/third_party/node/lib/internal/bootstrap/switches/ |
H A D | does_own_process_state.js | 19 process.setuid = wrapped.setuid; 48 setuid: _setuid, 102 setuid: wrapIdSetter('User', _setuid),
|
H A D | does_not_own_process_state.js | 19 process.setuid = unavailable('process.setuid()');
|
/kernel/liteos_a/testsuites/unittest/container/smoke/ |
H A D | It_user_container_003.cpp | 59 ret = setuid(TEST_SET_NEW_ID); in TestMap() 96 ret = setuid(TEST_SET_OLD_ID); in childFunc()
|
H A D | It_user_container_002.cpp | 95 int ret = setuid(TEST_SET_NEW_ID); in childFunc() 120 int ret = setuid(TEST_SET_OLD_ID); in ItUserContainer002()
|
/third_party/ntfs-3g/libfuse-lite/ |
H A D | mount_util.c | 74 setuid(geteuid()); in fuse_mnt_add_mount() 127 setuid(geteuid()); in fuse_mnt_umount() 318 if (setuid(geteuid())) in fuse_mnt_add_mount() 319 fprintf(stderr, "%s: failed to setuid : %s\n", progname, in fuse_mnt_add_mount() 368 if (setuid(geteuid())) in fuse_mnt_umount() 369 fprintf(stderr, "%s: failed to setuid : %s\n", progname, in fuse_mnt_umount()
|
H A D | mount.c | 108 FUSE_OPT_KEY("setuid", KEY_KERN_OPT), 226 int setuid; member 235 SOLARIS_MOUNT_OPT("suid", setuid, 1), 238 SOLARIS_MOUNT_OPT("setuid", setuid, 1), 644 * or nodevices; there is no way for the user to specify setuid + in fuse_kern_mount() 651 && !smo.nosetuid && !smo.setuid)) { in fuse_kern_mount() 655 * Defaults; if neither nodevices|devices,nosetuid|setuid has in fuse_kern_mount() 663 if (!smo.nosetuid && !smo.setuid) in fuse_kern_mount()
|
/kernel/linux/linux-5.10/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 216 if (setuid(child_uid) < 0) in test_setuid() 295 if (setuid(NO_POLICY_USER) < 0) in main() 312 if (setuid(RESTRICTED_PARENT) < 0) in main()
|
/kernel/linux/linux-5.10/fs/devpts/ |
H A D | inode.c | 94 int setuid; member 252 opts->setuid = 0; in parse_mount_options() 284 opts->setuid = 1; in parse_mount_options() 408 if (opts->setuid) in devpts_show_options() 579 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/kernel/linux/linux-6.6/fs/devpts/ |
H A D | inode.c | 76 int setuid; member 234 opts->setuid = 0; in parse_mount_options() 266 opts->setuid = 1; in parse_mount_options() 390 if (opts->setuid) in devpts_show_options() 561 inode->i_uid = opts->setuid ? opts->uid : current_fsuid(); in devpts_pty_new()
|
/third_party/cups-filters/backend/ |
H A D | cups-brf.c | 48 if (setuid(0)) { in main() 87 if (setuid(pw->pw_uid)) { in main()
|
/third_party/musl/src/unistd/ |
H A D | setuid.c | 5 int setuid(uid_t uid) in setuid() function
|
/third_party/libfuse/lib/ |
H A D | mount_util.c | 114 if(setuid(geteuid()) == -1) { in add_mount() 115 fprintf(stderr, "%s: setuid: %s\n", progname, strerror(errno)); in add_mount() 173 if(setuid(geteuid()) == -1) { in exec_umount() 174 fprintf(stderr, "%s: setuid: %s\n", progname, strerror(errno)); in exec_umount() 245 if(setuid(geteuid()) == -1) { in remove_mount() 246 fprintf(stderr, "%s: setuid: %s\n", progname, strerror(errno)); in remove_mount()
|
/third_party/ltp/testcases/kernel/security/smack/ |
H A D | smack_notroot.c | 23 setuid(1); in main()
|
/third_party/ltp/testcases/kernel/syscalls/setuid/ |
H A D | setuid01.c | 10 * Verify that setuid(2) returns 0 and effective uid has 25 UID16_CHECK(uid, setuid); in verify_setuid() 27 TST_EXP_PASS(SETUID(uid), "setuid(%d)", uid); in verify_setuid()
|
H A D | setuid04.c | 8 * Check if setuid behaves correctly with file permissions. The test 9 * creates a file as ROOT with permissions 0644, does a setuid and then 62 UID16_CHECK(uid, setuid); in setup() 68 "setuid() failed to set the effective uid to %d", uid); in setup()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/kill/ |
H A D | 3-1.c | 26 if (setuid(1)) { in main() 27 perror("setuid"); in main()
|
H A D | 2-2.c | 58 if (setuid(1)) { in main() 59 perror("setuid"); in main()
|
/third_party/musl/libc-test/src/functionalext/supplement/unistd/ |
H A D | setuid.c | 22 * @tc.desc : Call the setuid method to set the process uid 28 int result = setuid(uid); in setuid_0100() 30 t_error("%s setuid error get result is %d are not 0\n", __func__, result); in setuid_0100() 33 t_error("%s setuid failed", __func__); in setuid_0100()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/ |
H A D | 5-1.c | 42 if (setuid(pwd->pw_uid)) { in main() 43 perror("setuid"); in main()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/ |
H A D | 3-1.c | 45 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
H A D | 12-1.c | 41 /* setuid will change uid, euid */ in set_nonroot() 42 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getparam/ |
H A D | 6-1.c | 55 if (setuid(pw->pw_uid) != 0) { in set_nonroot() 60 perror("setuid failed"); in set_nonroot()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/ |
H A D | 20-1.c | 44 if (setuid(pw->pw_uid) != 0) { in set_nonroot()
|
/kernel/linux/build/test/fuzztest/accesstokenid/src/ |
H A D | accesstokenidcommon.cpp | 67 ret = setuid(ACCESS_TOKEN_UID); in SetUidAndGrp() 69 printf("SetUidAndGrp setuid error %d \n", ret); in SetUidAndGrp() 86 ret = setuid(ACCESS_TOKEN_OTHER_UID); in SetUidAndGrpOther() 88 printf("SetUidAndGrp setuid error %d \n", ret); in SetUidAndGrpOther()
|
/kernel/linux/linux-6.6/tools/testing/selftests/cgroup/ |
H A D | test_cpuset.c | 19 if (setuid(TEST_UID)) in do_migration_fn() 35 if (setuid(TEST_UID)) in do_controller_fn()
|