HomeSort by relevance Sort by last modified time
    Searched full:suid (Results 1 - 25 of 498) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/autotest/client/site_tests/security_SuidBinaries/
baseline.amd64-generic-cheets.sgid 1 # See corresponding .suid file for context.
baseline.betty.sgid 1 # See corresponding .suid file for context.
baseline.newbie.sgid 1 # See corresponding .suid file for context.
baseline.novato.sgid 1 # See corresponding .suid file for context.
baseline.vm.arc_userdebug.sgid 1 # See corresponding .suid file for context.
control 21 job.run_test("security_SuidBinaries", baseline='suid', tag='suid')
  /external/minijail/examples/
drop_privs.cpp 27 uid_t ruid, euid, suid; local
29 getresuid(&ruid, &euid, &suid);
32 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid; local
  /docs/source.android.com/zh-cn/security/overview/
implement.html 117 <h3 id="suid-files">?? SUID ??</h3>
121 <li>SUID ???????????? Android ????? shell ??????</li>
122 <li>???????????? SUID ?????????</li>
123 <li>SUID ???????????????????????????????????????? SUID ???????????????? SUID ?????????????
125 <li>SUID ?????????????? Root ?????????????????? shell ?????? SUID ???</li>
128 <p>CTS ??????????? SUID ?????????? CTS ????? SetUID ??????????</p
    [all...]
  /external/libchrome/sandbox/linux/
BUILD.gn 124 "suid/client/setuid_sandbox_client_unittest.cc",
125 "suid/client/setuid_sandbox_host_unittest.cc",
292 "suid/common/sandbox.h",
293 "suid/common/suid_unsafe_environment_variables.h",
294 "suid/process_util.h",
295 "suid/process_util_linux.c",
296 "suid/sandbox.c",
428 "suid/client/setuid_sandbox_client.cc",
429 "suid/client/setuid_sandbox_client.h",
430 "suid/client/setuid_sandbox_host.cc"
    [all...]
sandbox_linux.gypi 200 'suid/common/sandbox.h',
201 'suid/common/suid_unsafe_environment_variables.h',
202 'suid/process_util.h',
203 'suid/process_util_linux.c',
204 'suid/sandbox.c',
305 'suid/common/sandbox.h',
306 'suid/common/suid_unsafe_environment_variables.h',
307 'suid/client/setuid_sandbox_client.cc',
308 'suid/client/setuid_sandbox_client.h',
309 'suid/client/setuid_sandbox_host.cc'
    [all...]
sandbox_linux_test_sources.gypi 37 'suid/client/setuid_sandbox_client_unittest.cc',
38 'suid/client/setuid_sandbox_host_unittest.cc',
  /external/libchrome/sandbox/linux/suid/common/
suid_unsafe_environment_variables.h 6 // loading a SUID binary. Because they are unset rather than just ignored, they
7 // aren't passed to child processes of SUID processes either.
9 // We need to save these environment variables before running a SUID sandbox
  /external/libchrome/sandbox/linux/services/
syscall_wrappers_unittest.cc 67 uid_t ruid, euid, suid; local
69 ASSERT_EQ(0, getresuid(&ruid, &euid, &suid));
73 EXPECT_EQ(suid, sys_suid);
syscall_wrappers.cc 100 int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid) {
105 res = syscall(__NR_getresuid32, ruid, euid, suid);
107 res = syscall(__NR_getresuid, ruid, euid, suid);
112 if (suid) MSAN_UNPOISON(suid, sizeof(*suid));
  /external/autotest/client/site_tests/security_SysLogPermissions/
security_SysLogPermissions.py 17 def run_once(self, baseline='suid'):
  /external/minijail/test/
libminijail_test.cpp 98 uid_t ruid, euid, suid; local
100 getresuid(&ruid, &euid, &suid);
103 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid; local
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.c 57 uid_t uid, euid, suid; local
67 getresuid(&uid, &euid, &suid);
75 getresuid(&uid, &euid, &suid);
86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
  /external/selinux/python/sepolgen/tests/test_data/
short.log 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null)
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
audit.log 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null)
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
16 type=SYSCALL msg=audit(1162850343.419:985): arch=40000003 syscall=5 success=no exit=-2 a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null)
18 type=SYSCALL msg=audit(1162850343.427:986): arch=40000003 syscall=33 success=yes exit=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null)
20 type=SYSCALL msg=audit(1162850343.427:987): arch=40000003 syscall=5 success=yes exit=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null)
22 type=SYSCALL msg=audit(1162850343.427:988): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa1df2c a2=ce8ff4 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null)
27 type=SYSCALL msg=audit(1162850343.427:989): arch=40000003 syscall=5 success=yes exit=4 a0=8e1facb a1=80c2 a2=180 a3=80c2 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_ (…)
    [all...]
  /external/ltp/testcases/kernel/syscalls/utils/
compat_16.h 37 int setresuid(uid_t ruid, uid_t euid, uid_t suid);
134 int SETRESUID(void (cleanup)(void), UID_T ruid, UID_T euid, UID_T suid)
136 LTP_CREATE_SYSCALL(setresuid, cleanup, ruid, euid, suid);
  /external/openssh/openbsd-compat/
bsd-setres_id.c 64 setresuid(uid_t ruid, uid_t euid, uid_t suid)
68 if (ruid != suid) {
  /external/toybox/toys/posix/
chmod.c 22 s = u+s = suid, g+s = sgid, o+s = sticky. (+t is an alias for o+s).
23 suid/sgid: execute as the user/group who owns the file.
  /external/libcap/contrib/
pcaps4suid0 17 # change different suid-0 binaries away from suid-0 to using
23 # OR change different suid-0 binaries away from suid-0 to using
  /packages/apps/Settings/tests/robotests/src/com/android/settings/backup/
BackupSettingsActivityTest.java 177 private static int sUid = 0; // SYSTEM by default
180 sUid = uid;
185 return sUid;
190 sUid = 0;
  /external/selinux/python/audit2allow/
test.log 4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no exit=-13 a0=92c5288 a1=1 a2=154d50 a3=92c5120 items=1 ppid=13935 pid=13944 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null)
6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)
10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null)
12 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
15 node=dan.example.com type=SYSCALL msg=audit(1166017682.366:877): arch=40000003 syscall=196 success=no exit=-13 a0=96226a8 a1=bf88b01c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23768 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
17 node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
19 node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
22 node=patty.example.com type=SYSCALL msg=audit(1166036885.378:1097): arch=40000003 syscall=196 success=no exit=-13 a0=9624f38 a1=bf88b11c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23770 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
24 node=sam.example.com type=SYSCALL msg=audit(1166038880.318:1103): arch=40000003 syscall=5 success=no exit=-13 a0=bf96f068 a1=18800 a2=0 a3=bf973110 items=0 ppid=23765 pid=12387 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="sealert.cgi" exe="/usr/bin/perl" subj=system (…)
    [all...]

Completed in 292 milliseconds

1 2 3 4 5 6 7 8 91011>>