Searched defs:permission (Results 1 - 15 of 15) sorted by relevance

/system/netd/include/
H A DPermission.h23 // the permission the app (UID) has been granted. When applied to a network, it's the permission an
24 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is
25 // held by the app" or "no special permission is required to use the network".
30 // android.permission.INTERNET framework permission.
33 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission.
36 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an
44 permissionToName(Permission permission) argument
[all...]
H A DFwmark.h30 Permission permission : 2; member in struct:Fwmark::__anon2067
/system/netd/server/
H A DPhysicalNetwork.cpp31 Permission permission, PhysicalNetwork::Delegate* delegate) {
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
36 if (int ret = delegate->addFallthrough(interface, permission)) {
43 Permission permission,
46 permission)) {
50 if (int ret = delegate->removeFallthrough(interface, permission)) {
72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument
73 if (permission == PERMISSION_NONE) return 0;
77 ALOGE("Error closing sockets for netId %d permission change", mNetId);
80 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission,
30 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
42 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
101 setPermission(Permission permission) argument
[all...]
H A DFwmarkServer.cpp40 constexpr const char *UPDATE_DEVICE_STATS = "android.permission.UPDATE_DEVICE_STATS";
126 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local
129 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) {
169 permission = static_cast<Permission>(permission | fwmark.permission);
253 permission = PERMISSION_NONE;
279 permission = static_cast<Permission>(permission | fwmark.permission);
[all...]
H A DNetdHwService.cpp69 Permission permission = PERMISSION_SYSTEM; local
71 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId);
77 fwmark.permission = PERMISSION_SYSTEM;
H A DSockDiag.cpp442 // 1. The opening app no longer has permission to use this network, or:
443 // 2. The opening app does have permission, but did not explicitly select this network.
450 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument
466 controlMark.permission = permission;
487 // If explicit and permission bits match, go to the JMP below which rejects the socket
521 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) {
526 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms",
527 mSocketsDestroyed, netId, permission, s.timeTaken());
H A DCommandListener.cpp1369 // network create <netId> [permission]
1387 Permission permission = PERMISSION_NONE; local
1389 permission = stringToPermission(argv[3]);
1390 if (permission == PERMISSION_NONE) {
1391 return syntaxError(client, "Unknown permission");
1394 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) {
1439 // network permission user set <permission> <uid> ...
1440 // network permission user clear <uid> ...
1441 // network permission networ
1448 Permission permission = PERMISSION_NONE; local
[all...]
H A DNetworkController.cpp78 Permission permission, bool add) WARN_UNUSED_RESULT;
82 Permission permission) override WARN_UNUSED_RESULT;
84 Permission permission) override WARN_UNUSED_RESULT;
86 int modifyFallthrough(const std::string& physicalInterface, Permission permission,
101 Permission permission, bool add) {
105 permission)) {
113 permission)) {
123 Permission permission) {
124 return modifyFallthrough(physicalInterface, permission, true);
128 Permission permission) {
99 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument
122 addFallthrough(const std::string& physicalInterface, Permission permission) argument
127 removeFallthrough(const std::string& physicalInterface, Permission permission) argument
132 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument
358 createPhysicalNetworkLocked(unsigned netId, Permission permission) argument
384 createPhysicalNetwork(unsigned netId, Permission permission) argument
389 createPhysicalOemNetwork(Permission permission, unsigned *pNetId) argument
531 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument
544 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument
696 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local
831 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local
[all...]
H A DSockDiagTest.cpp290 Permission permission; member in struct:android::net::__anon2101
357 fwmark.permission = permissionTestcases[i].permission;
424 Permission permission = permissionTestcases[i].permission;
425 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
H A DNetdNativeService.cpp53 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL";
54 const char NETWORK_STACK[] = "android.permission.NETWORK_STACK";
55 const char DUMP[] = "android.permission.DUMP";
64 binder::Status checkPermission(const char *permission) { argument
68 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) {
71 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission);
87 #define ENFORCE_PERMISSION(permission) { \
88 binder::Status status = checkPermission((permission)); \
94 #define NETD_LOCKING_RPC(permission, loc
184 networkCreatePhysical(int32_t netId, const std::string& permission) argument
[all...]
H A DRouteController.cpp436 Permission permission, bool add) {
442 fwmark.permission = permission;
508 fwmark.permission = PERMISSION_SYSTEM;
509 mask.permission = PERMISSION_SYSTEM;
525 Permission permission, uid_t uidStart,
536 fwmark.permission = permission;
537 mask.permission = permission;
435 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument
524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
547 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
599 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
718 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
821 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument
976 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
985 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
1053 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument
1057 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument
1080 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
1085 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
[all...]
/system/nfc/src/gki/common/
H A Dgki_buffer.cc897 ** permission - (input) GKI_PUBLIC_POOL or GKI_RESTRICTED_POOL
903 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument
907 if (permission == GKI_RESTRICTED_POOL)
1105 ** permission - (input) restricted or public access?
1115 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument
1144 (void)GKI_set_pool_permission(xx, permission);
/system/vold/
H A DVoldNativeService.cpp50 constexpr const char* kDump = "android.permission.DUMP";
81 binder::Status checkPermission(const char* permission) { argument
85 if (checkCallingPermission(String16(permission), reinterpret_cast<int32_t*>(&pid),
90 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission));
/system/bt/stack/gatt/
H A Dgatt_int.h171 tGATT_PERM permission; member in struct:__anon1004
/system/security/keystore/
H A Dkey_store_service.cpp651 ALOGW("permission denied for %d: getmtime", targetUid);
1554 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid());
1678 sp<IBinder> binder = defaultServiceManager()->getService(String16("permission"));
1685 String16("android.permission.READ_PRIVILEGED_PHONE_STATE"),
1764 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only.
1910 * permission and if acting on other uids the grants to do so.
1912 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument
1915 if (!has_permission(callingUid, permission, spid)) {
1916 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUi
1930 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument
1947 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument
1965 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument
[all...]

Completed in 305 milliseconds