/bionic/libc/arch-arm64/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 14 END(setreuid)
|
/bionic/libc/arch-arm/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 16 END(setreuid)
|
/bionic/libc/arch-mips/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 19 END(setreuid)
|
/bionic/libc/arch-x86_64/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 15 END(setreuid)
|
/external/ltp/testcases/kernel/syscalls/setreuid/ |
setreuid01.c | 37 * Testcase to test the basic functionality of setreuid(2) system call. 73 UID16_CHECK(ruid, setreuid, cleanup); 76 UID16_CHECK(euid, setreuid, cleanup); 78 TEST(SETREUID(cleanup, -1, -1)); 82 "setreuid - Don't change either real or effective uid failed, errno=%d : %s", 86 "setreuid - Don't change either real or effective uid returned %ld", 95 TEST(SETREUID(cleanup, -1, euid)); 99 "setreuid - change effective to effective uid failed, errno=%d : %s", 103 "setreuid - change effective to effective uid returned %ld", 112 TEST(SETREUID(cleanup, ruid, -1)) [all...] |
setreuid05.c | 22 * Test the setreuid() feature, verifying the role of the saved-set-uid 23 * and setreuid's effect on it. 53 "After setreuid(-1, nobody),"}, { 55 "After setreuid(-1, root),"}, { 57 "After setreuid(daemon, -1),"}, { 59 "After setreuid(-1, bin),"}, { 61 "After setreuid(-1, root),"}, { 63 "After setreuid(-1, nobody),"}, { 65 "After setreuid(-1, daemon),"}, { 67 "After setreuid(-1, bin),"}, [all...] |
setreuid03.c | 23 * Test setreuid() when executed by an unpriviledged user. 59 "After setreuid(nobody, nobody),"}, { 61 "After setreuid(-1, nobody),"}, { 63 "After setreuid(nobody, -1),"}, { 64 &neg_one, &neg_one, &pass, &nobody, &nobody, "After setreuid(-1, -1),"}, 67 "After setreuid(-1, root),"}, { 69 "After setreuid(root, -1),"}, { 71 "After setreuid(root, root),"}, { 73 "After setreuid(root, nobody),"}, { 75 "After setreuid(root, nobody),"}, [all...] |
setreuid02.c | 22 * Test setreuid() when executed by root. 51 &neg_one, &neg_one, &root, &root, "After setreuid(-1, -1),"}, { 52 &nobody.pw_uid, &neg_one, &nobody, &root, "After setreuid(nobody, -1)"}, 54 &root.pw_uid, &neg_one, &root, &root, "After setreuid(root,-1),"}, { 56 "After setreuid(-1, daemon)"}, { 57 &neg_one, &root.pw_uid, &root, &root, "After setreuid(-1,root),"}, { 58 &bin.pw_uid, &neg_one, &bin, &root, "After setreuid(bin, -1)"}, { 59 &root.pw_uid, &neg_one, &root, &root, "After setreuid(-1, root)"},}; 82 TEST(SETREUID(cleanup, *test_data[i].real_uid, 86 tst_resm(TBROK, "setreuid(%d, %d) failed" [all...] |
setreuid04.c | 53 &neg_one, &neg_one, &root, &root, "After setreuid(-1, nobody),"}, { 55 "After setreuid(-1, -1),"},}; 83 TEST(SETREUID(cleanup, *test_data[i].real_uid, 87 tst_resm(TPASS, "setreuid(%d, %d) " 92 tst_resm(TFAIL, "setreuid(%d, %d) " 121 UID16_CHECK(root.pw_uid, setreuid, cleanup); 124 UID16_CHECK(nobody.pw_uid, setreuid, cleanup);
|
setreuid07.c | 23 * Check if setreuid behaves correctly with file permissions. 24 * The test creates a file as ROOT with permissions 0644, does a setreuid 86 if (SETREUID(NULL, 0, ltpuser->pw_uid) == -1) { 87 perror("setreuid failed"); 149 if (SETREUID(NULL, 0, 0) == -1) { 150 perror("setreuid failed");
|
setreuid06.c | 22 * Test that EPERM is set when setreuid is given an invalid user id. 60 TEST(SETREUID(cleanup, -1, INVAL_USER)); 64 tst_resm(TPASS, "setreuid set errno to EPERM as " 67 tst_resm(TFAIL, "setreuid FAILED, expected 1 but "
|
/external/strace/tests/ |
setreuid.gen.test | 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
|
setreuid.c | 7 # define SYSCALL_NAME "setreuid"
|
/external/strace/tests-m32/ |
setreuid.gen.test | 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
|
setreuid.c | 7 # define SYSCALL_NAME "setreuid"
|
/external/strace/tests-mx32/ |
setreuid.gen.test | 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
|
setreuid.c | 7 # define SYSCALL_NAME "setreuid"
|
/bionic/libc/arch-mips64/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 25 END(setreuid)
|
/bionic/libc/arch-x86/syscalls/ |
setreuid.S | 5 ENTRY(setreuid) function 34 END(setreuid)
|
/external/ltp/testcases/kernel/syscalls/vhangup/ |
vhangup01.c | 58 retval = setreuid(nobody_uid, nobody_uid); 60 perror("setreuid"); 61 tst_brkm(TFAIL, NULL, "setreuid failed");
|
/external/ltp/testcases/kernel/syscalls/getresuid/ |
getresuid02.c | 25 * and saved user ids after calling process invokes setreuid() to change 107 * setreuid() in setup. 166 if (setreuid(-1, ps_uid) < 0) { 168 "setreuid(-1, %d) Fails, errno:%d : %s", 183 if (setreuid(-1, pr_uid) < 0) {
|
/bionic/libc/ |
SECCOMP_BLACKLIST_APP.TXT | 37 int setreuid:setreuid32(uid_t, uid_t) arm,x86 38 int setreuid:setreuid(uid_t, uid_t) arm64,mips,mips64,x86_64
|
/external/ltp/testcases/kernel/syscalls/mkdir/ |
mkdir02.c | 145 rval = setreuid(nobody_uid, nobody_uid); 147 perror("setreuid"); 148 tst_resm(TFAIL, "setreuid failed to " 219 rval = setreuid(bin_uid, bin_uid); 221 tst_resm(TFAIL, "setreuid failed to " 225 perror("setreuid");
|
mkdir04.c | 128 rval = setreuid(nobody_uid, nobody_uid); 130 tst_resm(TFAIL | TERRNO, "setreuid failed to " 160 rval = setreuid(bin_uid, bin_uid); 162 tst_resm(TFAIL | TERRNO, "setreuid failed to "
|
/external/ltp/testcases/kernel/syscalls/mount/ |
mount03_setuid_test.c | 43 status = setreuid(ruid, 0);
|