/system/netd/include/ |
H A D | Permission.h | 23 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 24 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 25 // held by the app" or "no special permission is required to use the network". 30 // android.permission.INTERNET framework permission. 33 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 36 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an 44 permissionToName(Permission permission) argument [all...] |
H A D | Fwmark.h | 30 Permission permission : 2; member in struct:Fwmark::__anon2067
|
/system/netd/server/ |
H A D | PhysicalNetwork.cpp | 31 Permission permission, PhysicalNetwork::Delegate* delegate) { 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 36 if (int ret = delegate->addFallthrough(interface, permission)) { 43 Permission permission, 46 permission)) { 50 if (int ret = delegate->removeFallthrough(interface, permission)) { 72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument 73 if (permission == PERMISSION_NONE) return 0; 77 ALOGE("Error closing sockets for netId %d permission change", mNetId); 80 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, 30 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 42 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 101 setPermission(Permission permission) argument [all...] |
H A D | PhysicalNetwork.h | 33 Permission permission) WARN_UNUSED_RESULT = 0; 35 Permission permission) WARN_UNUSED_RESULT = 0; 43 int setPermission(Permission permission) WARN_UNUSED_RESULT; 52 int destroySocketsLackingPermission(Permission permission);
|
H A D | RouteController.h | 62 Permission permission) WARN_UNUSED_RESULT; 64 Permission permission) WARN_UNUSED_RESULT; 86 Permission permission) WARN_UNUSED_RESULT; 88 Permission permission) WARN_UNUSED_RESULT; 103 Permission permission) WARN_UNUSED_RESULT; 105 Permission permission) WARN_UNUSED_RESULT; 123 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission); 124 static int modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, 131 const char* physicalInterface, Permission permission); 146 Permission permission, boo [all...] |
H A D | FwmarkServer.cpp | 40 constexpr const char *UPDATE_DEVICE_STATS = "android.permission.UPDATE_DEVICE_STATS"; 126 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local 129 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { 169 permission = static_cast<Permission>(permission | fwmark.permission); 253 permission = PERMISSION_NONE; 279 permission = static_cast<Permission>(permission | fwmark.permission); [all...] |
H A D | RouteController.cpp | 436 Permission permission, bool add) { 442 fwmark.permission = permission; 508 fwmark.permission = PERMISSION_SYSTEM; 509 mask.permission = PERMISSION_SYSTEM; 525 Permission permission, uid_t uidStart, 536 fwmark.permission = permission; 537 mask.permission = permission; 435 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 547 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 599 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 718 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 821 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 976 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 985 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1053 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument 1057 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument 1080 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 1085 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument [all...] |
H A D | NetworkController.h | 101 int createPhysicalNetwork(unsigned netId, Permission permission) WARN_UNUSED_RESULT; 102 int createPhysicalOemNetwork(Permission permission, unsigned *netId) WARN_UNUSED_RESULT; 110 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 112 int setPermissionForNetworks(Permission permission, 153 int createPhysicalNetworkLocked(unsigned netId, Permission permission) WARN_UNUSED_RESULT;
|
H A D | NetworkController.cpp | 78 Permission permission, bool add) WARN_UNUSED_RESULT; 82 Permission permission) override WARN_UNUSED_RESULT; 84 Permission permission) override WARN_UNUSED_RESULT; 86 int modifyFallthrough(const std::string& physicalInterface, Permission permission, 101 Permission permission, bool add) { 105 permission)) { 113 permission)) { 123 Permission permission) { 124 return modifyFallthrough(physicalInterface, permission, true); 128 Permission permission) { 99 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 122 addFallthrough(const std::string& physicalInterface, Permission permission) argument 127 removeFallthrough(const std::string& physicalInterface, Permission permission) argument 132 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 358 createPhysicalNetworkLocked(unsigned netId, Permission permission) argument 384 createPhysicalNetwork(unsigned netId, Permission permission) argument 389 createPhysicalOemNetwork(Permission permission, unsigned *pNetId) argument 531 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument 544 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument 696 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local 831 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local [all...] |
H A D | NetdHwService.cpp | 69 Permission permission = PERMISSION_SYSTEM; local 71 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); 77 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | ClatdController.cpp | 78 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | SockDiag.h | 82 int destroySocketsLackingPermission(unsigned netId, Permission permission,
|
H A D | NetdNativeService.cpp | 53 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL"; 54 const char NETWORK_STACK[] = "android.permission.NETWORK_STACK"; 55 const char DUMP[] = "android.permission.DUMP"; 64 binder::Status checkPermission(const char *permission) { argument 68 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) { 71 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission); 87 #define ENFORCE_PERMISSION(permission) { \ 88 binder::Status status = checkPermission((permission)); \ 94 #define NETD_LOCKING_RPC(permission, loc 184 networkCreatePhysical(int32_t netId, const std::string& permission) argument [all...] |
H A D | SockDiagTest.cpp | 290 Permission permission; member in struct:android::net::__anon2101 357 fwmark.permission = permissionTestcases[i].permission; 424 Permission permission = permissionTestcases[i].permission; 425 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
|
H A D | CommandListener.cpp | 1369 // network create <netId> [permission] 1387 Permission permission = PERMISSION_NONE; local 1389 permission = stringToPermission(argv[3]); 1390 if (permission == PERMISSION_NONE) { 1391 return syntaxError(client, "Unknown permission"); 1394 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) { 1439 // network permission user set <permission> <uid> ... 1440 // network permission user clear <uid> ... 1441 // network permission networ 1448 Permission permission = PERMISSION_NONE; local [all...] |
H A D | SockDiag.cpp | 442 // 1. The opening app no longer has permission to use this network, or: 443 // 2. The opening app does have permission, but did not explicitly select this network. 450 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 466 controlMark.permission = permission; 487 // If explicit and permission bits match, go to the JMP below which rejects the socket 521 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) { 526 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 527 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | NetdNativeService.h | 47 binder::Status networkCreatePhysical(int32_t netId, const std::string& permission)
|
/system/extras/power_profile/gps_on/Application/src/main/java/com/example/android/powerprofile/gpson/ |
H A D | GpsActivity.java | 42 android.Manifest.permission.ACCESS_FINE_LOCATION); 46 new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION},
|
/system/security/keystore/ |
H A D | key_store_service.h | 199 * permission and if acting on other uids the grants to do so. 201 bool checkBinderPermission(perm_t permission, int32_t targetUid = UID_SELF); 205 * permission and the target uid is the caller or the caller is system. 207 bool checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid); 211 * permission or the target of the operation is the caller's uid. This is 212 * for operation where the permission is only for cross-uid activity and all 216 bool checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid); 219 * Helper method to check that the caller has the required permission as 222 * Returns NO_ERROR on success, PERMISSION_DENIED on a permission error and 226 KeyStoreServiceReturnCode checkBinderPermissionAndKeystoreState(perm_t permission, [all...] |
H A D | key_store_service.cpp | 651 ALOGW("permission denied for %d: getmtime", targetUid); 1554 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid()); 1678 sp<IBinder> binder = defaultServiceManager()->getService(String16("permission")); 1685 String16("android.permission.READ_PRIVILEGED_PHONE_STATE"), 1764 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only. 1910 * permission and if acting on other uids the grants to do so. 1912 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument 1915 if (!has_permission(callingUid, permission, spid)) { 1916 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUi 1930 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument 1947 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument 1965 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 87 tGATT_PERM perm = attr.permission; 171 attr16.permission, sec_flag, offset, read_long); 359 * perm: permission (authentication and key size requirements) 391 * perm: characteristic descriptor permission type. 521 tGATT_PERM perm = p_attr->permission; 526 VLOG(1) << StringPrintf("%s: p_attr->permission =0x%04x min_key_size==0x%04x", 527 __func__, p_attr->permission, min_key_size); 665 attr.permission = perm;
|
/system/netd/server/dns/ |
H A D | DnsTlsTransport.cpp | 186 fwmark.permission = PERMISSION_SYSTEM;
|
/system/netd/server/binder/android/net/ |
H A D | INetd.aidl | 62 // Network permission values. 70 * @param permission the permission necessary to use the network. Must be one of the 76 void networkCreatePhysical(int netId, @utf8InCpp String permission);
|
/system/extras/power_profile/camera_avg/Application/src/main/java/com/example/android/powerprofile/cameraavg/ |
H A D | CameraAvgFragment.java | 475 if (FragmentCompat.shouldShowRequestPermissionRationale(this, Manifest.permission.CAMERA)) { 478 FragmentCompat.requestPermissions(this, new String[]{Manifest.permission.CAMERA}, 614 if (ContextCompat.checkSelfPermission(getActivity(), Manifest.permission.CAMERA) 1016 * Shows OK/Cancel confirmation dialog about camera permission. 1029 new String[]{Manifest.permission.CAMERA},
|
/system/nfc/src/gki/common/ |
H A D | gki_buffer.cc | 897 ** permission - (input) GKI_PUBLIC_POOL or GKI_RESTRICTED_POOL 903 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument 907 if (permission == GKI_RESTRICTED_POOL) 1105 ** permission - (input) restricted or public access? 1115 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument 1144 (void)GKI_set_pool_permission(xx, permission);
|