Searched refs:rule (Results 1 - 6 of 6) sorted by relevance
/system/netd/server/ |
H A D | FirewallController.cpp | 86 // create default rule to drop all traffic 143 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { argument 155 if (rule == ALLOW) { 167 int FirewallController::setEgressSourceRule(const char* addr, FirewallRule rule) { argument 179 if (rule == ALLOW) { 192 FirewallRule rule) { 210 if (rule == ALLOW) { 239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 249 op = (rule == ALLOW)? "-I" : "-D"; 252 // When adding, append DROP rules at the end, after the RETURN rule tha 191 setEgressDestRule(const char* addr, int protocol, int port, FirewallRule rule) argument [all...] |
H A D | CommandListener.cpp | 166 // -D to delete any pre-existing jump rule (removes references 1256 ALOGE("failed to parse uid rule (%s)", arg); 1322 FirewallRule rule = parseRule(argv[3]); local 1324 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule); 1337 FirewallRule rule = parseRule(argv[3]); local 1339 int res = gCtls->firewallCtrl.setEgressSourceRule(addr, rule); 1353 FirewallRule rule = parseRule(argv[4]); local 1356 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_TCP, port, rule); 1357 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_UDP, port, rule); 1377 FirewallRule rule local [all...] |
H A D | RouteController.cpp | 253 // Adds or removes a routing rule for IPv4 and IPv6. 255 // + If |table| is non-zero, the rule points at the specified routing table. Otherwise, the table is 256 // unspecified. An unspecified table is not allowed when creating an FR_ACT_TO_TBL rule. 257 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is 259 // + If |iif| is non-NULL, the rule matches the specified incoming interface. 260 // + If |oif| is non-NULL, the rule matches the specified outgoing interface. 261 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that 262 // range (inclusive). Otherwise, the rule matches packets from all UIDs. 294 // Assemble a rule request and put it in an array of iovec structures. 295 fib_rule_hdr rule local [all...] |
/system/sepolicy/tools/ |
H A D | check_seapp.c | 129 int lineno; /** Line number rule was encounter on */ 136 rule_map *r; /** The rule map to store at that location */ 181 * rule map table entries (hash_entry), used for 200 * to a rule. 466 * Prints a rule map back to a file 470 * The rule map to print 487 * Compare two rule maps for equality 489 * a rule map to check 491 * a rule map to check 559 * Frees a rule ma 623 const key_map *rule; local [all...] |
/system/extras/tests/net_test/ |
H A D | multinetwork_test.py | 817 out = [(rule, attributes) for rule, attributes in rules 915 # Delete rule with mark 300 pointing at table 302. 918 # Check that the rule pointing at table 301 is still around.
|
H A D | multinetwork_base.py | 64 # Create a rule with the UID range selector. If the kernel doesn't understand 65 # the selector, it will create a rule with no selectors. 71 # Dump all the rules. If we find a rule using the UID range selector, then the 74 result = any("FRA_UID_START" in attrs for rule, attrs in rules) 76 # Delete the rule. 384 # Uncomment to look around at interface and rule configuration while
|
Completed in 188 milliseconds