Searched defs:rule (Results 1 - 7 of 7) sorted by relevance
/system/netd/server/ |
H A D | Controllers.cpp | 137 std::string rule; local 138 while (std::getline(stream, rule, '\n')) { 139 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) { 160 // than blindly deleting our rules and recreating them, because deleting a rule that doesn't
|
H A D | NetlinkCommands.cpp | 184 rtmsg rule = { local 189 { &rule, sizeof(rule) },
|
H A D | FirewallController.cpp | 83 // create default rule to drop all traffic 145 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { argument 157 // processes will terminate with "no such rule" errors and cause latency penalties while we 160 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { 163 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { 194 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument 201 op = (rule == ALLOW)? "-I" : "-D"; 204 // When adding, append DROP rules at the end, after the RETURN rule that matches TCP RSTs. 205 op = (rule == DENY)? "-A" : "-D";
|
H A D | CommandListener.cpp | 1083 ALOGE("failed to parse uid rule (%s)", arg); 1149 FirewallRule rule = parseRule(argv[3]); local 1151 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule); 1171 FirewallRule rule = parseRule(argv[4]); local 1172 int res = gCtls->firewallCtrl.setUidRule(childChain, uid, rule);
|
H A D | BandwidthController.cpp | 180 "-A bw_INPUT -m owner --socket-exists", /* This is a tracking rule. */ 181 "-A bw_OUTPUT -m owner --socket-exists", /* This is a tracking rule. */ 190 "-A bw_raw_PREROUTING -m owner --socket-exists", /* This is a tracking rule. */ 194 "-A bw_mangle_POSTROUTING -m owner --socket-exists", /* This is a tracking rule. */ 342 ALOGE("Failed set quota rule"); 456 ALOGE("Failed set quota rule"); 602 /* We only add the rule if this was the 1st tether added. */ 643 /* We only detete the rule if this was the last tether removed. */ 836 * The following assumes that the 1st rule has in:extIface out:intIface, 956 std::string rule; local [all...] |
H A D | RouteController.cpp | 216 // Adds or removes a routing rule for IPv4 and IPv6. 218 // + If |table| is non-zero, the rule points at the specified routing table. Otherwise, the table is 219 // unspecified. An unspecified table is not allowed when creating an FR_ACT_TO_TBL rule. 220 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is 222 // + If |iif| is non-NULL, the rule matches the specified incoming interface. 223 // + If |oif| is non-NULL, the rule matches the specified outgoing interface. 224 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that 225 // range (inclusive). Otherwise, the rule matches packets from all UIDs. 257 // Assemble a rule request and put it in an array of iovec structures. 258 fib_rule_hdr rule local [all...] |
/system/sepolicy/tools/ |
H A D | check_seapp.c | 129 int lineno; /** Line number rule was encounter on */ 136 rule_map *r; /** The rule map to store at that location */ 181 * rule map table entries (hash_entry), used for 201 * to a rule. 495 * Prints a rule map back to a file 499 * The rule map to print 516 * Compare two rule maps for equality 518 * a rule map to check 520 * a rule map to check 588 * Frees a rule ma 652 const key_map *rule; local [all...] |
Completed in 162 milliseconds