Searched refs:chain (Results 1 - 3 of 3) sorted by relevance
/system/netd/server/ |
H A D | FirewallController.cpp | 41 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need 101 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument 104 switch(chain) { 211 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument 212 switch(chain) { 224 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 230 FirewallType firewallType = getFirewallType(chain); 240 switch(chain) { 256 ALOGW("Unknown child chain: %d", chain); [all...] |
H A D | BandwidthController.h | 124 const char *chain, 133 std::string makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain); 158 * fp should be a file to the apropriate FORWARD chain of iptables rules. 192 * The FORWARD chain is updated in the following cases:
|
H A D | BandwidthController.cpp | 72 * - quota'd rules in the costly chain should be before bw_penalty_box lookups. 77 * - global quota for all costly interfaces uses a single costly chain: 303 std::string BandwidthController::makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain) { argument 313 ALOGE("Append op not supported for %s uids", chain); 325 asprintf(&buff, "%s %s -m owner --uid-owner %d", opFlag, chain, uid); 404 const char *chain, 433 ALOGE(failLogTemplate, appStrUids[uidNum], appUids[uidNum], chain); 460 iptCmd = makeIptablesSpecialAppCmd(op, uid, chain); 462 ALOGE(failLogTemplate, appStrUids[uidNum], uid, chain); 470 iptCmd = makeIptablesSpecialAppCmd(IptOpDelete, appUids[uidNum], chain); 403 manipulateSpecialApps(int numUids, char *appStrUids[], const char *chain, std::list<int > &specialAppUids, IptJumpOp jumpHandling, SpecialAppOp appOp) argument [all...] |
Completed in 370 milliseconds