Home
last modified time | relevance | path

Searched refs:permission (Results 1 – 25 of 249) sorted by relevance

12345678910

/system/netd/server/
DPhysicalNetwork.cpp30 [[nodiscard]] int addToDefault(unsigned netId, const std::string& interface, Permission permission, in addToDefault() argument
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { in addToDefault()
36 if (int ret = delegate->addFallthrough(interface, permission)) { in addToDefault()
43 Permission permission, PhysicalNetwork::Delegate* delegate) { in removeFromDefault() argument
45 permission)) { in removeFromDefault()
49 if (int ret = delegate->removeFallthrough(interface, permission)) { in removeFromDefault()
69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { in destroySocketsLackingPermission() argument
70 if (permission == PERMISSION_NONE) return 0; in destroySocketsLackingPermission()
77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, in destroySocketsLackingPermission()
80 mNetId, permission, strerror(-ret)); in destroySocketsLackingPermission()
[all …]
DRouteController.h62 Permission permission);
65 Permission permission);
86 Permission permission);
88 Permission permission);
106 Permission permission);
109 Permission permission);
127 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission);
128 static int modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission,
136 const char* physicalInterface, Permission permission);
151 Permission permission, bool add);
DRouteController.cpp472 int modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, in modifyIncomingPacketMark() argument
479 fwmark.permission = permission; in modifyIncomingPacketMark()
545 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
546 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
562 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument
573 fwmark.permission = permission; in modifyExplicitNetworkRule()
574 mask.permission = permission; in modifyExplicitNetworkRule()
585 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules() argument
590 fwmark.permission = permission; in modifyOutputInterfaceRules()
591 mask.permission = permission; in modifyOutputInterfaceRules()
[all …]
DFwmarkServer.cpp128 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); in processClient() local
131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
174 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
264 permission = PERMISSION_NONE; in processClient()
290 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
327 fwmark.permission = permission; in processClient()
DPhysicalNetwork.h31 Permission permission) = 0;
33 Permission permission) = 0;
41 [[nodiscard]] int setPermission(Permission permission);
50 int destroySocketsLackingPermission(Permission permission);
DNetworkController.cpp74 Permission permission, bool add);
78 Permission permission) override;
80 Permission permission) override;
82 [[nodiscard]] int modifyFallthrough(const std::string& physicalInterface, Permission permission,
97 Permission permission, bool add) { in modifyFallthrough() argument
101 permission)) { in modifyFallthrough()
109 permission)) { in modifyFallthrough()
119 Permission permission) { in addFallthrough() argument
120 return modifyFallthrough(physicalInterface, permission, true); in addFallthrough()
124 Permission permission) { in removeFallthrough() argument
[all …]
DNetworkController.h105 [[nodiscard]] int createPhysicalNetwork(unsigned netId, Permission permission);
106 [[nodiscard]] int createPhysicalOemNetwork(Permission permission, unsigned* netId);
114 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
116 [[nodiscard]] int setPermissionForNetworks(Permission permission,
163 [[nodiscard]] int createPhysicalNetworkLocked(unsigned netId, Permission permission);
DNetdHwService.cpp67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork() local
69 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); in createOemNetwork()
75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
DSockDiagTest.cpp293 Permission permission; member
360 fwmark.permission = permissionTestcases[i].permission; in modifySocketForTest()
427 Permission permission = permissionTestcases[i].permission; in shouldHaveClosedSocket() local
428 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM; in shouldHaveClosedSocket()
DTrafficController.cpp118 const std::string UidPermissionTypeToString(int permission) { in UidPermissionTypeToString() argument
119 if (permission == INetd::PERMISSION_NONE) { in UidPermissionTypeToString()
122 if (permission == INetd::PERMISSION_UNINSTALLED) { in UidPermissionTypeToString()
127 FLAG_MSG_TRANS(permissionType, BPF_PERMISSION_INTERNET, permission); in UidPermissionTypeToString()
128 FLAG_MSG_TRANS(permissionType, BPF_PERMISSION_UPDATE_DEVICE_STATS, permission); in UidPermissionTypeToString()
129 if (permission) { in UidPermissionTypeToString()
130 return StringPrintf("Unknown permission: %u", permission); in UidPermissionTypeToString()
808 void TrafficController::setPermissionForUids(int permission, const std::vector<uid_t>& uids) { in setPermissionForUids() argument
810 if (permission == INetd::PERMISSION_UNINSTALLED) { in setPermissionForUids()
826 bool privileged = (permission & INetd::PERMISSION_UPDATE_DEVICE_STATS); in setPermissionForUids()
[all …]
/system/netd/include/
DPermission.h44 inline const char *permissionToName(Permission permission) { in permissionToName() argument
45 switch (permission) { in permissionToName()
DFwmark.h30 Permission permission : 2; member
/system/vold/
DVoldNativeServiceValidation.cpp41 binder::Status CheckPermission(const char* permission) { in CheckPermission() argument
45 if (checkCallingPermission(String16(permission), reinterpret_cast<int32_t*>(&pid), in CheckPermission()
50 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission)); in CheckPermission()
DVoldNativeServiceValidation.h31 binder::Status CheckPermission(const char* permission);
/system/sepolicy/prebuilts/api/29.0/private/
Dnetd.te11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
16 # TODO: Remove this permission when 4.9 kernel is deprecated.
Dbpfloader.te6 # These permission is required for pin bpf program for netd.
11 # Allow bpfloader to create bpf maps and programs. The map_read and map_write permission is needed
Dpolicy_capabilities4 # Enable open permission check.
/system/extras/power_profile/gps_on/Application/src/main/java/com/example/android/powerprofile/gpson/
DGpsActivity.java42 android.Manifest.permission.ACCESS_FINE_LOCATION); in onCreate()
46 new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, in onCreate()
/system/sepolicy/prebuilts/api/30.0/private/
Dnetd.te12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
17 # TODO: Remove this permission when 4.9 kernel is deprecated.
/system/sepolicy/prebuilts/api/26.0/private/
Dpolicy_capabilities4 # Enable open permission check.
/system/sepolicy/prebuilts/api/28.0/private/
Dpolicy_capabilities4 # Enable open permission check.
Dnetd.te14 # give netd permission to setup iptables rule with xt_bpf
/system/sepolicy/prebuilts/api/27.0/private/
Dpolicy_capabilities4 # Enable open permission check.
/system/sepolicy/private/
Dnetd.te12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
17 # TODO: Remove this permission when 4.9 kernel is deprecated.
Dpolicy_capabilities4 # Enable open permission check.

12345678910