/external/autotest/client/site_tests/security_Minijail0/src/ |
common.sh | 16 euid=$(id -u) 17 [ "$euid" != "$1" ] && die "euid $euid != $1"
|
/external/openssh/openbsd-compat/ |
bsd-getpeereid.c | 28 getpeereid(int s, uid_t *euid, gid_t *gid) 35 *euid = cred.uid; 47 getpeereid(int s, uid_t *euid, gid_t *gid) 53 if ((*euid = ucred_geteuid(ucred)) == -1) 64 getpeereid(int s, uid_t *euid, gid_t *gid) 66 *euid = geteuid();
|
bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) 73 if (setreuid(ruid, euid) < 0) { 82 if (seteuid(euid) < 0) { 84 error("seteuid %u: %.100s", euid, strerror(errno));
|
/external/ltp/testcases/kernel/syscalls/getegid/ |
getegid02.c | 42 uid_t euid; local 58 euid = geteuid(); 59 pwent = getpwuid(euid); 63 "unexpected value %d", euid);
|
/external/minijail/examples/ |
drop_privs.cpp | 27 uid_t ruid, euid, suid; local 29 getresuid(&ruid, &euid, &suid); 32 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid;
|
/bionic/libc/bionic/ |
seteuid.cpp | 31 int seteuid(uid_t euid) { 32 return setresuid(-1, euid,-1);
|
/external/ltp/testcases/kernel/syscalls/utils/ |
compat_16.h | 37 int setresuid(uid_t ruid, uid_t euid, uid_t suid); 125 int SETREUID(void (cleanup)(void), UID_T ruid, UID_T euid) 127 LTP_CREATE_SYSCALL(setreuid, cleanup, ruid, euid); 134 int SETRESUID(void (cleanup)(void), UID_T ruid, UID_T euid, UID_T suid) 136 LTP_CREATE_SYSCALL(setresuid, cleanup, ruid, euid, suid);
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.c | 57 uid_t uid, euid, suid; local 67 getresuid(&uid, &euid, &suid); 70 if ((uid != euid && uid != 0) || 75 getresuid(&uid, &euid, &suid); 86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid); 90 if (uid != euid || gid != egid)
|
pscap.c | 67 int pid, ppid, uid = -1, euid = -1; local 126 euid = 0; 138 &id, &euid); 153 if (euid == 0) { 157 } else if (euid != uid) { 159 p = getpwuid(euid); 160 uid = euid;
|
/external/libchrome/sandbox/linux/services/ |
syscall_wrappers_unittest.cc | 67 uid_t ruid, euid, suid; local 69 ASSERT_EQ(0, getresuid(&ruid, &euid, &suid)); 72 EXPECT_EQ(euid, sys_euid);
|
syscall_wrappers.cc | 100 int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid) { 105 res = syscall(__NR_getresuid32, ruid, euid, suid); 107 res = syscall(__NR_getresuid, ruid, euid, suid); 111 if (euid) MSAN_UNPOISON(euid, sizeof(*euid));
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sigqueue/ |
12-1.c | 28 /** Set the euid of this process to a non-root uid */ 42 /* setuid will change uid, euid */ 53 printf("Testing with user '%s' (euid: %d)(uid: %d)\n",
|
3-1.c | 31 /** Set the euid of this process to a non-root uid */ 56 printf("Testing with user '%s' (uid: %d)(euid: %d)\n",
|
/external/linux-kselftest/tools/testing/selftests/mqueue/ |
mq_open_tests.c | 432 printf("Queue open in excess of rlimit max when euid = 0 " 435 printf("Queue open in excess of rlimit max when euid = 0 " 440 printf("Queue open with mq_maxmsg > limit when euid = 0 " 443 printf("Queue open with mq_maxmsg > limit when euid = 0 " 448 printf("Queue open with mq_msgsize > limit when euid = 0 " 451 printf("Queue open with mq_msgsize > limit when euid = 0 " 456 printf("Queue open with total size > 2GB when euid = 0 " 459 printf("Queue open with total size > 2GB when euid = 0 " 470 printf("Queue open in excess of rlimit max when euid = 99 " 473 printf("Queue open in excess of rlimit max when euid = 99 [all...] |
/external/ltp/testcases/kernel/syscalls/mq_unlink/ |
mq_unlink01.c | 32 static uid_t euid; variable 80 euid = geteuid(); 117 if (tc->as_nobody && seteuid(euid) == -1) 118 tst_res(TWARN | TERRNO, "seteuid back to %d failed", euid);
|
/external/ltp/testcases/kernel/syscalls/setreuid/ |
setreuid01.c | 54 static uid_t ruid, euid; /* real and effective user ids */ variable 75 euid = geteuid(); /* get effective uid */ 76 UID16_CHECK(euid, setreuid, cleanup); 95 TEST(SETREUID(cleanup, -1, euid));
|
/external/minijail/test/ |
libminijail_test.cpp | 98 uid_t ruid, euid, suid; local 100 getresuid(&ruid, &euid, &suid); 103 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid;
|
/external/toybox/toys/posix/ |
id.c | 90 uid_t uid = getuid(), euid = geteuid(); local 98 uid = euid = pw->pw_uid; 104 pw = xgetpwuid(i ? uid : euid); 115 if (uid != euid) { 116 pw = xgetpwuid(euid); 117 showid(" euid=", pw->pw_uid, pw->pw_name);
|
/external/openssh/ |
audit.c | 125 debug("audit connection from %s port %d euid %d", host, port, 136 debug("audit event euid %d user %s event %d (%s)", geteuid(), 152 debug("audit session open euid %d user %s tty name %s", geteuid(), 168 debug("audit session close euid %d user %s tty name %s", geteuid(), 180 debug("audit run command euid %d user %s command '%.200s'", geteuid(),
|
/external/selinux/python/sepolgen/tests/test_data/ |
short.log | 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
|
audit.log | 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 16 type=SYSCALL msg=audit(1162850343.419:985): arch=40000003 syscall=5 success=no exit=-2 a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) 18 type=SYSCALL msg=audit(1162850343.427:986): arch=40000003 syscall=33 success=yes exit=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 20 type=SYSCALL msg=audit(1162850343.427:987): arch=40000003 syscall=5 success=yes exit=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 22 type=SYSCALL msg=audit(1162850343.427:988): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa1df2c a2=ce8ff4 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 27 type=SYSCALL msg=audit(1162850343.427:989): arch=40000003 syscall=5 success=yes exit=4 a0=8e1facb a1=80c2 a2=180 a3=80c2 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r (…) [all...] |
/external/toybox/toys/other/ |
nsenter.c | 33 -r Become root (map current euid/egid to 0/0, implies -U) (--map-root-user) 89 static void handle_r(int euid, int egid) 98 write_ugid_map("/proc/self/uid_map", euid); 126 int euid = geteuid(), egid = getegid(); local 135 if (test_r()) handle_r(euid, egid);
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getparam/ |
6-1.c | 32 /** Set the euid of this process to a non-root uid */ 66 printf("Testing with user '%s' (euid,uid) = (%d,%d)\n",
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setparam/ |
23-6.c | 25 /** Set the euid of this process to a non-root uid */ 50 printf("Testing with user '%s' (euid: %d)(uid: %d)\n",
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/ |
20-1.c | 30 /** Set the euid of this process to a non-root uid */ 55 printf("Testing with user '%s' (euid: %d)(uid: %d)\n",
|