Home
last modified time | relevance | path

Searched refs:rule (Results 1 – 25 of 25) sorted by relevance

/system/netd/server/
DFirewallController.cpp143 int FirewallController::setInterfaceRule(const char* iface, FirewallRule rule) { in setInterfaceRule() argument
155 if (rule == ALLOW) { in setInterfaceRule()
167 int FirewallController::setEgressSourceRule(const char* addr, FirewallRule rule) { in setEgressSourceRule() argument
179 if (rule == ALLOW) { in setEgressSourceRule()
192 FirewallRule rule) { in setEgressDestRule() argument
210 if (rule == ALLOW) { in setEgressDestRule()
239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { in setUidRule() argument
249 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
253 op = (rule == DENY)? "-A" : "-D"; in setUidRule()
DCommandListener.cpp1322 FirewallRule rule = parseRule(argv[3]); in runCommand() local
1324 int res = gCtls->firewallCtrl.setInterfaceRule(iface, rule); in runCommand()
1337 FirewallRule rule = parseRule(argv[3]); in runCommand() local
1339 int res = gCtls->firewallCtrl.setEgressSourceRule(addr, rule); in runCommand()
1353 FirewallRule rule = parseRule(argv[4]); in runCommand() local
1356 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_TCP, port, rule); in runCommand()
1357 res |= gCtls->firewallCtrl.setEgressDestRule(addr, PROTOCOL_UDP, port, rule); in runCommand()
1377 FirewallRule rule = parseRule(argv[4]); in runCommand() local
1378 int res = gCtls->firewallCtrl.setUidRule(childChain, uid, rule); in runCommand()
DRouteController.cpp295 fib_rule_hdr rule = { in modifyIpRule() local
304 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { in modifyIpRule()
314 { &rule, sizeof(rule) }, in modifyIpRule()
337 rule.family = AF_FAMILIES[i]; in modifyIpRule()
/system/sepolicy/tools/sepolicy-analyze/
DREADME38 grant the same permissions where one allow rule is written
40 terms of attributes associated with those same types. The rule
41 with individual types is a candidate for removal. The rule with
79 quickly checking an individual expanded rule or group of rules. If there are
85 classes, or permissions from a neverallow rule that could not be resolved
/system/sepolicy/
Dgpsd.te16 # TODO: added to match above sysfs rule. Remove me?
Dnfc.te20 # TODO: added to match above sysfs rule. Remove me?
Dhealthd.te22 # TODO: added to match above sysfs rule. Remove me?
Dnetd.te35 # TODO: added to match above sysfs rule. Remove me?
Dseapp_contexts56 # inputs are matched on a key value rule line.
Dinstalld.te84 # Directory access covered by earlier rule above.
Ddumpstate.te90 # TODO: added to match above sysfs rule. Remove me?
Dvold.te93 # TODO: added to match above sysfs rule. Remove me?
Ddomain.te251 # Init can't do anything with binder calls. If this neverallow rule is being
356 # Do not assert this rule on userdebug/eng builds, due to some devices using
Dinit.te134 # Note: this requires the following allow rule
Dsystem_server.te194 # TODO: added to match above sysfs rule. Remove me?
/system/sepolicy/tools/
Dcheck_seapp.c623 const key_map *rule; in rule_map_validate() local
642 rule = &(rm->m[i]); in rule_map_validate()
644 if (!strcmp(rule->name, nrule->name)) { in rule_map_validate()
649 if (match_regex(nrule, rule)) { in rule_map_validate()
DREADME55 A tool for auditing a sepolicy file for any allow rule that grants
/system/connectivity/shill/
DHACKING102 - C++ exceptions are not allowed in the code. An exception to this rule is
/system/extras/tests/net_test/
Dmultinetwork_test.py817 out = [(rule, attributes) for rule, attributes in rules
Dmultinetwork_base.py74 result = any("FRA_UID_START" in attrs for rule, attrs in rules)
/system/bt/doc/
Dstyle_guide.md105 As a result of the above rule to declare and initialize variables together,
/system/connectivity/shill/doc/
Dmanager-api.txt456 state. As a general rule, shill does not disrupt
458 options appear. This method allows this rule to be
Ddevice-api.txt721 (WiFi only) Program a wake-on-packet rule into the NIC to wake
744 (WiFi only) Removes a wake-on-packet rule previously programmed into the
/system/tpm/trunks/generator/
Draw_commands_fixed.txt1201 This is a corner case exception to the rule that TPM2_Startup() must be the first command.
1761 command did not complete and the state of the TPM is unchanged. An exception to this general rule is
Draw_commands.txt1201 This is a corner case exception to the rule that TPM2_Startup() must be the first command.
1761 command did not complete and the state of the TPM is unchanged. An exception to this general rule is