HomeSort by relevance Sort by last modified time
    Searched refs:nobody (Results 1 - 25 of 66) sorted by null

1 2 3

  /external/ltp/testcases/kernel/syscalls/setreuid/
setreuid03.c 41 static struct passwd nobody, bin, root; variable in typeref:struct:passwd
57 &nobody.pw_uid, &nobody.pw_uid, &pass, &nobody, &nobody,
58 "After setreuid(nobody, nobody),"}, {
59 &neg_one, &nobody.pw_uid, &pass, &nobody, &nobody,
    [all...]
setreuid04.c 38 static struct passwd nobody, root; variable in typeref:struct:passwd
53 &neg_one, &neg_one, &root, &root, "After setreuid(-1, nobody),"}, {
54 &nobody.pw_uid, &nobody.pw_uid, &nobody, &nobody,
117 if (getpwnam("nobody") == NULL)
118 tst_brkm(TBROK, NULL, "nobody must be a valid user.");
123 nobody = *(getpwnam("nobody"));
    [all...]
setreuid05.c 40 static struct passwd nobody, daemonpw, root, bin; variable in typeref:struct:passwd
51 &nobody.pw_uid, &root.pw_uid, &pass, &nobody, &root, "Initially"}, {
52 &neg_one, &nobody.pw_uid, &pass, &nobody, &nobody,
53 "After setreuid(-1, nobody),"}, {
54 &neg_one, &root.pw_uid, &pass, &nobody, &root,
62 &neg_one, &nobody.pw_uid, &fail, &daemonpw, &bin,
63 "After setreuid(-1, nobody),"}, {
    [all...]
setreuid02.c 36 static struct passwd nobody, daemonpw, root, bin; variable in typeref:struct:passwd
52 &nobody.pw_uid, &neg_one, &nobody, &root, "After setreuid(nobody, -1)"},
106 if (getpwnam("nobody") == NULL)
107 tst_brkm(TBROK, NULL, "nobody must be a valid user.");
118 nobody = *(getpwnam("nobody"));
119 UID16_CHECK(nobody.pw_uid, setreuid, cleanup);
  /external/ltp/testcases/kernel/syscalls/setresgid/
setresgid03.c 47 * Check existence of user id's root/bin/nobody
48 * Set real/effective/saved gid to nobody
49 * Set effective uid to nobody
100 static struct passwd nobody, bin, root; variable in typeref:struct:passwd
108 {&neg, &neg, &bin.pw_gid, &nobody, &nobody, &nobody},
109 {&neg, &bin.pw_gid, &neg, &nobody, &nobody, &nobody},
    [all...]
setresgid01.c 36 * 2. setresgid(2) is successful for setresgid(-1, -1, nobody)
37 * 3. setresgid(2) is successful for setresgid(-1, nobody, -1)
38 * 4. setresgid(2) is successful for setresgid(nobody, -1, -1)
44 * Check existence of root and nobody user id's
94 static struct passwd nobody, root; variable in typeref:struct:passwd
105 {&neg, &neg, &nobody.pw_gid, &root, &root, &nobody,
106 "setresgid(-1, -1, nobody)"},
107 {&neg, &nobody.pw_gid, &neg, &root, &nobody, &nobody
    [all...]
setresgid02.c 41 * 6. setresgid(2) is successful for setresgid(root, nobody, nobody)
46 * Check existence of root, bin and nobody user id's
99 static struct passwd nobody, bin, root; variable in typeref:struct:passwd
108 {&neg, &neg, &neg, &root, &nobody, &nobody,
110 {&neg, &neg, &bin.pw_gid, &root, &nobody, &bin,
118 {&root.pw_gid, &nobody.pw_gid, &nobody.pw_gid, &root, &nobody, &nobody
    [all...]
  /external/ltp/testcases/kernel/security/integrity/ima/tests/
ima_measurements.sh 104 chown nobody.nobody user
108 # As user nobody, create and cat the new file
109 # (The LTP tests assumes existence of 'nobody'.)
110 sudo -n -u nobody sh -c "echo $(date) - create test.txt > ./test.txt;
  /external/ltp/testcases/kernel/syscalls/setegid/
setegid01.c 62 struct passwd *nobody; local
70 nobody = SAFE_GETPWNAM(cleanup, "nobody");
72 nobody_gid = nobody->pw_gid;
  /external/ltp/testcases/kernel/syscalls/setresuid/
setresuid01.c 62 * nobody and bin must be valid users.
78 struct passwd nobody, bin, root; variable in typeref:struct:passwd
97 &neg_one, &neg_one, &nobody_pw_uid, &root, &root, &nobody,
98 "After setresuid(-1, -1, nobody),"}, {
99 &neg_one, &bin_pw_uid, &neg_one, &root, &bin, &nobody,
107 &nobody_pw_uid, &neg_one, &neg_one, &nobody, &root, &bin,
108 "After setresuid(nobody, -1, -1)"}, {
109 &neg_one, &root_pw_uid, &neg_one, &nobody, &root, &bin,
170 if (getpwnam("nobody") == NULL) {
171 tst_brkm(TBROK, NULL, "nobody must be a valid user.")
    [all...]
setresuid02.c 58 * nobody and bin must be a valid users.
77 char user1name[] = "nobody";
80 struct passwd nobody, bin; variable in typeref:struct:passwd
97 &neg_one, &neg_one, &bin_pw_uid, &nobody, &bin, &bin,
99 &neg_one, &nobody_pw_uid, &neg_one, &nobody, &nobody, &bin,
100 "After setresuid(-1, nobody -1),"}, {
101 &bin_pw_uid, &neg_one, &neg_one, &bin, &nobody, &bin,
181 if (getpwnam("nobody") == NULL) {
182 tst_brkm(TBROK, NULL, "nobody must be a valid user.")
    [all...]
setresuid03.c 62 * nobody and bin must be a valid users.
82 char user1name[] = "nobody";
86 struct passwd nobody, bin, root; variable in typeref:struct:passwd
191 if (getpwnam("nobody") == NULL) {
192 tst_brkm(TBROK, NULL, "nobody must be a valid user.");
202 nobody = *(getpwnam("nobody"));
203 UID16_CHECK((nobody_pw_uid = nobody.pw_uid), "setresuid", cleanup)
  /external/ltp/testcases/kernel/syscalls/swapoff/
swapoff02.c 128 struct passwd *nobody; local
134 nobody = SAFE_GETPWNAM(NULL, "nobody");
135 nobody_uid = nobody->pw_uid;
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
CGIHTTPServer.py 230 nobody = nobody_uid()
246 os.setuid(nobody)
341 nobody = None variable
344 """Internal routine to get nobody's uid"""
345 global nobody
346 if nobody:
347 return nobody
353 nobody = pwd.getpwnam('nobody')[2]
355 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall()))
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/
CGIHTTPServer.py 232 nobody = nobody_uid()
248 os.setuid(nobody)
345 nobody = None variable
348 """Internal routine to get nobody's uid"""
349 global nobody
350 if nobody:
351 return nobody
357 nobody = pwd.getpwnam('nobody')[2]
359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall())
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
CGIHTTPServer.py 232 nobody = nobody_uid()
248 os.setuid(nobody)
345 nobody = None variable
348 """Internal routine to get nobody's uid"""
349 global nobody
350 if nobody:
351 return nobody
357 nobody = pwd.getpwnam('nobody')[2]
359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall())
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
CGIHTTPServer.py 232 nobody = nobody_uid()
248 os.setuid(nobody)
345 nobody = None variable
348 """Internal routine to get nobody's uid"""
349 global nobody
350 if nobody:
351 return nobody
357 nobody = pwd.getpwnam('nobody')[2]
359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall())
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
CGIHTTPServer.py 232 nobody = nobody_uid()
248 os.setuid(nobody)
345 nobody = None variable
348 """Internal routine to get nobody's uid"""
349 global nobody
350 if nobody:
351 return nobody
357 nobody = pwd.getpwnam('nobody')[2]
359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall())
    [all...]
  /external/ltp/
IDcheck.sh 79 fe nobody "$passwd"; NO_NOBODY_ID=$?
83 fe nobody "$group" || fe nogroup "$group"; NO_NOBODY_GRP=$?
94 echo "nobody: $NO_NOBODY_ID"
97 echo "nobody[/nogroup] grp: $NO_NOBODY_GRP"
133 make_user_group nobody 65534 $NO_NOBODY_ID $NO_NOBODY_GRP
164 # nobody is a standard group on all distros, apart from debian based ones;
166 if ! fe "nobody" "$passwd" || ! (fe "nogroup" "$group" || fe "nobody" "$group")
  /external/ltp/testcases/kernel/syscalls/swapon/
swapon02.c 124 struct passwd *nobody; local
130 nobody = SAFE_GETPWNAM(cleanup, "nobody");
131 nobody_uid = nobody->pw_uid;
  /external/valgrind/none/tests/solaris/
reserve_sysstat_addr.stderr.exp 7 or because nobody has yet needed it. In any case, let us know at
reserve_sysstat_zone_addr.stderr.exp 7 or because nobody has yet needed it. In any case, let us know at
  /external/ltp/testcases/kernel/syscalls/chmod/
chmod06.c 165 struct passwd *nobody; local
174 nobody = SAFE_GETPWNAM(NULL, "nobody");
175 nobody_uid = nobody->pw_uid;
  /external/ltp/testcases/kernel/syscalls/setregid/
setregid03.c 44 struct passwd nobody; variable in typeref:struct:passwd
107 if (seteuid(nobody.pw_uid) == -1)
184 if (getpwnam("nobody") == NULL)
185 tst_brkm(TBROK, NULL, "nobody must be a valid user.");
186 nobody = *(getpwnam("nobody"));
  /external/dnsmasq/contrib/Suse/
rc.dnsmasq-suse 35 startproc -p $NAMED_PID $NAMED_BIN -u nobody

Completed in 2541 milliseconds

1 2 3