OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:privilege
(Results
1 - 25
of
222
) sorted by null
1
2
3
4
5
6
7
8
9
/external/autotest/client/site_tests/security_Minijail_seccomp/
policy-privdrop_arm
10
#
Privilege
-dropping syscalls.
policy-privdrop_i386
10
#
Privilege
-dropping syscalls.
policy-privdrop_x86_64
10
#
Privilege
-dropping syscalls.
/device/linaro/hikey/bootloader/
README.md
8
We can also generate ptable (needs root
privilege
) with below commands:
/external/lzma/CPP/Windows/
MemoryLock.h
20
/* Probably we do not to set any
Privilege
for junction points.
/docs/source.android.com/src/security/bulletin/
2015-09-01.jd
69
<td>Elevation of
Privilege
Vulnerability in Kernel</td>
74
<td>Elevation of
Privilege
Vulnerability in Binder</td>
80
<td>Elevation of
Privilege
Vulnerability in Keystore </td>
85
<td>Elevation of
Privilege
Vulnerability in Region</td>
90
<td>Elevation of
Privilege
vulnerability in SMS enables notification bypass.</td>
95
<td>Elevation of
Privilege
Vulnerability in Lockscreen</td>
124
applications that exploit a
privilege
escalation vulnerability. If such an
190
<h3 id=elevation_privilege_vulnerability_in_kernel>Elevation
Privilege
Vulnerability in Kernel</h3>
193
<p>An elevation of
privilege
vulnerability in the Linux kernel's handling of ping
221
<h3 id=elevation_of_privilege_vulnerability_in_binder>Elevation of
Privilege
Vulnerability in Binder </h3
[
all
...]
2016-01-01.jd
66
<td>Elevation of
Privilege
Vulnerability in misc-sd driver</td>
71
<td>Elevation of
Privilege
Vulnerability in the Imagination Technologies driver</td>
76
<td>Elevation of
Privilege
Vulnerabilities in Trustzone</td>
81
<td>Elevation of
Privilege
Vulnerability in Kernel</td>
86
<td>Elevation of
Privilege
Vulnerability in Bluetooth</td>
96
<td>Elevation of
Privilege
Vulnerability in Setup Wizard</td>
101
<td>Elevation of
Privilege
Vulnerability in Wi-Fi</td>
140
applications that exploit a
privilege
escalation vulnerability. If such an
212
<h3 id=elevation_of_privilege_vulnerability_in_misc-sd_driver>Elevation of
Privilege
Vulnerability in misc-sd driver</h3>
215
<p>An elevation of
privilege
vulnerability in the misc-sd driver from MediaTe
[
all
...]
2016-02-01.jd
76
<td>Elevation of
Privilege
Vulnerability in Qualcomm Performance Module</td>
81
<td>Elevation of
Privilege
Vulnerability in Qualcomm Wi-Fi Driver</td>
86
<td>Elevation of
Privilege
Vulnerability in the Debugger Daemon</td>
96
<td>Elevation of
Privilege
Vulnerability in Wi-Fi</td>
101
<td>Elevation of
Privilege
Vulnerability in Mediaserver</td>
111
<td>Elevation of
Privilege
Vulnerability in Setup Wizard</td>
136
applications that exploit a
privilege
escalation vulnerability. If such an
251
<h3 id=elevation_of_privilege_vulnerability_in_qualcomm_performance_module>Elevation of
Privilege
Vulnerability in Qualcomm Performance Module</h3>
254
<p>An elevation of
privilege
vulnerability in the performance event manager
280
<h3 id=elevation_of_privilege_vulnerability_in_qualcomm_wifi_driver>Elevation of
Privilege
Vulnerability in Qualcomm Wi-Fi Driver</h3
[
all
...]
2015-12-01.jd
70
<td>Elevation of
Privilege
in Kernel</td>
86
<td>Elevation of
Privilege
Vulnerabilities in libstagefright</td>
91
<td>Elevation of
Privilege
Vulnerability in SystemUI</td>
96
<td>Elevation of
Privilege
Vulnerability in Native Frameworks Library</td>
101
<td>Elevation of
Privilege
Vulnerability in Wi-Fi</td>
106
<td>Elevation of
Privilege
Vulnerability in System Server</td>
133
<td>Elevation of
Privilege
Vulnerability in System Server</td>
162
applications that exploit a
privilege
escalation vulnerability. If such an
279
<h3 id="elevation_of_privilege_in_kernel">Elevation of
Privilege
in Kernel</h3>
281
<p>An elevation of
privilege
vulnerability in the system kernel could enable
[
all
...]
/cts/tests/tests/security/src/android/security/cts/
IntentSenderRemovalTest.java
26
* Make sure the DebugIntentSender activity, which allows
privilege
escalation of intent caller
/external/clang/test/Rewriter/
rewrite-foreach-in-block.mm
25
for (I *
privilege
in [ace ARR]) { }
/external/google-breakpad/src/third_party/libdisasm/
TODO
43
todo:
privilege
| ring
/external/libchrome/base/process/
launch.cc
49
// To prevent accidental
privilege
sharing to an untrusted child, processes
/external/wpa_supplicant_8/src/common/
privsep_commands.h
2
* WPA Supplicant -
privilege
separation commands
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml
11
<refpurpose>wpa_supplicant
privilege
separation helper</refpurpose>
27
<para><command>wpa_priv</command> is a
privilege
separation helper that
34
can be run as non-root user.
Privilege
separation restricts the effects
54
<command>wpa_supplicant</command> with
privilege
separation:</para>
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/
perm.h
31
/* Change I/O
privilege
level. */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/
perm.h
31
/* Change I/O
privilege
level. */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/
perm.h
31
/* Change I/O
privilege
level. */
/system/tpm/trunks/
trunksd.cc
67
<< "trunksd was not able to drop user
privilege
.";
69
<< "trunksd was not able to drop group
privilege
.";
/docs/source.android.com/src/security/enhancements/
enhancements41.jd
26
<li>Linux mmap_min_addr to mitigate null pointer dereference
privilege
/external/kernel-headers/original/uapi/linux/
securebits.h
26
set*uid to gain/lose
privilege
, transitions to/from uid 0 cause
/external/libcap/libcap/include/uapi/linux/
securebits.h
26
set*uid to gain/lose
privilege
, transitions to/from uid 0 cause
/external/libcap-ng/libcap-ng-0.7/utils/
captest.8
9
You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if
privilege
escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
/external/selinux/policycoreutils/restorecond/
restorecond.init
19
# 4 - insufficient
privilege
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
securebits.h
26
set*uid to gain/lose
privilege
, transitions to/from uid 0 cause
Completed in 3010 milliseconds
1
2
3
4
5
6
7
8
9