HomeSort by: relevance | last modified time | path
    Searched refs:setuid (Results 1 - 19 of 19) sorted by relevancy

  /xsrc/external/mit/xdm/dist/xdmshell/
xdmshell.c 29 * This program should probably be setuid to root.
129 /* make xdm run in a non-setuid environment */
130 if (setuid (geteuid()) == -1) {
131 fprintf(stderr, "%s: cannot setuid (error %d, %s)\r\n",
  /xsrc/external/mit/xorg-server/dist/hw/xfree86/parser/
write.c 150 if (setuid(getuid()) == -1)
152 "setuid failed(%s)\n", strerror(errno));
  /xsrc/external/mit/xorg-server.old/dist/hw/xfree86/parser/
write.c 168 if (setuid(getuid()) == -1)
170 "setuid failed(%s)\n",
  /xsrc/external/mit/luit/dist/
sys.c 508 rc = setuid(uid);
513 rc = setuid(getuid());
  /xsrc/external/mit/xf86dga/dist/
dga.c 135 if (setuid(getuid()) == -1) {
  /xsrc/external/mit/xload/dist/
xload.c 207 if (setuid(getuid()) == -1) {
208 fprintf(stderr, gettext("%s: setuid failed: %s\n"),
  /xsrc/external/mit/xdm/dist/xdm/
session.c 544 if (setuid (verify.uid) == -1) {
545 LogError( "SessionExit: setuid: %s\n", strerror(errno));
663 if (setuid(verify->uid) < 0) {
664 LogError ("setuid %d (user \"%s\") failed: %s\n",
  /xsrc/external/mit/xf86-video-intel-2014/dist/src/
backlight.c 350 if (setgid(getgid()) || setuid(getuid()))
  /xsrc/external/mit/xorg-server/dist/os/
utils.c 1408 if (setuid(getuid()) == -1)
1478 if (setuid(getuid()) == -1)
1556 if (setuid(getuid()) == -1)
1832 /* Check args and env only if running setuid (euid == 0 && euid != uid) ? */
2006 * usually only done for setuid servers (uid != euid).
  /xsrc/external/mit/xorg-server.old/dist/os/
utils.c 1282 if (setuid(getuid()) == -1)
1351 if (setuid(getuid()) == -1)
1426 if (setuid(getuid()) == -1)
1564 /* Check args and env only if running setuid (euid == 0 && euid != uid) ? */
1739 * usually only done for setuid servers (uid != euid).
  /xsrc/external/mit/libX11/dist/src/xlibi18n/
lcFile.c 40 # define seteuid setuid
196 * Note: this only protects setuid-root clients. It doesn't
197 * protect other setuid or any setgid clients. If this tradeoff
270 * Note: this only protects setuid-root clients. It doesn't
271 * protect other setuid or any setgid clients. If this tradeoff
  /xsrc/external/mit/xf86-video-intel/dist/src/
backlight.c 380 if (setgid(getgid()) || setuid(getuid()))
  /xsrc/external/mit/xfs/dist/os/
utils.c 484 if (setuid(pwent->pw_uid)) {
  /xsrc/external/mit/xinit/dist/
xinit.c 576 if (setuid(getuid()) == -1) {
  /xsrc/external/mit/xterm/dist/
main.c 2130 if (setuid(save_ruid) == -1) {
3228 * Call the real get_pty() before relinquishing root-setuid, caching the
5093 if (setuid(screen->uid)) {
misc.c 1155 if (setuid(screen->uid) == -1
2246 || setuid(uid) == -1) {
2308 if (setuid(screen->uid) == -1) {
2318 * Logging is a security hole, since it allows a setuid program to write
6436 { ERROR_SETUID, "spawn: setuid() failed" },
configure 726 --disable-setuid disable setuid in xterm, do not install setuid/setgid
727 --disable-setgid disable setgid in xterm, do not install setuid/setgid
728 --with-setuid[=XXX] use the given setuid user
8717 echo "$as_me:8717: checking if you want to disable setuid" >&5
8718 echo $ECHO_N "checking if you want to disable setuid... $ECHO_C" >&6
8720 # Check whether --enable-setuid or --disable-setuid was given
    [all...]
  /xsrc/external/mit/xorg-server/dist/
configure 2180 --enable-install-setuid Install Xorg server as owned by root with setuid bit
27281 # Check whether --enable-install-setuid was given.
27284 enableval=$enable_install_setuid; SETUID=$enableval
27286 e) SETUID=auto ;;
27292 if test "x$SETUID" = "xauto" ; then
27294 cygwin*) SETUID="no" ;;
27295 mingw*) SETUID="no" ;;
27296 darwin*) SETUID="no" ;;
27299 sparc) SETUID="no" ;
    [all...]
  /xsrc/external/mit/xorg-server.old/dist/
configure 1969 --enable-install-setuid Install Xorg server as owned by root with setuid bit
28613 # Check whether --enable-install-setuid was given.
28615 enableval=$enable_install_setuid; SETUID=$enableval
28617 SETUID=auto
28622 if test "x$SETUID" = "xauto" ; then
28624 cygwin*) SETUID="no" ;;
28625 darwin*) SETUID="no" ;;
28628 sparc) SETUID="no" ;;
28629 *) SETUID="yes" ;
    [all...]

Completed in 68 milliseconds