/packages/services/Car/car_product/sepolicy/ |
qcom-sh.te | 12 allow qcom-sh self:capability net_admin;
|
rmt_storage.te | 8 allow rmt_storage self:capability { setuid setgid };
|
/system/sepolicy/ |
sgdisk.te | 17 allow sgdisk self:capability sys_admin;
|
healthd.te | 11 allow healthd self:capability { net_admin sys_tty_config }; 45 allow healthd self:capability sys_boot;
|
/system/tpm/tpm_manager/server/ |
tpm_status_impl.cc | 52 LOG(ERROR) << "Error getting tpm capability data."; 90 bool TpmStatusImpl::GetCapability(uint32_t capability, 102 tpm_handle, capability, sizeof(uint32_t), 109 LOG(ERROR) << "Error getting TPM capability data.";
|
/external/tcpdump/tests/ |
pimv2_sm-v.out | 7 State Refresh Capability Option (21), length 4, Value: v1 14 State Refresh Capability Option (21), length 4, Value: v1 27 State Refresh Capability Option (21), length 4, Value: v1 34 State Refresh Capability Option (21), length 4, Value: v1 41 State Refresh Capability Option (21), length 4, Value: v1 48 State Refresh Capability Option (21), length 4, Value: v1 61 State Refresh Capability Option (21), length 4, Value: v1 68 State Refresh Capability Option (21), length 4, Value: v1 77 State Refresh Capability Option (21), length 4, Value: v1 84 State Refresh Capability Option (21), length 4, Value: v [all...] |
/device/htc/flounder/sepolicy/ |
netmgrd.te | 9 dontaudit netmgrd self:capability sys_module; 12 allow netmgrd self:capability { setuid setgid net_admin net_raw };
|
/device/lge/bullhead/sepolicy/ |
netmgrd.te | 15 allow netmgrd self:capability { setuid setgid net_admin net_raw setpcap }; 37 dontaudit netmgrd self:capability sys_module;
|
/device/moto/shamu/sepolicy/ |
netmgrd.te | 15 allow netmgrd self:capability { setuid setgid net_admin net_raw }; 44 dontaudit netmgrd self:capability sys_module;
|
/external/autotest/client/site_tests/graphics_dEQP/ |
control.gles2.capability.NotPass | 7 NAME = 'graphics_dEQP.gles2.capability.NotPass' 22 job.run_test('graphics_dEQP', opts = args + ['filter=dEQP-GLES2.capability',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudformation/ |
template.py | 2 from boto.cloudformation.stack import Capability 17 self.capabilities = ResultSet([('member', Capability)])
|
/external/libcap/libcap/ |
libcap.h | 5 * this small capability library. 16 #include <sys/capability.h> 39 # error Kernel <linux/capability.h> does not support library 44 # warning Kernel <linux/capability.h> does not support 64-bit capabilities 57 # error Kernel <linux/capability.h> v3 does not match library 66 # error Kernel <linux/capability.h> does not match library 81 * capability sets in the order of the cap_flag_t type: the are 184 * <sys/capability.h> if _POSIX_SOURCE is not #define'd, so we
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
polcap.py | 24 """Factory function for creating policy capability objects.""" 37 """A policy capability."""
|
/system/connectivity/apmanager/ |
device.h | 77 // Parse device capability from NL80211 message. 92 // Get HT and VHT capability string based on the operating channel. 93 // Return true and set the output capability string if such capability 119 // Get the capability for the band the given |channel| is in. Return true 120 // and set the output |capability| pointer if such capability exist for the 122 bool GetBandCapability(uint16_t channel, BandCapability* capability);
|
/system/core/base/include/android-base/ |
thread_annotations.h | 26 #define CAPABILITY(x) \ 27 THREAD_ANNOTATION_ATTRIBUTE__(capability(x))
|
/external/libchrome/sandbox/linux/services/ |
credentials.cc | 31 #include "sandbox/linux/system_headers/capability.h" 140 // Converts a Capability to the corresponding Linux CAP_XXX value. 141 int CapabilityToKernelValue(Credentials::Capability cap) { 143 case Credentials::Capability::SYS_CHROOT: 145 case Credentials::Capability::SYS_ADMIN: 149 LOG(FATAL) << "Invalid Capability: " << static_cast<int>(cap); 157 if (!SetCapabilities(proc_fd, std::vector<Capability>())) { 173 return SetCapabilitiesOnCurrentThread(std::vector<Capability>()); 178 const std::vector<Capability>& caps) { 183 // Initially, cap has no capability flags set. Enable the effective an [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
capability.h | 2 * This is <linux/capability.h> 26 a set of three capability sets. The transposition of 3*the 52 #define XATTR_CAPS_SUFFIX "capability" 151 * Transfer any capability in your permitted set to any pid, 152 * remove any capability in your permitted set from any pid 154 * Add any capability from current's capability bounding set 156 * Allow taking bits out of capability bounding set 321 to implement capability based overrides of that policy, this is 322 the capability it should use to do so. * [all...] |
/external/deqp/framework/egl/ |
egluNativeWindow.hpp | 76 enum Capability 113 Capability getCapabilities (void) const { return m_capabilities; } 116 NativeWindow (Capability capabilities); 122 const Capability m_capabilities; 136 NativeWindow::Capability getCapabilities (void) const { return m_capabilities; } 139 NativeWindowFactory (const std::string& name, const std::string& description, NativeWindow::Capability capabilities); 145 const NativeWindow::Capability m_capabilities;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
RadioCapability.java | 20 * Object to indicate the phone radio capability. 73 * Tell modem the action transaction of set radio capability is 79 * tell modem the action transaction of set radio capability is fail 125 * set radio capability is success or fail with RC_Phase_FINISH 147 * Get radio capability version. 149 * @return radio capability version 166 * get radio capability phase.
|
/frameworks/base/core/java/android/net/ |
NetworkRequest.java | 87 // when later an unrestricted capability could be added to mNetworkCapabilities, in 97 * Add the given capability requirement to this builder. These represent 103 * @param capability The {@code NetworkCapabilities.NET_CAPABILITY_*} to add. 107 public Builder addCapability(int capability) { 108 mNetworkCapabilities.addCapability(capability); 113 * Removes (if found) the given capability from this builder instance. 115 * @param capability The {@code NetworkCapabilities.NET_CAPABILITY_*} to remove. 118 public Builder removeCapability(int capability) { 119 mNetworkCapabilities.removeCapability(capability);
|
/external/autotest/client/cros/ |
tpm_dam.py | 26 '00 00 00 10 ' # Capability Area = TPM_CAP_MFR 34 '00 00 00 19 ' # Capability Area = TPM_CAP_DA_LOGIC 42 '00 00 00 19 ' # Capability Area = TPM_CAP_DA_LOGIC
|
/external/clang/include/clang/Analysis/Analyses/ |
ThreadSafety.h | 80 /// \param Kind -- the capability's name parameter (role, mutex, etc). 86 /// \param Kind -- the capability's name parameter (role, mutex, etc). 98 /// \param Kind -- the capability's name parameter (role, mutex, etc). 107 /// \param Kind -- the capability's name parameter (role, mutex, etc). 119 /// \param Kind -- the capability's name parameter (role, mutex, etc). 135 /// \param Kind -- the capability's name parameter (role, mutex, etc). 145 /// \param Kind -- the capability's name parameter (role, mutex, etc). 156 /// \param Kind -- the capability's name parameter (role, mutex, etc). 168 /// Warn when acquiring a lock that the negative capability is not held. 169 /// \param Kind -- the capability's name parameter (role, mutex, etc) [all...] |
/external/google-benchmark/src/ |
mutex.h | 15 #define CAPABILITY(x) \ 16 THREAD_ANNOTATION_ATTRIBUTE__(capability(x)) 81 class CAPABILITY("mutex") Mutex
|
/external/kernel-headers/original/uapi/linux/ |
capability.h | 2 * This is <linux/capability.h> 26 a set of three capability sets. The transposition of 3*the 150 * Transfer any capability in your permitted set to any pid, 151 * remove any capability in your permitted set from any pid 153 * Add any capability from current's capability bounding set 155 * Allow taking bits out of capability bounding set 324 to implement capability based overrides of that policy, this is 325 the capability it should use to do so. */ 332 to implement capability based checks on modifications to tha [all...] |
/external/libcap/libcap/include/uapi/linux/ |
capability.h | 2 * This is <linux/capability.h> 26 a set of three capability sets. The transposition of 3*the 150 * Transfer any capability in your permitted set to any pid, 151 * remove any capability in your permitted set from any pid 153 * Add any capability from current's capability bounding set 155 * Allow taking bits out of capability bounding set 320 to implement capability based overrides of that policy, this is 321 the capability it should use to do so. */ 328 to implement capability based checks on modifications to tha [all...] |