| /freebsd/contrib/netbsd-tests/sbin/sysctl/ |
| H A D | t_perm.sh | 76 atf_set "require.user" "unprivileged" 92 atf_set "require.user" "unprivileged" 108 atf_set "require.user" "unprivileged" 125 atf_set "require.user" "unprivileged" 141 atf_set "require.user" "unprivileged" 157 atf_set "require.user" "unprivileged" 173 atf_set "require.user" "unprivileged" 189 atf_set "require.user" "unprivileged"
|
| /freebsd/etc/ |
| H A D | master.passwd | 21 auditdistd:*:78:77::0:0:Auditdistd unprivileged user:/var/empty:/usr/sbin/nologin 24 _ypldap:*:160:160::0:0:YP LDAP unprivileged user:/var/empty:/usr/sbin/nologin 25 hast:*:845:845::0:0:HAST unprivileged user:/var/empty:/usr/sbin/nologin 26 tests:*:977:977::0:0:Unprivileged user for tests:/nonexistent:/usr/sbin/nologin 27 nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/usr/sbin/nologin
|
| /freebsd/sys/contrib/device-tree/Bindings/riscv/ |
| H A D | extensions.yaml | 57 version of the unprivileged ISA specification. 72 version of the unprivileged ISA specification. 76 20191213 version of the unprivileged specification. 81 ratified in the 20191213 version of the unprivileged ISA 87 20191213 version of the unprivileged ISA specification. 92 ratified in the 20191213 version of the unprivileged ISA 98 ratified in the 20191213 version of the unprivileged ISA 104 ratified in the 20191213 version of the unprivileged ISA 110 the 20191213 version of the unprivileged ISA specification. 374 ratified in the 20191213 version of the unprivileged ISA [all …]
|
| /freebsd/tools/regression/mlock/ |
| H A D | mlock.c | 43 * unprivileged. 79 errx(-1, "mlock unprivileged: succeeded but shouldn't have"); in main() 81 errx(-1, "mlock unprivileged: %s", strerror(errno)); in main() 84 errx(-1, "munlock unprivileged: succeeded but shouldn't have"); in main() 86 errx(-1, "munlock unprivileged: %s", strerror(errno)); in main()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/chattr/ |
| H A D | chattr_002_neg.ksh | 38 # Check whether unprivileged user can chattr 44 # 3. Try to chattr with unprivileged user 60 log_assert "Check whether unprivileged user can chattr" 82 log_pass "Unprivileged user cannot chattr as expected"
|
| /freebsd/contrib/kyua/utils/process/ |
| H A D | isolation_test.cpp | 322 set_md_var("require.user", "unprivileged"); in ATF_TEST_CASE_HEAD() 341 set_md_var("require.config", "unprivileged-user"); in ATF_TEST_CASE_HEAD() 347 get_config_var("unprivileged-user")); in ATF_TEST_CASE_BODY() 359 set_md_var("require.user", "unprivileged"); in ATF_TEST_CASE_HEAD() 385 set_md_var("require.user", "unprivileged"); in ATF_TEST_CASE_HEAD() 539 set_md_var("require.user", "unprivileged"); in ATF_TEST_CASE_HEAD() 554 set_md_var("require.config", "unprivileged-user"); in ATF_TEST_CASE_HEAD() 560 get_config_var("unprivileged-user")); in ATF_TEST_CASE_BODY() 570 set_md_var("require.config", "unprivileged-user"); in ATF_TEST_CASE_HEAD() 576 get_config_var("unprivileged-user")); in ATF_TEST_CASE_BODY() [all …]
|
| /freebsd/lib/libsys/ |
| H A D | setcred.2 | 36 may also allow unprivileged users to call it successfully, possibly depending on 228 Only the super-user or an unprivileged user authorized by some MAC module can 231 even if the standard system calls would have authorized any unprivileged user to 235 allows any unprivileged user to change the effective user ID to either the real 251 For example, to change all user IDs to that of some unprivileged user,
|
| /freebsd/tools/regression/security/proc_to_proc/ |
| H A D | scenario.c | 96 /* privileged on unprivileged */ 101 /* unprivileged on privileged */ 106 /* unprivileged on same unprivileged */ 111 /* unprivileged on different unprivileged */ 116 /* unprivileged on daemon, same */ 121 /* unprivileged on daemon, different */ 126 /* unprivileged on setuid, same */ 131 /* unprivileged on setuid, different */
|
| /freebsd/tests/sys/kern/tty/ |
| H A D | test_sti.c | 77 * Most tests fork so that we can do them while unprivileged, which we can only 152 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 236 "Test that unprivileged cannot inject into non-controlling TTY"); in ATF_TC_HEAD() 237 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 277 "Test that unprivileged cannot inject into TTY not opened for read"); in ATF_TC_HEAD() 278 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD()
|
| /freebsd/contrib/netbsd-tests/lib/libc/c063/ |
| H A D | t_o_search.c | 74 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 136 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 170 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 228 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 279 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 317 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD()
|
| /freebsd/contrib/kyua/engine/ |
| H A D | requirements_test.cpp | 259 .add_required_config("unprivileged-user") in ATF_TEST_CASE_BODY() 263 ATF_REQUIRE_MATCH("Required configuration property 'unprivileged-user' " in ATF_TEST_CASE_BODY() 306 .set_required_user("unprivileged") in ATF_TEST_CASE_BODY() 321 .set_required_user("unprivileged") in ATF_TEST_CASE_BODY() 337 .set_required_user("unprivileged") in ATF_TEST_CASE_BODY() 344 ATF_REQUIRE_MATCH("Requires.*unprivileged.*unprivileged-user", in ATF_TEST_CASE_BODY()
|
| H A D | requirements.cpp | 69 if ((*iter) == "unprivileged-user" || (*iter) == "unprivileged_user") in check_required_configs() 169 } else if (required_user == "unprivileged") { in check_required_user() 172 return "Requires an unprivileged user but the " in check_required_user() 173 "unprivileged-user configuration variable is not " in check_required_user()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_user/misc/ |
| H A D | zpool_wait_privilege.ksh | 23 # zpool wait works when run as an unprivileged user 30 # Make sure printing status works as unprivileged user.
|
| /freebsd/contrib/netbsd-tests/fs/tmpfs/ |
| H A D | t_create.sh | 51 atf_set "require.config" "unprivileged-user" 55 user=$(atf_config_get unprivileged-user) 56 # Allow the unprivileged user to access the work directory.
|
| H A D | t_mkdir.sh | 91 atf_set "require.config" "unprivileged-user" 95 user=$(atf_config_get unprivileged-user) 96 # Allow the unprivileged user to access the work directory.
|
| /freebsd/tests/sys/capsicum/ |
| H A D | Makefile | 17 # unprivileged user. Serialize them since some tests access global namespaces, 42 TEST_METADATA.capsicum-test= required_user="unprivileged"
|
| H A D | functional.sh | 48 atf_set descr 'Run capsicum-test as an unprivileged user' 49 atf_set require.user unprivileged
|
| /freebsd/sys/kern/ |
| H A D | kern_priv.c | 92 "Unprivileged processes may read the kernel message buffer"); 180 * Allow unprivileged users to call mlock(2)/munlock(2) and in priv_check_cred() 193 * Allow an unprivileged user to read the kernel message in priv_check_cred() 253 * Allow unprivileged process debugging on a per-jail basis. in priv_check_cred()
|
| /freebsd/lib/libc/tests/gen/ |
| H A D | fts_misc_test.c | 24 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 50 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD()
|
| /freebsd/contrib/netbsd-tests/lib/libc/sys/ |
| H A D | t_setrlimit.c | 102 if (res.rlim_cur == res.rlim_max) /* An unprivileged run. */ in ATF_TC_BODY() 433 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 475 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 513 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD() 546 atf_tc_set_md_var(tc, "require.user", "unprivileged"); in ATF_TC_HEAD()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/suid/ |
| H A D | suid_write_zil_replay.ksh | 38 log_assert "Verify ZIL replay results in correct SUID/SGID bits for unprivileged write to SUID/SGID… 67 # 3. Unprivileged write to a setuid file
|
| /freebsd/share/man/man9/ |
| H A D | p_candebug.9 | 52 Must be set to a non-zero value to allow unprivileged processes 76 An unprivileged process attempted to debug another process but the system is
|
| /freebsd/tests/atf_python/ |
| H A D | utils.py | 87 if self.TARGET_USER == "unprivileged": 88 user = self.atf_vars["unprivileged-user"]
|
| /freebsd/usr.sbin/certctl/ |
| H A D | certctl.c | 62 static bool unprivileged; variable 513 if (!unprivileged && fd >= 0) in write_certs() 839 if (unprivileged && (mlf = fopen(metalog, "a")) == NULL) { in certctl_rehash() 999 if (unprivileged && metalog == NULL && in set_defaults() 1040 info("unprivileged:\t%s", unprivileged ? "true" : "false"); in set_defaults() 1108 unprivileged = true; in main() 1125 if ((nobundle || unprivileged || metalog != NULL) && in main() 1128 if (!unprivileged && metalog != NULL) { in main()
|
| /freebsd/usr.sbin/bsdinstall/scripts/ |
| H A D | hardening | 45 …"3 read_msgbuf" "Disable reading kernel message buffer for unprivileged users" ${read_msgbuf:-off}… 46 "4 proc_debug" "Disable process debugging facilities for unprivileged users" ${proc_debug:-off} \
|