Home
last modified time | relevance | path

Searched refs:V4V6 (Results 1 – 11 of 11) sorted by relevance

/system/netd/server/
DFirewallController.cpp87 res |= execIptables(V4V6, "-A", LOCAL_INPUT, "-j", "DROP", NULL); in enableFirewall()
88 res |= execIptables(V4V6, "-A", LOCAL_OUTPUT, "-j", "REJECT", NULL); in enableFirewall()
89 res |= execIptables(V4V6, "-A", LOCAL_FORWARD, "-j", "REJECT", NULL); in enableFirewall()
104 res |= execIptables(V4V6, "-F", LOCAL_INPUT, NULL); in disableFirewall()
105 res |= execIptables(V4V6, "-F", LOCAL_OUTPUT, NULL); in disableFirewall()
106 res |= execIptables(V4V6, "-F", LOCAL_FORWARD, NULL); in disableFirewall()
162 res |= execIptables(V4V6, op, LOCAL_INPUT, "-i", iface, "-j", "RETURN", NULL); in setInterfaceRule()
163 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-o", iface, "-j", "RETURN", NULL); in setInterfaceRule()
259 res |= execIptables(V4V6, op, LOCAL_DOZABLE, "-m", "owner", "--uid-owner", in setUidRule()
263 res |= execIptables(V4V6, op, LOCAL_STANDBY, "-m", "owner", "--uid-owner", in setUidRule()
[all …]
DNatControllerTest.cpp51 { V4V6, "-F natctrl_FORWARD" },
58 { V4V6, "-F natctrl_FORWARD" },
62 { V4V6, "-F natctrl_tether_counters" },
63 { V4V6, "-X natctrl_tether_counters" },
64 { V4V6, "-N natctrl_tether_counters" },
91 { V4V6, StringPrintf("-A natctrl_tether_counters -i %s -o %s -j RETURN", in startNatCommands()
93 { V4V6, StringPrintf("-A natctrl_tether_counters -i %s -o %s -j RETURN", in startNatCommands()
DStrictController.cpp155 return execIptablesRestore(V4V6, commands); in disableStrict()
166 execIptables(V4V6, "-D", LOCAL_OUTPUT, in setUidCleartextPenalty()
169 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
172 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
178 res |= execIptables(V4V6, "-I", LOCAL_OUTPUT, in setUidCleartextPenalty()
183 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
187 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
DFirewallControllerTest.cpp53 { V4V6, "-t filter -D INPUT -j fw_whitelist" }, in TEST_F()
92 { V4V6, "-t filter -D INPUT -j fw_blacklist" }, in TEST_F()
114 { V4V6, "-D fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F()
120 { V4V6, "-A fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F()
128 { V4V6, "-I fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
134 { V4V6, "-D fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
DIptablesBaseTest.cpp65 if (target == V4 || target == V4V6) { in fakeExecIptables()
68 if (target == V6 || target == V4V6) { in fakeExecIptables()
99 if (target == V4 || target == V4V6) { in expectIptablesCommand()
102 if (target == V6 || target == V4V6) { in expectIptablesCommand()
106 return target == V4V6 ? 2 : 1; in expectIptablesCommand()
112 expected.push_back({ V4V6, cmd }); in expectIptablesCommands()
146 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
DNetdConstants.cpp95 if (target == V4 || target == V4V6) { in execIptables()
99 if (target == V6 || target == V4V6) { in execIptables()
150 if (target == V4 || target == V4V6) { in execIptablesRestore()
153 if (target == V6 || target == V4V6) { in execIptablesRestore()
DStrictControllerTest.cpp105 { V4V6, commandsCommon }, in TEST_F()
DNetdConstants.h43 enum IptablesTarget { V4, V6, V4V6 }; enumerator
DCommandListener.cpp215 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT); in CommandListener()
216 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD); in CommandListener()
217 createChildChains(V4V6, "filter", "OUTPUT", FILTER_OUTPUT); in CommandListener()
218 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING); in CommandListener()
219 createChildChains(V4V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING); in CommandListener()
220 createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD); in CommandListener()
DBandwidthController.cpp273 iptablesRestoreFunction(V4V6, commands); in flushCleanTables()
300 return iptablesRestoreFunction(V4V6, commands); in enableBandwidthControl()
DRouteController.cpp466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", in modifyIncomingPacketMark()