/osnet-11/usr/src/lib/libc/common/sys/ |
H A D | setuid.s | 30 .file "setuid.s" 32 /* C library -- setuid */ 33 /* int setuid (uid_t uid); */ 37 ANSI_PRAGMA_WEAK(setuid,function) 41 SYSCALL_RVAL1(setuid) 43 SET_SIZE(setuid)
|
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Bin/ |
H A D | setuids.d | 3 * setuids.d - snoop setuid calls. This can examine user logins. 55 syscall::setuid:entry 65 syscall::setuid:return 77 syscall::setuid:return
|
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/User/ |
H A D | setuids.d | 3 * setuids.d - snoop setuid calls. This can examine user logins. 55 syscall::setuid:entry 65 syscall::setuid:return 77 syscall::setuid:return
|
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | cfext.h | 38 unsigned setuid:1; /* pkgmap entry has setuid */ member in struct:mergstat
|
H A D | pkgexecv.c | 434 if (setuid(pwp->pw_uid) == -1) {
|
/osnet-11/usr/src/lib/libmail/common/ |
H A D | systemvp.c | 59 (void) setuid(getuid());
|
H A D | popenvp.c | 80 (void) setuid(getuid());
|
/osnet-11/usr/src/lib/libnsl/dial/ |
H A D | dial.c | 150 (void) setuid(Euid); 247 if (setuid(getuid()) && setgid(getgid()) < 0)
|
/osnet-11/usr/src/lib/krb5/ss/ |
H A D | pager.c | 131 if (setuid(getuid()) == 0)
|
/osnet-11/usr/src/cmd/hal/hald/ |
H A D | util_helper.c | 125 if (setuid (pw->pw_uid)) {
|
/osnet-11/usr/src/lib/libshell/common/sh/ |
H A D | suid_exec.c | 58 #define SPECIAL 04100 /* setuid execute only by owner */ 120 * group, and setuid/gid bits correctly set. This copy of 123 * it is setuid/gid. Validate the proper execution by 146 /* Make sure that this is the real setuid program, not the clone. 226 if(effuid != ruserid || setuid(ruserid) < 0) 426 if((mode & S_ISUID) && owner && setuid(owner) < 0) 459 /* Kill any setuid status at this point. That way, if the 460 * clone is not setuid, we won't exec it as root. Also, don't 464 if(setuid(ruserid) < 0)
|
H A D | args.c | 404 setuid(shp->gd->userid); 412 else if((shp->gd->userid!=shp->gd->euserid && setuid(shp->gd->euserid)<0) ||
|
/osnet-11/usr/src/lib/libshell/common/bltins/ |
H A D | regress.c | 89 "[+setuid(uid)?Sets the intercept effective uid to \auid\a. " 211 int setuid(uid_t uid) function 219 TRACE(euid, "setuid", ("%s", "EPERM")); 224 TRACE(euid, "setuid", ("%s", intercept_euid == intercept_ruid ? "euid==ruid" : "euid!=ruid"));
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | XSUB.h | 333 # define setuid PerlProc_setuid macro 471 # define setuid PerlProc_setuid macro
|
/osnet-11/usr/src/cmd/perl/5.8.4/utils/port/ |
H A D | InstallPerl | 8 # and needs to be setuid-root. 13 use POSIX qw(uname setuid); 89 die("Needs to be run as root or setuid root\n")
|
/osnet-11/usr/src/cmd/sendmail/libsm/ |
H A D | t-sem.c | 140 r = setuid(uid);
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | main.c | 1303 if (setuid(new_uid) < 0) 1305 syserr("main: setuid(%d) failed", (int) new_uid); 2919 (void) setuid(RealUid); 3048 (void) setuid(RealUid); 3681 ** EX_OSERR if the setuid failed. 3792 ** Try to setuid(RunAsUid). 3798 if (setuid(RunAsUid) < 0 || 3807 ** setuid() to drop the saved-uid as well. 3818 if (setuid(RunAsUid) < 0) 3820 syserr("drop_privileges: second setuid( [all...] |
H A D | deliver.c | 2638 if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn) 2640 syserr("openmailer: setuid(%ld) failed", 2649 if (setuid(new_ruid) < 0 && suidwarn) 2651 syserr("openmailer: setuid(%ld) failed", 5296 /* we have to open the data file BEFORE setuid() */ 5463 if (setuid(RealUid) < 0 && suidwarn) 5465 syserr("mailfile: setuid(%ld) failed", (long) RealUid); 5625 (void) setuid(RealUid);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/POSIX/ |
H A D | POSIX.xs | 171 # undef setuid 173 # define setuid(a) not_here("setuid") 1851 setuid(uid)
|
H A D | POSIX.pm | 887 setsid setuid sysconf tcgetpgrp tcsetpgrp ttyname)],
|
/osnet-11/usr/src/lib/libwrap/ |
H A D | options.c | 290 if (dry_run == 0 && setuid(pwd->pw_uid)) 291 tcpd_jump("setuid(%s): %m", value);
|
/osnet-11/usr/src/lib/libast/common/misc/ |
H A D | procopen.c | 637 setuid(geteuid()); 643 setuid(getuid());
|
/osnet-11/usr/src/lib/brand/solaris10/zone/ |
H A D | p2v.ksh | 449 setuid=nocheck
|
/osnet-11/usr/src/lib/libc/port/threads/ |
H A D | spawn.c | 166 if (setgid(getgid()) != 0 || setuid(getuid()) != 0)
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | Ping.pm | 1458 be run as root or that the program be setuid to root. 1649 be setuid to root. The other protocols do not require special
|