/external/elfutils/tests/ |
run-addrcfi.sh | 370 privileged reg70 (sr0): undefined 371 privileged reg71 (sr1): undefined 372 privileged reg72 (sr2): undefined 373 privileged reg73 (sr3): undefined 374 privileged reg74 (sr4): undefined 375 privileged reg75 (sr5): undefined 376 privileged reg76 (sr6): undefined 377 privileged reg77 (sr7): undefined 378 privileged reg78 (sr8): undefined 379 privileged reg79 (sr9): undefine [all...] |
/external/libcap/progs/ |
quicktest.sh | 48 # Make a local non-setuid-0 version of capsh and call it privileged 49 cp ./capsh ./privileged && chmod -s ./privileged 56 ./setcap all=ep ./privileged 61 ./setcap cap_setuid,cap_setgid=ep ./privileged 63 echo "Failed to set limited capabilities on privileged file" 88 rm -f privileged 102 # suppress uid=0 privilege and test this privileged 103 pass_capsh --secbits=0x2f --print -- -c "./privileged --user=nobody" 106 fail_capsh --drop=cap_setuid --secbits=0x2f --print -- -c "./privileged --user=nobody [all...] |
/external/chromium-trace/catapult/dashboard/dashboard/models/ |
graph_data.py | 410 def GetRowsForTestInRange(test_key, start_rev, end_rev, privileged=False): 413 if privileged: 422 def GetRowsForTestAroundRev(test_key, rev, num_points, privileged=False): 429 test_key, rev, num_rows_before, num_rows_after, privileged) 433 test_key, rev, num_rows_before, num_rows_after, privileged=False): 437 if privileged: 444 if privileged: 454 test_key, num_points, keys_only=False, privileged=False): 457 if privileged:
|
/system/core/logd/ |
LogBufferElement.h | 83 uint64_t flushTo(SocketClient *writer, LogBuffer *parent, bool privileged);
|
LogTimes.cpp | 128 bool privileged = FlushCommand::hasReadLogs(client); local 154 logbuf.flushTo(client, start, privileged, security, FilterFirstPass, me); 157 start = logbuf.flushTo(client, start, privileged, security, FilterSecondPass, me);
|
LogBuffer.h | 114 bool privileged, bool security,
|
LogBufferElement.cpp | 203 bool privileged) { 208 entry.hdr_size = privileged ?
|
LogBuffer.cpp | 921 bool privileged, bool security, 948 if (!privileged && (element->getUid() != uid)) { [all...] |
/packages/services/Car/tests/android_support_car_api_test/ |
Android.mk | 25 # for system|privileged permission.
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mips/ |
mips32.s | 28 # privileged instructions
|
/packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/ |
CellBroadcastReceiver.java | 51 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 85 // If 'privileged' is false, it means that the intent was delivered to the base 89 if (privileged) { 97 if (privileged) {
|
/external/v8/build/android/ |
adb_gdb | 97 PRIVILEGED= 155 --privileged) 156 PRIVILEGED=true 158 --privileged=*) 159 PRIVILEGED=true 249 --sandboxed or --sandboxed=<num> option) or a privileged (--privileged or 250 --privileged=<num>) service. 313 --privileged Debug first privileged process we find [all...] |
/external/chromium-trace/catapult/dashboard/dashboard/ |
debug_alert.py | 254 graph_data.GetLatestRowsForTest(test.key, num_points, privileged=True))) 273 test.key, revision, num_before, num_after, privileged=True)
|
graph_json.py | 208 parent_test.key, num_points, privileged=True)
|
/external/mesa3d/docs/OLD/ |
MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/i860/ |
system.s | 1 # System and privileged instructions
|
/external/ppp/pppd/ |
pppd.h | 121 #define OPT_PRIV 0x1000 /* privileged option */ 227 extern int privileged; /* We were run by real-uid root */ 475 bool ue_priv; /* from privileged source */ 702 int privileged)); 706 int options_from_list __P((struct wordlist *, int privileged)); [all...] |
main.c | 148 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1) [all...] |
auth.c | 390 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 472 * privgroup - allow members of the group to have privileged access. 488 privileged = 1; [all...] |
options.c | 235 "Take options from a privileged file", OPT_NOPRINT }, 379 privileged_option = privileged; 503 ret = options_from_file(path, 0, 1, privileged); [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
TaskRecord.java | 130 private static final String ATTR_PRIVILEGED = "privileged"; 178 // privileged permissions. 334 int resizeMode, boolean privileged, boolean _realActivitySuspended, 374 mPrivileged = privileged; [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.util_1.0.200.v20100503.jar | |
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.util_1.0.500.v20130404-1337.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.util_1.0.500.v20130404-1337.jar | |