/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
manis.good | 22 s%@SETUID@%$SETUID%g
|
manis.inp | 22 s%@SETUID@%$SETUID%g
|
modulo.inp | 22 s%@SETUID@%$SETUID%g
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/ |
pt_chown | |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/lib/ |
pt_chown | |
/cts/tests/tests/security/src/android/security/cts/ |
BannedFilesTest.java | 42 * setuid or setgid "ip" command can be used to modify the 54 * setuid or setgid tcpdump can be used maliciously to monitor 71 assertTrue("File \"" + file + "\" is setUID", (fs.mode & FileUtils.S_ISUID) == 0);
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 20 <li><strong>No setuid/setgid programs.</strong> 22 to Android system files and removed all setuid/setguid programs. This 31 <li><strong>Restrict Setuid from Android Apps.</strong> 34 from executing setuid programs. This reduces root attack surface and
|
/external/openssh/ |
uidswap.c | 130 if (setuid(geteuid()) < 0) 131 debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); 158 if (setuid(uid) < 0) 159 fatal("setuid %u: %.100s", (u_int)uid, strerror(errno)); 165 (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) 203 setuid(getuid()); 288 if (setuid(pw->pw_uid) < 0) 289 fatal("setuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno)); 309 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
|
/external/clang/test/Analysis/ |
security-syntax-checks.m | 59 int setuid(uid_t); 67 setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}} 68 setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}} 69 if (setuid (2) != 0) 72 // Currently the 'setuid' check is not flow-sensitive, and only looks 75 int t = setuid(2); // no-warnin [all...] |
/frameworks/av/media/libstagefright/include/ |
WVMExtractor.h | 41 virtual void setUID(uid_t uid) = 0; 77 void setUID(uid_t uid);
|
HTTPBase.h | 54 void setUID(uid_t uid);
|
/bionic/libc/bionic/ |
setuid.c | 33 int setuid(uid_t uid) function
|
/bootable/recovery/minadbd/ |
README.txt | 7 - always setuid/setgid's itself to the shell user
|
/external/mdnsresponder/ |
Makefile | 31 # Make sure ddnswriteconfig is owned by root:wheel, then make it setuid root executable
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
personality.h | 27 * cleared upon setuid or setgid exec:
|
prctl.h | 19 /* Get/set whether or not to drop capabilities on setuid() away from uid 0 */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
personality.h | 27 * cleared upon setuid or setgid exec:
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
personality.h | 27 * cleared upon setuid or setgid exec:
|
/external/ipsec-tools/src/racoon/ |
safefile.c | 55 /* no setuid */ 58 "setuid'ed execution not allowed\n");
|
/frameworks/av/media/libstagefright/ |
WVMExtractor.cpp | 148 void WVMExtractor::setUID(uid_t uid) { 150 mImpl->setUID(uid);
|
/external/chromium/net/url_request/ |
url_request_context.cc | 79 void URLRequestContext::setUID(uid_t uid) {
|
/external/kernel-headers/original/linux/ |
securebits.h | 24 /* When set, setuid to/from uid 0 does not trigger capability-"fixup".
|
/external/libcap-ng/libcap-ng-0.7/src/ |
captab.h | 30 _S(CAP_SETUID, "setuid" )
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.8 | 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
|
/frameworks/av/media/libmediaplayerservice/ |
StagefrightPlayer.h | 34 virtual status_t setUID(uid_t uid);
|