Searched refs:ALLOW (Results 1 – 7 of 7) sorted by relevance
/system/bpfprogs/ |
D | time_in_state.c | 48 const int ALLOW = 1; // return 1 to avoid blocking simpleperf from receiving events. variable 51 if (!last) return ALLOW; 57 if (!active) return ALLOW; 61 if (!policyp) return ALLOW; 65 if (!policy_active) return ALLOW; 81 if (!args->prev_pid || !old_last) return ALLOW; 89 if (!freq_idxp || !*freq_idxp) return ALLOW; 129 return ALLOW;
|
/system/netd/server/ |
D | FirewallControllerTest.cpp | 118 mFw.setUidRule(STANDBY, 12345, ALLOW); in TEST_F() 132 mFw.setUidRule(DOZABLE, 54321, ALLOW); in TEST_F() 158 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F() 272 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F() 275 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
|
D | FirewallController.h | 34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
|
D | TrafficControllerTest.cpp | 174 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST)); in checkUidOwnerRuleForChain() 185 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain() 191 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST)); in checkUidOwnerRuleForChain() 613 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST))); in TEST_F() 623 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F() 627 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST))); in TEST_F() 637 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F() 638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
|
D | FirewallController.cpp | 195 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule() 236 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
|
D | TrafficController.cpp | 524 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry() 526 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 34 DUPLICATE ALLOW RULES (dups)
|