome uses some setuid binaries, and hard links preserve setuid bits. An 37 # unprivileged user could gain root privileges by hardlinking a setuid
|
/external/compiler-rt/test/tsan/ |
D | setuid2.c | 15 setuid(0); in main()
|
D | setuid.c | 20 setuid(0); in main()
|
/external/ipsec-tools/ |
D | racoon.rc | 4 # IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
|
D | main.c | 194 setuid(AID_VPN); in main()
|
/external/dbus/bus/ |
D | Makefile.am | 239 echo "Not installing $(DESTDIR)$(libexecdir)/dbus-daemon-launch-helper binary setuid!"; \
|
/external/tlsdate/ |
D | apparmor-profile | 17 capability setuid, 78 capability setuid, 135 capability setuid,
|
/external/openssh/openbsd-compat/ |
D | bsd-setres_id.c | 91 if (setuid(ruid) < 0) { in setresuid()
|
/external/dbus/doc/ |
D | system-activation.txt | 9 In the next few paragraphs I will outline a simpler setuid approach for 27 This has the permissions 4750, i.e. u+rwx g+rx +setuid.
|
/external/tlsdate/src/ |
D | util-plan9.c | 111 if (0 != (setuid (uid) | seteuid (uid))) in drop_privs_to()
|
/external/autotest/utils/ |
D | service_helper.py | 86 os.setuid(uid)
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
D | captest.c | 74 setuid(0); in report()
|
/external/libcap/progs/ |
D | capsh.c | 349 status = setuid(value); in main() 440 status = setuid(pwd->pw_uid); in main()
|
/external/toybox/ |
D | main.c | 110 if (setuid(uid)) perror_exit("setuid %d->%d", euid, uid); // drop root in toy_init()
|
/external/mdnsresponder/mDNSPosix/ |
D | PosixDaemon.c | 216 setuid(pw->pw_uid); in main()
|
/external/fio/os/ |
D | os-windows.h | 98 int setuid(uid_t uid);
|
/external/strace/ |
D | uid.c | 84 SYS_FUNC(setuid) in SYS_FUNC() argument
|
/external/libchrome/sandbox/linux/ |
D | sandbox_linux.gypi | 40 # the setuid sandbox and is its own target. 196 # The setuid sandbox, for Linux
|
/external/iputils/ |
D | arping.c | 189 if (setuid(getuid()) < 0) { in limit_capabilities() 228 if (setuid(on ? euid : getuid())) { in modify_capability_raw() 263 if (setuid(getuid()) < 0) { in drop_capabilities()
|
12345678910