/external/ltp/testcases/kernel/syscalls/setreuid/ |
setreuid03.c | 41 static struct passwd nobody, bin, root; variable in typeref:struct:passwd 57 &nobody.pw_uid, &nobody.pw_uid, &pass, &nobody, &nobody, 58 "After setreuid(nobody, nobody),"}, { 59 &neg_one, &nobody.pw_uid, &pass, &nobody, &nobody, [all...] |
setreuid04.c | 38 static struct passwd nobody, root; variable in typeref:struct:passwd 53 &neg_one, &neg_one, &root, &root, "After setreuid(-1, nobody),"}, { 54 &nobody.pw_uid, &nobody.pw_uid, &nobody, &nobody, 117 if (getpwnam("nobody") == NULL) 118 tst_brkm(TBROK, NULL, "nobody must be a valid user."); 123 nobody = *(getpwnam("nobody")); [all...] |
setreuid05.c | 40 static struct passwd nobody, daemonpw, root, bin; variable in typeref:struct:passwd 51 &nobody.pw_uid, &root.pw_uid, &pass, &nobody, &root, "Initially"}, { 52 &neg_one, &nobody.pw_uid, &pass, &nobody, &nobody, 53 "After setreuid(-1, nobody),"}, { 54 &neg_one, &root.pw_uid, &pass, &nobody, &root, 62 &neg_one, &nobody.pw_uid, &fail, &daemonpw, &bin, 63 "After setreuid(-1, nobody),"}, { [all...] |
setreuid02.c | 36 static struct passwd nobody, daemonpw, root, bin; variable in typeref:struct:passwd 52 &nobody.pw_uid, &neg_one, &nobody, &root, "After setreuid(nobody, -1)"}, 106 if (getpwnam("nobody") == NULL) 107 tst_brkm(TBROK, NULL, "nobody must be a valid user."); 118 nobody = *(getpwnam("nobody")); 119 UID16_CHECK(nobody.pw_uid, setreuid, cleanup);
|
/external/ltp/testcases/kernel/syscalls/setresgid/ |
setresgid03.c | 47 * Check existence of user id's root/bin/nobody 48 * Set real/effective/saved gid to nobody 49 * Set effective uid to nobody 100 static struct passwd nobody, bin, root; variable in typeref:struct:passwd 108 {&neg, &neg, &bin.pw_gid, &nobody, &nobody, &nobody}, 109 {&neg, &bin.pw_gid, &neg, &nobody, &nobody, &nobody}, [all...] |
setresgid01.c | 36 * 2. setresgid(2) is successful for setresgid(-1, -1, nobody) 37 * 3. setresgid(2) is successful for setresgid(-1, nobody, -1) 38 * 4. setresgid(2) is successful for setresgid(nobody, -1, -1) 44 * Check existence of root and nobody user id's 94 static struct passwd nobody, root; variable in typeref:struct:passwd 105 {&neg, &neg, &nobody.pw_gid, &root, &root, &nobody, 106 "setresgid(-1, -1, nobody)"}, 107 {&neg, &nobody.pw_gid, &neg, &root, &nobody, &nobody [all...] |
setresgid02.c | 41 * 6. setresgid(2) is successful for setresgid(root, nobody, nobody) 46 * Check existence of root, bin and nobody user id's 99 static struct passwd nobody, bin, root; variable in typeref:struct:passwd 108 {&neg, &neg, &neg, &root, &nobody, &nobody, 110 {&neg, &neg, &bin.pw_gid, &root, &nobody, &bin, 118 {&root.pw_gid, &nobody.pw_gid, &nobody.pw_gid, &root, &nobody, &nobody [all...] |
/external/ltp/testcases/kernel/security/integrity/ima/tests/ |
ima_measurements.sh | 104 chown nobody.nobody user 108 # As user nobody, create and cat the new file 109 # (The LTP tests assumes existence of 'nobody'.) 110 sudo -n -u nobody sh -c "echo $(date) - create test.txt > ./test.txt;
|
/external/ltp/testcases/kernel/syscalls/setegid/ |
setegid01.c | 62 struct passwd *nobody; local 70 nobody = SAFE_GETPWNAM(cleanup, "nobody"); 72 nobody_gid = nobody->pw_gid;
|
/external/ltp/testcases/kernel/syscalls/setresuid/ |
setresuid01.c | 62 * nobody and bin must be valid users. 78 struct passwd nobody, bin, root; variable in typeref:struct:passwd 97 &neg_one, &neg_one, &nobody_pw_uid, &root, &root, &nobody, 98 "After setresuid(-1, -1, nobody),"}, { 99 &neg_one, &bin_pw_uid, &neg_one, &root, &bin, &nobody, 107 &nobody_pw_uid, &neg_one, &neg_one, &nobody, &root, &bin, 108 "After setresuid(nobody, -1, -1)"}, { 109 &neg_one, &root_pw_uid, &neg_one, &nobody, &root, &bin, 170 if (getpwnam("nobody") == NULL) { 171 tst_brkm(TBROK, NULL, "nobody must be a valid user.") [all...] |
setresuid02.c | 58 * nobody and bin must be a valid users. 77 char user1name[] = "nobody"; 80 struct passwd nobody, bin; variable in typeref:struct:passwd 97 &neg_one, &neg_one, &bin_pw_uid, &nobody, &bin, &bin, 99 &neg_one, &nobody_pw_uid, &neg_one, &nobody, &nobody, &bin, 100 "After setresuid(-1, nobody -1),"}, { 101 &bin_pw_uid, &neg_one, &neg_one, &bin, &nobody, &bin, 181 if (getpwnam("nobody") == NULL) { 182 tst_brkm(TBROK, NULL, "nobody must be a valid user.") [all...] |
setresuid03.c | 62 * nobody and bin must be a valid users. 82 char user1name[] = "nobody"; 86 struct passwd nobody, bin, root; variable in typeref:struct:passwd 191 if (getpwnam("nobody") == NULL) { 192 tst_brkm(TBROK, NULL, "nobody must be a valid user."); 202 nobody = *(getpwnam("nobody")); 203 UID16_CHECK((nobody_pw_uid = nobody.pw_uid), "setresuid", cleanup)
|
/external/ltp/testcases/kernel/syscalls/swapoff/ |
swapoff02.c | 128 struct passwd *nobody; local 134 nobody = SAFE_GETPWNAM(NULL, "nobody"); 135 nobody_uid = nobody->pw_uid;
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
CGIHTTPServer.py | 230 nobody = nobody_uid()
246 os.setuid(nobody)
341 nobody = None
variable 344 """Internal routine to get nobody's uid"""
345 global nobody
346 if nobody:
347 return nobody
353 nobody = pwd.getpwnam('nobody')[2]
355 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall())) [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
CGIHTTPServer.py | 232 nobody = nobody_uid() 248 os.setuid(nobody) 345 nobody = None variable 348 """Internal routine to get nobody's uid""" 349 global nobody 350 if nobody: 351 return nobody 357 nobody = pwd.getpwnam('nobody')[2] 359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall()) [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
CGIHTTPServer.py | 232 nobody = nobody_uid() 248 os.setuid(nobody) 345 nobody = None variable 348 """Internal routine to get nobody's uid""" 349 global nobody 350 if nobody: 351 return nobody 357 nobody = pwd.getpwnam('nobody')[2] 359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall()) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
CGIHTTPServer.py | 232 nobody = nobody_uid() 248 os.setuid(nobody) 345 nobody = None variable 348 """Internal routine to get nobody's uid""" 349 global nobody 350 if nobody: 351 return nobody 357 nobody = pwd.getpwnam('nobody')[2] 359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall()) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
CGIHTTPServer.py | 232 nobody = nobody_uid() 248 os.setuid(nobody) 345 nobody = None variable 348 """Internal routine to get nobody's uid""" 349 global nobody 350 if nobody: 351 return nobody 357 nobody = pwd.getpwnam('nobody')[2] 359 nobody = 1 + max(map(lambda x: x[2], pwd.getpwall()) [all...] |
/external/ltp/ |
IDcheck.sh | 79 fe nobody "$passwd"; NO_NOBODY_ID=$? 83 fe nobody "$group" || fe nogroup "$group"; NO_NOBODY_GRP=$? 94 echo "nobody: $NO_NOBODY_ID" 97 echo "nobody[/nogroup] grp: $NO_NOBODY_GRP" 133 make_user_group nobody 65534 $NO_NOBODY_ID $NO_NOBODY_GRP 164 # nobody is a standard group on all distros, apart from debian based ones; 166 if ! fe "nobody" "$passwd" || ! (fe "nogroup" "$group" || fe "nobody" "$group")
|
/external/ltp/testcases/kernel/syscalls/swapon/ |
swapon02.c | 124 struct passwd *nobody; local 130 nobody = SAFE_GETPWNAM(cleanup, "nobody"); 131 nobody_uid = nobody->pw_uid;
|
/external/valgrind/none/tests/solaris/ |
reserve_sysstat_addr.stderr.exp | 7 or because nobody has yet needed it. In any case, let us know at
|
reserve_sysstat_zone_addr.stderr.exp | 7 or because nobody has yet needed it. In any case, let us know at
|
/external/ltp/testcases/kernel/syscalls/chmod/ |
chmod06.c | 165 struct passwd *nobody; local 174 nobody = SAFE_GETPWNAM(NULL, "nobody"); 175 nobody_uid = nobody->pw_uid;
|
/external/ltp/testcases/kernel/syscalls/setregid/ |
setregid03.c | 44 struct passwd nobody; variable in typeref:struct:passwd 107 if (seteuid(nobody.pw_uid) == -1) 184 if (getpwnam("nobody") == NULL) 185 tst_brkm(TBROK, NULL, "nobody must be a valid user."); 186 nobody = *(getpwnam("nobody"));
|
/external/dnsmasq/contrib/Suse/ |
rc.dnsmasq-suse | 35 startproc -p $NAMED_PID $NAMED_BIN -u nobody
|