Home
last modified time | relevance | path

Searched refs:capability (Results 1 – 25 of 233) sorted by relevance

12345678910

/external/libcap-ng/libcap-ng-0.7/src/
Dcap-ng.c348 static void v1_update(capng_act_t action, unsigned int capability, __u32 *data) in v1_update() argument
351 *data |= MASK(capability); in v1_update()
353 *data &= ~(MASK(capability)); in v1_update()
356 static void update_effective(capng_act_t action, unsigned int capability, in update_effective() argument
360 m.data.v3[idx].effective |= MASK(capability); in update_effective()
362 m.data.v3[idx].effective &= ~(MASK(capability)); in update_effective()
365 static void update_permitted(capng_act_t action, unsigned int capability, in update_permitted() argument
369 m.data.v3[idx].permitted |= MASK(capability); in update_permitted()
371 m.data.v3[idx].permitted &= ~(MASK(capability)); in update_permitted()
374 static void update_inheritable(capng_act_t action, unsigned int capability, in update_inheritable() argument
[all …]
Dcap-ng.h55 int capng_update(capng_act_t action, capng_type_t type,unsigned int capability);
57 unsigned int capability, ...);
70 int capng_have_capability(capng_type_t which, unsigned int capability);
78 const char *capng_capability_to_name(unsigned int capability);
Dlookup_table.c107 const char *capng_capability_to_name(unsigned int capability) in capng_capability_to_name() argument
109 if (!cap_valid(capability)) in capng_capability_to_name()
113 CAP_NG_CAPABILITY_NAMES, capability); in capng_capability_to_name()
/external/clang/test/Sema/
Dattr-capabilities.c3 typedef int __attribute__((capability("role"))) ThreadRole;
8 struct __attribute__((capability("wrong"))) IncorrectName {}; // expected-warning {{invalid capabil…
10 int Test1 __attribute__((capability("test1"))); // expected-error {{'capability' attribute only ap…
16 struct __attribute__((capability(12))) Test3 {}; // expected-error {{'capability' attribute require…
19 struct __attribute__((capability)) Test5 {}; // expected-error {{'capability' attribute takes one a…
/external/clang/docs/
DThreadSafetyAnalysis.rst103 read/write the data) unless it has the *capability* to do so.
106 methods to acquire and release the capability. The name of the object serves
107 to identify the capability. The most common example is a mutex. For example,
109 to acquire the capability to access data that is protected by ``mu``. Similarly,
110 calling ``mu.Unlock()`` releases that capability.
112 A thread may hold a capability either *exclusively* or *shared*. An exclusive
113 capability can be held by only one thread at a time, while a shared capability
121 security keys, a thread cannot make copy of a capability, nor can it destroy
122 one. A thread can only release a capability to another thread, or acquire one
130 by calculating an approximation of that set, called the *capability
[all …]
/external/sepolicy/
Dperfprofd.te23 allow perfprofd self:capability { dac_override };
37 allow perfprofd self:capability sys_admin;
43 allow perfprofd self:capability { sys_resource sys_ptrace };
54 allow perfprofd self:capability ipc_lock;
Dlmkd.te7 allow lmkd self:capability { dac_override sys_resource kill };
13 allow lmkd self:capability ipc_lock;
32 allow lmkd self:capability sys_nice;
Drunas.te16 dontaudit runas self:capability dac_override;
20 allow runas self:capability { setuid setgid };
34 neverallow runas self:capability ~{ setuid setgid };
Dinit.te21 allow init self:capability sys_resource;
42 allow init self:capability sys_admin;
67 allow init self:capability dac_override;
70 allow init self:capability sys_time;
72 allow init self:capability { sys_rawio mknod };
98 allow init self:capability { chown fowner fsetid };
144 allow init self:capability net_admin;
150 allow init self:capability sys_boot;
172 allow init self:capability kill;
190 allow init self:capability { setuid setgid };
[all …]
Dclatd.te18 allow clatd self:capability { net_admin net_raw setuid setgid };
24 # so we permit any requests we see from clatd asking for this capability.
27 allow clatd self:capability ipc_lock;
Dnetd.te8 allow netd self:capability { net_admin net_raw kill };
13 # bit was even set. We do not appear to truly need this capability
15 dontaudit netd self:capability fsetid;
44 allow netd self:capability { dac_override chown fowner };
Dzygote.te8 allow zygote self:capability { dac_override setgid setuid fowner chown };
10 allow zygote self:capability setpcap;
39 allow zygote self:capability sys_admin;
54 dontaudit zygote self:capability fsetid; # TODO: deprecated in M
Ddumpstate.te11 allow dumpstate self:capability { setuid setgid sys_resource };
17 allow dumpstate self:capability kill;
26 allow dumpstate self:capability { dac_override chown fowner fsetid };
74 allow dumpstate self:capability sys_ptrace;
Duncrypt.te7 allow uncrypt self:capability dac_override;
28 allow uncrypt self:capability sys_rawio;
Ddnsmasq.te8 allow dnsmasq self:capability dac_override;
10 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
Dhealthd.te8 allow healthd self:capability { net_admin sys_tty_config };
37 allow healthd self:capability sys_boot;
Dkernel.te4 allow kernel self:capability sys_nice;
25 allow kernel self:capability sys_resource;
32 allow kernel self:capability sys_boot;
Dvold.te67 allow vold self:capability { net_admin dac_override mknod sys_admin chown fowner fsetid };
79 allow vold self:capability { sys_ptrace kill };
160 allow vold self:capability sys_nice;
163 allow vold self:capability sys_chroot;
Dbluetooth.te30 allow bluetooth self:capability net_admin;
72 neverallow bluetooth self:capability ~net_admin;
Dmtp.te10 allow mtp self:capability net_raw;
Dtee.te10 allow tee self:capability { dac_override };
Dppp.te12 allow ppp self:capability net_admin;
/external/selinux/sepolgen/tests/
Daudit.txt1 …} for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
3 …d=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
4 …d=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
6 …d=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
7 …d=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
9 …} for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
10 …} for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
12 …d=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
13 …d=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
15 …d=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r…
[all …]
/external/wpa_supplicant_8/src/p2p/
Dp2p_parse.c32 msg->capability = data; in p2p_parse_attribute()
780 if (msg.capability) { in p2p_attr_text()
784 msg.capability[0], msg.capability[1]); in p2p_attr_text()
856 if (!msg.capability) in p2p_get_group_capab()
859 return msg.capability[1]; in p2p_get_group_capab()
/external/kernel-headers/original/uapi/linux/
Dvideodev2.h768 __u32 capability; member
821 __u32 capability; /* Supported modes */ member
834 __u32 capability; /* Supported modes */ member
1399 __u32 capability; member
1412 __u32 capability; member
1466 __u32 capability; member
1511 __u32 capability; member
1526 __u32 capability; member

12345678910