Home
last modified time | relevance | path

Searched refs:capability (Results 1 – 25 of 256) sorted by relevance

1234567891011

/system/sepolicy/prebuilts/api/28.0/private/
Dbug_map1 cppreopts cppreopts capability 79414024
29 postinstall postinstall capability 77958490
30 postinstall_dexopt postinstall_dexopt capability 77958490
36 storaged storaged capability 77634061
44 usbd usbd capability 72472544
/system/bt/packet/avrcp/
Dcapabilities_packet.h31 Capability capability);
40 GetCapabilitiesRequestBuilder(Capability capability) in GetCapabilitiesRequestBuilder() argument
43 capability_(capability){}; in GetCapabilitiesRequestBuilder()
99 GetCapabilitiesResponseBuilder(Capability capability) in GetCapabilitiesResponseBuilder() argument
102 capability_(capability){}; in GetCapabilitiesResponseBuilder()
/system/sepolicy/prebuilts/api/26.0/public/
Dlmkd.te5 allow lmkd self:capability { dac_override sys_resource kill };
11 allow lmkd self:capability ipc_lock;
31 allow lmkd self:capability sys_nice;
Drunas.te16 dontaudit runas self:capability dac_override;
20 allow runas self:capability { setuid setgid };
36 neverallow runas self:capability ~{ setuid setgid };
Dperfprofd.te23 allow perfprofd self:capability { dac_override };
37 allow perfprofd self:capability sys_admin;
43 allow perfprofd self:capability { sys_resource sys_ptrace };
57 allow perfprofd self:capability ipc_lock;
Dclatd.te20 allow clatd self:capability { net_admin net_raw setuid setgid };
26 # so we permit any requests we see from clatd asking for this capability.
29 allow clatd self:capability ipc_lock;
Dhal_bluetooth.te11 allow hal_bluetooth self:capability net_admin;
30 allow hal_bluetooth self:capability sys_nice;
Ddnsmasq.te9 allow dnsmasq self:capability dac_override;
11 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
Duncrypt.te5 allow uncrypt self:capability dac_override;
31 allow uncrypt self:capability sys_rawio;
Dnetd.te12 allow netd self:capability { net_admin net_raw kill };
17 # bit was even set. We do not appear to truly need this capability
19 dontaudit netd self:capability fsetid;
51 allow netd self:capability { dac_override chown };
56 allow netd self:capability fowner;
Dinit.te38 allow init self:capability sys_resource;
59 allow init self:capability sys_admin;
89 allow init self:capability dac_override;
92 allow init self:capability sys_time;
94 allow init self:capability { sys_rawio mknod };
121 allow init self:capability { chown fowner fsetid };
260 allow init self:capability net_admin;
269 allow init self:capability sys_boot;
282 allow init self:capability kill;
299 # Set UID, GID, and adjust capability bounding set for services.
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dlmkd.te5 allow lmkd self:capability { dac_override sys_resource kill };
11 allow lmkd self:capability ipc_lock;
34 allow lmkd self:capability sys_nice;
Drunas.te17 dontaudit runas self:capability dac_override;
21 allow runas self:capability { setuid setgid };
37 neverallow runas self:capability ~{ setuid setgid };
Dperfprofd.te23 allow perfprofd self:capability { dac_override };
37 allow perfprofd self:capability sys_admin;
43 allow perfprofd self:capability { sys_resource sys_ptrace };
57 allow perfprofd self:capability ipc_lock;
Dclatd.te20 allow clatd self:capability { net_admin net_raw setuid setgid };
26 # so we permit any requests we see from clatd asking for this capability.
29 allow clatd self:capability ipc_lock;
Dhal_bluetooth.te11 allow hal_bluetooth self:capability net_admin;
30 allow hal_bluetooth self:capability sys_nice;
Ddnsmasq.te9 allow dnsmasq self:capability dac_override;
11 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
Duncrypt.te5 allow uncrypt self:capability dac_override;
32 allow uncrypt self:capability sys_rawio;
Dinit.te42 allow init self:capability sys_resource;
63 allow init self:capability sys_admin;
94 allow init self:capability dac_override;
97 allow init self:capability sys_time;
99 allow init self:capability { sys_rawio mknod };
126 allow init self:capability { chown fowner fsetid };
265 allow init self:capability net_admin;
274 allow init self:capability sys_boot;
287 allow init self:capability kill;
304 # Set UID, GID, and adjust capability bounding set for services.
[all …]
/system/connectivity/wificond/scanning/
Dscan_result.cpp50 capability(capability_), in NativeScanResult()
65 RETURN_IF_FAILED(parcel->writeUint32(capability)); in writeToParcel()
95 capability = static_cast<uint16_t>(parcel->readUint32()); in readFromParcel()
128 LOG(INFO) << "CAPABILITY: " << capability; in DebugLog()
Dscan_result.h45 uint16_t capability,
84 uint16_t capability; variable
/system/sepolicy/prebuilts/api/26.0/private/
Dbluetooth.te26 allow bluetooth self:capability net_admin;
31 allow bluetooth self:capability { net_admin net_raw net_bind_service };
61 allow bluetooth self:capability sys_nice;
76 neverallow bluetooth self:capability ~{ net_admin net_raw net_bind_service sys_nice};
Dnetutils_wrapper.te6 allow netutils_wrapper self:capability net_raw;
12 allow netutils_wrapper self:capability net_admin;
/system/sepolicy/prebuilts/api/27.0/private/
Dbluetooth.te25 allow bluetooth self:capability net_admin;
30 allow bluetooth self:capability { net_admin net_raw net_bind_service };
60 allow bluetooth self:capability sys_nice;
75 neverallow bluetooth self:capability ~{ net_admin net_raw net_bind_service sys_nice};
Dnetutils_wrapper.te6 allow netutils_wrapper self:capability net_raw;
12 allow netutils_wrapper self:capability net_admin;

1234567891011