Home
last modified time | relevance | path

Searched refs:permission (Results 1 – 25 of 306) sorted by relevance

12345678910>>...13

/system/netd/server/
DPhysicalNetwork.cpp30 [[nodiscard]] int addToDefault(unsigned netId, const std::string& interface, Permission permission, in addToDefault() argument
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { in addToDefault()
36 if (int ret = delegate->addFallthrough(interface, permission)) { in addToDefault()
43 Permission permission, PhysicalNetwork::Delegate* delegate) { in removeFromDefault() argument
45 permission)) { in removeFromDefault()
49 if (int ret = delegate->removeFallthrough(interface, permission)) { in removeFromDefault()
69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { in destroySocketsLackingPermission() argument
70 if (permission == PERMISSION_NONE) return 0; in destroySocketsLackingPermission()
77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, in destroySocketsLackingPermission()
80 mNetId, permission, strerror(-ret)); in destroySocketsLackingPermission()
[all …]
DRouteController.cpp457 int modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, in modifyIncomingPacketMark() argument
464 fwmark.permission = permission; in modifyIncomingPacketMark()
530 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
531 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule()
547 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument
558 fwmark.permission = permission; in modifyExplicitNetworkRule()
559 mask.permission = permission; in modifyExplicitNetworkRule()
571 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules() argument
576 fwmark.permission = permission; in modifyOutputInterfaceRules()
577 mask.permission = permission; in modifyOutputInterfaceRules()
[all …]
DRouteController.h110 Permission permission,
114 Permission permission,
138 Permission permission);
140 Permission permission);
158 Permission permission);
161 Permission permission);
191 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission);
193 const UidRangeMap& uidRangeMap, Permission permission,
202 const char* physicalInterface, Permission permission);
217 Permission permission, bool add);
DFwmarkServer.cpp128 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); in processClient() local
131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
174 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
264 permission = PERMISSION_NONE; in processClient()
290 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient()
327 fwmark.permission = permission; in processClient()
DNetworkController.cpp75 Permission permission, bool add);
79 Permission permission) override;
81 Permission permission) override;
83 [[nodiscard]] int modifyFallthrough(const std::string& physicalInterface, Permission permission,
98 Permission permission, bool add) { in modifyFallthrough() argument
102 permission)) { in modifyFallthrough()
110 permission)) { in modifyFallthrough()
120 Permission permission) { in addFallthrough() argument
121 return modifyFallthrough(physicalInterface, permission, true); in addFallthrough()
125 Permission permission) { in removeFallthrough() argument
[all …]
DPhysicalNetwork.h31 Permission permission) = 0;
33 Permission permission) = 0;
41 [[nodiscard]] int setPermission(Permission permission);
54 int destroySocketsLackingPermission(Permission permission);
DNetworkController.h108 [[nodiscard]] int createPhysicalNetwork(unsigned netId, Permission permission);
109 [[nodiscard]] int createPhysicalOemNetwork(Permission permission, unsigned* netId);
117 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
119 [[nodiscard]] int setPermissionForNetworks(Permission permission,
167 [[nodiscard]] int createPhysicalNetworkLocked(unsigned netId, Permission permission);
DNetdHwService.cpp67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork() local
69 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); in createOemNetwork()
75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
/system/netd/include/
DPermission.h44 inline const char *permissionToName(Permission permission) { in permissionToName() argument
45 switch (permission) { in permissionToName()
DFwmark.h30 Permission permission : 2; member
/system/vold/
DVoldNativeServiceValidation.cpp41 binder::Status CheckPermission(const char* permission) { in CheckPermission() argument
45 if (checkCallingPermission(String16(permission), &pid, &uid)) { in CheckPermission()
49 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission)); in CheckPermission()
/system/security/keystore2/src/
Dutils.rs19 use crate::permission;
20 use crate::permission::{KeyPerm, KeyPermSet, KeystorePerm};
46 permission::check_keystore_permission( in check_keystore_permission()
60 permission::check_grant_permission( in check_grant_permission()
79 permission::check_key_permission( in check_key_permission()
Dlib.rs37 pub mod permission; module
/system/sepolicy/prebuilts/api/29.0/private/
Dnetd.te11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
16 # TODO: Remove this permission when 4.9 kernel is deprecated.
Dbpfloader.te6 # These permission is required for pin bpf program for netd.
11 # Allow bpfloader to create bpf maps and programs. The map_read and map_write permission is needed
/system/extras/power_profile/gps_on/Application/src/main/java/com/example/android/powerprofile/gpson/
DGpsActivity.java42 android.Manifest.permission.ACCESS_FINE_LOCATION); in onCreate()
46 new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, in onCreate()
/system/sepolicy/prebuilts/api/30.0/private/
Dnetd.te12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write
17 # TODO: Remove this permission when 4.9 kernel is deprecated.
/system/chre/core/
Dnanoapp.cc175 bool Nanoapp::permitPermissionUse(uint32_t permission) const { in permitPermissionUse()
177 ((getAppPermissions() & permission) == permission); in permitPermissionUse()
/system/netd/server/binder/android/net/
DNativeNetworkConfig.aidl42 int permission;
/system/netd/server/aidl_api/netd_aidl_interface/7/android/net/
DNativeNetworkConfig.aidl40 int permission;
/system/netd/server/aidl_api/netd_aidl_interface/current/android/net/
DNativeNetworkConfig.aidl40 int permission;
/system/netd/server/aidl_api/netd_aidl_interface/6/android/net/
DNativeNetworkConfig.aidl40 int permission;
/system/sepolicy/prebuilts/api/27.0/private/
Dpolicy_capabilities4 # Enable open permission check.
/system/sepolicy/prebuilts/api/26.0/private/
Dpolicy_capabilities4 # Enable open permission check.
/system/sepolicy/prebuilts/api/28.0/private/
Dpolicy_capabilities4 # Enable open permission check.

12345678910>>...13