/system/netd/server/ |
D | PhysicalNetwork.cpp | 30 [[nodiscard]] int addToDefault(unsigned netId, const std::string& interface, Permission permission, in addToDefault() argument 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { in addToDefault() 36 if (int ret = delegate->addFallthrough(interface, permission)) { in addToDefault() 43 Permission permission, PhysicalNetwork::Delegate* delegate) { in removeFromDefault() argument 45 permission)) { in removeFromDefault() 49 if (int ret = delegate->removeFallthrough(interface, permission)) { in removeFromDefault() 69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { in destroySocketsLackingPermission() argument 70 if (permission == PERMISSION_NONE) return 0; in destroySocketsLackingPermission() 77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, in destroySocketsLackingPermission() 80 mNetId, permission, strerror(-ret)); in destroySocketsLackingPermission() [all …]
|
D | RouteController.h | 62 Permission permission); 65 Permission permission); 86 Permission permission); 88 Permission permission); 106 Permission permission); 109 Permission permission); 127 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission); 128 static int modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, 136 const char* physicalInterface, Permission permission); 151 Permission permission, bool add);
|
D | RouteController.cpp | 472 int modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, in modifyIncomingPacketMark() argument 479 fwmark.permission = permission; in modifyIncomingPacketMark() 545 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 546 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 562 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument 573 fwmark.permission = permission; in modifyExplicitNetworkRule() 574 mask.permission = permission; in modifyExplicitNetworkRule() 585 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules() argument 590 fwmark.permission = permission; in modifyOutputInterfaceRules() 591 mask.permission = permission; in modifyOutputInterfaceRules() [all …]
|
D | FwmarkServer.cpp | 128 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); in processClient() local 131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient() 174 permission = static_cast<Permission>(permission | fwmark.permission); in processClient() 264 permission = PERMISSION_NONE; in processClient() 290 permission = static_cast<Permission>(permission | fwmark.permission); in processClient() 295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient() 327 fwmark.permission = permission; in processClient()
|
D | PhysicalNetwork.h | 31 Permission permission) = 0; 33 Permission permission) = 0; 41 [[nodiscard]] int setPermission(Permission permission); 50 int destroySocketsLackingPermission(Permission permission);
|
D | NetworkController.cpp | 74 Permission permission, bool add); 78 Permission permission) override; 80 Permission permission) override; 82 [[nodiscard]] int modifyFallthrough(const std::string& physicalInterface, Permission permission, 97 Permission permission, bool add) { in modifyFallthrough() argument 101 permission)) { in modifyFallthrough() 109 permission)) { in modifyFallthrough() 119 Permission permission) { in addFallthrough() argument 120 return modifyFallthrough(physicalInterface, permission, true); in addFallthrough() 124 Permission permission) { in removeFallthrough() argument [all …]
|
D | NetworkController.h | 105 [[nodiscard]] int createPhysicalNetwork(unsigned netId, Permission permission); 106 [[nodiscard]] int createPhysicalOemNetwork(Permission permission, unsigned* netId); 114 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 116 [[nodiscard]] int setPermissionForNetworks(Permission permission, 163 [[nodiscard]] int createPhysicalNetworkLocked(unsigned netId, Permission permission);
|
D | NetdHwService.cpp | 67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork() local 69 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); in createOemNetwork() 75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
|
D | SockDiagTest.cpp | 293 Permission permission; member 360 fwmark.permission = permissionTestcases[i].permission; in modifySocketForTest() 427 Permission permission = permissionTestcases[i].permission; in shouldHaveClosedSocket() local 428 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM; in shouldHaveClosedSocket()
|
D | TrafficController.cpp | 118 const std::string UidPermissionTypeToString(int permission) { in UidPermissionTypeToString() argument 119 if (permission == INetd::PERMISSION_NONE) { in UidPermissionTypeToString() 122 if (permission == INetd::PERMISSION_UNINSTALLED) { in UidPermissionTypeToString() 127 FLAG_MSG_TRANS(permissionType, BPF_PERMISSION_INTERNET, permission); in UidPermissionTypeToString() 128 FLAG_MSG_TRANS(permissionType, BPF_PERMISSION_UPDATE_DEVICE_STATS, permission); in UidPermissionTypeToString() 129 if (permission) { in UidPermissionTypeToString() 130 return StringPrintf("Unknown permission: %u", permission); in UidPermissionTypeToString() 808 void TrafficController::setPermissionForUids(int permission, const std::vector<uid_t>& uids) { in setPermissionForUids() argument 810 if (permission == INetd::PERMISSION_UNINSTALLED) { in setPermissionForUids() 826 bool privileged = (permission & INetd::PERMISSION_UPDATE_DEVICE_STATS); in setPermissionForUids() [all …]
|
/system/netd/include/ |
D | Permission.h | 44 inline const char *permissionToName(Permission permission) { in permissionToName() argument 45 switch (permission) { in permissionToName()
|
D | Fwmark.h | 30 Permission permission : 2; member
|
/system/vold/ |
D | VoldNativeServiceValidation.cpp | 41 binder::Status CheckPermission(const char* permission) { in CheckPermission() argument 45 if (checkCallingPermission(String16(permission), reinterpret_cast<int32_t*>(&pid), in CheckPermission() 50 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission)); in CheckPermission()
|
D | VoldNativeServiceValidation.h | 31 binder::Status CheckPermission(const char* permission);
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | netd.te | 11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write 16 # TODO: Remove this permission when 4.9 kernel is deprecated.
|
D | bpfloader.te | 6 # These permission is required for pin bpf program for netd. 11 # Allow bpfloader to create bpf maps and programs. The map_read and map_write permission is needed
|
D | policy_capabilities | 4 # Enable open permission check.
|
/system/extras/power_profile/gps_on/Application/src/main/java/com/example/android/powerprofile/gpson/ |
D | GpsActivity.java | 42 android.Manifest.permission.ACCESS_FINE_LOCATION); in onCreate() 46 new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, in onCreate()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | netd.te | 12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write 17 # TODO: Remove this permission when 4.9 kernel is deprecated.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|
D | netd.te | 14 # give netd permission to setup iptables rule with xt_bpf
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|
/system/sepolicy/private/ |
D | netd.te | 12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write 17 # TODO: Remove this permission when 4.9 kernel is deprecated.
|
D | policy_capabilities | 4 # Enable open permission check.
|