/system/core/init/ |
D | capabilities.cpp | 117 ScopedCaps caps(cap_init()); in SetProcCaps() local 119 cap_clear(caps.get()); in SetProcCaps() 124 if (cap_set_flag(caps.get(), CAP_INHERITABLE, arraysize(value), value, CAP_SET) != 0 || in SetProcCaps() 125 cap_set_flag(caps.get(), CAP_PERMITTED, arraysize(value), value, CAP_SET) != 0) { in SetProcCaps() 134 if (cap_set_flag(caps.get(), CAP_PERMITTED, arraysize(value), value, CAP_SET) != 0 || in SetProcCaps() 135 cap_set_flag(caps.get(), CAP_EFFECTIVE, arraysize(value), value, CAP_SET) != 0) { in SetProcCaps() 141 if (cap_set_proc(caps.get()) != 0) { in SetProcCaps() 207 ScopedCaps caps(cap_get_proc()); in DropInheritableCaps() local 208 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in DropInheritableCaps() 212 if (cap_set_proc(caps.get()) != 0) { in DropInheritableCaps()
|
D | capabilities.h | 39 void operator()(cap_t caps) const { cap_free(caps); } in operator()
|
D | reboot_utils.cpp | 68 ScopedCaps caps(cap_get_proc()); in IsRebootCapable() local 69 if (!caps) { in IsRebootCapable() 75 if (cap_get_flag(caps.get(), CAP_SYS_BOOT, CAP_EFFECTIVE, &value) != 0) { in IsRebootCapable()
|
/system/core/logd/ |
D | main.cpp | 93 std::unique_ptr<struct _cap_struct, int (*)(void*)> caps(cap_init(), cap_free); in DropPrivs() local 94 if (cap_clear(caps.get()) < 0) { in DropPrivs() 99 if (cap_set_flag(caps.get(), CAP_PERMITTED, 1, &cap_syslog, CAP_SET) < 0 || in DropPrivs() 100 cap_set_flag(caps.get(), CAP_EFFECTIVE, 1, &cap_syslog, CAP_SET) < 0) { in DropPrivs() 106 if (cap_set_flag(caps.get(), CAP_PERMITTED, 1, &cap_audit_control, CAP_SET) < 0 || in DropPrivs() 107 cap_set_flag(caps.get(), CAP_EFFECTIVE, 1, &cap_audit_control, CAP_SET) < 0) { in DropPrivs() 111 if (cap_set_proc(caps.get()) < 0) { in DropPrivs()
|
/system/core/adb/daemon/ |
D | main.cpp | 136 ScopedCaps caps(cap_get_proc(), &cap_free); in drop_privileges() local 137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges() 140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges() 143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges() 146 if (cap_set_proc(caps.get()) != 0) { in drop_privileges()
|
/system/core/libcutils/ |
D | sched_policy_test.cpp | 33 __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3]; in hasCapSysNice() local 34 if (capget(&header, &caps[0])) { in hasCapSysNice() 41 return caps[nice_idx].effective & nice_mask; in hasCapSysNice()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | performanced.te | 7 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1011 # Only allow filesystem caps to be set at build time or
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | performanced.te | 12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1004 # Only allow filesystem caps to be set at build time or
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | performanced.te | 12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1311 # Only allow filesystem caps to be set at build time. Runtime changes
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | performanced.te | 12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1306 # Only allow filesystem caps to be set at build time. Runtime changes
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | performanced.te | 12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1306 # Only allow filesystem caps to be set at build time. Runtime changes
|
/system/sepolicy/public/ |
D | performanced.te | 12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
|
D | domain.te | 1330 # Only allow filesystem caps to be set at build time. Runtime changes
|
/system/bt/vendor_libs/test_vendor_lib/model/controller/ |
D | dual_mode_controller.cc | 1907 vector<uint8_t> caps = properties_.GetLeVendorCap(); in LeVendorCap() local 1908 if (caps.size() == 0) { in LeVendorCap()
|