Home
last modified time | relevance | path

Searched full:capability (Results 1 – 25 of 1251) sorted by relevance

12345678910>>...51

/freebsd/lib/libc/gen/
H A Dgetcap.345 .Nd capability database access routines
73 function extracts the capability
116 function enables the addition of a character buffer containing a single capability
118 to the capability database.
150 is one of the names of the capability record
157 function searches the capability record
159 for the capability
167 untyped capability will be searched for (see below for explanation of
175 if the requested capability could not be
177 The end of the capability value is signaled by a `:' or
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Target/SPIRV/
H A DSPIRVModuleAnalysis.cpp38 static cl::list<SPIRV::Capability::Capability>
43 cl::values(clEnumValN(SPIRV::Capability::Shader, "Shader",
44 "SPIR-V Shader capability")));
47 SmallSet<SPIRV::Capability::Capability, 4> S;
102 // capability needs to be declared to use the feature." However, one in getSymbolicOperandRequirements()
103 // capability may be preferred over another. We use command line in getSymbolicOperandRequirements()
118 // capability requirements, use the list of extensions (if the subtarget in getSymbolicOperandRequirements()
305 auto Cap = SPIRV::Capability::Capability(MI.getOperand(0).getImm()); in processDefInstrs()
575 LLVM_DEBUG(dbgs() << "Capability not supported: " in checkSatisfiable()
605 const Capability::Capability ToRemove, in removeCapabilityIf()
[all …]
H A DSPIRVModuleAnalysis.h46 const std::optional<Capability::Capability> Cap;
52 std::optional<Capability::Capability> Cap = {},
57 Requirements(Capability::Capability Cap) : Requirements(true, {Cap}) {} in Requirements()
68 SmallSet<Capability::Capability, 8> AllCaps;
99 void addCapability(Capability::Capability ToAdd) { addCapabilities({ToAdd}); } in addCapability()
117 bool isCapabilityAvailable(Capability::Capability Cap) const { in isCapabilityAvailable()
121 // Remove capability ToRemove, but only if IfPresent is present.
122 void removeCapabilityIf(const Capability::Capability ToRemove,
123 const Capability::Capability IfPresent);
/freebsd/lib/libc/capability/
H A Dcap_rights_init.369 Capability rights should be separated with comma when passed to the
81 The complete list of the capability rights can be found in the
91 For convenience the structure can be filled with capability rights instead of
102 err(1, "Unable to limit capability rights");
107 function adds the given capability rights to the given
113 function removes the given capability rights from the given
119 function checks if all the given capability rights are set for the given
137 function merges all capability rights present in the
145 function removes all capability rights present in the
155 structure contains all capability rights present in the
[all …]
/freebsd/lib/libcasper/services/cap_sysctl/
H A Dcap_sysctl.330 .Nd "library for getting or setting system information in capability mode"
66 capability.
79 capability provides unrestricted access to the sysctl namespace.
86 capability.
117 applies a set of sysctl limits to the capability, denying access to sysctl
132 The following example first opens a capability to casper, uses this
133 capability to create the
137 capability to get the value of
146 /* Open capability to Casper. */
151 /* Enter capability mode sandbox. */
[all …]
/freebsd/lib/libcasper/libcasper/
H A Dlibcasper.382 An application capability, represented by the
86 A capability to the casper process, obtained with the
95 function instantiates a capability to allow a program to access
103 The function is used when a capability is inherited through the
132 function returns a clone of the capability passed as its only argument.
136 function closes, and frees, the given capability.
142 domain socket descriptor associated with the given capability for use with
151 function stores the current limits of the given capability in the
165 function sets limits for the given capability.
169 capability represents.
[all …]
/freebsd/share/man/man9/
H A Dpci.995 .Fn pci_find_cap "device_t dev" "int capability" "int *capreg"
101 .Fn pci_find_extcap "device_t dev" "int capability" "int *capreg"
103 .Fn pci_find_htcap "device_t dev" "int capability" "int *capreg"
105 .Fn pci_find_next_cap "device_t dev" "int capability" "int start" "int *capreg"
107 .Fn pci_find_next_extcap "device_t dev" "int capability" "int start" "int *capreg"
109 .Fn pci_find_next_htcap "device_t dev" "int capability" "int start" "int *capreg"
224 capability register set of device
243 capability register set of device
255 to a register in the PCI-express capability register set of device
322 function is used to locate the first instance of a PCI capability
[all …]
/freebsd/sys/net80211/
H A D_ieee80211.h472 #define IEEE80211_C_STA 0x00000001 /* CAPABILITY: STA available */
473 #define IEEE80211_C_8023ENCAP 0x00000002 /* CAPABILITY: 802.3 encap */
474 #define IEEE80211_C_FF 0x00000040 /* CAPABILITY: ATH FF avail */
475 #define IEEE80211_C_TURBOP 0x00000080 /* CAPABILITY: ATH Turbo avail*/
476 #define IEEE80211_C_IBSS 0x00000100 /* CAPABILITY: IBSS available */
477 #define IEEE80211_C_PMGT 0x00000200 /* CAPABILITY: Power mgmt */
478 #define IEEE80211_C_HOSTAP 0x00000400 /* CAPABILITY: HOSTAP avail */
479 #define IEEE80211_C_AHDEMO 0x00000800 /* CAPABILITY: Old Adhoc Demo */
480 #define IEEE80211_C_SWRETRY 0x00001000 /* CAPABILITY: sw tx retry */
481 #define IEEE80211_C_TXPMGT 0x00002000 /* CAPABILITY: tx power mgmt */
[all …]
/freebsd/lib/libcasper/services/cap_syslog/
H A Dcap_syslog.334 .Nd "library for syslog in capability mode"
72 The following example first opens a capability to casper and then uses this
73 capability to create the
79 /* Open capability to Casper. */
84 /* Enter capability mode sandbox. */
86 err(1, "Unable to enter capability mode");
88 /* Use Casper capability to create capability to the system.syslog service. */
93 /* Close Casper capability, we don't need it anymore. */
97 cap_syslog(capsyslog, LOG_NOTICE, "System logs from capability mode.");
/freebsd/contrib/ncurses/man/
H A Duser_caps.550 user-defined \fIterminfo\fR capability format
65 Rather than change the meaning of an existing capability, a new name was added.
68 tables for each type of capability.
85 The tables of capability names differ between implementations.
87 Although they \fImay\fP provide all of the standard capability names,
126 The \fIbox1\fP capability is used in @TIC@ to help with terminal descriptions
148 modifications to the toolset's predefined capability names are needed.
157 \fB@TIC@\fP will store a user-defined capability if the capability name is not
164 requires that the capability names are 2-characters.
166 When the capability is simple enough for use in a termcap application,
[all …]
H A Dinfocmp.1m107 If a capability is defined for only one of the
108 terminals, the value returned depends on the type of the capability:
121 produces a list of each capability that is \fIdifferent\fP
123 Each item in the list shows \*(``:\*('' after the capability name,
124 followed by the capability values, separated by a comma.
127 produces a list of each capability that is \fIcommon\fP between
130 Each item in the list shows \*(``=\*('' after the capability name,
131 followed by the capability value.
138 produces a list of each capability that is in \fInone\fP of the given entries.
139 Each item in the list shows \*(``!\*('' before the capability name.
[all …]
H A Dtput.184 When retrieving capability values,
85 the result depends upon the capability's type.
118 a capability code from the terminal database,
125 Although these resemble capability codes,
130 indicates a capability from the terminal database.
138 up to the (fixed) quantity the capability requires.
145 If no parameters are given for the capability,
276 it operates as if run with the corresponding (pseudo-)capability
342 retrieves more than one capability per invocation of \fB\%@TPUT@\fP.
398 0 Boolean or string capability present
[all …]
H A Dterminfo.tail47 That is, if \fB@TIC@\fP encounters a capability name
50 and makes an extended table entry for that capability.
56 User-defined capability strings whose name begins
62 If the capability name happens to be two characters,
63 the capability is also available through the termcap interface.
144 when the end of a line is reached) is indicated by the capability \fBam\fP.
217 A delay in milliseconds may appear anywhere in a string capability, enclosed in
234 capability; it is used for cost computation but does not trigger delays.
242 To do this, put a period before the capability name.
332 \fBcols\fP numeric capability.
[all …]
H A Dcurs_terminfo.3x132 Capability names and codes use the POSIX portable character set.
134 Capability string values have no associated encoding;
296 capability.
309 capability.
407 capability,
413 The capability string is null-terminated.
442 formatting capability to see what the
570 .SS "Terminal Capability Functions"
573 and \fB\%tigetstr\fP return the value of the capability corresponding to
582 for each capability is given in the table column entitled
[all …]
/freebsd/lib/libcasper/services/cap_netdb/
H A Dcap_netdb.329 .Nd "library for getting network proto entry in capability mode"
51 The following example first opens a capability to casper and then uses this
52 capability to create the
59 /* Open capability to Casper. */
64 /* Enter capability mode sandbox. */
66 err(1, "Unable to enter capability mode");
68 /* Use Casper capability to create capability to the system.netdb service. */
73 /* Close Casper capability, we don't need it anymore. */
/freebsd/tools/regression/security/cap_test/
H A Dcap_test_relative.c44 * 1. Use strict relative lookups in capability mode or when operating
45 * relative to a capability.
68 * openat(2) with regular file descriptors in non-capability mode in test_relative()
79 * When not in capability mode, we don't actually require CAP_LOOKUP. in test_relative()
89 * This requires discussion: do we treat a capability with in test_relative()
90 * CAP_MASK_VALID *exactly* like a non-capability file descriptor in test_relative()
96 * A file opened relative to a capability should itself be a capability. in test_relative()
105 * Enter capability mode; now ALL lookups are strictly relative. in test_relative()
130 * Lookups containing '..' should fail in capability mode. in test_relative()
140 * A file opened relative to a capability should itself be a capability. in test_relative()
/freebsd/contrib/capsicum-test/
H A Dcapmode.cc2 // available in capability mode. The goal is not to see if they work, just
64 EXPECT_OK(cap_enter()); // Enter capability mode. in FORK_TEST_F()
68 // System calls that are not permitted in capability mode. in FORK_TEST_F()
102 EXPECT_OK(cap_enter()); // Enter capability mode. in FORK_TEST_F()
104 // System calls that are not permitted in capability mode. in FORK_TEST_F()
118 EXPECT_OK(cap_enter()); // Enter capability mode. in FORK_TEST_F()
178 EXPECT_OK(cap_enter()); // Enter capability mode. in FORK_TEST_F()
189 // but they are allowed in capability mode, so errno != ECAPMODE. in FORK_TEST_F()
213 EXPECT_OK(cap_enter()); // Enter capability mode. in FORK_TEST_F()
215 // Creation of raw sockets is not permitted in capability mode. in FORK_TEST_F()
[all …]
/freebsd/tools/regression/capsicum/syscalls/
H A Dcap_getmode.c55 /* We are not in capability mode. */ in main()
66 /* If parent is not in capability mode, child after fork() also won't be. */ in main()
76 /* We are not in capability mode. */ in main()
84 /* If parent is not in capability mode, child after pdfork() also won't be. */ in main()
94 /* We are not in capability mode. */ in main()
103 /* In capability mode... */ in main()
111 /* We are in capability mode. */ in main()
122 /* If parent is in capability mode, child after fork() also will be. */ in main()
132 /* We are in capability mode. */ in main()
137 * wait(2) and friends are not permitted in the capability mod in main()
[all...]
/freebsd/contrib/llvm-project/llvm/lib/Target/SPIRV/MCTargetDesc/
H A DSPIRVBaseInfo.cpp38 Capability::Capability ReqCapability;
43 using namespace Capability;
118 const SPIRV::CapabilityEntry *Capability = in getSymbolicOperandCapabilities() local
122 while (Capability && Capability->Category == Category && in getSymbolicOperandCapabilities()
123 Capability->Value == Value) { in getSymbolicOperandCapabilities()
125 static_cast<SPIRV::Capability::Capability>(Capability->ReqCapability)); in getSymbolicOperandCapabilities()
126 ++Capability; in getSymbolicOperandCapabilities()
143 static_cast<SPIRV::Capability::Capability>(Entry->Value)); in getCapabilitiesEnabledByExtension()
/freebsd/sys/dev/pci/
H A Dhostb_pci.c40 * provides an AGP capability then we create a child agp device for the
196 pci_hostb_find_cap(device_t dev, device_t child, int capability, in pci_hostb_find_cap() argument
200 return (pci_find_cap(dev, capability, capreg)); in pci_hostb_find_cap()
204 pci_hostb_find_next_cap(device_t dev, device_t child, int capability, in pci_hostb_find_next_cap() argument
208 return (pci_find_next_cap(dev, capability, start, capreg)); in pci_hostb_find_next_cap()
212 pci_hostb_find_extcap(device_t dev, device_t child, int capability, in pci_hostb_find_extcap() argument
216 return (pci_find_extcap(dev, capability, capreg)); in pci_hostb_find_extcap()
220 pci_hostb_find_next_extcap(device_t dev, device_t child, int capability, in pci_hostb_find_next_extcap() argument
224 return (pci_find_next_extcap(dev, capability, start, capreg)); in pci_hostb_find_next_extcap()
228 pci_hostb_find_htcap(device_t dev, device_t child, int capability, in pci_hostb_find_htcap() argument
[all …]
/freebsd/lib/libutil/
H A Dlogin_cap.3259 capability record
353 capability records.
357 a capability tag as the second, and remaining parameters being
358 default and error values that are returned if the capability is
363 of capability each deals with, be it a simple string, a list,
373 Memory allocated during retrieval or processing of capability
379 This function returns a simple string capability.
388 capability tag as a list of values in a
401 Capability tags for which this function is called consist of a list of
406 associated with a particular capability tag with the value expressed
[all …]
/freebsd/lib/libsys/
H A Dcap_enter.235 .Nd Capability mode system calls
46 places the current process into capability mode, a mode of execution in which
51 If the process is already in a capability mode sandbox, the system call is a
57 will be placed in capability mode from inception.
68 returns a flag indicating whether or not the process is in a capability mode
74 capability mode sandbox, any syscall which results in either an
101 When the process is in capability mode,
104 A zero value means the process is not in capability mode.
145 These functions and the capability facility were created by
H A Dcap_rights_limit.238 .Nd limit capability rights
57 it is assigned all capability rights; for
62 it inherits capability rights from the "parent" file descriptor.
66 Once capability rights are reduced, operations on the file descriptor will be
76 Capability rights assigned to a file descriptor can be obtained with the
80 The complete list of the capability rights can be found in the
86 The following example demonstrates how to limit file descriptor capability
129 argument contains capability rights not present for the given file descriptor.
130 Capability rights list can only be reduced, never expanded.
/freebsd/lib/libcasper/services/cap_net/
H A Dcap_net.344 .Nd "library for networking in capability mode"
113 By default, the cap_net capability provides unrestricted access to the network
222 The following example first opens a capability to casper and then uses this
223 capability to create the
233 /* Open capability to Casper. */
241 /* Enter capability mode sandbox. */
243 err(1, "Unable to enter capability mode");
245 /* Use Casper capability to create capability to the system.net service. */
250 /* Close Casper capability. */
/freebsd/lib/libcasper/services/cap_pwd/
H A Dcap_pwd.341 .Nd "library for password database operations in capability mode"
167 The following example first opens a capability to casper and then uses this
168 capability to create the
178 /* Open capability to Casper. */
183 /* Enter capability mode sandbox. */
185 err(1, "Unable to enter capability mode");
187 /* Use Casper capability to create capability to the system.pwd service. */
192 /* Close Casper capability, we don't need it anymore. */

12345678910>>...51