HomeSort by relevance Sort by last modified time
    Searched full:setresuid (Results 1 - 25 of 338) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /bionic/libc/arch-arm64/syscalls/
setresuid.S 5 ENTRY(setresuid) function
14 END(setresuid)
  /bionic/libc/arch-arm/syscalls/
setresuid.S 5 ENTRY(setresuid) function
16 END(setresuid)
  /bionic/libc/arch-mips/syscalls/
setresuid.S 5 ENTRY(setresuid) function
19 END(setresuid)
  /bionic/libc/arch-x86_64/syscalls/
setresuid.S 5 ENTRY(setresuid) function
15 END(setresuid)
  /external/strace/tests/
setresuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setresuid -a19 ); do not edit.
setresuid.c 7 # define SYSCALL_NAME "setresuid"
  /external/strace/tests-m32/
setresuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setresuid -a19 ); do not edit.
setresuid.c 7 # define SYSCALL_NAME "setresuid"
  /external/strace/tests-mx32/
setresuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setresuid -a19 ); do not edit.
setresuid.c 7 # define SYSCALL_NAME "setresuid"
  /bionic/libc/arch-mips64/syscalls/
setresuid.S 5 ENTRY(setresuid) function
25 END(setresuid)
  /external/autotest/client/site_tests/security_Minijail_seccomp/
policy-privdrop_x86_64 13 setresuid: 1
  /external/ltp/testcases/kernel/syscalls/setresuid/
setresuid01.c 25 * Test setresuid() when executed by root.
96 "After setresuid(-1, -1, -1),"}, {
98 "After setresuid(-1, -1, nobody),"}, {
100 "After setresuid(-1, bin, -1),"}, {
102 "After setresuid(-1, -1, root),"}, {
104 "After setresuid(-1, -1, bin),"}, {
106 "After setresuid(-1, root, -1),"}, {
108 "After setresuid(nobody, -1, -1)"}, {
110 "After setresuid(-1, root, -1),"}, {
112 "After setresuid(root, -1, -1),"},}
    [all...]
setresuid05.c 71 UID16_CHECK(ltpuser->pw_uid, "setresuid", cleanup)
78 TEST(SETRESUID(cleanup, -1, ltpuser->pw_uid, -1));
81 tst_resm(TFAIL | TTERRNO, "setresuid failed unexpectedly");
90 tst_resm(TPASS, "setresuid succeeded as expected");
93 "setresuid failed unexpectedly; euid(%d) - st_uid(%d)",
setresuid02.c 26 * uid values through the setresuid system call.
98 "After setresuid(-1, -1, bin),"}, {
100 "After setresuid(-1, nobody -1),"}, {
102 "After setresuid(bin, -1 -1),"},};
127 if (setresuid(nobody_pw_uid, bin_pw_uid, nobody_pw_uid) == -1) {
128 tst_brkm(TFAIL, cleanup, "Initial setresuid failed");
138 TEST(SETRESUID(NULL, *test_data[i].real_uid,
143 tst_resm(TPASS, "setresuid(%d, %d, %d) "
149 tst_resm(TFAIL, "setresuid(%d, %d, %d) "
190 UID16_CHECK((nobody_pw_uid = nobody.pw_uid), "setresuid", cleanup
    [all...]
setresuid03.c 25 * Test that the setresuid system call sets the proper errno
28 * effective uid of the current saved uid. Also verify that setresuid
105 "After setresuid(root, -1, -1),"}, {
107 "After setresuid(-1, -1, bin),"}, {
109 "After setresuid(-1, -1, bin),"}
135 if (setresuid(root_pw_uid, bin_pw_uid, bin_pw_uid)
137 tst_brkm(TFAIL, cleanup, "Initial setresuid failed");
147 TEST(SETRESUID(NULL, *test_data[i].real_uid,
153 tst_resm(TPASS, "setresuid(%d, %d, %d) "
159 tst_resm(TFAIL, "setresuid(%d, %d, %d)
    [all...]
setresuid04.c 25 * Check if setresuid behaves correctly with file permissions.
26 * The test creates a file as ROOT with permissions 0644, does a setresuid
105 if (SETRESUID(NULL, 0, ltpuser->pw_uid, 0) == -1) {
106 perror("setresuid failed");
172 if (SETRESUID(NULL, 0, 0, 0) == -1) {
173 perror("setresuid failed");
199 UID16_CHECK(ltpuser->pw_uid, "setresuid", cleanup)
  /bionic/libc/arch-x86/syscalls/
setresuid.S 5 ENTRY(setresuid) function
39 END(setresuid)
  /external/ltp/testcases/kernel/syscalls/utils/
compat_16.h 37 int setresuid(uid_t ruid, uid_t euid, uid_t suid);
134 int SETRESUID(void (cleanup)(void), UID_T ruid, UID_T euid, UID_T suid)
136 LTP_CREATE_SYSCALL(setresuid, cleanup, ruid, euid, suid);
  /frameworks/native/services/vr/performanced/
performance_service_tests.cpp 281 ASSERT_EQ(0, setresuid(AID_NOBODY, AID_NOBODY, -1))
317 ASSERT_EQ(0, setresuid(original_uid, original_uid, -1))
319 ASSERT_EQ(0, setresuid(AID_SYSTEM, AID_SYSTEM, -1))
355 ASSERT_EQ(0, setresuid(original_uid, original_uid, -1))
361 ASSERT_EQ(0, setresuid(AID_SYSTEM, AID_NOBODY, -1))
397 ASSERT_EQ(0, setresuid(original_uid, original_uid, -1))
403 ASSERT_EQ(0, setresuid(AID_GRAPHICS, AID_GRAPHICS, -1))
439 ASSERT_EQ(0, setresuid(original_uid, original_uid, -1))
445 ASSERT_EQ(0, setresuid(AID_NOBODY, AID_NOBODY, -1))
482 ASSERT_EQ(0, setresuid(original_uid, original_uid, -1)
    [all...]
main.cpp 45 ret = setresuid(AID_SYSTEM, AID_SYSTEM, AID_SYSTEM);
  /bionic/libc/bionic/
seteuid.cpp 32 return setresuid(-1, euid,-1);
  /external/ltp/testcases/kernel/syscalls/getresuid/
getresuid03.c 25 * and saved user ids after calling process invokes setresuid() to change
81 extern int setresuid(uid_t, uid_t, uid_t);
169 if (setresuid(-1, pe_uid, -1) < 0) {
171 "setresuid(-1, %d, -1) Fails, errno:%d : %s",
  /external/honggfuzz/libcommon/
ns.c 82 if (setresuid(current_uid, current_uid, current_uid) == -1) {
83 PLOG_E("setresuid(%d)", (int)current_uid);
  /external/ltp/include/lapi/syscalls/
s390.in 270 setresuid 164
317 setresuid 208

Completed in 721 milliseconds

1 2 3 4 5 6 7 8 91011>>