/external/elfutils/src/tests/ |
run-addrcfi.sh | 369 privileged reg70 (sr0): undefined 370 privileged reg71 (sr1): undefined 371 privileged reg72 (sr2): undefined 372 privileged reg73 (sr3): undefined 373 privileged reg74 (sr4): undefined 374 privileged reg75 (sr5): undefined 375 privileged reg76 (sr6): undefined 376 privileged reg77 (sr7): undefined 377 privileged reg78 (sr8): undefined 378 privileged reg79 (sr9): undefine [all...] |
/external/valgrind/docs/internals/ |
s390-opcodes.csv | 49 csch,"clear subchannel",N/A,"privileged instruction" 51 csp,"compare and swap and purge",N/A,"privileged instruction" 60 diag,diagnose,N/A,"privileged instruction" 67 epar,"extract primary ASN",N/A,"privileged instruction" 68 epair,"extract primary ASN and instance",N/A,"privileged instruction" 70 esar,"extract secondary ASN",N/A,"privileged instruction", 71 esair,"extract secondary ASN and instance,N/A,"privileged instruction", 76 hsch,"halt subchannel",N/A,"privileged instruction" 77 iac,"insert address space control",N/A,"privileged instruction" 80 ipk,"insert PSW key",N/A,"privileged instruction [all...] |
/external/lldb/test/functionalities/connect_remote/ |
EchoServer.py | 11 PORT = 12345 # Arbitrary non-privileged port
|
/external/openssh/contrib/cygwin/ |
README | 29 --user -u <account> privileged user for service, default 'cyg_server'. 30 --pwd -w <passwd> Use "pwd" as password for privileged user. 31 --privileged On Windows XP, require privileged user
|
/external/openssh/ |
uidswap.c | 56 static int privileged = 0; variable 77 privileged = 0; 83 privileged = 0; 88 privileged = 1; 125 /* Propagate the privileged gid to all of our gids. */ 128 /* Propagate the privileged uid to all of our uids. */ 166 * Restores to the original (privileged) uid. 171 /* it's a no-op unless privileged */ 172 if (!privileged) { 181 /* Set the effective uid back to the saved privileged uid. * [all...] |
README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 36 --with-privsep-user=user Specify non-privileged user for privilege separation 60 process 6917 is the privileged monitor process, 6919 is the user owned
|
gss-serv.c | 94 /* Privileged (called from ssh_gssapi_server_ctx) */ 123 /* Privileged */ 165 /* Privileged */ 265 /* Privileged (called from accept_secure_ctx) */ 348 /* Privileged */ 376 /* Privileged */
|
/frameworks/base/core/java/android/app/ |
IUiAutomationConnection.aidl | 27 * This interface contains privileged operations a shell program can perform 30 * not. Running privileged operations by the shell user on behalf of an
|
/packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/ |
CellBroadcastReceiver.java | 59 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 97 // If 'privileged' is false, it means that the intent was delivered to the base 101 if (privileged) { 109 if (privileged) { 123 if (privileged) { 129 // Send broadcast twice, once for apps that have PRIVILEGED permission and once
|
/external/openssh/openbsd-compat/ |
bsd-statvfs.h | 54 /* non-privileged process. */ 58 /* non-privileged process. */
|
/frameworks/base/core/res/ |
AndroidManifest.xml | [all...] |
/external/skia/src/gpu/ |
GrRenderTargetPriv.h | 14 This class is purely a privileged window into GrRenderTarget. It should never have additional
|
GrSurfacePriv.h | 14 This class is purely a privileged window into GrSurface. It should never have additional data
|
GrTexturePriv.h | 14 This class is purely a privileged window into GrTexture. It should never have additional data
|
/frameworks/base/core/java/android/net/ |
INetworkScoreCache.aidl | 28 * <p>A proper implementation should throw SecurityException whenever the caller is not privileged.
|
/external/mksh/src/ |
sh_flags.opt | 115 /* -p privileged shell (suid) */ 117 FN("privileged", FPRIVILEGED, OF_ANY
|
/packages/services/Telecomm/src/com/android/server/telecom/components/ |
UserCallActivity.java | 72 // If we were launched directly from the CallActivity, not one of its more privileged 73 // aliases, then make sure that only the non-privileged actions are allowed.
|
/packages/services/Telecomm/testapps/src/com/android/server/telecom/testapps/ |
TestDialerActivity.java | 122 Toast.makeText(this, "Privileged dialer operation failed", Toast.LENGTH_SHORT).show(); 125 Toast.makeText(this, "Privileged dialer operation succeeded", Toast.LENGTH_SHORT).show();
|
/external/sepolicy/ |
system_app.te | 3 # com.android.settings. These are not as privileged as the system
|
/external/valgrind/include/vki/ |
vki-xen-tmem.h | 22 /* Privileged commands to HYPERVISOR_tmem_op() */
|
/system/netd/include/ |
Permission.h | 30 // PERMISSION_NETWORK is used for privileged networks and apps that can manipulate or access them,
|
/system/netd/server/ |
VirtualNetwork.h | 26 // Only a few privileged UIDs may skip the VPN and go directly to the underlying physical network.
|
/system/core/logd/ |
LogTimes.cpp | 125 bool privileged = FlushCommand::hasReadLogs(client); local 137 logbuf.flushTo(client, start, privileged, FilterFirstPass, me); 140 start = logbuf.flushTo(client, start, privileged, FilterSecondPass, me);
|
/frameworks/base/core/java/android/content/pm/ |
PermissionInfo.java | 59 * to the <code>privileged</code> value of 66 * is now very confusing because it only applies to privileged apps, not all 207 protLevel += "|privileged";
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
CarrierAppUtils.java | 51 * So, for each such app, we either disable until used IFF the app is not carrier privileged AND 53 * the app is carrier privileged and in either the default state or DISABLED_UNTIL_USED. 59 * privileged apps may have changed.
|