/freebsd-current/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 102 { &creds[2], &creds[0], EPERM, EPERM, EPERM, EPERM, 0, EPERM, "8. unpriv1 on priv"}, 103 { &creds[2], &creds[1], EPERM, EPERM, EPERM, EPERM, 0, EPERM, " [all...] |
/freebsd-current/contrib/pjdfstest/tests/chown/ |
H A D | 07.t | 5 desc="chown returns EPERM if the operation would change the ownership, but the effective user ID is not the super-user and the process is not an owner of the file" 25 expect EPERM -u 65534 -g 65534 chown ${n1}/${n2} 65533 65533 26 expect EPERM -u 65533 -g 65533 chown ${n1}/${n2} 65534 65534 27 expect EPERM -u 65533 -g 65533 chown ${n1}/${n2} 65533 65533 28 expect EPERM -u 65534 -g 65534 -- chown ${n1}/${n2} -1 65533 30 expect EPERM -u 65534 -g 65534 chown ${n1}/${n3} 65533 65533 31 expect EPERM -u 65533 -g 65533 chown ${n1}/${n3} 65534 65534 32 expect EPERM -u 65533 -g 65533 chown ${n1}/${n3} 65533 65533 33 expect EPERM -u 65534 -g 65534 -- chown ${n1}/${n3} -1 65533 42 expect EPERM [all...] |
/freebsd-current/contrib/pjdfstest/tests/open/ |
H A D | 11.t | 5 desc="open returns EPERM when the named file has its append-only flag set, the file is to be modified, and O_TRUNC is specified or O_APPEND is not specified" 29 expect EPERM open ${n0} O_WRONLY 30 expect EPERM open ${n0} O_RDWR 31 todo FreeBSD:ZFS "When fle is protected by SF_APPEND, open(O_TRUNC) should return EPERM." 32 expect EPERM open ${n0} O_RDONLY,O_TRUNC 33 todo FreeBSD:ZFS "When fle is protected by SF_APPEND, open(O_TRUNC) should return EPERM." 34 expect EPERM open ${n0} O_RDONLY,O_APPEND,O_TRUNC 35 todo FreeBSD:ZFS "When fle is protected by SF_APPEND, open(O_TRUNC) should return EPERM." 36 expect EPERM open ${n0} O_WRONLY,O_APPEND,O_TRUNC 37 todo FreeBSD:ZFS "When fle is protected by SF_APPEND, open(O_TRUNC) should return EPERM [all...] |
H A D | 10.t | 5 desc="open returns EPERM when the named file has its immutable flag set and the file is to be modified" 27 expect EPERM open ${n0} O_WRONLY 28 expect EPERM open ${n0} O_RDWR 29 expect EPERM open ${n0} O_RDONLY,O_TRUNC 45 expect EPERM open ${n0} O_WRONLY 46 expect EPERM open ${n0} O_RDWR 47 expect EPERM open ${n0} O_RDONLY,O_TRUNC
|
/freebsd-current/contrib/capsicum-test/ |
H A D | capsicum-linux.h | 26 // Failure to open file due to path traversal generates EPERM 31 #define E_NO_TRAVERSE_CAPABILITY EPERM 32 #define E_NO_TRAVERSE_O_BENEATH EPERM
|
/freebsd-current/tools/regression/priv/ |
H A D | priv_cred.c | 66 expect("priv_setuid(!asroot, injail)", error, -1, EPERM); 68 expect("priv_setuid(!asroot, !injail)", error, -1, EPERM); 82 expect("priv_seteuid(!asroot, injail)", error, -1, EPERM); 84 expect("priv_seteuid(!asroot, !injail)", error, -1, EPERM); 98 expect("priv_setgid(!asroot, injail)", error, -1, EPERM); 100 expect("priv_setgid(!asroot, !injail)", error, -1, EPERM); 114 expect("priv_setegd(!asroot, injail)", error, -1, EPERM); 116 expect("priv_setegid(!asroot, !injail)", error, -1, EPERM); 133 expect("priv_setgroups(!asroot, injail)", error, -1, EPERM); 135 expect("priv_setgroups(!asroot, !injail)", error, -1, EPERM); [all...] |
H A D | priv_settimeofday.c | 66 EPERM); 71 EPERM); 74 EPERM);
|
H A D | priv_acct.c | 121 expect("priv_acct_enable(root, jail)", error, -1, EPERM); 125 expect("priv_acct_enable(!root, jail)", error, -1, EPERM); 127 expect("priv_acct_enable(!root, !jail)", error, -1, EPERM); 137 expect("priv_acct_disable(root, jail)", error, -1, EPERM); 141 expect("priv_acct_disable(!root, jail)", error, -1, EPERM); 143 expect("priv_acct_disable(!root, !jail)", error, -1, EPERM); 153 expect("priv_acct_rotate(root, jail)", error, -1, EPERM); 157 expect("priv_acct_rotate(!root, jail)", error, -1, EPERM); 159 expect("priv_acct_rotate(!root, !jail)", error, -1, EPERM); 169 expect("priv_acct_noopdisable(root, jail)", error, -1, EPERM); [all...] |
H A D | priv_clock_settime.c | 67 EPERM); 72 EPERM); 75 EPERM);
|
H A D | priv_vm_madv_protect.c | 59 EPERM); 64 EPERM); 67 EPERM);
|
H A D | priv_vm_munlock.c | 58 expect("priv_vm_munlock(asroot, injail)", error, -1, EPERM); 62 expect("priv_vm_munlock(!asroot, injail", error, -1, EPERM); 64 expect("priv_vm_munlock(!asroot, !injail", error, -1, EPERM);
|
H A D | priv_vm_mlock.c | 58 expect("priv_vm_mlock(asroot, injail)", error, -1, EPERM); 62 expect("priv_vm_mlock(!asroot, injail", error, -1, EPERM); 64 expect("priv_vm_mlock(!asroot, !injail", error, -1, EPERM);
|
H A D | priv_vfs_chflags.c | 117 error, -1, EPERM); 120 error, -1, EPERM); 165 error, -1, EPERM); 168 error, -1, EPERM); 183 error, -1, EPERM); 189 error, -1, EPERM); 192 error, -1, EPERM); 207 error, -1, EPERM); 213 error, -1, EPERM); 216 error, -1, EPERM); [all...] |
H A D | priv_sysctl_write.c | 92 EPERM); 97 EPERM); 100 EPERM); 116 EPERM); 119 EPERM);
|
H A D | priv_adjtime.c | 69 expect("priv_adjtime(asroot, injail)", error, -1, EPERM); 73 expect("priv_adjtime(!asroot, injail)", error, -1, EPERM); 75 expect("priv_adjtime(!asroot, !injail)", error, -1, EPERM);
|
H A D | priv_vfs_fhstatfs.c | 72 EPERM); 77 EPERM); 80 EPERM);
|
H A D | priv_vfs_fhstat.c | 72 expect("priv_vfs_fhstat(asroot, injail)", error, -1, EPERM); 76 expect("priv_vfs_fhstat(!asroot, injail)", error, -1, EPERM); 78 expect("priv_vfs_fhstat(!asroot, !injail)", error, -1, EPERM);
|
H A D | priv_vfs_getfh.c | 63 expect("priv_vfs_getfh(asroot, injail)", error, -1, EPERM); 67 expect("priv_vfs_getfh(!asroot, injail)", error, -1, EPERM); 69 expect("priv_vfs_getfh(!asroot, !injail)", error, -1, EPERM);
|
H A D | priv_kenv_unset.c | 63 expect("priv_kenv_unset(asroot, injail)", error, -1, EPERM); 67 expect("priv_kenv_unset(!asroot, injail)", error, -1, EPERM); 69 expect("priv_kenv_unset(!asroot, !injail)", error, -1, EPERM);
|
H A D | priv_kenv_set.c | 60 expect("priv_kenv_set(asroot, injail)", error, -1, EPERM); 64 expect("priv_kenv_set(!asroot, injail)", error, -1, EPERM); 66 expect("priv_kenv_set(!asroot, !injail)", error, -1, EPERM);
|
/freebsd-current/contrib/pjdfstest/tests/chflags/ |
H A D | 11.t | 5 desc="chflags returns EPERM if a user tries to set or remove the SF_SNAPSHOT flag" 25 expect EPERM -u 65534 -g 65534 chflags ${n1} SF_SNAPSHOT 27 expect EPERM chflags ${n1} SF_SNAPSHOT 30 expect EPERM -u 65534 -g 65534 chflags ${n1} SF_SNAPSHOT 32 expect EPERM chflags ${n1} SF_SNAPSHOT 42 expect EPERM -u 65534 -g 65534 lchflags ${n1} SF_SNAPSHOT 44 expect EPERM lchflags ${n1} SF_SNAPSHOT 47 expect EPERM -u 65534 -g 65534 lchflags ${n1} SF_SNAPSHOT 49 expect EPERM lchflags ${n1} SF_SNAPSHOT
|
/freebsd-current/contrib/lib9p/pytest/ |
H A D | p9err.py | 18 _errno.ENOTEMPTY: _errno.EPERM, 19 _errno.EDQUOT: _errno.EPERM, 20 _errno.ENOSYS: _errno.EPERM,
|
/freebsd-current/contrib/pjdfstest/tests/rmdir/ |
H A D | 09.t | 5 desc="rmdir returns EPERM if the named directory has its immutable, undeletable or append-only flag set" 27 expect EPERM rmdir ${n0} 33 expect EPERM rmdir ${n0} 39 todo FreeBSD:ZFS "Removing a directory protected by SF_APPEND should return EPERM." 40 expect EPERM rmdir ${n0} 41 todo FreeBSD:ZFS "Removing a directory protected by SF_APPEND should return EPERM." 43 todo FreeBSD:ZFS "Removing a directory protected by SF_APPEND should return EPERM." 50 expect EPERM rmdir ${n0} 56 expect EPERM rmdir ${n0} 62 expect EPERM rmdi [all...] |
/freebsd-current/contrib/pjdfstest/tests/unlink/ |
H A D | 09.t | 5 desc="unlink returns EPERM if the named file has its immutable, undeletable or append-only flag set" 27 expect EPERM unlink ${n0} 33 expect EPERM unlink ${n0} 39 todo FreeBSD:ZFS "Removing a file protected by SF_APPEND should return EPERM." 40 expect EPERM unlink ${n0} 41 todo FreeBSD:ZFS "Removing a file protected by SF_APPEND should return EPERM." 43 todo FreeBSD:ZFS "Removing a file protected by SF_APPEND should return EPERM." 50 expect EPERM unlink ${n0} 56 expect EPERM unlink ${n0} 62 expect EPERM unlin [all...] |
/freebsd-current/contrib/pjdfstest/tests/utimensat/ |
H A D | 07.t | 29 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} 0 UTIME_OMIT $DATE2 0 0 30 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} $DATE1 0 0 UTIME_OMIT 0 31 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} $DATE1 0 $DATE2 0 0 35 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} 0 UTIME_OMIT $DATE2 0 0 36 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} $DATE1 0 0 UTIME_OMIT 0 37 expect EPERM -u $UID_NOBODY open . O_RDONLY : utimensat 0 ${n0} $DATE1 0 $DATE2 0 0
|