HomeSort by relevance Sort by last modified time
    Searched full:privileges (Results 1 - 25 of 184) sorted by null

1 2 3 4 5 6 7 8

  /tools/motodev/src/plugins/installer/resources/
openOutputMac.scpt 1 do shell script "mv /tmp/launchd.temp /etc/launchd.conf; mv /tmp/androidSDK /etc/paths.d/androidSDK; rm -rf /tmp/androidSDK; rm -rf /tmp/launchd.conf; rm -rf /tmp/launchd.temp" with administrator privileges
  /libcore/luni/src/test/java/tests/java/sql/
DatabaseMetaDataNotSupportedTest.java 137 // grant SELECT privileges
155 // revoke SELECT privileges
166 assertFalse("No SELECT privileges", userMeta.allTablesAreSelectable());
169 // revoke CREATE privileges
296 @KnownFailure("not supported. Privileges are not supported.")
456 @KnownFailure("not supported. Privileges are not supported.")
459 // case 1. Get privileges when no privilegies exist for one table
460 ResultSet privileges = meta.getTablePrivileges(conn.getCatalog(), "%", local
462 assertFalse("Some privilegies exist", privileges.next());
463 privileges.close()
    [all...]
  /external/libcap-ng/libcap-ng-0.7/
README 3 for apps that may have too much privileges.
  /external/libcap-ng/libcap-ng-0.7/docs/
capng_lock.3 11 capng_lock will take steps to prevent children of the current process to regain full privileges if the uid is 0. This should be called while possessing the CAP_SETPCAP capability in the kernel. This function will do the following if permitted by the kernel: Set the NOROOT option on for PR_SET_SECUREBITS, set the NOROOT_LOCKED option to on for PR_SET_SECUREBITS, set the PR_NO_SETUID_FIXUP option on for PR_SET_SECUREBITS, and set the PR_NO_SETUID_FIXUP_LOCKED option on for PR_SET_SECUREBITS.
capng_change_id.3 11 This function will change uid and gid to the ones given while retaining the capabilities previously specified in capng_update. It is not necessary and perhaps better if capng_apply has not been called prior to this function so that all necessary privileges are still intact. The caller is required to have CAP_SETPCAP capability still active before calling this function.
  /external/kernel-headers/original/linux/
prctl.h 134 * If no_new_privs is set, then operations that grant new privileges (i.e.
138 * Operations that merely manipulate or drop existing privileges (setresuid,
139 * capset, etc.) will still work. Drop those privileges if you want them gone.
  /external/dnsmasq/contrib/Solaris10/
dnsmasq.xml 36 <method_credential user='root' group='root' privileges='all'/>
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/scripts_cvs/searchcvs/
mysql-users.dump 14 GRANT ALL PRIVILEGES ON `dbaccessrw`.* TO 'dbaccessrw'@'localhost';
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
fsuid.h 28 other privileges (such as who can send signals at the process). */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/
fsuid.h 28 other privileges (such as who can send signals at the process). */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/
fsuid.h 28 other privileges (such as who can send signals at the process). */
  /external/tcpdump/
acconfig.h 132 /* define if should drop privileges by default */
135 /* define if should chroot when dropping privileges */
  /frameworks/base/core/java/android/content/pm/
UserInfo.java 45 * User with administrative privileges. Such a user can create and
56 * Indicates the user has restrictions in privileges, in addition to those for normal users.
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 26 This prevents the ability for child processes to regain privileges if the uid is 0.
  /tools/motodev/src/plugins/installer/src/com/motorola/studio/android/installer/i18n/
installerNLS.properties 36 MotodevPolicy_Insufficient_Permissions_Title=Insufficient user privileges
  /external/chromium/third_party/libjingle/source/talk/base/
thread.h 65 // handle will, on Win32, be opened with only synchronization privileges -
67 // write additional code to adjust the privileges, or call a different
71 // be able to get synchronization privileges, in which case the result
  /external/chromium/chrome/browser/ui/cocoa/
keystone_promote_postflight.sh 15 # real user ID (dropping root privileges).
  /external/compiler-rt/BlocksRuntime/tests/
makefile 51 # <rdar://problem/6456031> ER: option to not require extra privileges (-nosudo or somesuch)
  /external/libnl-headers/netlink/
netlink-kernel.h 103 * may require special privileges because it has the potential to
  /external/openssh/
ssh.h 88 * sshd will change its privileges to this user and its
  /external/webkit/Source/WebCore/platform/mac/
FileSystemMac.mm 84 // It is critical to pass FALSE for excludeByPath because excluding by path requires root privileges.
  /external/dropbear/debian/
implicit 8 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges'
21 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges'
  /external/e2fsprogs/util/
copy_sparse.c 3 * (requires root privileges)
57 fprintf(stderr, "No permission to use FIBMAP ioctl; must have root privileges\n");
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 29 to be run with root privileges.</para>
40 privileges (usually, root user). It opens a UNIX domain socket for each
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 82 * insufficient privileges
97 * insufficient privileges

Completed in 728 milliseconds

1 2 3 4 5 6 7 8