Searched refs:capability (Results 1 – 25 of 63) sorted by relevance
123
7 allow lmkd self:capability { dac_override sys_resource kill };13 allow lmkd self:capability ipc_lock;35 allow lmkd self:capability sys_nice;
16 dontaudit runas self:capability dac_override;20 allow runas self:capability { setuid setgid };34 neverallow runas self:capability ~{ setuid setgid };
23 allow perfprofd self:capability { dac_override };37 allow perfprofd self:capability sys_admin;43 allow perfprofd self:capability { sys_resource sys_ptrace };57 allow perfprofd self:capability ipc_lock;
18 allow clatd self:capability { net_admin net_raw setuid setgid };24 # so we permit any requests we see from clatd asking for this capability.27 allow clatd self:capability ipc_lock;
7 allow uncrypt self:capability dac_override;29 allow uncrypt self:capability sys_rawio;
8 allow dnsmasq self:capability dac_override;10 allow dnsmasq self:capability { net_admin net_raw net_bind_service setgid setuid };
22 allow init self:capability sys_resource;43 allow init self:capability sys_admin;72 allow init self:capability dac_override;75 allow init self:capability sys_time;77 allow init self:capability { sys_rawio mknod };104 allow init self:capability { chown fowner fsetid };153 allow init self:capability net_admin;159 allow init self:capability sys_boot;189 allow init self:capability kill;207 allow init self:capability { setuid setgid };[all …]
23 allow bluetooth self:capability net_admin;28 allow bluetooth self:capability { net_admin net_raw net_bind_service };71 neverallow bluetooth self:capability ~{ net_admin net_raw net_bind_service };
8 allow netd self:capability { net_admin net_raw kill };13 # bit was even set. We do not appear to truly need this capability15 dontaudit netd self:capability fsetid;41 allow netd self:capability { dac_override chown fowner };
11 allow healthd self:capability { net_admin sys_tty_config };45 allow healthd self:capability sys_boot;
10 allow mtp self:capability net_raw;
11 allow dumpstate self:capability { setuid setgid sys_resource };16 allow dumpstate self:capability {32 allow dumpstate self:capability { dac_override chown fowner fsetid };107 allow dumpstate self:capability sys_ptrace;
10 allow tee self:capability { dac_override };
12 allow ppp self:capability net_admin;
8 allow otapreopt_chroot self:capability { sys_admin sys_chroot };
8 allow slideshow self:capability sys_tty_config;
4 allow kernel self:capability sys_nice;34 allow kernel self:capability sys_resource;41 allow kernel self:capability sys_boot;
18 allow racoon self:capability { net_admin net_bind_service net_raw setuid };
17 allow sgdisk self:capability sys_admin;
8 allow zygote self:capability { dac_override setgid setuid fowner chown };10 allow zygote self:capability setpcap;41 allow zygote self:capability sys_admin;
129 data.capability = TPM_CAP_TPM_PROPERTIES; in GetValidCapabilityData()139 data.capability = TPM_CAP_ALGS; in GetValidAlgorithmData()253 permanent_data_.capability = 0xFFFFF; in TEST_F()259 startup_clear_data_.capability = 0xFFFFF; in TEST_F()265 lockout_counter_.capability = 0xFFFFF; in TEST_F()271 lockout_threshold_.capability = 0xFFFFF; in TEST_F()277 lockout_interval_.capability = 0xFFFFF; in TEST_F()283 lockout_recovery_.capability = 0xFFFFF; in TEST_F()289 rsa_data_.capability = 0xFFFFF; in TEST_F()295 ecc_data_.capability = 0xFFFFF; in TEST_F()
101 if (capability_data.capability != TPM_CAP_ALGS || in Initialize()120 if (capability_data.capability != TPM_CAP_ALGS || in Initialize()235 if (capability_data.capability != TPM_CAP_TPM_PROPERTIES || in GetTpmProperty()
90 bool TpmStatusImpl::GetCapability(uint32_t capability, in GetCapability() argument102 tpm_handle, capability, sizeof(uint32_t), in GetCapability()
53 bool GetCapability(uint32_t capability,
27 THREAD_ANNOTATION_ATTRIBUTE__(capability(x))