/system/netd/server/ |
D | PhysicalNetwork.cpp | 30 [[nodiscard]] int addToDefault(unsigned netId, const std::string& interface, Permission permission, in addToDefault() argument 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { in addToDefault() 36 if (int ret = delegate->addFallthrough(interface, permission)) { in addToDefault() 43 Permission permission, PhysicalNetwork::Delegate* delegate) { in removeFromDefault() argument 45 permission)) { in removeFromDefault() 49 if (int ret = delegate->removeFallthrough(interface, permission)) { in removeFromDefault() 69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { in destroySocketsLackingPermission() argument 70 if (permission == PERMISSION_NONE) return 0; in destroySocketsLackingPermission() 77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, in destroySocketsLackingPermission() 80 mNetId, permission, strerror(-ret)); in destroySocketsLackingPermission() [all …]
|
D | RouteController.cpp | 457 int modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, in modifyIncomingPacketMark() argument 464 fwmark.permission = permission; in modifyIncomingPacketMark() 530 fwmark.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 531 mask.permission = PERMISSION_SYSTEM; in modifyVpnSystemPermissionRule() 547 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument 558 fwmark.permission = permission; in modifyExplicitNetworkRule() 559 mask.permission = permission; in modifyExplicitNetworkRule() 571 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules() argument 576 fwmark.permission = permission; in modifyOutputInterfaceRules() 577 mask.permission = permission; in modifyOutputInterfaceRules() [all …]
|
D | RouteController.h | 110 Permission permission, 114 Permission permission, 138 Permission permission); 140 Permission permission); 158 Permission permission); 161 Permission permission); 191 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission); 193 const UidRangeMap& uidRangeMap, Permission permission, 202 const char* physicalInterface, Permission permission); 217 Permission permission, bool add);
|
D | FwmarkServer.cpp | 128 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); in processClient() local 131 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient() 174 permission = static_cast<Permission>(permission | fwmark.permission); in processClient() 264 permission = PERMISSION_NONE; in processClient() 290 permission = static_cast<Permission>(permission | fwmark.permission); in processClient() 295 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { in processClient() 327 fwmark.permission = permission; in processClient()
|
D | NetworkController.cpp | 75 Permission permission, bool add); 79 Permission permission) override; 81 Permission permission) override; 83 [[nodiscard]] int modifyFallthrough(const std::string& physicalInterface, Permission permission, 98 Permission permission, bool add) { in modifyFallthrough() argument 102 permission)) { in modifyFallthrough() 110 permission)) { in modifyFallthrough() 120 Permission permission) { in addFallthrough() argument 121 return modifyFallthrough(physicalInterface, permission, true); in addFallthrough() 125 Permission permission) { in removeFallthrough() argument [all …]
|
D | PhysicalNetwork.h | 31 Permission permission) = 0; 33 Permission permission) = 0; 41 [[nodiscard]] int setPermission(Permission permission); 54 int destroySocketsLackingPermission(Permission permission);
|
D | NetworkController.h | 108 [[nodiscard]] int createPhysicalNetwork(unsigned netId, Permission permission); 109 [[nodiscard]] int createPhysicalOemNetwork(Permission permission, unsigned* netId); 117 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 119 [[nodiscard]] int setPermissionForNetworks(Permission permission, 167 [[nodiscard]] int createPhysicalNetworkLocked(unsigned netId, Permission permission);
|
D | NetdHwService.cpp | 67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork() local 69 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); in createOemNetwork() 75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
|
/system/netd/include/ |
D | Permission.h | 44 inline const char *permissionToName(Permission permission) { in permissionToName() argument 45 switch (permission) { in permissionToName()
|
D | Fwmark.h | 30 Permission permission : 2; member
|
/system/vold/ |
D | VoldNativeServiceValidation.cpp | 41 binder::Status CheckPermission(const char* permission) { in CheckPermission() argument 45 if (checkCallingPermission(String16(permission), &pid, &uid)) { in CheckPermission() 49 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission)); in CheckPermission()
|
/system/security/keystore2/src/ |
D | utils.rs | 19 use crate::permission; 20 use crate::permission::{KeyPerm, KeyPermSet, KeystorePerm}; 46 permission::check_keystore_permission( in check_keystore_permission() 60 permission::check_grant_permission( in check_grant_permission() 79 permission::check_key_permission( in check_key_permission()
|
D | lib.rs | 37 pub mod permission; module
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | netd.te | 11 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write 16 # TODO: Remove this permission when 4.9 kernel is deprecated.
|
D | bpfloader.te | 6 # These permission is required for pin bpf program for netd. 11 # Allow bpfloader to create bpf maps and programs. The map_read and map_write permission is needed
|
/system/extras/power_profile/gps_on/Application/src/main/java/com/example/android/powerprofile/gpson/ |
D | GpsActivity.java | 42 android.Manifest.permission.ACCESS_FINE_LOCATION); in onCreate() 46 new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, in onCreate()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | netd.te | 12 # give netd permission to setup iptables rule with xt_bpf, attach program to cgroup, and read/write 17 # TODO: Remove this permission when 4.9 kernel is deprecated.
|
/system/chre/core/ |
D | nanoapp.cc | 175 bool Nanoapp::permitPermissionUse(uint32_t permission) const { in permitPermissionUse() 177 ((getAppPermissions() & permission) == permission); in permitPermissionUse()
|
/system/netd/server/binder/android/net/ |
D | NativeNetworkConfig.aidl | 42 int permission;
|
/system/netd/server/aidl_api/netd_aidl_interface/7/android/net/ |
D | NativeNetworkConfig.aidl | 40 int permission;
|
/system/netd/server/aidl_api/netd_aidl_interface/current/android/net/ |
D | NativeNetworkConfig.aidl | 40 int permission;
|
/system/netd/server/aidl_api/netd_aidl_interface/6/android/net/ |
D | NativeNetworkConfig.aidl | 40 int permission;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | policy_capabilities | 4 # Enable open permission check.
|