/system/netd/server/ |
D | FirewallController.cpp | 87 res |= execIptables(V4V6, "-A", LOCAL_INPUT, "-j", "DROP", NULL); in enableFirewall() 88 res |= execIptables(V4V6, "-A", LOCAL_OUTPUT, "-j", "REJECT", NULL); in enableFirewall() 89 res |= execIptables(V4V6, "-A", LOCAL_FORWARD, "-j", "REJECT", NULL); in enableFirewall() 104 res |= execIptables(V4V6, "-F", LOCAL_INPUT, NULL); in disableFirewall() 105 res |= execIptables(V4V6, "-F", LOCAL_OUTPUT, NULL); in disableFirewall() 106 res |= execIptables(V4V6, "-F", LOCAL_FORWARD, NULL); in disableFirewall() 162 res |= execIptables(V4V6, op, LOCAL_INPUT, "-i", iface, "-j", "RETURN", NULL); in setInterfaceRule() 163 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-o", iface, "-j", "RETURN", NULL); in setInterfaceRule() 259 res |= execIptables(V4V6, op, LOCAL_DOZABLE, "-m", "owner", "--uid-owner", in setUidRule() 263 res |= execIptables(V4V6, op, LOCAL_STANDBY, "-m", "owner", "--uid-owner", in setUidRule() [all …]
|
D | NatControllerTest.cpp | 51 { V4V6, "-F natctrl_FORWARD" }, 58 { V4V6, "-F natctrl_FORWARD" }, 62 { V4V6, "-F natctrl_tether_counters" }, 63 { V4V6, "-X natctrl_tether_counters" }, 64 { V4V6, "-N natctrl_tether_counters" }, 91 { V4V6, StringPrintf("-A natctrl_tether_counters -i %s -o %s -j RETURN", in startNatCommands() 93 { V4V6, StringPrintf("-A natctrl_tether_counters -i %s -o %s -j RETURN", in startNatCommands()
|
D | StrictController.cpp | 155 return execIptablesRestore(V4V6, commands); in disableStrict() 166 execIptables(V4V6, "-D", LOCAL_OUTPUT, in setUidCleartextPenalty() 169 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 172 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 178 res |= execIptables(V4V6, "-I", LOCAL_OUTPUT, in setUidCleartextPenalty() 183 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 187 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
|
D | FirewallControllerTest.cpp | 53 { V4V6, "-t filter -D INPUT -j fw_whitelist" }, in TEST_F() 92 { V4V6, "-t filter -D INPUT -j fw_blacklist" }, in TEST_F() 114 { V4V6, "-D fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F() 120 { V4V6, "-A fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F() 128 { V4V6, "-I fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F() 134 { V4V6, "-D fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
|
D | IptablesBaseTest.cpp | 65 if (target == V4 || target == V4V6) { in fakeExecIptables() 68 if (target == V6 || target == V4V6) { in fakeExecIptables() 99 if (target == V4 || target == V4V6) { in expectIptablesCommand() 102 if (target == V6 || target == V4V6) { in expectIptablesCommand() 106 return target == V4V6 ? 2 : 1; in expectIptablesCommand() 112 expected.push_back({ V4V6, cmd }); in expectIptablesCommands() 146 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
|
D | NetdConstants.cpp | 95 if (target == V4 || target == V4V6) { in execIptables() 99 if (target == V6 || target == V4V6) { in execIptables() 150 if (target == V4 || target == V4V6) { in execIptablesRestore() 153 if (target == V6 || target == V4V6) { in execIptablesRestore()
|
D | StrictControllerTest.cpp | 105 { V4V6, commandsCommon }, in TEST_F()
|
D | NetdConstants.h | 43 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | CommandListener.cpp | 215 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT); in CommandListener() 216 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD); in CommandListener() 217 createChildChains(V4V6, "filter", "OUTPUT", FILTER_OUTPUT); in CommandListener() 218 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING); in CommandListener() 219 createChildChains(V4V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING); in CommandListener() 220 createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD); in CommandListener()
|
D | BandwidthController.cpp | 273 iptablesRestoreFunction(V4V6, commands); in flushCleanTables() 300 return iptablesRestoreFunction(V4V6, commands); in enableBandwidthControl()
|
D | RouteController.cpp | 466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", in modifyIncomingPacketMark()
|