HomeSort by relevance Sort by last modified time
    Searched full:setuid (Results 1 - 25 of 427) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /ndk/sources/host-tools/sed-4.2.1/testsuite/
manis.good 22 s%@SETUID@%$SETUID%g
manis.inp 22 s%@SETUID@%$SETUID%g
modulo.inp 22 s%@SETUID@%$SETUID%g
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/
pt_chown 
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/lib/
pt_chown 
  /cts/tests/tests/security/src/android/security/cts/
BannedFilesTest.java 42 * setuid or setgid "ip" command can be used to modify the
54 * setuid or setgid tcpdump can be used maliciously to monitor
71 assertTrue("File \"" + file + "\" is setUID", (fs.mode & FileUtils.S_ISUID) == 0);
  /docs/source.android.com/src/devices/tech/security/
enhancements43.jd 20 <li><strong>No setuid/setgid programs.</strong>
22 to Android system files and removed all setuid/setguid programs.  This
31 <li><strong>Restrict Setuid from Android Apps.</strong>
34 from executing setuid programs. This reduces root attack surface and
  /external/openssh/
uidswap.c 130 if (setuid(geteuid()) < 0)
131 debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
158 if (setuid(uid) < 0)
159 fatal("setuid %u: %.100s", (u_int)uid, strerror(errno));
165 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
203 setuid(getuid());
288 if (setuid(pw->pw_uid) < 0)
289 fatal("setuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno));
309 (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
  /external/clang/test/Analysis/
security-syntax-checks.m 59 int setuid(uid_t);
67 setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}}
68 setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}}
69 if (setuid (2) != 0)
72 // Currently the 'setuid' check is not flow-sensitive, and only looks
75 int t = setuid(2); // no-warnin
    [all...]
  /frameworks/av/media/libstagefright/include/
WVMExtractor.h 41 virtual void setUID(uid_t uid) = 0;
77 void setUID(uid_t uid);
HTTPBase.h 54 void setUID(uid_t uid);
  /bionic/libc/bionic/
setuid.c 33 int setuid(uid_t uid) function
  /bootable/recovery/minadbd/
README.txt 7 - always setuid/setgid's itself to the shell user
  /external/mdnsresponder/
Makefile 31 # Make sure ddnswriteconfig is owned by root:wheel, then make it setuid root executable
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
personality.h 27 * cleared upon setuid or setgid exec:
prctl.h 19 /* Get/set whether or not to drop capabilities on setuid() away from uid 0 */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
personality.h 27 * cleared upon setuid or setgid exec:
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
personality.h 27 * cleared upon setuid or setgid exec:
  /external/ipsec-tools/src/racoon/
safefile.c 55 /* no setuid */
58 "setuid'ed execution not allowed\n");
  /frameworks/av/media/libstagefright/
WVMExtractor.cpp 148 void WVMExtractor::setUID(uid_t uid) {
150 mImpl->setUID(uid);
  /external/chromium/net/url_request/
url_request_context.cc 79 void URLRequestContext::setUID(uid_t uid) {
  /external/kernel-headers/original/linux/
securebits.h 24 /* When set, setuid to/from uid 0 does not trigger capability-"fixup".
  /external/libcap-ng/libcap-ng-0.7/src/
captab.h 30 _S(CAP_SETUID, "setuid" )
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /frameworks/av/media/libmediaplayerservice/
StagefrightPlayer.h 34 virtual status_t setUID(uid_t uid);

Completed in 593 milliseconds

1 2 3 4 5 6 7 8 91011>>