Searched refs:ALLOW (Results 1 – 7 of 7) sorted by relevance
/system/bpfprogs/ |
D | time_in_state.c | 57 const int ALLOW = 1; // return 1 to avoid blocking simpleperf from receiving events. variable 60 if (!last) return ALLOW; 66 if (!active) return ALLOW; 70 if (!policyp) return ALLOW; 74 if (!policy_active) return ALLOW; 90 if (!args->prev_pid || !old_last) return ALLOW; 98 if (!freq_idxp || !*freq_idxp) return ALLOW; 182 return ALLOW; 217 const int ALLOW = 1; variable 241 return ALLOW;
|
/system/netd/server/ |
D | FirewallControllerTest.cpp | 118 mFw.setUidRule(STANDBY, 12345, ALLOW); in TEST_F() 132 mFw.setUidRule(DOZABLE, 54321, ALLOW); in TEST_F() 158 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F() 272 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F() 275 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
|
D | FirewallController.h | 34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
|
D | TrafficControllerTest.cpp | 174 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST)); in checkUidOwnerRuleForChain() 185 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain() 191 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain() 575 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST))); in TEST_F() 585 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F() 589 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F() 598 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F() 599 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
|
D | FirewallController.cpp | 197 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule() 240 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
|
D | TrafficController.cpp | 500 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry() 502 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 34 DUPLICATE ALLOW RULES (dups)
|