/bionic/libc/arch-arm64/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 14 END(geteuid)
|
/bionic/libc/arch-arm/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 16 END(geteuid)
|
/bionic/libc/arch-mips/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 19 END(geteuid)
|
/bionic/libc/arch-x86_64/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 15 END(geteuid)
|
/bionic/libc/arch-mips64/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 25 END(geteuid)
|
/bionic/libc/arch-x86/syscalls/ |
geteuid.S | 5 ENTRY(geteuid) function 24 END(geteuid)
|
/external/e2fsprogs/include/nonunix/ |
pwd.h | 6 __inline int geteuid(void){return 1;} function
|
/external/libbrillo/brillo/ |
file_utils_unittest.cc | 106 EXPECT_TRUE(TouchFile(file_path_, kPermissions777, geteuid() + 1, getegid())); 112 EXPECT_TRUE(TouchFile(file_path_, kPermissions777, geteuid(), getegid() + 1)); 117 EXPECT_TRUE(TouchFile(file_path_, kPermissions777, geteuid(), getegid())); 123 EXPECT_TRUE(TouchFile(file_path_, kPermissions700, geteuid(), getegid())); 129 EXPECT_TRUE(TouchFile(file_path_, kPermissions777, geteuid(), getegid())); 130 EXPECT_TRUE(TouchFile(file_path_, kPermissions700, geteuid(), getegid()));
|
/prebuilts/go/darwin-x86/src/os/ |
proc.go | 30 // Geteuid returns the numeric effective user id of the caller. 31 func Geteuid() int { return syscall.Geteuid() }
|
/prebuilts/go/linux-x86/src/os/ |
proc.go | 30 // Geteuid returns the numeric effective user id of the caller. 31 func Geteuid() int { return syscall.Geteuid() }
|
/frameworks/av/media/libstagefright/ |
HTTPBase.cpp | 121 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid()); 129 ALOGE("Failed untagging socket %d (My UID=%d)", sockfd, geteuid()); 140 RegisterSocketUserMark(sockfd, geteuid());
|
/external/ltrace/ |
execute_program.c | 48 if (getuid() != 0 || geteuid() != 0) { 68 if (options.user || !geteuid()) {
|
/system/connectivity/apmanager/init/ |
apmanager-seccomp-amd64.policy | 3 geteuid: 1
|
/external/libcap/progs/old/ |
execcap.c | 37 if (getuid() && !geteuid()) {
|
sucap.c | 61 if (getuid() && !geteuid()) { 149 printf("[debug] uid:%d, real uid:%d\n", geteuid(), getuid()); 173 /* printf("[debug] uid:%d, real uid:%d\n", geteuid(), getuid()); */
|
/external/toybox/toys/pending/ |
logger.c | 49 struct passwd *pw = getpwuid(geteuid());
|
/system/tpm/attestation/server/ |
attestationd-seccomp-amd64.policy | 20 geteuid: 1
|
/system/tpm/tpm_manager/server/ |
tpm_manager-seccomp-amd64.policy | 20 geteuid: 1
|
/system/tpm/trunks/ |
trunksd-seccomp-arm64.policy | 19 geteuid: 1
|
trunksd-seccomp-x86_64.policy | 19 geteuid: 1
|
/external/curl/src/ |
tool_homedir.c | 77 struct passwd *pw = getpwuid(geteuid());
|
/external/mesa3d/src/gallium/targets/gbm/ |
gbm.c | 40 if (geteuid() == getuid())
|
/external/chromium-trace/catapult/telemetry/build/ |
linux_setup_msr.py | 79 if os.geteuid() == 0: 91 if os.geteuid() != 0:
|
/external/curl/lib/ |
netrc.c | 82 if(!getpwuid_r(geteuid(), &pw, pwbuf, sizeof(pwbuf), &pw_res) 93 pw= getpwuid(geteuid());
|
/external/toybox/toys/posix/ |
cpio.c | 150 if (!err && !geteuid() && !(toys.optflags & FLAG_no_preserve_owner)) 176 if (!geteuid() && !(toys.optflags & FLAG_no_preserve_owner)) { 191 if (!S_ISREG(mode) && !S_ISLNK(mode) && !geteuid()
|