/system/netd/server/ |
D | FirewallController.cpp | 143 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { in setInterfaceRule() argument 155 if (rule == ALLOW) { in setInterfaceRule() 167 int FirewallController::setEgressSourceRule(const char* addr, FirewallRule rule) { in setEgressSourceRule() argument 179 if (rule == ALLOW) { in setEgressSourceRule() 192 FirewallRule rule) { in setEgressDestRule() argument 210 if (rule == ALLOW) { in setEgressDestRule() 239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { in setUidRule() argument 249 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule() 253 op = (rule == DENY)? "-A" : "-D"; in setUidRule()
|
D | CommandListener.cpp | 1322 FirewallRule rule = parseRule(argv[3]); in runCommand() local 1324 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule); in runCommand() 1337 FirewallRule rule = parseRule(argv[3]); in runCommand() local 1339 int res = gCtls->firewallCtrl.setEgressSourceRule(addr, rule); in runCommand() 1353 FirewallRule rule = parseRule(argv[4]); in runCommand() local 1356 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_TCP, port, rule); in runCommand() 1357 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_UDP, port, rule); in runCommand() 1377 FirewallRule rule = parseRule(argv[4]); in runCommand() local 1378 int res = gCtls->firewallCtrl.setUidRule(childChain, uid, rule); in runCommand()
|
D | RouteController.cpp | 295 fib_rule_hdr rule = { in modifyIpRule() local 304 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { in modifyIpRule() 314 { &rule, sizeof(rule) }, in modifyIpRule() 337 rule.family = AF_FAMILIES[i]; in modifyIpRule()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 38 grant the same permissions where one allow rule is written 40 terms of attributes associated with those same types. The rule 41 with individual types is a candidate for removal. The rule with 79 quickly checking an individual expanded rule or group of rules. If there are 85 classes, or permissions from a neverallow rule that could not be resolved
|
/system/sepolicy/ |
D | gpsd.te | 16 # TODO: added to match above sysfs rule. Remove me?
|
D | nfc.te | 20 # TODO: added to match above sysfs rule. Remove me?
|
D | healthd.te | 22 # TODO: added to match above sysfs rule. Remove me?
|
D | netd.te | 35 # TODO: added to match above sysfs rule. Remove me?
|
D | seapp_contexts | 56 # inputs are matched on a key value rule line.
|
D | installd.te | 84 # Directory access covered by earlier rule above.
|
D | dumpstate.te | 90 # TODO: added to match above sysfs rule. Remove me?
|
D | vold.te | 93 # TODO: added to match above sysfs rule. Remove me?
|
D | domain.te | 251 # Init can't do anything with binder calls. If this neverallow rule is being 356 # Do not assert this rule on userdebug/eng builds, due to some devices using
|
D | init.te | 134 # Note: this requires the following allow rule
|
D | system_server.te | 194 # TODO: added to match above sysfs rule. Remove me?
|
/system/sepolicy/tools/ |
D | check_seapp.c | 623 const key_map *rule; in rule_map_validate() local 642 rule = &(rm->m[i]); in rule_map_validate() 644 if (!strcmp(rule->name, nrule->name)) { in rule_map_validate() 649 if (match_regex(nrule, rule)) { in rule_map_validate()
|
D | README | 55 A tool for auditing a sepolicy file for any allow rule that grants
|
/system/connectivity/shill/ |
D | HACKING | 102 - C++ exceptions are not allowed in the code. An exception to this rule is
|
/system/extras/tests/net_test/ |
D | multinetwork_test.py | 817 out = [(rule, attributes) for rule, attributes in rules
|
D | multinetwork_base.py | 74 result = any("FRA_UID_START" in attrs for rule, attrs in rules)
|
/system/bt/doc/ |
D | style_guide.md | 105 As a result of the above rule to declare and initialize variables together,
|
/system/connectivity/shill/doc/ |
D | manager-api.txt | 456 state. As a general rule, shill does not disrupt 458 options appear. This method allows this rule to be
|
D | device-api.txt | 721 (WiFi only) Program a wake-on-packet rule into the NIC to wake 744 (WiFi only) Removes a wake-on-packet rule previously programmed into the
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 1201 This is a corner case exception to the rule that TPM2_Startup() must be the first command. 1761 command did not complete and the state of the TPM is unchanged. An exception to this general rule is
|
D | raw_commands.txt | 1201 This is a corner case exception to the rule that TPM2_Startup() must be the first command. 1761 command did not complete and the state of the TPM is unchanged. An exception to this general rule is
|