Home
last modified time | relevance | path

Searched refs:tun (Results 1 – 25 of 28) sorted by relevance

12

/system/core/rootdir/
Dueventd.rc65 /dev/tun 0660 system vpn
Dinit.rc40 # symlink the Android specific /dev/tun to Linux expected /dev/net/tun
42 symlink ../tun /dev/net/tun
/system/sepolicy/prebuilts/api/31.0/public/
Dnetd.te22 # Allow netd to open /dev/tun, set it up and pass it to clatd
Dapp.te356 # Apps receive an open tun fd from the framework for
/system/sepolicy/public/
Dnetd.te22 # Allow netd to open /dev/tun, set it up and pass it to clatd
Dapp.te356 # Apps receive an open tun fd from the framework for
/system/sepolicy/prebuilts/api/30.0/public/
Dnetd.te22 # Allow netd to open /dev/tun, set it up and pass it to clatd
Dapp.te338 # Apps receive an open tun fd from the framework for
/system/sepolicy/prebuilts/api/29.0/public/
Dnetd.te22 # Allow netd to open /dev/tun, set it up and pass it to clatd
Dapp.te336 # Apps receive an open tun fd from the framework for
/system/netd/tests/
Dbinder_test.cpp1019 TunInterface tun; in TEST_F() local
1020 ASSERT_EQ(0, tun.init()); in TEST_F()
1022 mNetd->setProcSysNet(INetd::IPV6, INetd::CONF, tun.name(), "disable_ipv6", "1"); in TEST_F()
1024 status = mNetd->interfaceAddAddress(tun.name(), "2001:db8::1", 64); in TEST_F()
1027 tun.destroy(); in TEST_F()
1107 const std::string& tun = sTun.name(); in TEST_F() local
1111 EXPECT_TRUE(mNetd->getProcSysNet(ipversion, category, tun, parameter, &value).isOk()); in TEST_F()
1116 EXPECT_TRUE(mNetd->setProcSysNet(ipversion, category, tun, parameter, std::to_string(2 * ival)) in TEST_F()
1118 EXPECT_TRUE(mNetd->getProcSysNet(ipversion, category, tun, parameter, &value).isOk()); in TEST_F()
1121 EXPECT_TRUE(mNetd->setProcSysNet(ipversion, category, tun, parameter, std::to_string(ival)) in TEST_F()
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dapp.te322 # Apps receive an open tun fd from the framework for
Dsystem_server.te299 # tun device used for 3rd party vpn apps
Dfile_contexts159 /dev/tun u:object_r:tun_device:s0
/system/sepolicy/prebuilts/api/27.0/private/
Dapp.te330 # Apps receive an open tun fd from the framework for
Dfile_contexts161 /dev/tun u:object_r:tun_device:s0
Dsystem_server.te312 # tun device used for 3rd party vpn apps
/system/sepolicy/prebuilts/api/28.0/public/
Dapp.te348 # Apps receive an open tun fd from the framework for
/system/sepolicy/prebuilts/api/28.0/private/
Dfile_contexts168 /dev/tun u:object_r:tun_device:s0
Dsystem_server.te331 # tun device used for 3rd party vpn apps
/system/sepolicy/prebuilts/api/29.0/private/
Dfile_contexts164 /dev/tun u:object_r:tun_device:s0
Dsystem_server.te352 # tun device used for 3rd party vpn apps
/system/sepolicy/prebuilts/api/30.0/private/
Dfile_contexts170 /dev/tun u:object_r:tun_device:s0
/system/sepolicy/private/
Dfile_contexts187 /dev/tun u:object_r:tun_device:s0
/system/sepolicy/prebuilts/api/31.0/private/
Dfile_contexts187 /dev/tun u:object_r:tun_device:s0

12