/external/chromium_org/components/nacl/zygote/ |
DEPS | 3 "+sandbox/linux/suid",
|
/external/chromium_org/content/public/common/ |
sandbox_linux.h | 14 // SUID sandbox active. 17 // SUID sandbox is using the PID namespace. 20 // SUID sandbox is using the network namespace.
|
zygote_fork_delegate_linux.h | 55 // child process's real PID from within the SUID sandbox. 63 // suid sandbox, Fork() returns the Linux process ID.
|
/external/chromium_org/sandbox/linux/suid/common/ |
suid_unsafe_environment_variables.h | 6 // loading a SUID binary. Because they are unset rather than just ignored, they 7 // aren't passed to child processes of SUID processes either. 9 // We need to save these environment variables before running a SUID sandbox
|
/external/chromium_org/sandbox/linux/ |
BUILD.gn | 96 "suid/client/setuid_sandbox_client_unittest.cc", 198 "suid/common/sandbox.h", 199 "suid/common/suid_unsafe_environment_variables.h", 200 "suid/process_util.h", 201 "suid/process_util_linux.c", 202 "suid/sandbox.c", 274 "suid/common/sandbox.h", 275 "suid/common/suid_unsafe_environment_variables.h", 276 "suid/client/setuid_sandbox_client.cc", 277 "suid/client/setuid_sandbox_client.h" [all...] |
sandbox_linux.gypi | 187 'suid/common/sandbox.h', 188 'suid/common/suid_unsafe_environment_variables.h', 189 'suid/process_util.h', 190 'suid/process_util_linux.c', 191 'suid/sandbox.c', 284 'suid/common/sandbox.h', 285 'suid/common/suid_unsafe_environment_variables.h', 286 'suid/client/setuid_sandbox_client.cc', 287 'suid/client/setuid_sandbox_client.h',
|
sandbox_linux_test_sources.gypi | 32 'suid/client/setuid_sandbox_client_unittest.cc',
|
/external/chromium_org/components/nacl/loader/ |
DEPS | 8 "+sandbox/linux/suid",
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/ |
SuidFilesActivity.java | 17 package com.android.cts.verifier.suid; 47 /** {@link Activity} that tries to find suid files. */ 52 /** These programs are expected suid binaries. */ 113 // Start searching for suid files using a background thread. 144 Log.e("Suid", "onDestroy"); 151 /** {@link ListView} items display the basenames of the suid files. */ 170 /** {@link AsyncTask} that searches the file system for suid files. */
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.c | 57 uid_t uid, euid, suid; local 67 getresuid(&uid, &euid, &suid); 75 getresuid(&uid, &euid, &suid); 86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
|
captest.8 | 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
|
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
nacl_sandbox_linux.cc | 26 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 97 // 6) The socket created by the SUID sandbox helper, used by ChrootMe(). 99 // (Only present when running under the SUID sandbox.) 148 "The SUID sandbox is not engaged for NaCl:";
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.cc | 5 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 29 #include "sandbox/linux/suid/common/sandbox.h" 30 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 47 // sandbox. This is to allow nesting of one instance of the SUID sandbox 81 // different names here so that the SUID sandbox can resolve them for the 274 LOG(FATAL) << "The SUID sandbox helper binary is missing: " 282 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not "
|
setuid_sandbox_client_unittest.cc | 9 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 10 #include "sandbox/linux/suid/common/sandbox.h"
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
bpf_dsl_unittest.cc | 52 static int setresuid(uid_t ruid, uid_t euid, uid_t suid) { 53 return Syscall::Call(__NR_setresuid, ruid, euid, suid); 137 const Arg<uid_t> ruid(0), euid(1), suid(2); 138 return If(ruid == 0 || euid == 0 || suid == 0, Error(EPERM)) 139 .ElseIf(ruid == 1 && euid == 1 && suid == 1, Error(EAGAIN))
|
/external/kernel-headers/original/uapi/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/ |
mcSuid.h | 37 /** Length of SUID. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
securebits.h | 13 inheritance of root-permissions and suid-root executable under
|
/docs/source.android.com/src/devices/tech/security/ |
best-practices.jd | 200 <h3 id="suid-files">SUID files</h3> 207 <li>SUID processes <strong>must not</strong> provide a shell or backdoor that can be used to 209 <li>SUID programs <strong>must not</strong> be writable by any user.</li> 210 <li>SUID programs <strong>should</strong> not be world readable or executable. Create a 211 group, limit access to the SUID binary to members of that group, and place any 212 applications that should be able to execute the SUID program into that 214 <li>SUID programs are a common source of user "rooting" of devices. To reduce 215 this risk, SUID programs <strong>should not</strong> be executable by the shell 219 <p>The CTS verifier has been expanded with an informational test that lists SUID [all...] |
/external/chromium_org/sandbox/linux/suid/ |
sandbox.c | 7 #include "sandbox/linux/suid/common/sandbox.h" 32 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 33 #include "sandbox/linux/suid/process_util.h" 337 uid_t ruid, euid, suid; local 338 if (getresuid(&ruid, &euid, &suid)) { 354 // ld.so may have cleared several environment variables because we are SUID.
|
process_util_linux.c | 13 #include "sandbox/linux/suid/process_util.h"
|
/external/chromium_org/chrome/test/chromeos/autotest/files/client/deps/chrome_test/ |
setup_test_links.sh | 54 "$pyauto_dep_dir/test_src/out/Release/suid-python" \
|
/frameworks/opt/timezonepicker/res/values-af/ |
arrays.xml | 49 <item msgid="8972081011408691260">"Suid-Soedan"</item>
|
/hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/TlCm/ |
cmp.h | 171 mcSuid_t suid; member in struct:__anon21937 229 mcSuid_t suid; member in struct:__anon21944 270 mcSuid_t suid; member in struct:__anon21949 315 mcSuid_t suid; member in struct:__anon21955 340 mcSuid_t suid; member in struct:__anon21958 372 mcSuid_t suid; member in struct:__anon21963 475 mcSuid_t suid; member in struct:__anon21978 505 mcSuid_t suid; member in struct:__anon21983 1499 mcSuid_t suid; member in struct:__anon22127 [all...] |