Searched refs:cap (Results 1 - 10 of 10) sorted by relevance
/system/core/init/ |
H A D | capabilities.cpp | 25 #define CAP_MAP_ENTRY(cap) { #cap, CAP_##cap } 103 for (size_t cap = 0; cap <= last_valid_cap; ++cap) { 104 if (cap < to_keep.size() && to_keep.test(cap)) { 108 if (cap_drop_bound(cap) == -1) { 109 PLOG(ERROR) << "cap_drop_bound(" << cap << ") faile [all...] |
H A D | service.cpp | 417 unsigned int cap = static_cast<unsigned int>(res); // |res| is >= 0. local 418 if (cap > last_valid_cap) { 422 capabilities_[cap] = true;
|
/system/core/base/ |
H A D | logging_test.cpp | 209 static void CheckMessage(const CapturedStderr& cap, android::base::LogSeverity severity, argument 212 ASSERT_EQ(0, lseek(cap.fd(), 0, SEEK_SET)); 213 android::base::ReadFdToString(cap.fd(), &output); 407 CapturedStderr cap; \ 411 CheckMessage(cap, \ 415 ASSERT_EQ(0, lseek(cap.fd(), 0, SEEK_CUR)); \ 429 CapturedStderr cap; local 434 CheckMessage(cap, android::base::INFO, "67890"); 438 CapturedStderr cap; local 443 CheckMessage(cap, androi 447 CapturedStderr cap; // So the logging below has no side-effects. local 559 CapturedStderr cap; local 574 CapturedStderr cap; local 603 CapturedStderr cap; local 616 CapturedStderr cap; local [all...] |
/system/bt/include/hardware/avrcp/ |
H A D | avrcp_logging_helper.h | 100 inline std::string CapabilityText(const Capability& cap) { argument 101 switch (cap) { 105 return "Unknown Capability: " + loghex((uint8_t)cap); 109 inline std::ostream& operator<<(std::ostream& os, const Capability& cap) { argument 110 return os << CapabilityText(cap);
|
/system/bt/tools/mcap_tool/ |
H A D | mcap_tool.cc | 172 struct __user_cap_data_struct cap[2]; local 186 cap[CAP_TO_INDEX(CAP_NET_RAW)].permitted |= CAP_TO_MASK(CAP_NET_RAW); 187 cap[CAP_TO_INDEX(CAP_NET_ADMIN)].permitted |= CAP_TO_MASK(CAP_NET_ADMIN); 188 cap[CAP_TO_INDEX(CAP_NET_BIND_SERVICE)].permitted |= 190 cap[CAP_TO_INDEX(CAP_SYS_RAWIO)].permitted |= CAP_TO_MASK(CAP_SYS_RAWIO); 191 cap[CAP_TO_INDEX(CAP_SYS_NICE)].permitted |= CAP_TO_MASK(CAP_SYS_NICE); 192 cap[CAP_TO_INDEX(CAP_SETGID)].permitted |= CAP_TO_MASK(CAP_SETGID); 193 cap[CAP_TO_INDEX(CAP_WAKE_ALARM)].permitted |= CAP_TO_MASK(CAP_WAKE_ALARM); 195 cap[CAP_TO_INDEX(CAP_NET_RAW)].effective |= CAP_TO_MASK(CAP_NET_RAW); 196 cap[CAP_TO_INDE [all...] |
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | access_vectors | 82 common cap 391 inherits cap 547 inherits cap
|
/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | access_vectors | 84 common cap 395 inherits cap 551 inherits cap
|
/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | access_vectors | 84 common cap 404 inherits cap 560 inherits cap
|
/system/sepolicy/private/ |
H A D | access_vectors | 84 common cap 404 inherits cap 560 inherits cap
|
/system/sepolicy/reqd_mask/ |
H A D | access_vectors | 84 common cap 404 inherits cap 560 inherits cap
|
Completed in 237 milliseconds