HomeSort by relevance Sort by last modified time
    Searched full:privileged (Results 51 - 75 of 297) sorted by null

1 23 4 5 6 7 8 91011>>

  /system/sepolicy/
isolated_app.te 66 # Restrict socket ioctls. Either 1. disallow privileged ioctls, 2. disallow the
shell.te 124 # Make sure strace works for the non-privileged shell user
152 # Do not allow privileged socket ioctl commands
  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/i860/
system.s 1 # System and privileged instructions
  /external/ppp/pppd/
pppd.8 52 option from a privileged source cannot be overridden by a
53 non-privileged user.
86 file may contain privileged options, such as \fInoauth\fR, even if pppd
100 for this option from a privileged source cannot be overridden by a
101 non-privileged user.
122 is privileged if the \fInodefaultroute\fR option has been specified.
130 modem has already hung up. A value for this option from a privileged
131 source cannot be overridden by a non-privileged user.
151 for this option from a privileged source cannot be overridden by a
152 non-privileged user
    [all...]
  /cts/hostsidetests/numberblocking/src/com/android/cts/numberblocking/hostside/
NumberBlockingTest.java 107 // Block a number as a privileged app that can block numbers.
124 // Ensure that a privileged app cannot block numbers when the current user is a
  /docs/source.android.com/src/security/
implement.jd 175 using the shared UID of system or another privileged service (i.e., phone), it
286 files are processed by a privileged process and are world writable, then it
291 <li>Configuration files used by privileged processes <strong>should not</strong>
293 <li>Configuration files used by privileged processes <strong>must not</strong> be
298 <p>Any code used by privileged OEM processes must be in /vendor or /system; these
300 highly-privileged apps installed on the phone should also be in these
302 attacker to control the code that a privileged process executes.</p>
305 <li>All native code used by privileged OEM processes <strong>must be</strong> in /vendor or
  /external/mksh/src/
sh_flags.opt 134 /* -p privileged shell (suid) */
136 FN("privileged", FPRIVILEGED, OF_ANY
sh_flags.gen 71 FN("privileged", FPRIVILEGED, OF_ANY, 'p')
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 31 <para>If enabled, privileged operations are done in the wpa_priv process
45 non-privileged user account created just for this purpose to limit access
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/asm-generic/
siginfo.h 153 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */
154 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
  /system/core/logd/
LogBufferElement.cpp 203 bool privileged) {
208 entry.hdr_size = privileged ?
  /external/chromium-trace/catapult/dashboard/dashboard/
graph_json.py 255 def _GetRowsForTestInRange(test_key, start_rev, end_rev, privileged=False):
257 if privileged:
266 def _GetRowsForTestAroundRev(test_key, rev, num_points, privileged=False):
271 if privileged:
279 if privileged:
290 def _GetLatestRowsForTest(test_key, num_points, privileged=False):
292 if privileged:
  /packages/services/Telephony/src/com/android/phone/
CarrierConfigLoader.java 77 * CarrierConfigLoader binds to privileged carrier apps to fetch carrier config overlays.
91 // Carrier configs from privileged carrier config app, indexed by phoneID.
621 * the default app and a privileged carrier app, if present. This will not bind to an app if we
639 // SKIP checking run-time READ_PHONE_STATE since using PRIVILEGED
665 // TODO: Check that the calling packages is privileged for subId specifically.
668 // Requires the calling app to be either a carrier privileged app or
669 // system privileged app with MODIFY_PHONE_STATE permission.
    [all...]
  /frameworks/base/telephony/java/com/android/internal/telephony/
CarrierAppUtils.java 57 * So, for each such app, we either disable until used IFF the app is not carrier privileged AND
59 * the app is carrier privileged and in either the default state or DISABLED_UNTIL_USED.
70 * privileged apps may have changed.
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
PhoneSubInfoController.java 278 * Make sure caller has either read privileged phone permission or carrier privilege.
288 log("No read privileged phone permission, check carrier privilege next.");
426 // SKIP checking run-time OP_READ_PHONE_STATE since self or using PRIVILEGED
  /cts/tests/tests/os/src/android/os/cts/
RequiredComponentsTest.java 59 fail("The installer must be a privileged app");
  /cts/tests/tests/telecom2/src/android/telecom/cts/
DefaultDialerOperationsNoPermissionsTest.java 25 * Verifies that certain privileged operations can only be performed by the default dialer.
  /docs/source.android.com/src/security/enhancements/
enhancements43.jd 41 the shell from acquiring privileged capabilities.</li>
  /external/libcap/doc/
capability.notes 44 type. Being able to bind to any privileged port is still a formidable
  /external/tlsdate/src/events/
sigchld.c 105 fatal ("[event:%s] cannot terminate STOPPED privileged child",
  /external/valgrind/include/vki/
vki-xen-tmem.h 49 /* Privileged commands to HYPERVISOR_tmem_op() */
  /frameworks/av/camera/aidl/android/hardware/
ICameraService.aidl 67 * Default UID/PID values for non-privileged callers of
  /frameworks/base/core/java/android/webkit/
PermissionRequest.java 58 * messages are privileged operations, e.g. modifying sound libraries and sampling data, or
  /frameworks/base/services/backup/java/com/android/server/backup/
KeyValueBackupJob.java 49 // regardless. Privileged callers can always trigger an immediate pass via
  /frameworks/base/services/core/java/com/android/server/pm/
ProtectedPackages.java 94 * <p>A protected package means that, apart from the package owner, no system or privileged apps

Completed in 1450 milliseconds

1 23 4 5 6 7 8 91011>>