/external/autotest/client/site_tests/security_SuidBinaries/ |
security_SuidBinaries.py | 48 def run_once(self, baseline='suid'): 65 permmask = {'suid': '4000', 'sgid': '2000'}
|
/external/ltp/testcases/kernel/syscalls/mknod/ |
mknod01.c | 59 S_IFREG | 04700, /* ordinary file with mode 04700 (suid) */ 61 S_IFREG | 06700, /* ordinary file with mode 06700 (sgid & suid) */
|
/bionic/libc/include/ |
mntent.h | 47 #define MNTOPT_SUID "suid"
|
/external/kernel-headers/original/uapi/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/external/libcap/libcap/include/uapi/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.8 | 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
|
/external/libchrome/sandbox/linux/ |
sandbox_linux_nacl_nonsfi.gyp | 50 'suid/client/setuid_sandbox_client.cc',
|
/external/toybox/ |
main.c | 116 // Drop permissions for non-suid commands. 130 error_msg("Not installed suid root"); 161 // Return if we need to re-exec to acquire root via suid bit. 178 // (Leave toys.which null to disable suid return logic.)
|
Config.in | 37 bool "SUID support" 40 Support for the Set User ID bit, to install toybox suid root and drop 42 this change ownership of the file to the root user and set the suid
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
Vertex.java | 164 boolean[] sUID = x509Cert.getSubjectUniqueID(); 165 if (sUID != null) { 167 for (boolean b : sUID) {
|
/docs/source.android.com/en/security/overview/ |
implement.html | 200 <h3 id="suid-files">Securing SUID files</h3> 207 <li>SUID processes must not provide a shell or backdoor that can be used to 209 <li>SUID programs must not be writable by any user.</li> 210 <li>SUID programs should not be world readable or executable. Create a group, 211 limit access to the SUID binary to members of that group, and place any 212 applications that should be able to execute the SUID program into that group. 214 <li>SUID programs are a common source of user rooting of devices. To reduce 215 this risk, SUID programs should not be executable by the shell user.</li> 218 <p>CTS verifier includes an informational test listing SUID files; som [all...] |
/external/libchrome/sandbox/linux/suid/ |
sandbox.c | 7 #include "sandbox/linux/suid/common/sandbox.h" 33 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 34 #include "sandbox/linux/suid/process_util.h" 338 uid_t ruid, euid, suid; local 339 if (getresuid(&ruid, &euid, &suid)) { 355 // ld.so may have cleared several environment variables because we are SUID.
|
process_util_linux.c | 13 #include "sandbox/linux/suid/process_util.h"
|
/external/selinux/python/sepolgen/tests/ |
test_audit.py | 31 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) 34 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) 37 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) 40 type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) 43 type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) 55 type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null)
|
/external/squashfs-tools/squashfs-tools/ |
pseudo.c | 279 char suid[100], sgid[100]; /* overflow safe */ local 309 n = sscanf(def, " %c %o %99s %99s %n", &type, &mode, suid, sgid, 402 uid = strtoll(suid, &ptr, 10); 405 ERROR("Uid %s out of range\n", suid); 409 struct passwd *pwuid = getpwnam(suid); 413 ERROR("Uid %s invalid uid or unknown user\n", suid);
|
/external/libchrome/sandbox/linux/services/ |
syscall_wrappers.h | 63 SANDBOX_EXPORT int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid);
|
credentials.cc | 45 uid_t ruid, euid, suid; local 47 PCHECK(sys_getresuid(&ruid, &euid, &suid) == 0); 49 const bool uids_are_equal = (ruid == euid) && (ruid == suid);
|
/frameworks/opt/timezonepicker/res/values-af/ |
arrays.xml | 49 <item msgid="8972081011408691260">"Suid-Soedan"</item>
|
/external/autotest/client/site_tests/platform_OSLimits/ |
platform_OSLimits.py | 90 'suid-dump': 2, 111 'suid-dump': '/proc/sys/fs/suid_dumpable',
|
/external/ltp/testcases/kernel/syscalls/sched_setscheduler/ |
sched_setscheduler03.c | 122 uid_t ruid, euid, suid; local 154 SAFE_GETRESUID(&ruid, &euid, &suid);
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
bpf_dsl_unittest.cc | 200 const Arg<uid_t> ruid(0), euid(1), suid(2); 201 return If(AnyOf(ruid == 0, euid == 0, suid == 0), Error(EPERM)) 202 .ElseIf(AllOf(ruid == 1, euid == 1, suid == 1), Error(EAGAIN))
|
/development/ndk/platforms/android-9/include/sys/ |
mount.h | 40 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
|
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
SQLExceptionTest.java | 37 * SUID test 46 assertEquals("SUID mismatch: ", theFixedSUID, theSUID); 48 System.out.println("SUID check got exception: " + e.getMessage()); 49 // assertTrue("Exception while testing SUID ", false );
|