Home
last modified time | relevance | path

Searched refs:CAP_SETPCAP (Results 1 - 7 of 7) sorted by relevance

/third_party/musl/src/linux/liteos_a/
H A Dcap.c24 CAP_KILL, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE,
68 case CAP_SETPCAP: in linux_caps_to_ohos()
142 result |= 1 << CAP_SETPCAP; in ohos_caps_to_linux()
/third_party/musl/porting/liteos_a/user/src/linux/
H A Dcap.c40 CAP_KILL, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE,
84 case CAP_SETPCAP: in linux_caps_to_ohos()
158 result |= 1 << CAP_SETPCAP; in ohos_caps_to_linux()
/third_party/ltp/testcases/kernel/syscalls/capset/
H A Dcapset02.c34 #define CAP1 (1 << CAP_NET_RAW | 1 << CAP_CHOWN | 1 << CAP_SETPCAP)
/third_party/ltp/testcases/kernel/syscalls/prctl/
H A Dprctl07.c100 cap_value_t caplist[3] = {CAP_NET_RAW, CAP_NET_BIND_SERVICE, CAP_SETPCAP}; in verify_prctl()
H A Dprctl02.c38 * CAP_SETPCAP capability
40 * CAP_SETPCAP capability
203 TST_CAP(TST_CAP_DROP, CAP_SETPCAP),
/third_party/rust/crates/rustix/src/thread/
H A Dprctl.rs170 const CAP_SETPCAP: u32 = 8; consts
245 SetPermittedCapabilities = CAP_SETPCAP,
/third_party/libfuse/util/
H A Dmount.fuse.c355 uint64_t required_caps = CAP_TO_MASK(CAP_SETPCAP) | in main()
358 fprintf(stderr, "%s: drop_privileges was requested, which launches the FUSE file system fully unprivileged. In order to do so %s must be run with privileges, please invoke with CAP_SYS_ADMIN and CAP_SETPCAP (e.g. as root).\n", in main()
395 * and we need to retain CAP_SETPCAP in order to drop in main()

Completed in 6 milliseconds