/system/netd/include/ |
H A D | Permission.h | 23 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 24 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 25 // held by the app" or "no special permission is required to use the network". 30 // android.permission.INTERNET framework permission. 33 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 36 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an 44 permissionToName(Permission permission) argument [all...] |
H A D | Fwmark.h | 30 Permission permission : 2; member in struct:Fwmark::__anon2067
|
/system/netd/server/ |
H A D | PhysicalNetwork.cpp | 31 Permission permission, PhysicalNetwork::Delegate* delegate) { 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 36 if (int ret = delegate->addFallthrough(interface, permission)) { 43 Permission permission, 46 permission)) { 50 if (int ret = delegate->removeFallthrough(interface, permission)) { 72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument 73 if (permission == PERMISSION_NONE) return 0; 77 ALOGE("Error closing sockets for netId %d permission change", mNetId); 80 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, 30 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 42 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 101 setPermission(Permission permission) argument [all...] |
H A D | FwmarkServer.cpp | 40 constexpr const char *UPDATE_DEVICE_STATS = "android.permission.UPDATE_DEVICE_STATS"; 126 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local 129 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { 169 permission = static_cast<Permission>(permission | fwmark.permission); 253 permission = PERMISSION_NONE; 279 permission = static_cast<Permission>(permission | fwmark.permission); [all...] |
H A D | NetdHwService.cpp | 69 Permission permission = PERMISSION_SYSTEM; local 71 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); 77 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | SockDiag.cpp | 442 // 1. The opening app no longer has permission to use this network, or: 443 // 2. The opening app does have permission, but did not explicitly select this network. 450 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 466 controlMark.permission = permission; 487 // If explicit and permission bits match, go to the JMP below which rejects the socket 521 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) { 526 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 527 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | CommandListener.cpp | 1369 // network create <netId> [permission] 1387 Permission permission = PERMISSION_NONE; local 1389 permission = stringToPermission(argv[3]); 1390 if (permission == PERMISSION_NONE) { 1391 return syntaxError(client, "Unknown permission"); 1394 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) { 1439 // network permission user set <permission> <uid> ... 1440 // network permission user clear <uid> ... 1441 // network permission networ 1448 Permission permission = PERMISSION_NONE; local [all...] |
H A D | NetworkController.cpp | 78 Permission permission, bool add) WARN_UNUSED_RESULT; 82 Permission permission) override WARN_UNUSED_RESULT; 84 Permission permission) override WARN_UNUSED_RESULT; 86 int modifyFallthrough(const std::string& physicalInterface, Permission permission, 101 Permission permission, bool add) { 105 permission)) { 113 permission)) { 123 Permission permission) { 124 return modifyFallthrough(physicalInterface, permission, true); 128 Permission permission) { 99 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 122 addFallthrough(const std::string& physicalInterface, Permission permission) argument 127 removeFallthrough(const std::string& physicalInterface, Permission permission) argument 132 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 358 createPhysicalNetworkLocked(unsigned netId, Permission permission) argument 384 createPhysicalNetwork(unsigned netId, Permission permission) argument 389 createPhysicalOemNetwork(Permission permission, unsigned *pNetId) argument 531 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument 544 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument 696 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local 831 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local [all...] |
H A D | SockDiagTest.cpp | 290 Permission permission; member in struct:android::net::__anon2101 357 fwmark.permission = permissionTestcases[i].permission; 424 Permission permission = permissionTestcases[i].permission; 425 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
|
H A D | NetdNativeService.cpp | 53 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL"; 54 const char NETWORK_STACK[] = "android.permission.NETWORK_STACK"; 55 const char DUMP[] = "android.permission.DUMP"; 64 binder::Status checkPermission(const char *permission) { argument 68 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) { 71 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission); 87 #define ENFORCE_PERMISSION(permission) { \ 88 binder::Status status = checkPermission((permission)); \ 94 #define NETD_LOCKING_RPC(permission, loc 184 networkCreatePhysical(int32_t netId, const std::string& permission) argument [all...] |
H A D | RouteController.cpp | 436 Permission permission, bool add) { 442 fwmark.permission = permission; 508 fwmark.permission = PERMISSION_SYSTEM; 509 mask.permission = PERMISSION_SYSTEM; 525 Permission permission, uid_t uidStart, 536 fwmark.permission = permission; 537 mask.permission = permission; 435 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 547 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 599 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 718 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 821 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 976 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 985 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1053 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument 1057 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument 1080 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 1085 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument [all...] |
/system/nfc/src/gki/common/ |
H A D | gki_buffer.cc | 897 ** permission - (input) GKI_PUBLIC_POOL or GKI_RESTRICTED_POOL 903 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument 907 if (permission == GKI_RESTRICTED_POOL) 1105 ** permission - (input) restricted or public access? 1115 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument 1144 (void)GKI_set_pool_permission(xx, permission);
|
/system/vold/ |
H A D | VoldNativeService.cpp | 50 constexpr const char* kDump = "android.permission.DUMP"; 81 binder::Status checkPermission(const char* permission) { argument 85 if (checkCallingPermission(String16(permission), reinterpret_cast<int32_t*>(&pid), 90 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission));
|
/system/bt/stack/gatt/ |
H A D | gatt_int.h | 171 tGATT_PERM permission; member in struct:__anon1004
|
/system/security/keystore/ |
H A D | key_store_service.cpp | 651 ALOGW("permission denied for %d: getmtime", targetUid); 1554 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid()); 1678 sp<IBinder> binder = defaultServiceManager()->getService(String16("permission")); 1685 String16("android.permission.READ_PRIVILEGED_PHONE_STATE"), 1764 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only. 1910 * permission and if acting on other uids the grants to do so. 1912 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument 1915 if (!has_permission(callingUid, permission, spid)) { 1916 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUi 1930 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument 1947 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument 1965 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument [all...] |