Home
last modified time | relevance | path

Searched refs:PERMISSION_SYSTEM (Results 1 – 19 of 19) sorted by relevance

/system/netd/include/
DPermission.h41 PERMISSION_SYSTEM = 0x3, // Includes PERMISSION_NETWORK. enumerator
48 case PERMISSION_SYSTEM: return "SYSTEM"; in permissionToName()
/system/netd/server/
DFwmarkServer.cpp131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
DNetworkController.cpp208 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDnsLocked()
676 return ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) || in canProtectLocked()
770 return uid < FIRST_APPLICATION_UID ? PERMISSION_SYSTEM : PERMISSION_NONE; in getPermissionForUserLocked()
785 if ((userPermission & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in checkUserNetworkAccessLocked()
823 if ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in modifyRoute()
DNetdHwService.cpp67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork()
75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
DSockDiagTest.cpp297 { 42, false, PERMISSION_SYSTEM, },
300 { 42, true, PERMISSION_SYSTEM, },
303 { 43, false, PERMISSION_SYSTEM, },
306 { 43, true, PERMISSION_SYSTEM, },
428 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM; in shouldHaveClosedSocket()
DRouteController.cpp545 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
546 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
674 fwmark.permission = PERMISSION_SYSTEM; in addLegacyRouteRules()
675 mask.permission = PERMISSION_SYSTEM; in addLegacyRouteRules()
DTetherController.cpp258 fwmark.permission = PERMISSION_SYSTEM; in startTethering()
405 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders()
DClatdController.cpp424 fwmark.permission = PERMISSION_SYSTEM; in init()
DNetdNativeService.cpp1096 case INetd::PERMISSION_SYSTEM: in convertPermission()
1097 return Permission::PERMISSION_SYSTEM; in convertPermission()
DXfrmControllerTest.cpp441 EXPECT_EQ(PERMISSION_SYSTEM, fwmark.permission); in testIpSecAddSecurityAssociation()
DNdcDispatcher.cpp111 return INetd::PERMISSION_SYSTEM; in stringToINetdPermission()
DXfrmController.cpp1320 fwmark.permission = PERMISSION_SYSTEM; in fillNlAttrXfrmOutputMark()
/system/netd/server/aidl_api/netd_aidl_interface/1/android/net/
DINetd.aidl112 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/2/android/net/
DINetd.aidl133 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/3/android/net/
DINetd.aidl141 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/current/android/net/
DINetd.aidl144 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/binder/android/net/
DINetd.aidl896 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/4/android/net/
DINetd.aidl144 const int PERMISSION_SYSTEM = 2; field
/system/netd/tests/
Dbinder_test.cpp1724 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIpRuleExists()
1761 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIptablesRuleExists()
1822 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F()
1865 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F()
1982 status = mNetd->networkSetPermissionForNetwork(TEST_NETID1, INetd::PERMISSION_SYSTEM); in TEST_F()
1984 expectNetworkPermissionIpRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F()
1985 expectNetworkPermissionIptablesRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F()