HomeSort by relevance Sort by last modified time
    Searched refs:sudoers (Results 1 - 2 of 2) sorted by null

  /external/ltp/testcases/kernel/syscalls/utimensat/
utimensat_tests.sh 250 # comment this line in /etc/sudoers to avoid the error message:
253 sudoers=/etc/sudoers
254 if [ ! -r $sudoers ]; then
255 tst_brkm TBROK "can't read $sudoers"
258 if grep -q "^${pattern}" $sudoers; then
259 tst_resm TINFO "Comment requiretty in $sudoers for automated testing systems"
260 if ! sed -r -i.$$ -e "s/^($pattern)/#\1/" $sudoers; then
261 tst_brkm TBROK "failed to mangle $sudoers properly"
268 tst_resm TINFO "Restore requiretty in $sudoers"
    [all...]
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/
posix_platform_backend.py 18 """Returns True if the binary in |path| features in the sudoers file.
27 """Returns True if the binary at |path| appears in the sudoers file.
31 sudoers = subprocess.check_output(['/usr/bin/sudo', '-l'])
32 return _BinaryExistsInSudoersFiles(path, sudoers)

Completed in 555 milliseconds