Home
last modified time | relevance | path

Searched refs:ALLOW (Results 1 – 7 of 7) sorted by relevance

/system/bpfprogs/
Dtime_in_state.c57 const int ALLOW = 1; // return 1 to avoid blocking simpleperf from receiving events. variable
60 if (!last) return ALLOW;
66 if (!active) return ALLOW;
70 if (!policyp) return ALLOW;
74 if (!policy_active) return ALLOW;
90 if (!args->prev_pid || !old_last) return ALLOW;
98 if (!freq_idxp || !*freq_idxp) return ALLOW;
182 return ALLOW;
217 const int ALLOW = 1; variable
241 return ALLOW;
/system/netd/server/
DFirewallControllerTest.cpp118 mFw.setUidRule(STANDBY, 12345, ALLOW); in TEST_F()
132 mFw.setUidRule(DOZABLE, 54321, ALLOW); in TEST_F()
158 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F()
272 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
275 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
DFirewallController.h34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
DTrafficControllerTest.cpp174 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST)); in checkUidOwnerRuleForChain()
185 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain()
191 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain()
575 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST))); in TEST_F()
585 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F()
589 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F()
598 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
599 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
DFirewallController.cpp197 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule()
240 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
DTrafficController.cpp500 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry()
502 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()
/system/sepolicy/tools/sepolicy-analyze/
DREADME34 DUPLICATE ALLOW RULES (dups)