HomeSort by relevance Sort by last modified time
    Searched full:suid (Results 76 - 100 of 140) sorted by null

1 2 34 5 6

  /prebuilts/ndk/android-ndk-r7/platforms/android-8/arch-x86/usr/include/
unistd.h 93 extern int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid);
  /prebuilts/ndk/android-ndk-r7/platforms/android-9/arch-arm/usr/include/
unistd.h 93 extern int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid);
  /prebuilts/ndk/android-ndk-r7/platforms/android-9/arch-x86/usr/include/
unistd.h 93 extern int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid);
  /cts/apps/CtsVerifier/res/values/
strings.xml 279 <string name="suid_files">SUID File Scanner</string>
280 <string name="suid_files_info">This test will attempt to find unauthorized SUID binaries, but it is not comprehensive due to permission restrictions.\n\nAuthorized SUID binaries will appear green, while unauthorized SUID binaries will appear red.\n\nPress OK to start the scan...</string>
285 <string name="no_suid_files">No unauthorized suid files detected!</string>
  /external/chromium/chrome/browser/
memory_details_linux.cc 185 // Handle the zygote separately. With the SUID sandbox and a separate
  /external/openssh/
OVERVIEW 109 - The client is suid root. It tries to temporarily give up this
  /system/core/toolbox/
mount.c 55 { "suid", MS_NOSUID, 0, MS_NOSUID },
  /external/e2fsprogs/intl/
dcigettext.c 391 /* Checking whether the binaries runs SUID must be done and glibc provides
507 /* See whether this is a SUID binary or not. */
602 /* When this is a SUID binary we must not allow accessing files
    [all...]
  /external/quake/quake/src/QW/docs/
readme.qwcl 180 Make Quake suid root as follows:
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
fs.h 105 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
fs.h 105 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
fs.h 105 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
  /external/emma/core/java12/com/vladium/jcd/cls/
ClassDef.java 91 public final void setDeclaredSUID (final long suid)
93 m_declaredSUID = suid;
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/
ld-2.7.so 
ld-linux.so.2 
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/lib/
ld-2.7.so 
ld-linux.so.2 
  /bionic/libc/
SYSCALLS.TXT 50 uid_t getresuid:getresuid32 (uid_t *ruid, uid_t *euid, uid_t *suid) 209
  /external/llvm/lib/Support/Unix/
PathV2.inc 83 // FIXME: Don't use TMPDIR if program is SUID or SGID enabled.
  /libcore/luni/src/main/java/java/io/
ObjectInputStream.java     [all...]
  /external/emma/core/java12/com/vladium/emma/instr/
InstrVisitor.java 257 // if necessary, do SUID compensation [need to be done after method
321 // statically: warn that SUID compensation may not work
325 m_log.warning ("and can interfere with " + IAppConstants.APP_NAME + "'s SUID compensation");
    [all...]
  /external/valgrind/main/coregrind/m_initimg/
initimg-linux.c 729 running suid, and therefore the dynamic linker should
732 never be SUID, and we need LD_PRELOAD to work for the
    [all...]
  /cts/apps/CtsVerifier/
AndroidManifest.xml 207 <activity android:name=".suid.SuidFilesActivity"
  /external/chromium/base/
process_util_linux.cc 391 // Try statm if smaps is empty because of the SUID sandbox.
  /external/zlib/examples/
gun.c 513 no errors are reported. The mode bits, including suid, sgid, and the sticky

Completed in 1301 milliseconds

1 2 34 5 6