/frameworks/base/core/java/android/content/pm/ |
UserInfo.java | 45 * User with administrative privileges. Such a user can create and 56 * Indicates the user has restrictions in privileges, in addition to those for normal users.
|
/external/chromium_org/sandbox/win/src/ |
restricted_token.h | 113 // Lists all privileges in the token and add them to the list of privileges 129 // Adds a privilege to the list of privileges to remove in the restricted 183 // The list of privileges to remove in the restricted token.
|
restricted_token.cc | 285 // Get the list of privileges in the token 309 // Build the list of privileges to disable 316 if (token_privileges->Privileges[i].Luid.HighPart == luid.HighPart && 317 token_privileges->Privileges[i].Luid.LowPart == luid.LowPart) { 324 privileges_to_disable_.push_back(token_privileges->Privileges[i].Luid);
|
/external/chromium_org/sql/ |
error_delegate_util.cc | 47 // Presumably either transient or we don't have the privileges to
|
/external/kernel-headers/original/linux/ |
securebits.h | 12 /* When set UID 0 has no special privileges. When unset, we support
|
/external/libcap-ng/libcap-ng-0.7/docs/ |
capng_change_id.3 | 11 This function will change uid and gid to the ones given while retaining the capabilities previously specified in capng_update. It is not necessary and perhaps better if capng_apply has not been called prior to this function so that all necessary privileges are still intact. The caller is required to have CAP_SETPCAP capability still active before calling this function.
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.8 | 26 This prevents the ability for child processes to regain privileges if the uid is 0.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
securebits.h | 12 /* When set UID 0 has no special privileges. When unset, we support
|
/external/chromium/third_party/libjingle/source/talk/base/ |
thread.h | 65 // handle will, on Win32, be opened with only synchronization privileges - 67 // write additional code to adjust the privileges, or call a different 71 // be able to get synchronization privileges, in which case the result
|
/external/chromium_org/chrome/installer/setup/ |
setup_util_unittest.cc | 51 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, 67 // First get the size of the buffer needed for |privileges| below. 72 TOKEN_PRIVILEGES* privileges = local 75 if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) { 85 for (int i = privileges->PrivilegeCount - 1; i >= 0 ; --i) { 86 LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i];
|
/external/chromium_org/chrome/test/pyautolib/ |
chromoting_helper.py | 37 assert os.geteuid() == 0, 'Need superuser privileges' 112 assert os.geteuid() == 0, 'Need superuser privileges' 121 assert os.geteuid() == 0, 'Need superuser privileges'
|
/external/chromium/chrome/browser/ui/cocoa/ |
keystone_promote_postflight.sh | 15 # real user ID (dropping root privileges).
|
/external/chromium_org/chrome/browser/mac/ |
keystone_promote_postflight.sh | 15 # real user ID (dropping root privileges).
|
/external/chromium_org/third_party/mesa/src/bin/ |
installmesa | 17 echo "***** Mesa installation - You may need root privileges to do this *****"
|
/external/compiler-rt/BlocksRuntime/tests/ |
makefile | 51 # <rdar://problem/6456031> ER: option to not require extra privileges (-nosudo or somesuch)
|
/external/mesa3d/bin/ |
installmesa | 17 echo "***** Mesa installation - You may need root privileges to do this *****"
|
/external/openssh/ |
ssh.h | 88 * sshd will change its privileges to this user and its
|
/external/chromium_org/chrome/test/pyautolib/chromeos/ |
suid_actions.py | 8 Needs to be run with superuser privileges, typically using the 42 assert os.geteuid() == 0, 'Needs superuser privileges.'
|
/external/dropbear/debian/ |
implicit | 8 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges' 21 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges'
|
/external/e2fsprogs/util/ |
copy_sparse.c | 3 * (requires root privileges) 57 fprintf(stderr, "No permission to use FIBMAP ioctl; must have root privileges\n");
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_priv.sgml | 29 to be run with root privileges.</para> 40 privileges (usually, root user). It opens a UNIX domain socket for each
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 82 * insufficient privileges 97 * insufficient privileges
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/ |
io.h | 28 permission off for that range. This call requires root privileges. 38 privileges. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
io.h | 28 permission off for that range. This call requires root privileges. 38 privileges. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
io.h | 28 permission off for that range. This call requires root privileges. 38 privileges. */
|