Searched refs:setuid (Results 1 - 15 of 15) sorted by relevance
/linux-master/fs/devpts/ |
H A D | inode.c | 75 int setuid; member in struct:pts_mount_opts 233 opts->setuid = 0; 265 opts->setuid = 1; 389 if (opts->setuid) 560 inode->i_uid = opts->setuid ? opts->uid : current_fsuid();
|
/linux-master/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 277 if (setuid(child_uid) < 0) 492 if (setuid(NO_POLICY_UGID) < 0) 507 if (setuid(RESTRICTED_PARENT_UGID) < 0)
|
/linux-master/tools/testing/selftests/cgroup/ |
H A D | test_cpuset.c | 19 if (setuid(TEST_UID)) 35 if (setuid(TEST_UID))
|
/linux-master/tools/testing/selftests/mount/ |
H A D | nosymfollow-test.c | 108 if (setuid(0) != 0) 109 die("setuid(0) failed %s\n", strerror(errno));
|
H A D | unprivileged-remount-test.c | 175 if (setuid(0) != 0) { 176 die("setuid(0) failed %s\n",
|
/linux-master/tools/testing/selftests/rlimits/ |
H A D | rlimits-per-userns.c | 67 if (setuid(user) < 0) 68 err(EXIT_FAILURE, "(pid=%d): setuid(%d)", pid, user);
|
/linux-master/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 169 ASSERT_EQ(setuid(65534), 0);
|
/linux-master/tools/testing/selftests/net/ |
H A D | ipv6_flowlabel_mgr.c | 130 explain("child process can get it too, but not after setuid(nobody)"); 136 if (setuid(USHRT_MAX)) 137 fprintf(stderr, "[INFO] skip setuid child test\n");
|
/linux-master/samples/seccomp/ |
H A D | user-trap.c | 232 if (setuid(1000) < 0) { 233 perror("setuid");
|
/linux-master/tools/testing/selftests/move_mount_set_group/ |
H A D | move_mount_set_group_test.c | 104 if (setuid(0))
|
/linux-master/kernel/ |
H A D | sys_ni.c | 99 COND_SYSCALL(setuid); variable
|
H A D | sys.c | 521 * This makes it possible for a setuid program to completely drop its 526 * 100% compatible with BSD. A program which uses just setuid() will be 600 * setuid() is implemented like SysV with SAVED_IDS 602 * Note that SAVED_ID's is deficient in that a setuid root program 604 * user and then switch back, because if you're root, setuid() sets 657 SYSCALL_DEFINE1(setuid, uid_t, uid) 2051 * arbitrary program as any executable, even setuid ones.
|
/linux-master/tools/testing/selftests/filesystems/binderfs/ |
H A D | binderfs_test.c | 208 if (setuid(0))
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | token.c | 277 if (setuid(0))
|
/linux-master/tools/testing/selftests/mount_setattr/ |
H A D | mount_setattr_test.c | 216 if (setuid(0))
|
Completed in 164 milliseconds