Lines Matching full:setreuid
23 * Test setreuid() when executed by an unpriviledged user.
59 "After setreuid(nobody, nobody),"}, {
61 "After setreuid(-1, nobody),"}, {
63 "After setreuid(nobody, -1),"}, {
64 &neg_one, &neg_one, &pass, &nobody, &nobody, "After setreuid(-1, -1),"},
67 "After setreuid(-1, root),"}, {
69 "After setreuid(root, -1),"}, {
71 "After setreuid(root, root),"}, {
73 "After setreuid(root, nobody),"}, {
75 "After setreuid(root, nobody),"}, {
77 "After setreuid(bin, root),"}, {
79 "After setreuid(bin, -1),"}, {
81 "After setreuid(bin, bin,),"}, {
83 "After setreuid(bin, nobody),"}, {
85 "After setreuid(nobody, bin),"},};
109 TEST(SETREUID(cleanup, *test_data[i].real_uid,
116 "setreuid(%d, %d) "
123 tst_resm(TPASS, "setreuid(%d, %d) "
128 tst_resm(TPASS, "setreuid(%d, %d) "
134 tst_resm(TFAIL, "setreuid(%d, %d) "
165 UID16_CHECK(root.pw_uid, setreuid, cleanup);
168 UID16_CHECK(nobody.pw_uid, setreuid, cleanup);
171 UID16_CHECK(bin.pw_uid, setreuid, cleanup);