HomeSort by relevance Sort by last modified time
    Searched full:suid (Results 1 - 25 of 302) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/content/public/common/
sandbox_linux.h 14 // SUID sandbox active.
17 // SUID sandbox is using the PID namespace.
20 // SUID sandbox is using the network namespace.
zygote_fork_delegate_linux.h 43 // suid sandbox, Fork() returns the Linux process ID. Inside
  /bionic/libc/bionic/
setresuid.c 31 extern int __setresuid(uid_t ruid, uid_t euid, uid_t suid);
33 int setresuid(uid_t ruid, uid_t euid, uid_t suid)
36 return __setresuid(ruid, euid, suid);
  /external/chromium_org/sandbox/linux/suid/common/
suid_unsafe_environment_variables.h 6 // loading a SUID binary. Because they are unset rather than just ignored, they
7 // aren't passed to child processes of SUID processes either.
9 // We need to save these environment variables before running a SUID sandbox
  /external/chromium_org/sandbox/linux/
sandbox_linux.gypi 127 'suid/common/sandbox.h',
128 'suid/common/suid_unsafe_environment_variables.h',
129 'suid/linux_util.c',
130 'suid/linux_util.h',
131 'suid/process_util.h',
132 'suid/process_util_linux.c',
133 'suid/sandbox.c',
191 'suid/common/sandbox.h',
192 'suid/common/suid_unsafe_environment_variables.h',
193 'suid/client/setuid_sandbox_client.cc'
    [all...]
sandbox_linux_test_sources.gypi 25 'suid/client/setuid_sandbox_client_unittest.cc',
  /external/chromium_org/components/nacl/common/
nacl_helper_linux.h 25 // the SUID sandbox.
37 // child processes real PID from within the SUID sandbox. See
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/
SuidFilesActivity.java 17 package com.android.cts.verifier.suid;
47 /** {@link Activity} that tries to find suid files. */
52 /** These programs are expected suid binaries. */
113 // Start searching for suid files using a background thread.
144 Log.e("Suid", "onDestroy");
151 /** {@link ListView} items display the basenames of the suid files. */
170 /** {@link AsyncTask} that searches the file system for suid files. */
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.c 57 uid_t uid, euid, suid; local
67 getresuid(&uid, &euid, &suid);
75 getresuid(&uid, &euid, &suid);
86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /external/chromium_org/content/zygote/
zygote_linux.h 36 // Returns true if the SUID sandbox is active.
52 // This is equivalent to fork(), except that, when using the SUID sandbox, it
87 // In the SUID sandbox, we try to use a new PID namespace. Thus the PIDs
zygote_main_linux.cc 42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
385 // This will set the *using_suid_sandbox variable to true if the SUID sandbox
399 // Use the SUID sandbox. This still allows the seccomp sandbox to
427 // the SUID sandbox), they would nonetheless be in the /same/ PID
487 LOG(ERROR) << "The SUID sandbox created a new PID namespace but Zygote "
488 "is not the init process. Please, make sure the SUID "
  /external/chromium_org/chrome/test/security_tests/
sandbox_browsertest_linux.cc 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox
  /external/chromium_org/content/common/
zygote_commands_linux.h 26 // This number must be kept in sync in sandbox/linux/suid/sandbox.c
  /external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc 36 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
37 #include "sandbox/linux/suid/common/sandbox.h"
122 // A non empty sandbox_cmd means we want a SUID sandbox.
128 LOG(FATAL) << "The SUID sandbox helper binary is missing: "
142 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not "
168 // In the SUID sandbox, the real zygote is forked from the sandbox.
204 // Not using the SUID sandbox.
357 // So, in the normal case, we use the SUID binary to change it for us.
412 // So, we use the SUID binary to change it for us.
431 LOG(ERROR) << "Unable to run suid sandbox to set low memory margin."
    [all...]
  /external/kernel-headers/original/linux/
securebits.h 13 inheritance of root-permissions and suid-root executable under
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/
mcSuid.h 37 /** Length of SUID. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
securebits.h 13 inheritance of root-permissions and suid-root executable under
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.cc 15 #include "sandbox/linux/suid/common/sandbox.h"
16 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
43 // different names here so that the SUID sandbox can resolve them for the
setuid_sandbox_client_unittest.cc 11 #include "sandbox/linux/suid/common/sandbox.h"
  /libcore/luni/src/main/java/java/io/
ObjectStreamClass.java 41 * and SUID of the class as well as field names and types. Information inherited
50 // No need to compute the SUID for ObjectStreamClass, just use the value
54 // Name of the field that contains the SUID value (if present)
253 // Compute the SUID
382 * a java.lang.Class for which to compute the SUID
385 * @return the value of SUID of this class
391 * really need to compute SUID using SHAOutputStream
409 throw new RuntimeException("Error fetching SUID: " + iae);
578 throw new RuntimeException(e + " computing SHA-1/SUID");
    [all...]
  /external/chromium_org/chrome/test/chromeos/autotest/files/client/deps/chrome_test/
setup_test_links.sh 55 "$pyauto_dep_dir/test_src/out/Release/suid-python" \
  /frameworks/opt/timezonepicker/res/values-af/
arrays.xml 49 <item msgid="8972081011408691260">"Suid-Soedan"</item>
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/TlCm/
cmp.h 171 mcSuid_t suid; member in struct:__anon34149
229 mcSuid_t suid; member in struct:__anon34156
270 mcSuid_t suid; member in struct:__anon34161
315 mcSuid_t suid; member in struct:__anon34167
340 mcSuid_t suid; member in struct:__anon34170
372 mcSuid_t suid; member in struct:__anon34175
475 mcSuid_t suid; member in struct:__anon34190
505 mcSuid_t suid; member in struct:__anon34195
1499 mcSuid_t suid; member in struct:__anon34339
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/
TestResultsReport.java 50 * <test title="SUID File Scanner" class-name="com.android.cts.verifier.suid.SuidFilesActivity" result="not-executed" />

Completed in 301 milliseconds

1 2 3 4 5 6 7 8 91011>>