/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
ld-2.11.1.so | |
ld-linux.so.2 | |
/device/asus/deb/ |
init.deb.rc | 69 #Remove SUID bit for iproute2 ip tool
|
/device/asus/flo/ |
init.flo.rc | 69 #Remove SUID bit for iproute2 ip tool
|
/device/lge/mako/ |
init.mako.rc | 75 #Remove SUID bit for iproute2 ip tool
|
/external/chromium_org/components/nacl/loader/ |
nacl_helper_linux.cc | 283 << "Most likely you need to configure your SUID sandbox "
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_linux.cc | 35 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/performance_tests/ |
perftest.py | 239 re.compile(r'Running without the SUID sandbox'),
|
/external/strace/ |
system.c | 37 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
|
/packages/apps/DeskClock/res/values-af/ |
array.xml | 171 <item msgid="5987600941235656656">"Nieu-Suid-Wallis"</item>
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/ |
fs.h | 187 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
fs.h | 187 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
|
/external/chromium_org/content/browser/ |
browser_main_loop.cc | 114 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 152 "Running without the SUID sandbox! See " [all...] |
/libcore/luni/src/main/java/java/io/ |
ObjectInputStream.java | [all...] |
/cts/apps/CtsVerifier/res/values/ |
strings.xml | [all...] |
/external/emma/core/java12/com/vladium/emma/instr/ |
InstrVisitor.java | 257 // if necessary, do SUID compensation [need to be done after method 321 // statically: warn that SUID compensation may not work 325 m_log.warning ("and can interfere with " + IAppConstants.APP_NAME + "'s SUID compensation"); [all...] |
/external/iputils/ |
RELNOTES | 63 spec: Add exmple lines for suid-root installation 424 > In case of suid-root, it can be used by malicious user to send data to
|
/external/valgrind/main/coregrind/m_initimg/ |
initimg-linux.c | 729 running suid, and therefore the dynamic linker should 732 never be SUID, and we need LD_PRELOAD to work for the [all...] |
/external/llvm/lib/Support/Unix/ |
Path.inc | 91 // FIXME: Don't use TMPDIR if program is SUID or SGID enabled.
|
/external/zlib/src/examples/ |
gun.c | 514 no errors are reported. The mode bits, including suid, sgid, and the sticky
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_common_interceptors.inc | [all...] |
/external/chromium_org/base/process/ |
process_metrics_linux.cc | 353 // b) Unavailable in the SUID sandbox.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/ |
stdlib.h | 570 programs is running with SUID or SGID enabled. */ [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/ |
stdlib.h | 570 programs is running with SUID or SGID enabled. */ [all...] |
/external/valgrind/main/coregrind/m_syswrap/ |
syswrap-linux.c | 587 vki_old_uid_t, ruid, vki_old_uid_t, euid, vki_old_uid_t, suid); 594 vki_uid_t, ruid, vki_uid_t, euid, vki_uid_t, suid); 602 vki_old_uid_t *, suid); 605 PRE_MEM_WRITE( "getresuid16(suid)", ARG3, sizeof(vki_old_uid_t) ); 621 vki_uid_t *, ruid, vki_uid_t *, euid, vki_uid_t *, suid); 624 PRE_MEM_WRITE( "getresuid(suid)", ARG3, sizeof(vki_uid_t) ); [all...] |