/external/libcap-ng/libcap-ng-0.7/src/ |
D | cap-ng.c | 348 static void v1_update(capng_act_t action, unsigned int capability, __u32 *data) in v1_update() argument 351 *data |= MASK(capability); in v1_update() 353 *data &= ~(MASK(capability)); in v1_update() 356 static void update_effective(capng_act_t action, unsigned int capability, in update_effective() argument 360 m.data.v3[idx].effective |= MASK(capability); in update_effective() 362 m.data.v3[idx].effective &= ~(MASK(capability)); in update_effective() 365 static void update_permitted(capng_act_t action, unsigned int capability, in update_permitted() argument 369 m.data.v3[idx].permitted |= MASK(capability); in update_permitted() 371 m.data.v3[idx].permitted &= ~(MASK(capability)); in update_permitted() 374 static void update_inheritable(capng_act_t action, unsigned int capability, in update_inheritable() argument [all …]
|
D | cap-ng.h | 55 int capng_update(capng_act_t action, capng_type_t type,unsigned int capability); 57 unsigned int capability, ...); 70 int capng_have_capability(capng_type_t which, unsigned int capability); 78 const char *capng_capability_to_name(unsigned int capability);
|
D | lookup_table.c | 107 const char *capng_capability_to_name(unsigned int capability) in capng_capability_to_name() argument 109 if (!cap_valid(capability)) in capng_capability_to_name() 113 CAP_NG_CAPABILITY_NAMES, capability); in capng_capability_to_name()
|
/external/clang/test/Sema/ |
D | attr-capabilities.c | 3 typedef int __attribute__((capability("role"))) ThreadRole; 8 struct __attribute__((capability("wrong"))) IncorrectName {}; // expected-warning {{invalid capabil… 10 int Test1 __attribute__((capability("test1"))); // expected-error {{'capability' attribute only ap… 16 struct __attribute__((capability(12))) Test3 {}; // expected-error {{'capability' attribute require… 19 struct __attribute__((capability)) Test5 {}; // expected-error {{'capability' attribute takes one a…
|
/external/clang/docs/ |
D | ThreadSafetyAnalysis.rst | 103 read/write the data) unless it has the *capability* to do so. 106 methods to acquire and release the capability. The name of the object serves 107 to identify the capability. The most common example is a mutex. For example, 109 to acquire the capability to access data that is protected by ``mu``. Similarly, 110 calling ``mu.Unlock()`` releases that capability. 112 A thread may hold a capability either *exclusively* or *shared*. An exclusive 113 capability can be held by only one thread at a time, while a shared capability 121 security keys, a thread cannot make copy of a capability, nor can it destroy 122 one. A thread can only release a capability to another thread, or acquire one 130 by calculating an approximation of that set, called the *capability [all …]
|
/external/sepolicy/ |
D | perfprofd.te | 23 allow perfprofd self:capability { dac_override }; 37 allow perfprofd self:capability sys_admin; 43 allow perfprofd self:capability { sys_resource sys_ptrace }; 54 allow perfprofd self:capability ipc_lock;
|
D | lmkd.te | 7 allow lmkd self:capability { dac_override sys_resource kill }; 13 allow lmkd self:capability ipc_lock; 32 allow lmkd self:capability sys_nice;
|
D | runas.te | 16 dontaudit runas self:capability dac_override; 20 allow runas self:capability { setuid setgid }; 34 neverallow runas self:capability ~{ setuid setgid };
|
D | init.te | 21 allow init self:capability sys_resource; 42 allow init self:capability sys_admin; 67 allow init self:capability dac_override; 70 allow init self:capability sys_time; 72 allow init self:capability { sys_rawio mknod }; 98 allow init self:capability { chown fowner fsetid }; 144 allow init self:capability net_admin; 150 allow init self:capability sys_boot; 172 allow init self:capability kill; 190 allow init self:capability { setuid setgid }; [all …]
|
D | clatd.te | 18 allow clatd self:capability { net_admin net_raw setuid setgid }; 24 # so we permit any requests we see from clatd asking for this capability. 27 allow clatd self:capability ipc_lock;
|
D | netd.te | 8 allow netd self:capability { net_admin net_raw kill }; 13 # bit was even set. We do not appear to truly need this capability 15 dontaudit netd self:capability fsetid; 44 allow netd self:capability { dac_override chown fowner };
|
D | zygote.te | 8 allow zygote self:capability { dac_override setgid setuid fowner chown }; 10 allow zygote self:capability setpcap; 39 allow zygote self:capability sys_admin; 54 dontaudit zygote self:capability fsetid; # TODO: deprecated in M
|
D | dumpstate.te | 11 allow dumpstate self:capability { setuid setgid sys_resource }; 17 allow dumpstate self:capability kill; 26 allow dumpstate self:capability { dac_override chown fowner fsetid }; 74 allow dumpstate self:capability sys_ptrace;
|
D | uncrypt.te | 7 allow uncrypt self:capability dac_override; 28 allow uncrypt self:capability sys_rawio;
|
D | dnsmasq.te | 8 allow dnsmasq self:capability dac_override; 10 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
|
D | healthd.te | 8 allow healthd self:capability { net_admin sys_tty_config }; 37 allow healthd self:capability sys_boot;
|
D | kernel.te | 4 allow kernel self:capability sys_nice; 25 allow kernel self:capability sys_resource; 32 allow kernel self:capability sys_boot;
|
D | vold.te | 67 allow vold self:capability { net_admin dac_override mknod sys_admin chown fowner fsetid }; 79 allow vold self:capability { sys_ptrace kill }; 160 allow vold self:capability sys_nice; 163 allow vold self:capability sys_chroot;
|
D | bluetooth.te | 30 allow bluetooth self:capability net_admin; 72 neverallow bluetooth self:capability ~net_admin;
|
D | mtp.te | 10 allow mtp self:capability net_raw;
|
D | tee.te | 10 allow tee self:capability { dac_override };
|
D | ppp.te | 12 allow ppp self:capability net_admin;
|
/external/selinux/sepolgen/tests/ |
D | audit.txt | 1 …} for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 3 …d=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 4 …d=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 6 …d=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 7 …d=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 9 …} for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 10 …} for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 12 …d=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 13 …d=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… 15 …d=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r… [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 32 msg->capability = data; in p2p_parse_attribute() 780 if (msg.capability) { in p2p_attr_text() 784 msg.capability[0], msg.capability[1]); in p2p_attr_text() 856 if (!msg.capability) in p2p_get_group_capab() 859 return msg.capability[1]; in p2p_get_group_capab()
|
/external/kernel-headers/original/uapi/linux/ |
D | videodev2.h | 768 __u32 capability; member 821 __u32 capability; /* Supported modes */ member 834 __u32 capability; /* Supported modes */ member 1399 __u32 capability; member 1412 __u32 capability; member 1466 __u32 capability; member 1511 __u32 capability; member 1526 __u32 capability; member
|