Searched refs:chain (Results 1 - 3 of 3) sorted by relevance

/system/netd/server/
H A DFirewallController.cpp41 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need
101 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument
104 switch(chain) {
211 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument
212 switch(chain) {
224 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument
230 FirewallType firewallType = getFirewallType(chain);
240 switch(chain) {
256 ALOGW("Unknown child chain: %d", chain);
[all...]
H A DBandwidthController.h124 const char *chain,
133 std::string makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain);
158 * fp should be a file to the apropriate FORWARD chain of iptables rules.
192 * The FORWARD chain is updated in the following cases:
H A DBandwidthController.cpp72 * - quota'd rules in the costly chain should be before bw_penalty_box lookups.
77 * - global quota for all costly interfaces uses a single costly chain:
303 std::string BandwidthController::makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain) { argument
313 ALOGE("Append op not supported for %s uids", chain);
325 asprintf(&buff, "%s %s -m owner --uid-owner %d", opFlag, chain, uid);
404 const char *chain,
433 ALOGE(failLogTemplate, appStrUids[uidNum], appUids[uidNum], chain);
460 iptCmd = makeIptablesSpecialAppCmd(op, uid, chain);
462 ALOGE(failLogTemplate, appStrUids[uidNum], uid, chain);
470 iptCmd = makeIptablesSpecialAppCmd(IptOpDelete, appUids[uidNum], chain);
403 manipulateSpecialApps(int numUids, char *appStrUids[], const char *chain, std::list<int > &specialAppUids, IptJumpOp jumpHandling, SpecialAppOp appOp) argument
[all...]

Completed in 370 milliseconds