Home
last modified time | relevance | path

Searched refs:rule (Results 1 – 25 of 125) sorted by relevance

12345

/system/logging/logd/
DPruneList.cpp176 for (const auto& rule : low_priority_prune_) { in Format() local
177 prune_rules.emplace_back(rule.Format()); in Format()
179 for (const auto& rule : high_priority_prune_) { in Format() local
180 prune_rules.emplace_back("~" + rule.Format()); in Format()
186 for (const auto& rule : high_priority_prune_) { in IsHighPriority() local
187 if (rule.Matches(element)) { in IsHighPriority()
195 for (const auto& rule : low_priority_prune_) { in IsLowPriority() local
196 if (rule.Matches(element)) { in IsLowPriority()
/system/sepolicy/build/soong/
Dselinux_contexts.go248 rule := android.NewRuleBuilder(pctx, ctx)
250 rule.Command().
258 rule.Temporary(builtContext)
262 rule.Command().
271 rule.Temporary(builtContext)
275 rule.Command().
284 rule.Temporary(builtContext)
285 rule.Command().Text("cp").Input(builtContext).Output(ret)
287 rule.DeleteTemporaryFiles()
288 rule.Build("selinux_contexts", "building contexts: "+m.Name())
[all …]
Dpolicy.go211 rule := android.NewRuleBuilder(pctx, ctx)
218 rule.Command().Tool(ctx.Config().PrebuiltBuildTool(ctx, "m4")).
240 rule.Build("conf", "Transform policy to conf: "+ctx.ModuleName())
338 rule := android.NewRuleBuilder(pctx, ctx)
339 rule.Command().BuiltTool("checkpolicy").
347 rule.Command().Text("cat").
353 rule.Command().BuiltTool("build_sepolicy").
361 rule.Command().Text("grep -v").
372 secilcCmd := rule.Command().BuiltTool("secilc").
387 rule.Build("cil", "Building cil for "+ctx.ModuleName())
[all …]
Dsepolicy_neverallow.go146 rule := android.NewRuleBuilder(pctx, ctx)
150 rule.Command().BuiltTool("checkpolicy").
155 rule.Build("neverallow_checkpolicy", "Neverallow check: "+ctx.ModuleName())
159 rule = android.NewRuleBuilder(pctx, ctx)
164 rule.Command().BuiltTool("sepolicy-analyze").
174 rule.Command().Text("touch").Output(n.testTimestamp)
175 rule.Build("neverallow_sepolicy-analyze", "Neverallow check: "+ctx.ModuleName())
Dsepolicy_freeze.go90 rule := android.NewRuleBuilder(pctx, ctx)
93 rule.Command().Text("diff").
101 rule.Command().Text("touch").
105 rule.Build("sepolicy_freeze_test", "sepolicy_freeze_test")
Dversioned_policy.go107 rule := android.NewRuleBuilder(pctx, ctx)
114 versionCmd := rule.Command().BuiltTool("version_policy").
134 rule.Command().BuiltTool("build_sepolicy").
142 rule.Command().BuiltTool("secilc").
154 rule.Build("mapping", "Versioning mapping file "+ctx.ModuleName())
Dsepolicy_vers.go81 rule := android.NewRuleBuilder(pctx, ctx)
82 rule.Command().Text("echo").Text(ver).Text(">").Output(out)
83 rule.Build("sepolicy_vers", v.Name())
Dcompat_cil.go252 rule := android.NewRuleBuilder(pctx, ctx)
253 rule.Command().Text("touch").Output(f.compatTestTimestamp).Implicits(inputs)
254 rule.Build("compat", "compat test timestamp for: "+f.Name())
/system/netd/server/
DFirewallController.cpp122 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { in setInterfaceRule() argument
137 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule()
140 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { in setInterfaceRule()
DNetlinkCommands.cpp195 rtmsg rule = { in rtNetlinkFlush() local
200 { &rule, sizeof(rule) }, in rtNetlinkFlush()
DControllers.cpp142 std::string rule; in findExistingChildChains() local
143 while (std::getline(stream, rule, '\n')) { in findExistingChildChains()
144 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) { in findExistingChildChains()
DBandwidthController.cpp738 std::string rule; in parseAndFlushCostlyTables() local
743 while (std::getline(stream, rule, '\n')) { in parseAndFlushCostlyTables()
744 if (!StartsWith(rule, NEW_CHAIN_COMMAND)) continue; in parseAndFlushCostlyTables()
745 chainName = rule.substr(NEW_CHAIN_COMMAND.size()); in parseAndFlushCostlyTables()
746 ALOGV("parse chainName=<%s> orig line=<%s>", chainName.c_str(), rule.c_str()); in parseAndFlushCostlyTables()
/system/hardware/interfaces/net/netd/testutils/
DVtsHalNetNetdTestUtils.cpp79 for (const auto& rule : rules) { in countMatchingIpRules() local
80 if (std::regex_search(rule, regex)) { in countMatchingIpRules()
/system/netd/tests/
Dtest_utils.cpp78 for (const auto& rule : rules) { in iptablesRuleExists() local
79 if (rule.find(expectedRule) != std::string::npos) { in iptablesRuleExists()
/system/sepolicy/tools/sepolicy-analyze/
DREADME38 grant the same permissions where one allow rule is written
40 terms of attributes associated with those same types. The rule
41 with individual types is a candidate for removal. The rule with
87 quickly checking an individual expanded rule or group of rules. If there are
93 classes, or permissions from a neverallow rule that could not be resolved
/system/sepolicy/prebuilts/api/30.0/private/
Dstoraged.te33 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma…
34 # Remove after no logs are seen for this rule.
Dmigrate_legacy_obb_data.te26 # This rule is required to let this process read /proc/{parent_pid}/mount.
/system/sepolicy/prebuilts/api/33.0/private/
Dstoraged.te35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma…
36 # Remove after no logs are seen for this rule.
Dmigrate_legacy_obb_data.te26 # This rule is required to let this process read /proc/{parent_pid}/mount.
/system/sepolicy/private/
Dstoraged.te35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma…
36 # Remove after no logs are seen for this rule.
Dmigrate_legacy_obb_data.te26 # This rule is required to let this process read /proc/{parent_pid}/mount.
/system/sepolicy/prebuilts/api/31.0/private/
Dstoraged.te35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma…
36 # Remove after no logs are seen for this rule.
/system/sepolicy/prebuilts/api/32.0/private/
Dstoraged.te35 # b/142672293: No other priv-app should need this allow rule now that GMS core runs in its own doma…
36 # Remove after no logs are seen for this rule.
/system/sepolicy/prebuilts/api/28.0/private/
Dnetd.te14 # give netd permission to setup iptables rule with xt_bpf
/system/sepolicy/prebuilts/api/29.0/private/
Dmigrate_legacy_obb_data.te26 # This rule is required to let this process read /proc/{parent_pid}/mount.

12345