/system/netd/server/ |
D | IptablesRestoreControllerTest.cpp | 154 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain() 167 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain() 202 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() 210 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 235 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 249 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() 283 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F() 287 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F() 288 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F() 291 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F() [all …]
|
D | ControllersTest.cpp | 73 {V4V6, in TEST_F() 82 {V4V6, in TEST_F() 95 {V4V6, in TEST_F() 108 {V4V6, in TEST_F() 115 {V4V6, in TEST_F()
|
D | FirewallControllerTest.cpp | 116 { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } in TEST_F() 122 { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } in TEST_F() 130 { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } in TEST_F() 136 { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } in TEST_F() 144 { V4V6, "*filter\n" in TEST_F() 153 { V4V6, "*filter\n" in TEST_F()
|
D | Controllers.cpp | 117 if (target == V4V6) { in findExistingChildChains() 226 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT, true); in initChildChains() 227 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD, true); in initChildChains() 228 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING, true); in initChildChains() 229 createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD, true); in initChildChains() 230 createChildChains(V4V6, "mangle", "INPUT", MANGLE_INPUT, true); in initChildChains()
|
D | BandwidthController.cpp | 277 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables() 296 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl() 386 res |= iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr); in setInterfaceSharedQuota() 436 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) { in removeInterfaceSharedQuota() 498 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) { in setInterfaceQuota() 554 const int res = iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr); in removeInterfaceQuota() 600 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr); in runIptablesAlertCmd() 715 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert() 745 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert() 795 iptablesRestoreFunction(V4V6, Join(clearCommands, '\n'), nullptr); in parseAndFlushCostlyTables()
|
D | FirewallController.cpp | 120 res = execIptablesRestore(V4V6, command.c_str()); in setFirewallType() 141 return (execIptablesRestore(V4V6, command.c_str()) == 0) ? 0 : -EREMOTEIO; in resetFirewall() 174 return execIptablesRestore(V4V6, command); in enableChildChains() 213 return (execIptablesRestore(V4V6, command) == 0) ? 0 : -EREMOTEIO; in setInterfaceRule() 279 return (execIptablesRestore(V4V6, command) == 0) ? 0 : -EREMOTEIO; in setUidRule()
|
D | StrictController.cpp | 155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains() 197 return (execIptablesRestore(V4V6, Join(commands, "\n")) == 0) ? 0 : -EREMOTEIO; in setUidCleartextPenalty()
|
D | IdletimerController.cpp | 160 return (execIptablesRestore(V4V6, Join(cmds, '\n')) == 0) ? 0 : -EREMOTEIO; in modifyInterfaceIdletimer()
|
D | NetdConstants.h | 30 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | StrictControllerTest.cpp | 104 { V4V6, commandsCommon }, in TEST_F()
|
D | BandwidthControllerTest.cpp | 96 expected.push_back({ V4V6, expectedClean }); in expectSetupCommands() 98 expected.push_back({ V4V6, expectedFlush }); in expectSetupCommands() 100 expected.push_back({ V4V6, expectedAccounting }); in expectSetupCommands()
|
D | IptablesRestoreController.cpp | 359 if (target == V4 || target == V4V6) { in execute() 362 if (target == V6 || target == V4V6) { in execute()
|
D | IptablesBaseTest.cpp | 102 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
|
D | TetherControllerTest.cpp | 100 {V4V6, 107 {V4V6,
|
D | WakeupControllerTest.cpp | 293 EXPECT_CALL(mIptables, execute(V4V6, kExpected, _)).WillOnce(Return(0)); in TEST_F() 306 EXPECT_CALL(mIptables, execute(V4V6, kExpected, _)).WillOnce(Return(0)); in TEST_F()
|
D | WakeupController.cpp | 218 auto rv = mIptables->execute(V4V6, cmd, &out); in execIptables()
|
D | TetherController.cpp | 522 res = iptablesRestoreFunction(V4V6, defaultCommands, nullptr); in setupIptablesHooks() 621 return iptablesRestoreFunction(V4V6, cmds, nullptr); in setTetherGlobalAlertRule()
|
D | RouteController.cpp | 471 if (RouteController::iptablesRestoreCommandFunction(V4V6, "mangle", cmd, nullptr) != 0) { in modifyIncomingPacketMark()
|