Home
last modified time | relevance | path

Searched refs:caps (Results 1 – 19 of 19) sorted by relevance

/system/core/init/
Dcapabilities.cpp117 ScopedCaps caps(cap_init()); in SetProcCaps() local
119 cap_clear(caps.get()); in SetProcCaps()
124 if (cap_set_flag(caps.get(), CAP_INHERITABLE, arraysize(value), value, CAP_SET) != 0 || in SetProcCaps()
125 cap_set_flag(caps.get(), CAP_PERMITTED, arraysize(value), value, CAP_SET) != 0) { in SetProcCaps()
134 if (cap_set_flag(caps.get(), CAP_PERMITTED, arraysize(value), value, CAP_SET) != 0 || in SetProcCaps()
135 cap_set_flag(caps.get(), CAP_EFFECTIVE, arraysize(value), value, CAP_SET) != 0) { in SetProcCaps()
141 if (cap_set_proc(caps.get()) != 0) { in SetProcCaps()
207 ScopedCaps caps(cap_get_proc()); in DropInheritableCaps() local
208 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in DropInheritableCaps()
212 if (cap_set_proc(caps.get()) != 0) { in DropInheritableCaps()
Dcapabilities.h39 void operator()(cap_t caps) const { cap_free(caps); } in operator()
Dreboot_utils.cpp68 ScopedCaps caps(cap_get_proc()); in IsRebootCapable() local
69 if (!caps) { in IsRebootCapable()
75 if (cap_get_flag(caps.get(), CAP_SYS_BOOT, CAP_EFFECTIVE, &value) != 0) { in IsRebootCapable()
/system/core/logd/
Dmain.cpp93 std::unique_ptr<struct _cap_struct, int (*)(void*)> caps(cap_init(), cap_free); in DropPrivs() local
94 if (cap_clear(caps.get()) < 0) { in DropPrivs()
99 if (cap_set_flag(caps.get(), CAP_PERMITTED, 1, &cap_syslog, CAP_SET) < 0 || in DropPrivs()
100 cap_set_flag(caps.get(), CAP_EFFECTIVE, 1, &cap_syslog, CAP_SET) < 0) { in DropPrivs()
106 if (cap_set_flag(caps.get(), CAP_PERMITTED, 1, &cap_audit_control, CAP_SET) < 0 || in DropPrivs()
107 cap_set_flag(caps.get(), CAP_EFFECTIVE, 1, &cap_audit_control, CAP_SET) < 0) { in DropPrivs()
111 if (cap_set_proc(caps.get()) < 0) { in DropPrivs()
/system/core/adb/daemon/
Dmain.cpp136 ScopedCaps caps(cap_get_proc(), &cap_free); in drop_privileges() local
137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges()
140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges()
143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges()
146 if (cap_set_proc(caps.get()) != 0) { in drop_privileges()
/system/core/libcutils/
Dsched_policy_test.cpp33 __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3]; in hasCapSysNice() local
34 if (capget(&header, &caps[0])) { in hasCapSysNice()
41 return caps[nice_idx].effective & nice_mask; in hasCapSysNice()
/system/sepolicy/prebuilts/api/26.0/public/
Dperformanced.te7 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1011 # Only allow filesystem caps to be set at build time or
/system/sepolicy/prebuilts/api/27.0/public/
Dperformanced.te12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1004 # Only allow filesystem caps to be set at build time or
/system/sepolicy/prebuilts/api/28.0/public/
Dperformanced.te12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1311 # Only allow filesystem caps to be set at build time. Runtime changes
/system/sepolicy/prebuilts/api/29.0/public/
Dperformanced.te12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1306 # Only allow filesystem caps to be set at build time. Runtime changes
/system/sepolicy/prebuilts/api/30.0/public/
Dperformanced.te12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1306 # Only allow filesystem caps to be set at build time. Runtime changes
/system/sepolicy/public/
Dperformanced.te12 # TODO: use file caps to obtain sys_nice instead of setuid / setgid.
Ddomain.te1330 # Only allow filesystem caps to be set at build time. Runtime changes
/system/bt/vendor_libs/test_vendor_lib/model/controller/
Ddual_mode_controller.cc1907 vector<uint8_t> caps = properties_.GetLeVendorCap(); in LeVendorCap() local
1908 if (caps.size() == 0) { in LeVendorCap()