/external/autotest/client/site_tests/security_SuidBinaries/ |
baseline.amd64-generic-cheets.sgid | 1 # See corresponding .suid file for context.
|
baseline.betty.sgid | 1 # See corresponding .suid file for context.
|
baseline.newbie.sgid | 1 # See corresponding .suid file for context.
|
baseline.novato.sgid | 1 # See corresponding .suid file for context.
|
baseline.vm.arc_userdebug.sgid | 1 # See corresponding .suid file for context.
|
control | 21 job.run_test("security_SuidBinaries", baseline='suid', tag='suid')
|
/external/minijail/examples/ |
drop_privs.cpp | 27 uid_t ruid, euid, suid; local 29 getresuid(&ruid, &euid, &suid); 32 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid; local
|
/docs/source.android.com/zh-cn/security/overview/ |
implement.html | 117 <h3 id="suid-files">?? SUID ??</h3> 121 <li>SUID ???????????? Android ????? shell ??????</li> 122 <li>???????????? SUID ?????????</li> 123 <li>SUID ???????????????????????????????????????? SUID ???????????????? SUID ????????????? 125 <li>SUID ?????????????? Root ?????????????????? shell ?????? SUID ???</li> 128 <p>CTS ??????????? SUID ?????????? CTS ????? SetUID ??????????</p [all...] |
/external/libchrome/sandbox/linux/ |
BUILD.gn | 124 "suid/client/setuid_sandbox_client_unittest.cc", 125 "suid/client/setuid_sandbox_host_unittest.cc", 292 "suid/common/sandbox.h", 293 "suid/common/suid_unsafe_environment_variables.h", 294 "suid/process_util.h", 295 "suid/process_util_linux.c", 296 "suid/sandbox.c", 428 "suid/client/setuid_sandbox_client.cc", 429 "suid/client/setuid_sandbox_client.h", 430 "suid/client/setuid_sandbox_host.cc" [all...] |
sandbox_linux.gypi | 200 'suid/common/sandbox.h', 201 'suid/common/suid_unsafe_environment_variables.h', 202 'suid/process_util.h', 203 'suid/process_util_linux.c', 204 'suid/sandbox.c', 305 'suid/common/sandbox.h', 306 'suid/common/suid_unsafe_environment_variables.h', 307 'suid/client/setuid_sandbox_client.cc', 308 'suid/client/setuid_sandbox_client.h', 309 'suid/client/setuid_sandbox_host.cc' [all...] |
sandbox_linux_test_sources.gypi | 37 'suid/client/setuid_sandbox_client_unittest.cc', 38 'suid/client/setuid_sandbox_host_unittest.cc',
|
/external/libchrome/sandbox/linux/suid/common/ |
suid_unsafe_environment_variables.h | 6 // loading a SUID binary. Because they are unset rather than just ignored, they 7 // aren't passed to child processes of SUID processes either. 9 // We need to save these environment variables before running a SUID sandbox
|
/external/libchrome/sandbox/linux/services/ |
syscall_wrappers_unittest.cc | 67 uid_t ruid, euid, suid; local 69 ASSERT_EQ(0, getresuid(&ruid, &euid, &suid)); 73 EXPECT_EQ(suid, sys_suid);
|
syscall_wrappers.cc | 100 int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid) { 105 res = syscall(__NR_getresuid32, ruid, euid, suid); 107 res = syscall(__NR_getresuid, ruid, euid, suid); 112 if (suid) MSAN_UNPOISON(suid, sizeof(*suid));
|
/external/autotest/client/site_tests/security_SysLogPermissions/ |
security_SysLogPermissions.py | 17 def run_once(self, baseline='suid'):
|
/external/minijail/test/ |
libminijail_test.cpp | 98 uid_t ruid, euid, suid; local 100 getresuid(&ruid, &euid, &suid); 103 LOG(INFO) << "ruid " << ruid << " euid " << euid << " suid " << suid; local
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.c | 57 uid_t uid, euid, suid; local 67 getresuid(&uid, &euid, &suid); 75 getresuid(&uid, &euid, &suid); 86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
|
/external/selinux/python/sepolgen/tests/test_data/ |
short.log | 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
|
audit.log | 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 11 type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) 16 type=SYSCALL msg=audit(1162850343.419:985): arch=40000003 syscall=5 success=no exit=-2 a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) 18 type=SYSCALL msg=audit(1162850343.427:986): arch=40000003 syscall=33 success=yes exit=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 20 type=SYSCALL msg=audit(1162850343.427:987): arch=40000003 syscall=5 success=yes exit=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 22 type=SYSCALL msg=audit(1162850343.427:988): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa1df2c a2=ce8ff4 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) 27 type=SYSCALL msg=audit(1162850343.427:989): arch=40000003 syscall=5 success=yes exit=4 a0=8e1facb a1=80c2 a2=180 a3=80c2 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_ (…) [all...] |
/external/ltp/testcases/kernel/syscalls/utils/ |
compat_16.h | 37 int setresuid(uid_t ruid, uid_t euid, uid_t suid); 134 int SETRESUID(void (cleanup)(void), UID_T ruid, UID_T euid, UID_T suid) 136 LTP_CREATE_SYSCALL(setresuid, cleanup, ruid, euid, suid);
|
/external/openssh/openbsd-compat/ |
bsd-setres_id.c | 64 setresuid(uid_t ruid, uid_t euid, uid_t suid) 68 if (ruid != suid) {
|
/external/toybox/toys/posix/ |
chmod.c | 22 s = u+s = suid, g+s = sgid, o+s = sticky. (+t is an alias for o+s). 23 suid/sgid: execute as the user/group who owns the file.
|
/external/libcap/contrib/ |
pcaps4suid0 | 17 # change different suid-0 binaries away from suid-0 to using 23 # OR change different suid-0 binaries away from suid-0 to using
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/backup/ |
BackupSettingsActivityTest.java | 177 private static int sUid = 0; // SYSTEM by default 180 sUid = uid; 185 return sUid; 190 sUid = 0;
|
/external/selinux/python/audit2allow/ |
test.log | 4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no exit=-13 a0=92c5288 a1=1 a2=154d50 a3=92c5120 items=1 ppid=13935 pid=13944 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) 6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null) 10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null) 12 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 15 node=dan.example.com type=SYSCALL msg=audit(1166017682.366:877): arch=40000003 syscall=196 success=no exit=-13 a0=96226a8 a1=bf88b01c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23768 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 17 node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 19 node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 22 node=patty.example.com type=SYSCALL msg=audit(1166036885.378:1097): arch=40000003 syscall=196 success=no exit=-13 a0=9624f38 a1=bf88b11c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23770 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) 24 node=sam.example.com type=SYSCALL msg=audit(1166038880.318:1103): arch=40000003 syscall=5 success=no exit=-13 a0=bf96f068 a1=18800 a2=0 a3=bf973110 items=0 ppid=23765 pid=12387 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="sealert.cgi" exe="/usr/bin/perl" subj=system (…) [all...] |