Searched refs:CAP_NET_ADMIN (Results 1 – 24 of 24) sorted by relevance
/external/libcap/doc/values/ |
D | 13.txt | 5 (also permitted via CAP_NET_ADMIN)
|
D | 39.txt | 32 - CAP_NET_ADMIN is required to load networking
|
/external/strace/ |
D | caps0.h | 13 CAP_NET_ADMIN,
|
/external/strace/xlat/ |
D | cap_mask0.in | 14 1<<CAP_NET_ADMIN
|
D | cap.in | 14 CAP_NET_ADMIN
|
D | cap_mask0.h | 29 XLAT_PAIR(1ULL<<CAP_NET_ADMIN, "1<<CAP_NET_ADMIN"),
|
D | cap.h | 29 XLAT(CAP_NET_ADMIN),
|
/external/bcc/tools/ |
D | capable_example.txt | 9 22:11:23 114 2676 snmpd 12 CAP_NET_ADMIN 1 41 CAP_NET_ADMIN, run checking CAP_SYS_RESOURCES, then some short-lived processes
|
/external/iputils/ |
D | ping_common.h | 267 static inline int enable_capability_admin(void) { return modify_capability(CAP_NET_ADMIN, CAP_SET)… in enable_capability_admin() 268 static inline int disable_capability_admin(void) { return modify_capability(CAP_NET_ADMIN, CAP_CLEA… in disable_capability_admin()
|
D | ping_common.c | 71 static cap_value_t cap_admin = CAP_NET_ADMIN; 94 cap_get_flag(cap_cur_p, CAP_NET_ADMIN, CAP_PERMITTED, &cap_ok); in limit_capabilities()
|
/external/libcap-ng/libcap-ng-0.7/src/ |
D | captab.h | 35 _S(CAP_NET_ADMIN, "net_admin" )
|
/external/libcap-ng/libcap-ng-0.7/bindings/python/ |
D | capng.py | 82 CAP_NET_ADMIN = _capng.CAP_NET_ADMIN variable
|
/external/libcap/libcap/include/uapi/linux/ |
D | capability.h | 203 #define CAP_NET_ADMIN 12 macro
|
/external/kernel-headers/original/uapi/linux/ |
D | capability.h | 203 #define CAP_NET_ADMIN 12 macro
|
/external/android-clat/ |
D | main.c | 133 set_capability(1 << CAP_NET_ADMIN); in main()
|
D | clatd.c | 182 set_capability((1 << CAP_NET_ADMIN) | in drop_root_but_keep_caps()
|
/external/rust/crates/nix/test/sys/ |
D | test_sockopt.rs | 11 require_capability!(CAP_NET_ADMIN); in is_so_mark_functional()
|
/external/iputils/doc/ |
D | rarpd.sgml | 129 to listen and send RARP and ARP packets. It also needs <constant/CAP_NET_ADMIN/
|
D | rdisc.sgml | 197 and send ICMP messages and capability <constant/CAP_NET_ADMIN/
|
/external/crosvm/ |
D | README.md | 67 * Some other features (networking) require `CAP_NET_ADMIN` so those usually 215 …kernel with TUN/TAP support (check for `/dev/net/tun`) and running with `CAP_NET_ADMIN` privileges.
|
/external/dnsmasq/src/ |
D | dnsmasq.c | 369 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW) | (1 << CAP_SETUID); in main() 393 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in main()
|
/external/wpa_supplicant_8/src/utils/ |
D | os_unix.c | 391 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); in os_program_init()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README | 988 minimum set of capabilities needed for the operations is CAP_NET_ADMIN
|
/external/ltp/doc/ |
D | test-writing-guidelines.txt | 1787 CAP_NET_ADMIN. During setup we should be able to do it, then during run it
|