Index: sandbox/linux/suid/suid_unsafe_environment_variables.h |
diff --git a/sandbox/linux/suid/suid_unsafe_environment_variables.h b/sandbox/linux/suid/suid_unsafe_environment_variables.h |
deleted file mode 100644 |
index 4e3329f439357308fc227318b30aa09e8c4b2f11..0000000000000000000000000000000000000000 |
--- a/sandbox/linux/suid/suid_unsafe_environment_variables.h |
+++ /dev/null |
@@ -1,64 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-// This is a list of environment variables which the ELF loader unsets when |
-// loading a SUID binary. Because they are unset rather than just ignored, they |
-// aren't passed to child processes of SUID processes either. |
-// |
-// We need to save these environment variables before running a SUID sandbox |
-// and restore them before running child processes (but after dropping root). |
-// |
-// List gathered from glibc sources (00ebd7ed58df389a78e41dece058048725cb585e): |
-// sysdeps/unix/sysv/linux/i386/dl-librecon.h |
-// sysdeps/generic/unsecvars.h |
- |
-#ifndef SANDBOX_LINUX_SUID_SUID_UNSAFE_ENVIRONMENT_VARIABLES_H_ |
-#define SANDBOX_LINUX_SUID_SUID_UNSAFE_ENVIRONMENT_VARIABLES_H_ |
- |
-static const char* kSUIDUnsafeEnvironmentVariables[] = { |
- "LD_AOUT_LIBRARY_PATH", |
- "LD_AOUT_PRELOAD", |
- "GCONV_PATH", |
- "GETCONF_DIR", |
- "HOSTALIASES", |
- "LD_AUDIT", |
- "LD_DEBUG", |
- "LD_DEBUG_OUTPUT", |
- "LD_DYNAMIC_WEAK", |
- "LD_LIBRARY_PATH", |
- "LD_ORIGIN_PATH", |
- "LD_PRELOAD", |
- "LD_PROFILE", |
- "LD_SHOW_AUXV", |
- "LD_USE_LOAD_BIAS", |
- "LOCALDOMAIN", |
- "LOCPATH", |
- "MALLOC_TRACE", |
- "NIS_PATH", |
- "NLSPATH", |
- "RESOLV_HOST_CONF", |
- "RES_OPTIONS", |
- "TMPDIR", |
- "TZDIR", |
- NULL, |
-}; |
- |
-// Return a malloc allocated string containing the 'saved' environment variable |
-// name for a given environment variable. |
-static inline char* SandboxSavedEnvironmentVariable(const char* envvar) { |
- const size_t envvar_len = strlen(envvar); |
- const size_t saved_envvarlen = envvar_len + 1 /* NUL terminator */ + |
- 8 /* strlen("SANDBOX_") */; |
- char* const saved_envvar = (char*) malloc(saved_envvarlen); |
- if (!saved_envvar) |
- return NULL; |
- |
- memcpy(saved_envvar, "SANDBOX_", 8); |
- memcpy(saved_envvar + 8, envvar, envvar_len); |
- saved_envvar[8 + envvar_len] = 0; |
- |
- return saved_envvar; |
-} |
- |
-#endif // SANDBOX_LINUX_SUID_SUID_UNSAFE_ENVIRONMENT_VARIABLES_H_ |