/third_party/ltp/testcases/kernel/syscalls/prctl/ |
D | prctl07.c | 100 cap_value_t caplist[3] = {CAP_NET_RAW, CAP_NET_BIND_SERVICE, CAP_SETPCAP}; in verify_prctl() 118 check_cap_raise(CAP_NET_RAW, "on non-permitted cap", 1); in verify_prctl() 134 check_cap_is_set(CAP_NET_RAW, "CAP_NET_RAW was", 0); in verify_prctl() 136 check_cap_lower(CAP_NET_RAW, "CAP_NET_RAW(it wasn't in ambient set)"); in verify_prctl()
|
/third_party/ltp/include/lapi/ |
D | capability.h | 23 #ifndef CAP_NET_RAW 24 # define CAP_NET_RAW 13 macro
|
/third_party/ltp/lib/newlib_tests/ |
D | tst_capability01.c | 48 TST_CAP(TST_CAP_REQ, CAP_NET_RAW), 49 TST_CAP(TST_CAP_DROP, CAP_NET_RAW),
|
D | tst_capability02.c | 30 TST_CAP(TST_CAP_REQ, CAP_NET_RAW),
|
/third_party/ltp/testcases/kernel/syscalls/capget/ |
D | capget01.c | 38 if (data[0].effective & 1 << CAP_NET_RAW) in verify_capget() 54 TST_CAP(TST_CAP_DROP, CAP_NET_RAW),
|
/third_party/musl/porting/liteos_a/user/src/linux/ |
D | cap.c | 41 CAP_NET_BROADCAST, CAP_NET_ADMIN, CAP_NET_RAW, CAP_SYS_PTRACE, CAP_SYS_ADMIN, 96 case CAP_NET_RAW: in linux_caps_to_ohos() 170 result |= 1 << CAP_NET_RAW; in ohos_caps_to_linux()
|
/third_party/musl/src/linux/liteos_a/ |
D | cap.c | 25 CAP_NET_BROADCAST, CAP_NET_ADMIN, CAP_NET_RAW, CAP_SYS_PTRACE, CAP_SYS_ADMIN, 80 case CAP_NET_RAW: in linux_caps_to_ohos() 154 result |= 1 << CAP_NET_RAW; in ohos_caps_to_linux()
|
/third_party/ltp/testcases/kernel/syscalls/capset/ |
D | capset03.c | 23 #define CAP2 (CAP1 | 1 << CAP_NET_RAW)
|
D | capset02.c | 34 #define CAP1 (1 << CAP_NET_RAW | 1 << CAP_CHOWN | 1 << CAP_SETPCAP)
|
/third_party/ltp/testcases/kernel/containers/userns/ |
D | userns01.c | 93 TST_CAP(TST_CAP_DROP, CAP_NET_RAW),
|
/third_party/curl/docs/cmdline-opts/ |
D | interface.md | 24 have **CAP_NET_RAW** or to be run as root. More information about Linux
|
/third_party/ltp/testcases/network/can/filter-tests/ |
D | can_rcv_own_msgs.c | 144 TST_CAP(TST_CAP_REQ, CAP_NET_RAW),
|
D | can_filter.c | 182 TST_CAP(TST_CAP_REQ, CAP_NET_RAW),
|
/third_party/rust/crates/rustix/src/thread/ |
D | prctl.rs | 175 const CAP_NET_RAW: u32 = 13; constant 262 NetRaw = CAP_NET_RAW,
|
/third_party/e2fsprogs/ |
D | 1003-add-dac-config.patch | 100 + { "CAP_NET_RAW", CAP_NET_RAW },
|
/third_party/libwebsockets/test-apps/ |
D | test-server.c | 496 info.caps[0] = CAP_NET_RAW; in main()
|
/third_party/rust/crates/nix/test/sys/ |
D | test_sockopt.rs | 174 require_capability!("test_so_type", CAP_NET_RAW); in test_so_type_unknown()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | os_unix.c | 357 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in os_program_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | os_unix.c | 365 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in os_program_init()
|
/third_party/ltp/doc/ |
D | C-Test-API.asciidoc | 1907 tst_brk(TCONF | TTERRNO, "We don't have CAP_NET_RAW to begin with"); 1916 TST_CAP(TST_CAP_REQ, CAP_NET_RAW), 1917 TST_CAP(TST_CAP_DROP, CAP_NET_RAW), 1933 TST_CAP(TST_CAP_REQ, CAP_NET_RAW), 1940 Here we request 'CAP_NET_RAW', but drop 'CAP_SYS_ADMIN'. If the capability is
|
D | c-test-api.txt | 1819 tst_brk(TCONF | TTERRNO, "We don't have CAP_NET_RAW to begin with"); 1828 TST_CAP(TST_CAP_REQ, CAP_NET_RAW), 1829 TST_CAP(TST_CAP_DROP, CAP_NET_RAW), 1845 TST_CAP(TST_CAP_REQ, CAP_NET_RAW), 1852 Here we request 'CAP_NET_RAW', but drop 'CAP_SYS_ADMIN'. If the capability is
|
/third_party/libwebsockets/READMEs/ |
D | README.coding.md | 1273 requires CAP_NET_RAW capability... root has this capability. 1280 the unprivileged user inherit just the CAP_NET_RAW capability. 1294 info.caps[0] = CAP_NET_RAW;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | README | 989 and CAP_NET_RAW.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | README | 989 and CAP_NET_RAW.
|