HomeSort by relevance Sort by last modified time
    Searched full:privilege (Results 1 - 25 of 222) sorted by null

1 2 3 4 5 6 7 8 9

  /external/autotest/client/site_tests/security_Minijail_seccomp/
policy-privdrop_arm 10 # Privilege-dropping syscalls.
policy-privdrop_i386 10 # Privilege-dropping syscalls.
policy-privdrop_x86_64 10 # Privilege-dropping syscalls.
  /device/linaro/hikey/bootloader/
README.md 8 We can also generate ptable (needs root privilege) with below commands:
  /external/lzma/CPP/Windows/
MemoryLock.h 20 /* Probably we do not to set any Privilege for junction points.
  /docs/source.android.com/src/security/bulletin/
2015-09-01.jd 69 <td>Elevation of Privilege Vulnerability in Kernel</td>
74 <td>Elevation of Privilege Vulnerability in Binder</td>
80 <td>Elevation of Privilege Vulnerability in Keystore </td>
85 <td>Elevation of Privilege Vulnerability in Region</td>
90 <td>Elevation of Privilege vulnerability in SMS enables notification bypass.</td>
95 <td>Elevation of Privilege Vulnerability in Lockscreen</td>
124 applications that exploit a privilege escalation vulnerability. If such an
190 <h3 id=elevation_privilege_vulnerability_in_kernel>Elevation Privilege Vulnerability in Kernel</h3>
193 <p>An elevation of privilege vulnerability in the Linux kernel's handling of ping
221 <h3 id=elevation_of_privilege_vulnerability_in_binder>Elevation of Privilege Vulnerability in Binder </h3
    [all...]
2016-01-01.jd 66 <td>Elevation of Privilege Vulnerability in misc-sd driver</td>
71 <td>Elevation of Privilege Vulnerability in the Imagination Technologies driver</td>
76 <td>Elevation of Privilege Vulnerabilities in Trustzone</td>
81 <td>Elevation of Privilege Vulnerability in Kernel</td>
86 <td>Elevation of Privilege Vulnerability in Bluetooth</td>
96 <td>Elevation of Privilege Vulnerability in Setup Wizard</td>
101 <td>Elevation of Privilege Vulnerability in Wi-Fi</td>
140 applications that exploit a privilege escalation vulnerability. If such an
212 <h3 id=elevation_of_privilege_vulnerability_in_misc-sd_driver>Elevation of Privilege Vulnerability in misc-sd driver</h3>
215 <p>An elevation of privilege vulnerability in the misc-sd driver from MediaTe
    [all...]
2016-02-01.jd 76 <td>Elevation of Privilege Vulnerability in Qualcomm Performance Module</td>
81 <td>Elevation of Privilege Vulnerability in Qualcomm Wi-Fi Driver</td>
86 <td>Elevation of Privilege Vulnerability in the Debugger Daemon</td>
96 <td>Elevation of Privilege Vulnerability in Wi-Fi</td>
101 <td>Elevation of Privilege Vulnerability in Mediaserver</td>
111 <td>Elevation of Privilege Vulnerability in Setup Wizard</td>
136 applications that exploit a privilege escalation vulnerability. If such an
251 <h3 id=elevation_of_privilege_vulnerability_in_qualcomm_performance_module>Elevation of Privilege Vulnerability in Qualcomm Performance Module</h3>
254 <p>An elevation of privilege vulnerability in the performance event manager
280 <h3 id=elevation_of_privilege_vulnerability_in_qualcomm_wifi_driver>Elevation of Privilege Vulnerability in Qualcomm Wi-Fi Driver</h3
    [all...]
2015-12-01.jd 70 <td>Elevation of Privilege in Kernel</td>
86 <td>Elevation of Privilege Vulnerabilities in libstagefright</td>
91 <td>Elevation of Privilege Vulnerability in SystemUI</td>
96 <td>Elevation of Privilege Vulnerability in Native Frameworks Library</td>
101 <td>Elevation of Privilege Vulnerability in Wi-Fi</td>
106 <td>Elevation of Privilege Vulnerability in System Server</td>
133 <td>Elevation of Privilege Vulnerability in System Server</td>
162 applications that exploit a privilege escalation vulnerability. If such an
279 <h3 id="elevation_of_privilege_in_kernel">Elevation of Privilege in Kernel</h3>
281 <p>An elevation of privilege vulnerability in the system kernel could enable
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
IntentSenderRemovalTest.java 26 * Make sure the DebugIntentSender activity, which allows privilege escalation of intent caller
  /external/clang/test/Rewriter/
rewrite-foreach-in-block.mm 25 for (I *privilege in [ace ARR]) { }
  /external/google-breakpad/src/third_party/libdisasm/
TODO 43 todo: privilege | ring
  /external/libchrome/base/process/
launch.cc 49 // To prevent accidental privilege sharing to an untrusted child, processes
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 2 * WPA Supplicant - privilege separation commands
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
27 <para><command>wpa_priv</command> is a privilege separation helper that
34 can be run as non-root user. Privilege separation restricts the effects
54 <command>wpa_supplicant</command> with privilege separation:</para>
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/
perm.h 31 /* Change I/O privilege level. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/
perm.h 31 /* Change I/O privilege level. */
  /system/tpm/trunks/
trunksd.cc 67 << "trunksd was not able to drop user privilege.";
69 << "trunksd was not able to drop group privilege.";
  /docs/source.android.com/src/security/enhancements/
enhancements41.jd 26 <li>Linux mmap_min_addr to mitigate null pointer dereference privilege
  /external/kernel-headers/original/uapi/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /external/libcap/libcap/include/uapi/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /external/selinux/policycoreutils/restorecond/
restorecond.init 19 # 4 - insufficient privilege
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause

Completed in 3010 milliseconds

1 2 3 4 5 6 7 8 9