/system/logging/logd/ |
D | PruneList.cpp | 176 for (const auto& rule : low_priority_prune_) { in Format() local 177 prune_rules.emplace_back(rule.Format()); in Format() 179 for (const auto& rule : high_priority_prune_) { in Format() local 180 prune_rules.emplace_back("~" + rule.Format()); in Format() 186 for (const auto& rule : high_priority_prune_) { in IsHighPriority() local 187 if (rule.Matches(element)) { in IsHighPriority() 195 for (const auto& rule : low_priority_prune_) { in IsLowPriority() local 196 if (rule.Matches(element)) { in IsLowPriority()
|
/system/sepolicy/build/soong/ |
D | selinux_contexts.go | 248 rule := android.NewRuleBuilder(pctx, ctx) 250 rule.Command(). 258 rule.Temporary(builtContext) 262 rule.Command(). 271 rule.Temporary(builtContext) 275 rule.Command(). 284 rule.Temporary(builtContext) 285 rule.Command().Text("cp").Input(builtContext).Output(ret) 287 rule.DeleteTemporaryFiles() 288 rule.Build("selinux_contexts", "building contexts: "+m.Name()) [all …]
|
D | policy.go | 211 rule := android.NewRuleBuilder(pctx, ctx) 218 rule.Command().Tool(ctx.Config().PrebuiltBuildTool(ctx, "m4")). 240 rule.Build("conf", "Transform policy to conf: "+ctx.ModuleName()) 338 rule := android.NewRuleBuilder(pctx, ctx) 339 rule.Command().BuiltTool("checkpolicy"). 347 rule.Command().Text("cat"). 353 rule.Command().BuiltTool("build_sepolicy"). 361 rule.Command().Text("grep -v"). 372 secilcCmd := rule.Command().BuiltTool("secilc"). 387 rule.Build("cil", "Building cil for "+ctx.ModuleName()) [all …]
|
D | sepolicy_neverallow.go | 146 rule := android.NewRuleBuilder(pctx, ctx) 150 rule.Command().BuiltTool("checkpolicy"). 155 rule.Build("neverallow_checkpolicy", "Neverallow check: "+ctx.ModuleName()) 159 rule = android.NewRuleBuilder(pctx, ctx) 164 rule.Command().BuiltTool("sepolicy-analyze"). 174 rule.Command().Text("touch").Output(n.testTimestamp) 175 rule.Build("neverallow_sepolicy-analyze", "Neverallow check: "+ctx.ModuleName())
|
D | sepolicy_freeze.go | 90 rule := android.NewRuleBuilder(pctx, ctx) 93 rule.Command().Text("diff"). 101 rule.Command().Text("touch"). 105 rule.Build("sepolicy_freeze_test", "sepolicy_freeze_test")
|
D | versioned_policy.go | 107 rule := android.NewRuleBuilder(pctx, ctx) 114 versionCmd := rule.Command().BuiltTool("version_policy"). 134 rule.Command().BuiltTool("build_sepolicy"). 142 rule.Command().BuiltTool("secilc"). 154 rule.Build("mapping", "Versioning mapping file "+ctx.ModuleName())
|
D | sepolicy_vers.go | 81 rule := android.NewRuleBuilder(pctx, ctx) 82 rule.Command().Text("echo").Text(ver).Text(">").Output(out) 83 rule.Build("sepolicy_vers", v.Name())
|
D | compat_cil.go | 252 rule := android.NewRuleBuilder(pctx, ctx) 253 rule.Command().Text("touch").Output(f.compatTestTimestamp).Implicits(inputs) 254 rule.Build("compat", "compat test timestamp for: "+f.Name())
|
/system/netd/server/ |
D | FirewallController.cpp | 122 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { in setInterfaceRule() argument 137 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule() 140 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { in setInterfaceRule()
|
D | NetlinkCommands.cpp | 195 rtmsg rule = { in rtNetlinkFlush() local 200 { &rule, sizeof(rule) }, in rtNetlinkFlush()
|
D | Controllers.cpp | 142 std::string rule; in findExistingChildChains() local 143 while (std::getline(stream, rule, '\n')) { in findExistingChildChains() 144 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) { in findExistingChildChains()
|
D | BandwidthController.cpp | 738 std::string rule; in parseAndFlushCostlyTables() local 743 while (std::getline(stream, rule, '\n')) { in parseAndFlushCostlyTables() 744 if (!StartsWith(rule, NEW_CHAIN_COMMAND)) continue; in parseAndFlushCostlyTables() 745 chainName = rule.substr(NEW_CHAIN_COMMAND.size()); in parseAndFlushCostlyTables() 746 ALOGV("parse chainName=<%s> orig line=<%s>", chainName.c_str(), rule.c_str()); in parseAndFlushCostlyTables()
|
/system/hardware/interfaces/net/netd/testutils/ |
D | VtsHalNetNetdTestUtils.cpp | 79 for (const auto& rule : rules) { in countMatchingIpRules() local 80 if (std::regex_search(rule, regex)) { in countMatchingIpRules()
|
/system/netd/tests/ |
D | test_utils.cpp | 78 for (const auto& rule : rules) { in iptablesRuleExists() local 79 if (rule.find(expectedRule) != std::string::npos) { in iptablesRuleExists()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 38 grant the same permissions where one allow rule is written 40 terms of attributes associated with those same types. The rule 41 with individual types is a candidate for removal. The rule with 87 quickly checking an individual expanded rule or group of rules. If there are 93 classes, or permissions from a neverallow rule that could not be resolved
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | storaged.te | 33 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma… 34 # Remove after no logs are seen for this rule.
|
D | migrate_legacy_obb_data.te | 26 # This rule is required to let this process read /proc/{parent_pid}/mount.
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | storaged.te | 35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma… 36 # Remove after no logs are seen for this rule.
|
D | migrate_legacy_obb_data.te | 26 # This rule is required to let this process read /proc/{parent_pid}/mount.
|
/system/sepolicy/private/ |
D | storaged.te | 35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma… 36 # Remove after no logs are seen for this rule.
|
D | migrate_legacy_obb_data.te | 26 # This rule is required to let this process read /proc/{parent_pid}/mount.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | storaged.te | 35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma… 36 # Remove after no logs are seen for this rule.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | storaged.te | 35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma… 36 # Remove after no logs are seen for this rule.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | netd.te | 14 # give netd permission to setup iptables rule with xt_bpf
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | migrate_legacy_obb_data.te | 26 # This rule is required to let this process read /proc/{parent_pid}/mount.
|