/bionic/libc/bionic/ |
seteuid.cpp | 31 int seteuid(uid_t euid) { 32 return setresuid(-1, euid,-1);
|
/external/openssh/openbsd-compat/ |
bsd-getpeereid.c | 28 getpeereid(int s, uid_t *euid, gid_t *gid) 35 *euid = cred.uid; 47 getpeereid(int s, uid_t *euid, gid_t *gid) 53 if ((*euid = ucred_geteuid(ucred)) == -1) 64 getpeereid(int s, uid_t *euid, gid_t *gid) 66 *euid = geteuid();
|
bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) 73 if (setreuid(ruid, euid) < 0) { 82 if (seteuid(euid) < 0) { 84 error("seteuid %u: %.100s", euid, strerror(errno));
|
/external/autotest/client/site_tests/security_Minijail0/src/ |
common.sh | 16 euid=$(id -u) 17 [ "$euid" != "$1" ] && die "euid $euid != $1"
|
/external/ltp/testcases/kernel/syscalls/getegid/ |
getegid02.c | 42 uid_t euid; local 58 euid = geteuid(); 59 pwent = getpwuid(euid); 63 "unexpected value %d", euid);
|
/external/ltp/testcases/kernel/syscalls/mq_unlink/ |
mq_unlink01.c | 32 static uid_t euid; variable 80 euid = geteuid(); 117 if (tc->as_nobody && seteuid(euid) == -1) 118 tst_res(TWARN | TERRNO, "seteuid back to %d failed", euid);
|
/external/ltp/testcases/kernel/syscalls/setreuid/ |
setreuid01.c | 54 static uid_t ruid, euid; /* real and effective user ids */ variable 75 euid = geteuid(); /* get effective uid */ 76 UID16_CHECK(euid, setreuid, cleanup); 95 TEST(SETREUID(cleanup, -1, euid));
|
/external/python/cpython2/Misc/ |
setuid-prog.c | 129 uid_t euid = geteuid(); local 154 if (statb.st_uid != 0 && statb.st_uid != euid) { 164 if (setreuid(euid, euid) < 0)
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
pscap.c | 67 int pid, ppid, uid = -1, euid = -1; local 126 euid = 0; 138 &id, &euid); 153 if (euid == 0) { 157 } else if (euid != uid) { 159 p = getpwuid(euid); 160 uid = euid;
|
captest.c | 57 uid_t uid, euid, suid; local 67 getresuid(&uid, &euid, &suid); 70 if ((uid != euid && uid != 0) || 75 getresuid(&uid, &euid, &suid); 86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid); 90 if (uid != euid || gid != egid)
|
/external/toybox/toys/other/ |
nsenter.c | 33 -r Become root (map current euid/egid to 0/0, implies -U) (--map-root-user) 89 static void handle_r(int euid, int egid) 98 write_ugid_map("/proc/self/uid_map", euid); 126 int euid = geteuid(), egid = getegid(); local 135 if (test_r()) handle_r(euid, egid);
|
/external/minijail/examples/ |
drop_privs.cpp | 27 uid_t ruid, euid, suid; local 29 getresuid(&ruid, &euid, &suid); 32 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid;
|
/external/ltp/testcases/kernel/syscalls/utils/ |
compat_16.h | 37 int setresuid(uid_t ruid, uid_t euid, uid_t suid); 125 int SETREUID(void (cleanup)(void), UID_T ruid, UID_T euid) 127 LTP_CREATE_SYSCALL(setreuid, cleanup, ruid, euid); 134 int SETRESUID(void (cleanup)(void), UID_T ruid, UID_T euid, UID_T suid) 136 LTP_CREATE_SYSCALL(setresuid, cleanup, ruid, euid, suid);
|
/external/toybox/toys/posix/ |
id.c | 90 uid_t uid = getuid(), euid = geteuid(); local 98 uid = euid = pw->pw_uid; 104 pw = xgetpwuid(i ? uid : euid); 115 if (uid != euid) { 116 pw = xgetpwuid(euid); 117 showid(" euid=", pw->pw_uid, pw->pw_name);
|
/external/libchrome/sandbox/linux/services/ |
syscall_wrappers_unittest.cc | 67 uid_t ruid, euid, suid; local 69 ASSERT_EQ(0, getresuid(&ruid, &euid, &suid)); 72 EXPECT_EQ(euid, sys_euid);
|
syscall_wrappers.cc | 100 int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid) { 105 res = syscall(__NR_getresuid32, ruid, euid, suid); 107 res = syscall(__NR_getresuid, ruid, euid, suid); 111 if (euid) MSAN_UNPOISON(euid, sizeof(*euid));
|
credentials.cc | 45 uid_t ruid, euid, suid; local 47 PCHECK(sys_getresuid(&ruid, &euid, &suid) == 0); 49 const bool uids_are_equal = (ruid == euid) && (ruid == suid); 52 if (resuid) *resuid = euid;
|
syscall_wrappers.h | 63 SANDBOX_EXPORT int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid);
|
/external/ltp/testcases/kernel/syscalls/sched_setscheduler/ |
sched_setscheduler03.c | 122 uid_t ruid, euid, suid; local 151 tst_res(TINFO, "Setting euid to nobody to drop privilege"); 154 SAFE_GETRESUID(&ruid, &euid, &suid); 155 if (euid != nobody_uid)
|
/external/minijail/test/ |
libminijail_test.cpp | 98 uid_t ruid, euid, suid; local 100 getresuid(&ruid, &euid, &suid); 103 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid;
|
/external/toybox/ |
main.c | 121 uid_t uid = getuid(), euid = geteuid(); local 124 if (uid != euid) { 125 if (setuid(uid)) perror_exit("setuid %d->%d", euid, uid); // drop root 126 euid = uid; 132 if ((which->flags & TOYFLAG_NEEDROOT) && euid) help_exit("Not root");
|
/system/security/keystore/ |
permissions.cpp | 54 uid_t euid; member in struct:user_euid 153 return user.euid; 186 if (user.euid == callingUid && user.uid == targetUid) {
|
/bionic/libc/kernel/uapi/linux/ |
cn_proc.h | 63 __u32 euid; member in union:proc_event::__anon497::id_proc_event::__anon500
|
/development/ndk/platforms/android-21/include/linux/ |
cn_proc.h | 74 __u32 euid; member in union:proc_event::__anon1790::id_proc_event::__anon1793
|
/external/kernel-headers/original/uapi/linux/ |
cn_proc.h | 92 __u32 euid; member in union:proc_event::__anon21343::id_proc_event::__anon21346
|