OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:privileges
(Results
51 - 75
of
323
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h
28
permission off for that range. This call requires root
privileges
.
38
privileges
. */
acct.h
90
ASU = 0x02, /* Used super-user
privileges
. */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h
28
permission off for that range. This call requires root
privileges
.
38
privileges
. */
acct.h
90
ASU = 0x02, /* Used super-user
privileges
. */
/external/clang/test/Analysis/
security-syntax-checks.m
52
// <rdar://problem/6337132> CWE-273: Failure to Check Whether
Privileges
Were
67
setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected
privileges
}}
68
setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected
privileges
}}
80
setreuid(2,2); // expected-warning{{The return value from the call to 'setreuid' is not checked. If an error occurs in 'setreuid', the following code may execute with unexpected
privileges
}}
81
setregid(2,2); // expected-warning{{The return value from the call to 'setregid' is not checked. If an error occurs in 'setregid', the following code may execute with unexpected
privileges
}}
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/plat-mac/lib-scriptpackages/Finder/
Finder_items.py
200
"""everyones
privileges
- """
212
"""group
privileges
- """
256
"""owner
privileges
- """
/system/core/adb/
SERVICES.TXT
181
privileges
and thus may not run on all devices. <path> is a full
208
It requires sufficient
privileges
but works as follow:
225
If the adbd daemon doesn't have sufficient
privileges
to open
/external/chromium/chrome/browser/ui/cocoa/
keystone_promote_preflight.sh
18
# real user ID (dropping root
privileges
).
/external/chromium_org/chrome/browser/mac/
keystone_promote_preflight.sh
18
# real user ID (dropping root
privileges
).
/external/chromium_org/chrome/browser/ui/
browser_instant_controller.h
92
//
privileges
for any existing WebContents (that belong to the erstwhile
/external/openssh/
README.privsep
16
chroot(2) to "/var/empty" and change its
privileges
to the "sshd" user
OVERVIEW
111
privileges
are only used to make the connection (from a
112
privileged socket). Any extra
privileges
are dropped before
/external/protobuf/python/
README.txt
65
This step may require superuser
privileges
.
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
acct.h
101
#define ASU 0x02 /* ... used super-user
privileges
*/
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
acct.h
90
ASU = 0x02, /* Used super-user
privileges
. */
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
acct.h
101
#define ASU 0x02 /* ... used super-user
privileges
*/
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
acct.h
101
#define ASU 0x02 /* ... used super-user
privileges
*/
/sdk/find_lock/
find_lock.cpp
189
// Open a process token that lets us adjust
privileges
205
priv.
Privileges
[0].Attributes = SE_PRIVILEGE_ENABLED;
208
&(priv.
Privileges
[0].Luid)); // lpLuid
607
if (gIsDebug) fprintf(stderr, "Warning: adusting
privileges
failed. Continuing anyway.\n");
609
if (gIsDebug) fprintf(stderr, "
Privileges
adjusted.\n"); // DEBUG remove lter
/external/chromium_org/chrome/browser/extensions/
window_open_apitest.cc
422
// the new window has extension
privileges
.
459
// gives the new window extension
privileges
- even though the opening page
460
// does not have extension
privileges
, we break the script connection, so
/external/chromium_org/chrome/installer/setup/
setup_util.cc
458
// Adjust the token's
privileges
to enable |privilege_name|. If this privilege
463
tp.
Privileges
[0].Luid = privilege_luid;
464
tp.
Privileges
[0].Attributes = SE_PRIVILEGE_ENABLED;
/external/smack/src/org/jivesoftware/smackx/packet/
MUCOwner.java
30
* IQ packet that serves for granting and revoking ownership
privileges
, granting
31
* and revoking administrative
privileges
and destroying a room. All these operations
/external/tcpdump/
config.h
133
/* define if should drop
privileges
by default */
136
/* define if should chroot when dropping
privileges
*/
config.h.in
132
/* define if should drop
privileges
by default */
135
/* define if should chroot when dropping
privileges
*/
/bionic/libc/include/sys/
limits.h
172
#define _POSIX_CHOWN_RESTRICTED 1 /* yes, chown requires appropriate
privileges
*/
/development/ndk/platforms/android-3/include/sys/
limits.h
172
#define _POSIX_CHOWN_RESTRICTED 1 /* yes, chown requires appropriate
privileges
*/
Completed in 1319 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>