Home
last modified time | relevance | path

Searched refs:PERMISSION_SYSTEM (Results 1 – 22 of 22) sorted by relevance

/system/netd/include/
DPermission.h41 PERMISSION_SYSTEM = 0x3, // Includes PERMISSION_NETWORK. enumerator
48 case PERMISSION_SYSTEM: return "SYSTEM"; in permissionToName()
/system/netd/server/
DFwmarkServer.cpp131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
DNetworkController.cpp210 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDnsLocked()
703 return ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) || in canProtectLocked()
819 return uid < FIRST_APPLICATION_UID ? PERMISSION_SYSTEM : PERMISSION_NONE; in getPermissionForUserLocked()
835 if ((userPermission & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in checkUserNetworkAccessLocked()
889 if ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in modifyRoute()
DNetdHwService.cpp67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork()
75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
DSockDiagTest.cpp297 { 42, false, PERMISSION_SYSTEM, },
300 { 42, true, PERMISSION_SYSTEM, },
303 { 43, false, PERMISSION_SYSTEM, },
306 { 43, true, PERMISSION_SYSTEM, },
428 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM; in shouldHaveClosedSocket()
DRouteController.cpp530 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
531 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
661 fwmark.permission = PERMISSION_SYSTEM; in addLegacyRouteRules()
662 mask.permission = PERMISSION_SYSTEM; in addLegacyRouteRules()
DTetherController.cpp231 fwmark.permission = PERMISSION_SYSTEM; in startTethering()
378 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders()
DClatdController.cpp382 fwmark.permission = PERMISSION_SYSTEM; in init()
DNetdNativeService.cpp1134 case INetd::PERMISSION_SYSTEM: in convertPermission()
1135 return Permission::PERMISSION_SYSTEM; in convertPermission()
DXfrmControllerTest.cpp441 EXPECT_EQ(PERMISSION_SYSTEM, fwmark.permission); in testIpSecAddSecurityAssociation()
DNdcDispatcher.cpp111 return INetd::PERMISSION_SYSTEM; in stringToINetdPermission()
DXfrmController.cpp1400 fwmark.permission = PERMISSION_SYSTEM; in fillNlAttrXfrmOutputMark()
/system/netd/server/aidl_api/netd_aidl_interface/1/android/net/
DINetd.aidl112 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/2/android/net/
DINetd.aidl133 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/3/android/net/
DINetd.aidl141 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/4/android/net/
DINetd.aidl144 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/7/android/net/
DINetd.aidl171 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/6/android/net/
DINetd.aidl169 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/binder/android/net/
DINetd.aidl916 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/current/android/net/
DINetd.aidl171 const int PERMISSION_SYSTEM = 2; field
/system/netd/server/aidl_api/netd_aidl_interface/5/android/net/
DINetd.aidl144 const int PERMISSION_SYSTEM = 2; field
/system/netd/tests/
Dbinder_test.cpp1848 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIpRuleExists()
1886 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIptablesRuleExists()
1949 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F()
1992 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F()
2111 status = mNetd->networkSetPermissionForNetwork(TEST_NETID1, INetd::PERMISSION_SYSTEM); in TEST_F()
2113 expectNetworkPermissionIpRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F()
2114 expectNetworkPermissionIptablesRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F()
4069 expected.permission = (uid == AID_ROOT) ? PERMISSION_SYSTEM : PERMISSION_NONE; in expectPacketSentOnNetId()
4091 expected.permission = (uid == AID_ROOT) ? PERMISSION_SYSTEM : PERMISSION_NONE; in expectUnreachableError()
4303 createPhysicalNetwork(APP_DEFAULT_NETID, sTun2.name(), INetd::PERMISSION_SYSTEM); in TEST_F()