Searched refs:rule (Results 1 - 6 of 6) sorted by relevance

/system/netd/server/
H A DFirewallController.cpp86 // create default rule to drop all traffic
143 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { argument
155 if (rule == ALLOW) {
167 int FirewallController::setEgressSourceRule(const char* addr, FirewallRule rule) { argument
179 if (rule == ALLOW) {
192 FirewallRule rule) {
210 if (rule == ALLOW) {
239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument
249 op = (rule == ALLOW)? "-I" : "-D";
252 // When adding, append DROP rules at the end, after the RETURN rule tha
191 setEgressDestRule(const char* addr, int protocol, int port, FirewallRule rule) argument
[all...]
H A DCommandListener.cpp166 // -D to delete any pre-existing jump rule (removes references
1256 ALOGE("failed to parse uid rule (%s)", arg);
1322 FirewallRule rule = parseRule(argv[3]); local
1324 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule);
1337 FirewallRule rule = parseRule(argv[3]); local
1339 int res = gCtls->firewallCtrl.setEgressSourceRule(addr, rule);
1353 FirewallRule rule = parseRule(argv[4]); local
1356 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_TCP, port, rule);
1357 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_UDP, port, rule);
1377 FirewallRule rule local
[all...]
H A DRouteController.cpp253 // Adds or removes a routing rule for IPv4 and IPv6.
255 // + If |table| is non-zero, the rule points at the specified routing table. Otherwise, the table is
256 // unspecified. An unspecified table is not allowed when creating an FR_ACT_TO_TBL rule.
257 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
259 // + If |iif| is non-NULL, the rule matches the specified incoming interface.
260 // + If |oif| is non-NULL, the rule matches the specified outgoing interface.
261 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that
262 // range (inclusive). Otherwise, the rule matches packets from all UIDs.
294 // Assemble a rule request and put it in an array of iovec structures.
295 fib_rule_hdr rule local
[all...]
/system/sepolicy/tools/
H A Dcheck_seapp.c129 int lineno; /** Line number rule was encounter on */
136 rule_map *r; /** The rule map to store at that location */
181 * rule map table entries (hash_entry), used for
200 * to a rule.
466 * Prints a rule map back to a file
470 * The rule map to print
487 * Compare two rule maps for equality
489 * a rule map to check
491 * a rule map to check
559 * Frees a rule ma
623 const key_map *rule; local
[all...]
/system/extras/tests/net_test/
H A Dmultinetwork_test.py817 out = [(rule, attributes) for rule, attributes in rules
915 # Delete rule with mark 300 pointing at table 302.
918 # Check that the rule pointing at table 301 is still around.
H A Dmultinetwork_base.py64 # Create a rule with the UID range selector. If the kernel doesn't understand
65 # the selector, it will create a rule with no selectors.
71 # Dump all the rules. If we find a rule using the UID range selector, then the
74 result = any("FRA_UID_START" in attrs for rule, attrs in rules)
76 # Delete the rule.
384 # Uncomment to look around at interface and rule configuration while

Completed in 188 milliseconds