Searched defs:rule (Results 1 - 7 of 7) sorted by relevance

/system/netd/server/
H A DControllers.cpp137 std::string rule; local
138 while (std::getline(stream, rule, '\n')) {
139 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) {
160 // than blindly deleting our rules and recreating them, because deleting a rule that doesn't
H A DNetlinkCommands.cpp184 rtmsg rule = { local
189 { &rule, sizeof(rule) },
H A DFirewallController.cpp83 // create default rule to drop all traffic
145 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { argument
157 // processes will terminate with "no such rule" errors and cause latency penalties while we
160 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) {
163 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) {
194 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument
201 op = (rule == ALLOW)? "-I" : "-D";
204 // When adding, append DROP rules at the end, after the RETURN rule that matches TCP RSTs.
205 op = (rule == DENY)? "-A" : "-D";
H A DCommandListener.cpp1083 ALOGE("failed to parse uid rule (%s)", arg);
1149 FirewallRule rule = parseRule(argv[3]); local
1151 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule);
1171 FirewallRule rule = parseRule(argv[4]); local
1172 int res = gCtls->firewallCtrl.setUidRule(childChain, uid, rule);
H A DBandwidthController.cpp180 "-A bw_INPUT -m owner --socket-exists", /* This is a tracking rule. */
181 "-A bw_OUTPUT -m owner --socket-exists", /* This is a tracking rule. */
190 "-A bw_raw_PREROUTING -m owner --socket-exists", /* This is a tracking rule. */
194 "-A bw_mangle_POSTROUTING -m owner --socket-exists", /* This is a tracking rule. */
342 ALOGE("Failed set quota rule");
456 ALOGE("Failed set quota rule");
602 /* We only add the rule if this was the 1st tether added. */
643 /* We only detete the rule if this was the last tether removed. */
836 * The following assumes that the 1st rule has in:extIface out:intIface,
956 std::string rule; local
[all...]
H A DRouteController.cpp216 // Adds or removes a routing rule for IPv4 and IPv6.
218 // + If |table| is non-zero, the rule points at the specified routing table. Otherwise, the table is
219 // unspecified. An unspecified table is not allowed when creating an FR_ACT_TO_TBL rule.
220 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
222 // + If |iif| is non-NULL, the rule matches the specified incoming interface.
223 // + If |oif| is non-NULL, the rule matches the specified outgoing interface.
224 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that
225 // range (inclusive). Otherwise, the rule matches packets from all UIDs.
257 // Assemble a rule request and put it in an array of iovec structures.
258 fib_rule_hdr rule local
[all...]
/system/sepolicy/tools/
H A Dcheck_seapp.c129 int lineno; /** Line number rule was encounter on */
136 rule_map *r; /** The rule map to store at that location */
181 * rule map table entries (hash_entry), used for
201 * to a rule.
495 * Prints a rule map back to a file
499 * The rule map to print
516 * Compare two rule maps for equality
518 * a rule map to check
520 * a rule map to check
588 * Frees a rule ma
652 const key_map *rule; local
[all...]

Completed in 162 milliseconds