Searched refs:setuid (Results 1 – 25 of 97) sorted by relevance
1234
54 ATF_REQUIRE(setuid(0) == -1); in ATF_TC_BODY()68 ATF_REQUIRE(setuid(uid) == 0); in ATF_TC_BODY()95 rv = setuid(pw->pw_uid); in ATF_TC_BODY()
172 if (setuid(cuid) < 0) in ATF_TC_BODY()185 if (setuid(puid) != 0) in ATF_TC_BODY()
128 if (setuid(pw->pw_uid) != 0) in ATF_TC_BODY()
153 if (setuid(pw->pw_uid) != 0) in ATF_TC_BODY()
285 (void)setuid(pw->pw_uid); in ATF_TC_BODY()
293 if (setuid(uid) != 0) in ATF_TC_BODY()
14 DIR !?= mktemp -d -t regress-setuid-XXXXXXXXXX29 REGRESS_TARGETS+= run-regress-setuid54 BINFILES+= setuid83 run-regress-setuid: install-setuid84 cd ${DIR} && ${SUDO} ./setuid
35 if (setuid(pw->pw_uid) == -1) in main()
32 if (setuid(pw->pw_uid) == -1) in main()
178 setuid => -u $test ? 1 : 0,229 setuid => -u $test ? 1 : 0,296 setuid => -u $symlink ? 1 : 0,
21 SUBDIR+= setuid
124 if (setuid(pwd->pw_uid) != 0) in main()
81 if (setuid(geteuid())) in main()
68 If you #define SECURE in config.h then hack will not setuid(getuid())69 before executing a chdir(). Hack will always do setuid(getuid()) with
86 setuid(pw->pw_uid); in main()
120 if (setuid(pw->pw_uid)) { in rcmdsh()
212 setuid => $bool,270 $file->{setuid} = -u _ ? 1 : 0;
180 setuid(0); in main()
73 settimeofday.o setuid.o shmat.o shmctl.o shmdt.o \198 setresuid.2 setreuid.2 setsid.2 sendsyslog.2 setuid.2 shmat.2 \
152 PROTO_NORMAL(setuid);
133 setuid(0); in local_passwd()
132 else if (setuid(0)) in main()
292 setuid
20 C<PERLIO_DEBUG> environment variable if perl wasn't running setuid and the31 If perl is running setuid or the B<-T> switch was supplied C<PERLIO_DEBUG> is
76 // setuid ASan log_path exploits: https://www.exploit-db.com/exploits/46241.