OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:privileged
(Results
51 - 75
of
297
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/system/sepolicy/
isolated_app.te
66
# Restrict socket ioctls. Either 1. disallow
privileged
ioctls, 2. disallow the
shell.te
124
# Make sure strace works for the non-
privileged
shell user
152
# Do not allow
privileged
socket ioctl commands
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/i860/
system.s
1
# System and
privileged
instructions
/external/ppp/pppd/
pppd.8
52
option from a
privileged
source cannot be overridden by a
53
non-
privileged
user.
86
file may contain
privileged
options, such as \fInoauth\fR, even if pppd
100
for this option from a
privileged
source cannot be overridden by a
101
non-
privileged
user.
122
is
privileged
if the \fInodefaultroute\fR option has been specified.
130
modem has already hung up. A value for this option from a
privileged
131
source cannot be overridden by a non-
privileged
user.
151
for this option from a
privileged
source cannot be overridden by a
152
non-
privileged
user
[
all
...]
/cts/hostsidetests/numberblocking/src/com/android/cts/numberblocking/hostside/
NumberBlockingTest.java
107
// Block a number as a
privileged
app that can block numbers.
124
// Ensure that a
privileged
app cannot block numbers when the current user is a
/docs/source.android.com/src/security/
implement.jd
175
using the shared UID of system or another
privileged
service (i.e., phone), it
286
files are processed by a
privileged
process and are world writable, then it
291
<li>Configuration files used by
privileged
processes <strong>should not</strong>
293
<li>Configuration files used by
privileged
processes <strong>must not</strong> be
298
<p>Any code used by
privileged
OEM processes must be in /vendor or /system; these
300
highly-
privileged
apps installed on the phone should also be in these
302
attacker to control the code that a
privileged
process executes.</p>
305
<li>All native code used by
privileged
OEM processes <strong>must be</strong> in /vendor or
/external/mksh/src/
sh_flags.opt
134
/* -p
privileged
shell (suid) */
136
FN("
privileged
", FPRIVILEGED, OF_ANY
sh_flags.gen
71
FN("
privileged
", FPRIVILEGED, OF_ANY, 'p')
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml
31
<para>If enabled,
privileged
operations are done in the wpa_priv process
45
non-
privileged
user account created just for this purpose to limit access
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/asm-generic/
siginfo.h
153
#define ILL_PRVOPC (__SI_FAULT|5) /*
privileged
opcode */
154
#define ILL_PRVREG (__SI_FAULT|6) /*
privileged
register */
/system/core/logd/
LogBufferElement.cpp
203
bool
privileged
) {
208
entry.hdr_size =
privileged
?
/external/chromium-trace/catapult/dashboard/dashboard/
graph_json.py
255
def _GetRowsForTestInRange(test_key, start_rev, end_rev,
privileged
=False):
257
if
privileged
:
266
def _GetRowsForTestAroundRev(test_key, rev, num_points,
privileged
=False):
271
if
privileged
:
279
if
privileged
:
290
def _GetLatestRowsForTest(test_key, num_points,
privileged
=False):
292
if
privileged
:
/packages/services/Telephony/src/com/android/phone/
CarrierConfigLoader.java
77
* CarrierConfigLoader binds to
privileged
carrier apps to fetch carrier config overlays.
91
// Carrier configs from
privileged
carrier config app, indexed by phoneID.
621
* the default app and a
privileged
carrier app, if present. This will not bind to an app if we
639
// SKIP checking run-time READ_PHONE_STATE since using
PRIVILEGED
665
// TODO: Check that the calling packages is
privileged
for subId specifically.
668
// Requires the calling app to be either a carrier
privileged
app or
669
// system
privileged
app with MODIFY_PHONE_STATE permission.
[
all
...]
/frameworks/base/telephony/java/com/android/internal/telephony/
CarrierAppUtils.java
57
* So, for each such app, we either disable until used IFF the app is not carrier
privileged
AND
59
* the app is carrier
privileged
and in either the default state or DISABLED_UNTIL_USED.
70
*
privileged
apps may have changed.
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
PhoneSubInfoController.java
278
* Make sure caller has either read
privileged
phone permission or carrier privilege.
288
log("No read
privileged
phone permission, check carrier privilege next.");
426
// SKIP checking run-time OP_READ_PHONE_STATE since self or using
PRIVILEGED
/cts/tests/tests/os/src/android/os/cts/
RequiredComponentsTest.java
59
fail("The installer must be a
privileged
app");
/cts/tests/tests/telecom2/src/android/telecom/cts/
DefaultDialerOperationsNoPermissionsTest.java
25
* Verifies that certain
privileged
operations can only be performed by the default dialer.
/docs/source.android.com/src/security/enhancements/
enhancements43.jd
41
the shell from acquiring
privileged
capabilities.</li>
/external/libcap/doc/
capability.notes
44
type. Being able to bind to any
privileged
port is still a formidable
/external/tlsdate/src/events/
sigchld.c
105
fatal ("[event:%s] cannot terminate STOPPED
privileged
child",
/external/valgrind/include/vki/
vki-xen-tmem.h
49
/*
Privileged
commands to HYPERVISOR_tmem_op() */
/frameworks/av/camera/aidl/android/hardware/
ICameraService.aidl
67
* Default UID/PID values for non-
privileged
callers of
/frameworks/base/core/java/android/webkit/
PermissionRequest.java
58
* messages are
privileged
operations, e.g. modifying sound libraries and sampling data, or
/frameworks/base/services/backup/java/com/android/server/backup/
KeyValueBackupJob.java
49
// regardless.
Privileged
callers can always trigger an immediate pass via
/frameworks/base/services/core/java/com/android/server/pm/
ProtectedPackages.java
94
* <p>A protected package means that, apart from the package owner, no system or
privileged
apps
Completed in 1450 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>