/external/chromium_org/content/public/common/ |
sandbox_linux.h | 14 // SUID sandbox active. 17 // SUID sandbox is using the PID namespace. 20 // SUID sandbox is using the network namespace.
|
zygote_fork_delegate_linux.h | 43 // suid sandbox, Fork() returns the Linux process ID. Inside
|
/bionic/libc/bionic/ |
setresuid.c | 31 extern int __setresuid(uid_t ruid, uid_t euid, uid_t suid); 33 int setresuid(uid_t ruid, uid_t euid, uid_t suid) 36 return __setresuid(ruid, euid, suid);
|
/external/chromium_org/sandbox/linux/suid/common/ |
suid_unsafe_environment_variables.h | 6 // loading a SUID binary. Because they are unset rather than just ignored, they 7 // aren't passed to child processes of SUID processes either. 9 // We need to save these environment variables before running a SUID sandbox
|
/external/chromium_org/sandbox/linux/ |
sandbox_linux.gypi | 127 'suid/common/sandbox.h', 128 'suid/common/suid_unsafe_environment_variables.h', 129 'suid/linux_util.c', 130 'suid/linux_util.h', 131 'suid/process_util.h', 132 'suid/process_util_linux.c', 133 'suid/sandbox.c', 191 'suid/common/sandbox.h', 192 'suid/common/suid_unsafe_environment_variables.h', 193 'suid/client/setuid_sandbox_client.cc' [all...] |
sandbox_linux_test_sources.gypi | 25 'suid/client/setuid_sandbox_client_unittest.cc',
|
/external/chromium_org/components/nacl/common/ |
nacl_helper_linux.h | 25 // the SUID sandbox. 37 // child processes real PID from within the SUID sandbox. See
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/ |
SuidFilesActivity.java | 17 package com.android.cts.verifier.suid; 47 /** {@link Activity} that tries to find suid files. */ 52 /** These programs are expected suid binaries. */ 113 // Start searching for suid files using a background thread. 144 Log.e("Suid", "onDestroy"); 151 /** {@link ListView} items display the basenames of the suid files. */ 170 /** {@link AsyncTask} that searches the file system for suid files. */
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.c | 57 uid_t uid, euid, suid; local 67 getresuid(&uid, &euid, &suid); 75 getresuid(&uid, &euid, &suid); 86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
|
captest.8 | 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
|
/external/chromium_org/content/zygote/ |
zygote_linux.h | 36 // Returns true if the SUID sandbox is active. 52 // This is equivalent to fork(), except that, when using the SUID sandbox, it 87 // In the SUID sandbox, we try to use a new PID namespace. Thus the PIDs
|
zygote_main_linux.cc | 42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 385 // This will set the *using_suid_sandbox variable to true if the SUID sandbox 399 // Use the SUID sandbox. This still allows the seccomp sandbox to 427 // the SUID sandbox), they would nonetheless be in the /same/ PID 487 LOG(ERROR) << "The SUID sandbox created a new PID namespace but Zygote " 488 "is not the init process. Please, make sure the SUID "
|
/external/chromium_org/chrome/test/security_tests/ |
sandbox_browsertest_linux.cc | 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox
|
/external/chromium_org/content/common/ |
zygote_commands_linux.h | 26 // This number must be kept in sync in sandbox/linux/suid/sandbox.c
|
/external/chromium_org/content/browser/zygote_host/ |
zygote_host_impl_linux.cc | 36 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 37 #include "sandbox/linux/suid/common/sandbox.h" 122 // A non empty sandbox_cmd means we want a SUID sandbox. 128 LOG(FATAL) << "The SUID sandbox helper binary is missing: " 142 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not " 168 // In the SUID sandbox, the real zygote is forked from the sandbox. 204 // Not using the SUID sandbox. 357 // So, in the normal case, we use the SUID binary to change it for us. 412 // So, we use the SUID binary to change it for us. 431 LOG(ERROR) << "Unable to run suid sandbox to set low memory margin." [all...] |
/external/kernel-headers/original/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/ |
mcSuid.h | 37 /** Length of SUID. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.cc | 15 #include "sandbox/linux/suid/common/sandbox.h" 16 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 43 // different names here so that the SUID sandbox can resolve them for the
|
setuid_sandbox_client_unittest.cc | 11 #include "sandbox/linux/suid/common/sandbox.h"
|
/libcore/luni/src/main/java/java/io/ |
ObjectStreamClass.java | 41 * and SUID of the class as well as field names and types. Information inherited 50 // No need to compute the SUID for ObjectStreamClass, just use the value 54 // Name of the field that contains the SUID value (if present) 253 // Compute the SUID 382 * a java.lang.Class for which to compute the SUID 385 * @return the value of SUID of this class 391 * really need to compute SUID using SHAOutputStream 409 throw new RuntimeException("Error fetching SUID: " + iae); 578 throw new RuntimeException(e + " computing SHA-1/SUID"); [all...] |
/external/chromium_org/chrome/test/chromeos/autotest/files/client/deps/chrome_test/ |
setup_test_links.sh | 55 "$pyauto_dep_dir/test_src/out/Release/suid-python" \
|
/frameworks/opt/timezonepicker/res/values-af/ |
arrays.xml | 49 <item msgid="8972081011408691260">"Suid-Soedan"</item>
|
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/TlCm/ |
cmp.h | 171 mcSuid_t suid; member in struct:__anon34149 229 mcSuid_t suid; member in struct:__anon34156 270 mcSuid_t suid; member in struct:__anon34161 315 mcSuid_t suid; member in struct:__anon34167 340 mcSuid_t suid; member in struct:__anon34170 372 mcSuid_t suid; member in struct:__anon34175 475 mcSuid_t suid; member in struct:__anon34190 505 mcSuid_t suid; member in struct:__anon34195 1499 mcSuid_t suid; member in struct:__anon34339 [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/ |
TestResultsReport.java | 50 * <test title="SUID File Scanner" class-name="com.android.cts.verifier.suid.SuidFilesActivity" result="not-executed" />
|