Home
last modified time | relevance | path

Searched refs:CAP_NET_ADMIN (Results 1 – 24 of 24) sorted by relevance

/external/libcap/doc/values/
D13.txt5 (also permitted via CAP_NET_ADMIN)
D39.txt32 - CAP_NET_ADMIN is required to load networking
/external/bcc/tools/
Dcapable_example.txt9 22:11:23 114 2676 snmpd 12 CAP_NET_ADMIN 1
41 CAP_NET_ADMIN, run checking CAP_SYS_RESOURCES, then some short-lived processes
/external/strace/
Dcaps0.h13 CAP_NET_ADMIN,
/external/strace/xlat/
Dcap_mask0.in14 1<<CAP_NET_ADMIN
Dcap.in14 CAP_NET_ADMIN
Dcap_mask0.h29 XLAT_PAIR(1ULL<<CAP_NET_ADMIN, "1<<CAP_NET_ADMIN"),
Dcap.h29 XLAT(CAP_NET_ADMIN),
/external/iputils/
Dping_common.h267 static inline int enable_capability_admin(void) { return modify_capability(CAP_NET_ADMIN, CAP_SET)… in enable_capability_admin()
268 static inline int disable_capability_admin(void) { return modify_capability(CAP_NET_ADMIN, CAP_CLEA… in disable_capability_admin()
Dping_common.c71 static cap_value_t cap_admin = CAP_NET_ADMIN;
94 cap_get_flag(cap_cur_p, CAP_NET_ADMIN, CAP_PERMITTED, &cap_ok); in limit_capabilities()
/external/libcap-ng/libcap-ng-0.7/bindings/python/
Dcapng.py82 CAP_NET_ADMIN = _capng.CAP_NET_ADMIN variable
/external/libcap-ng/libcap-ng-0.7/src/
Dcaptab.h35 _S(CAP_NET_ADMIN, "net_admin" )
/external/libcap/libcap/include/uapi/linux/
Dcapability.h203 #define CAP_NET_ADMIN 12 macro
/external/kernel-headers/original/uapi/linux/
Dcapability.h203 #define CAP_NET_ADMIN 12 macro
/external/android-clat/
Dmain.c133 set_capability(1 << CAP_NET_ADMIN); in main()
Dclatd.c182 set_capability((1 << CAP_NET_ADMIN) | in drop_root_but_keep_caps()
/external/rust/crates/nix/test/sys/
Dtest_sockopt.rs11 require_capability!(CAP_NET_ADMIN); in is_so_mark_functional()
/external/iputils/doc/
Drarpd.sgml129 to listen and send RARP and ARP packets. It also needs <constant/CAP_NET_ADMIN/
Drdisc.sgml197 and send ICMP messages and capability <constant/CAP_NET_ADMIN/
/external/crosvm/
DREADME.md67 * Some other features (networking) require `CAP_NET_ADMIN` so those usually
215 …kernel with TUN/TAP support (check for `/dev/net/tun`) and running with `CAP_NET_ADMIN` privileges.
/external/dnsmasq/src/
Ddnsmasq.c369 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW) | (1 << CAP_SETUID); in main()
393 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in main()
/external/wpa_supplicant_8/src/utils/
Dos_unix.c391 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in os_program_init()
/external/wpa_supplicant_8/wpa_supplicant/
DREADME988 minimum set of capabilities needed for the operations is CAP_NET_ADMIN
/external/ltp/doc/
Dtest-writing-guidelines.txt1787 CAP_NET_ADMIN. During setup we should be able to do it, then during run it