HomeSort by relevance Sort by last modified time
    Searched full:privileged (Results 1 - 25 of 209) sorted by null

1 2 3 4 5 6 7 8 9

  /external/elfutils/src/tests/
run-addrcfi.sh 369 privileged reg70 (sr0): undefined
370 privileged reg71 (sr1): undefined
371 privileged reg72 (sr2): undefined
372 privileged reg73 (sr3): undefined
373 privileged reg74 (sr4): undefined
374 privileged reg75 (sr5): undefined
375 privileged reg76 (sr6): undefined
376 privileged reg77 (sr7): undefined
377 privileged reg78 (sr8): undefined
378 privileged reg79 (sr9): undefine
    [all...]
  /external/valgrind/docs/internals/
s390-opcodes.csv 49 csch,"clear subchannel",N/A,"privileged instruction"
51 csp,"compare and swap and purge",N/A,"privileged instruction"
60 diag,diagnose,N/A,"privileged instruction"
67 epar,"extract primary ASN",N/A,"privileged instruction"
68 epair,"extract primary ASN and instance",N/A,"privileged instruction"
70 esar,"extract secondary ASN",N/A,"privileged instruction",
71 esair,"extract secondary ASN and instance,N/A,"privileged instruction",
76 hsch,"halt subchannel",N/A,"privileged instruction"
77 iac,"insert address space control",N/A,"privileged instruction"
80 ipk,"insert PSW key",N/A,"privileged instruction
    [all...]
  /external/lldb/test/functionalities/connect_remote/
EchoServer.py 11 PORT = 12345 # Arbitrary non-privileged port
  /external/openssh/contrib/cygwin/
README 29 --user -u <account> privileged user for service, default 'cyg_server'.
30 --pwd -w <passwd> Use "pwd" as password for privileged user.
31 --privileged On Windows XP, require privileged user
  /external/openssh/
uidswap.c 56 static int privileged = 0; variable
77 privileged = 0;
83 privileged = 0;
88 privileged = 1;
125 /* Propagate the privileged gid to all of our gids. */
128 /* Propagate the privileged uid to all of our uids. */
166 * Restores to the original (privileged) uid.
171 /* it's a no-op unless privileged */
172 if (!privileged) {
181 /* Set the effective uid back to the saved privileged uid. *
    [all...]
README.privsep 3 privileged monitor process. Its purpose is to prevent privilege
36 --with-privsep-user=user Specify non-privileged user for privilege separation
60 process 6917 is the privileged monitor process, 6919 is the user owned
gss-serv.c 94 /* Privileged (called from ssh_gssapi_server_ctx) */
123 /* Privileged */
165 /* Privileged */
265 /* Privileged (called from accept_secure_ctx) */
348 /* Privileged */
376 /* Privileged */
  /frameworks/base/core/java/android/app/
IUiAutomationConnection.aidl 27 * This interface contains privileged operations a shell program can perform
30 * not. Running privileged operations by the shell user on behalf of an
  /packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/
CellBroadcastReceiver.java 59 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
97 // If 'privileged' is false, it means that the intent was delivered to the base
101 if (privileged) {
109 if (privileged) {
123 if (privileged) {
129 // Send broadcast twice, once for apps that have PRIVILEGED permission and once
  /external/openssh/openbsd-compat/
bsd-statvfs.h 54 /* non-privileged process. */
58 /* non-privileged process. */
  /frameworks/base/core/res/
AndroidManifest.xml     [all...]
  /external/skia/src/gpu/
GrRenderTargetPriv.h 14 This class is purely a privileged window into GrRenderTarget. It should never have additional
GrSurfacePriv.h 14 This class is purely a privileged window into GrSurface. It should never have additional data
GrTexturePriv.h 14 This class is purely a privileged window into GrTexture. It should never have additional data
  /frameworks/base/core/java/android/net/
INetworkScoreCache.aidl 28 * <p>A proper implementation should throw SecurityException whenever the caller is not privileged.
  /external/mksh/src/
sh_flags.opt 115 /* -p privileged shell (suid) */
117 FN("privileged", FPRIVILEGED, OF_ANY
  /packages/services/Telecomm/src/com/android/server/telecom/components/
UserCallActivity.java 72 // If we were launched directly from the CallActivity, not one of its more privileged
73 // aliases, then make sure that only the non-privileged actions are allowed.
  /packages/services/Telecomm/testapps/src/com/android/server/telecom/testapps/
TestDialerActivity.java 122 Toast.makeText(this, "Privileged dialer operation failed", Toast.LENGTH_SHORT).show();
125 Toast.makeText(this, "Privileged dialer operation succeeded", Toast.LENGTH_SHORT).show();
  /external/sepolicy/
system_app.te 3 # com.android.settings. These are not as privileged as the system
  /external/valgrind/include/vki/
vki-xen-tmem.h 22 /* Privileged commands to HYPERVISOR_tmem_op() */
  /system/netd/include/
Permission.h 30 // PERMISSION_NETWORK is used for privileged networks and apps that can manipulate or access them,
  /system/netd/server/
VirtualNetwork.h 26 // Only a few privileged UIDs may skip the VPN and go directly to the underlying physical network.
  /system/core/logd/
LogTimes.cpp 125 bool privileged = FlushCommand::hasReadLogs(client); local
137 logbuf.flushTo(client, start, privileged, FilterFirstPass, me);
140 start = logbuf.flushTo(client, start, privileged, FilterSecondPass, me);
  /frameworks/base/core/java/android/content/pm/
PermissionInfo.java 59 * to the <code>privileged</code> value of
66 * is now very confusing because it only applies to privileged apps, not all
207 protLevel += "|privileged";
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
CarrierAppUtils.java 51 * So, for each such app, we either disable until used IFF the app is not carrier privileged AND
53 * the app is carrier privileged and in either the default state or DISABLED_UNTIL_USED.
59 * privileged apps may have changed.

Completed in 6828 milliseconds

1 2 3 4 5 6 7 8 9