/system/netd/include/ |
D | Permission.h | 41 PERMISSION_SYSTEM = 0x3, // Includes PERMISSION_NETWORK. enumerator 48 case PERMISSION_SYSTEM: return "SYSTEM"; in permissionToName()
|
/system/netd/server/ |
D | FwmarkServer.cpp | 131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient() 295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
|
D | NetworkController.cpp | 210 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDnsLocked() 703 return ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) || in canProtectLocked() 819 return uid < FIRST_APPLICATION_UID ? PERMISSION_SYSTEM : PERMISSION_NONE; in getPermissionForUserLocked() 835 if ((userPermission & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in checkUserNetworkAccessLocked() 889 if ((getPermissionForUserLocked(uid) & PERMISSION_SYSTEM) == PERMISSION_SYSTEM) { in modifyRoute()
|
D | NetdHwService.cpp | 67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork() 75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
|
D | SockDiagTest.cpp | 297 { 42, false, PERMISSION_SYSTEM, }, 300 { 42, true, PERMISSION_SYSTEM, }, 303 { 43, false, PERMISSION_SYSTEM, }, 306 { 43, true, PERMISSION_SYSTEM, }, 428 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM; in shouldHaveClosedSocket()
|
D | RouteController.cpp | 530 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 531 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 661 fwmark.permission = PERMISSION_SYSTEM; in addLegacyRouteRules() 662 mask.permission = PERMISSION_SYSTEM; in addLegacyRouteRules()
|
D | TetherController.cpp | 231 fwmark.permission = PERMISSION_SYSTEM; in startTethering() 378 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders()
|
D | ClatdController.cpp | 382 fwmark.permission = PERMISSION_SYSTEM; in init()
|
D | NetdNativeService.cpp | 1134 case INetd::PERMISSION_SYSTEM: in convertPermission() 1135 return Permission::PERMISSION_SYSTEM; in convertPermission()
|
D | XfrmControllerTest.cpp | 441 EXPECT_EQ(PERMISSION_SYSTEM, fwmark.permission); in testIpSecAddSecurityAssociation()
|
D | NdcDispatcher.cpp | 111 return INetd::PERMISSION_SYSTEM; in stringToINetdPermission()
|
D | XfrmController.cpp | 1400 fwmark.permission = PERMISSION_SYSTEM; in fillNlAttrXfrmOutputMark()
|
/system/netd/server/aidl_api/netd_aidl_interface/1/android/net/ |
D | INetd.aidl | 112 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/2/android/net/ |
D | INetd.aidl | 133 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/3/android/net/ |
D | INetd.aidl | 141 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/4/android/net/ |
D | INetd.aidl | 144 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/7/android/net/ |
D | INetd.aidl | 171 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/6/android/net/ |
D | INetd.aidl | 169 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/binder/android/net/ |
D | INetd.aidl | 916 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/current/android/net/ |
D | INetd.aidl | 171 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/server/aidl_api/netd_aidl_interface/5/android/net/ |
D | INetd.aidl | 144 const int PERMISSION_SYSTEM = 2; field
|
/system/netd/tests/ |
D | binder_test.cpp | 1848 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIpRuleExists() 1886 case INetd::PERMISSION_SYSTEM: in expectNetworkPermissionIptablesRuleExists() 1949 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F() 1992 EXPECT_TRUE(mNetd->networkSetPermissionForUser(INetd::PERMISSION_SYSTEM, testUids).isOk()); in TEST_F() 2111 status = mNetd->networkSetPermissionForNetwork(TEST_NETID1, INetd::PERMISSION_SYSTEM); in TEST_F() 2113 expectNetworkPermissionIpRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F() 2114 expectNetworkPermissionIptablesRuleExists(sTun.name().c_str(), INetd::PERMISSION_SYSTEM); in TEST_F() 4069 expected.permission = (uid == AID_ROOT) ? PERMISSION_SYSTEM : PERMISSION_NONE; in expectPacketSentOnNetId() 4091 expected.permission = (uid == AID_ROOT) ? PERMISSION_SYSTEM : PERMISSION_NONE; in expectUnreachableError() 4303 createPhysicalNetwork(APP_DEFAULT_NETID, sTun2.name(), INetd::PERMISSION_SYSTEM); in TEST_F()
|