HomeSort by relevance Sort by last modified time
    Searched full:setreuid (Results 1 - 25 of 400) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /bionic/libc/arch-arm64/syscalls/
setreuid.S 5 ENTRY(setreuid) function
14 END(setreuid)
  /bionic/libc/arch-arm/syscalls/
setreuid.S 5 ENTRY(setreuid) function
16 END(setreuid)
  /bionic/libc/arch-mips/syscalls/
setreuid.S 5 ENTRY(setreuid) function
19 END(setreuid)
  /bionic/libc/arch-x86_64/syscalls/
setreuid.S 5 ENTRY(setreuid) function
15 END(setreuid)
  /external/ltp/testcases/kernel/syscalls/setreuid/
setreuid01.c 37 * Testcase to test the basic functionality of setreuid(2) system call.
73 UID16_CHECK(ruid, setreuid, cleanup);
76 UID16_CHECK(euid, setreuid, cleanup);
78 TEST(SETREUID(cleanup, -1, -1));
82 "setreuid - Don't change either real or effective uid failed, errno=%d : %s",
86 "setreuid - Don't change either real or effective uid returned %ld",
95 TEST(SETREUID(cleanup, -1, euid));
99 "setreuid - change effective to effective uid failed, errno=%d : %s",
103 "setreuid - change effective to effective uid returned %ld",
112 TEST(SETREUID(cleanup, ruid, -1))
    [all...]
setreuid05.c 22 * Test the setreuid() feature, verifying the role of the saved-set-uid
23 * and setreuid's effect on it.
53 "After setreuid(-1, nobody),"}, {
55 "After setreuid(-1, root),"}, {
57 "After setreuid(daemon, -1),"}, {
59 "After setreuid(-1, bin),"}, {
61 "After setreuid(-1, root),"}, {
63 "After setreuid(-1, nobody),"}, {
65 "After setreuid(-1, daemon),"}, {
67 "After setreuid(-1, bin),"},
    [all...]
setreuid03.c 23 * Test setreuid() when executed by an unpriviledged user.
59 "After setreuid(nobody, nobody),"}, {
61 "After setreuid(-1, nobody),"}, {
63 "After setreuid(nobody, -1),"}, {
64 &neg_one, &neg_one, &pass, &nobody, &nobody, "After setreuid(-1, -1),"},
67 "After setreuid(-1, root),"}, {
69 "After setreuid(root, -1),"}, {
71 "After setreuid(root, root),"}, {
73 "After setreuid(root, nobody),"}, {
75 "After setreuid(root, nobody),"},
    [all...]
setreuid02.c 22 * Test setreuid() when executed by root.
51 &neg_one, &neg_one, &root, &root, "After setreuid(-1, -1),"}, {
52 &nobody.pw_uid, &neg_one, &nobody, &root, "After setreuid(nobody, -1)"},
54 &root.pw_uid, &neg_one, &root, &root, "After setreuid(root,-1),"}, {
56 "After setreuid(-1, daemon)"}, {
57 &neg_one, &root.pw_uid, &root, &root, "After setreuid(-1,root),"}, {
58 &bin.pw_uid, &neg_one, &bin, &root, "After setreuid(bin, -1)"}, {
59 &root.pw_uid, &neg_one, &root, &root, "After setreuid(-1, root)"},};
82 TEST(SETREUID(cleanup, *test_data[i].real_uid,
86 tst_resm(TBROK, "setreuid(%d, %d) failed"
    [all...]
setreuid04.c 53 &neg_one, &neg_one, &root, &root, "After setreuid(-1, nobody),"}, {
55 "After setreuid(-1, -1),"},};
83 TEST(SETREUID(cleanup, *test_data[i].real_uid,
87 tst_resm(TPASS, "setreuid(%d, %d) "
92 tst_resm(TFAIL, "setreuid(%d, %d) "
121 UID16_CHECK(root.pw_uid, setreuid, cleanup);
124 UID16_CHECK(nobody.pw_uid, setreuid, cleanup);
setreuid07.c 23 * Check if setreuid behaves correctly with file permissions.
24 * The test creates a file as ROOT with permissions 0644, does a setreuid
86 if (SETREUID(NULL, 0, ltpuser->pw_uid) == -1) {
87 perror("setreuid failed");
149 if (SETREUID(NULL, 0, 0) == -1) {
150 perror("setreuid failed");
setreuid06.c 22 * Test that EPERM is set when setreuid is given an invalid user id.
60 TEST(SETREUID(cleanup, -1, INVAL_USER));
64 tst_resm(TPASS, "setreuid set errno to EPERM as "
67 tst_resm(TFAIL, "setreuid FAILED, expected 1 but "
  /external/strace/tests/
setreuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
setreuid.c 7 # define SYSCALL_NAME "setreuid"
  /external/strace/tests-m32/
setreuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
setreuid.c 7 # define SYSCALL_NAME "setreuid"
  /external/strace/tests-mx32/
setreuid.gen.test 2 # Generated by ./tests/gen_tests.sh from ./tests/gen_tests.in (setreuid -a15 ); do not edit.
setreuid.c 7 # define SYSCALL_NAME "setreuid"
  /bionic/libc/arch-mips64/syscalls/
setreuid.S 5 ENTRY(setreuid) function
25 END(setreuid)
  /bionic/libc/arch-x86/syscalls/
setreuid.S 5 ENTRY(setreuid) function
34 END(setreuid)
  /external/ltp/testcases/kernel/syscalls/vhangup/
vhangup01.c 58 retval = setreuid(nobody_uid, nobody_uid);
60 perror("setreuid");
61 tst_brkm(TFAIL, NULL, "setreuid failed");
  /external/ltp/testcases/kernel/syscalls/getresuid/
getresuid02.c 25 * and saved user ids after calling process invokes setreuid() to change
107 * setreuid() in setup.
166 if (setreuid(-1, ps_uid) < 0) {
168 "setreuid(-1, %d) Fails, errno:%d : %s",
183 if (setreuid(-1, pr_uid) < 0) {
  /bionic/libc/
SECCOMP_BLACKLIST_APP.TXT 37 int setreuid:setreuid32(uid_t, uid_t) arm,x86
38 int setreuid:setreuid(uid_t, uid_t) arm64,mips,mips64,x86_64
  /external/ltp/testcases/kernel/syscalls/mkdir/
mkdir02.c 145 rval = setreuid(nobody_uid, nobody_uid);
147 perror("setreuid");
148 tst_resm(TFAIL, "setreuid failed to "
219 rval = setreuid(bin_uid, bin_uid);
221 tst_resm(TFAIL, "setreuid failed to "
225 perror("setreuid");
mkdir04.c 128 rval = setreuid(nobody_uid, nobody_uid);
130 tst_resm(TFAIL | TERRNO, "setreuid failed to "
160 rval = setreuid(bin_uid, bin_uid);
162 tst_resm(TFAIL | TERRNO, "setreuid failed to "
  /external/ltp/testcases/kernel/syscalls/mount/
mount03_setuid_test.c 43 status = setreuid(ruid, 0);

Completed in 223 milliseconds

1 2 3 4 5 6 7 8 91011>>