Home
last modified time | relevance | path

Searched refs:V4V6 (Results 1 – 10 of 10) sorted by relevance

/system/netd/server/
DFirewallController.cpp87 res |= execIptables(V4V6, "-A", LOCAL_INPUT, "-j", "DROP", NULL); in enableFirewall()
88 res |= execIptables(V4V6, "-A", LOCAL_OUTPUT, "-j", "REJECT", NULL); in enableFirewall()
89 res |= execIptables(V4V6, "-A", LOCAL_FORWARD, "-j", "REJECT", NULL); in enableFirewall()
104 res |= execIptables(V4V6, "-F", LOCAL_INPUT, NULL); in disableFirewall()
105 res |= execIptables(V4V6, "-F", LOCAL_OUTPUT, NULL); in disableFirewall()
106 res |= execIptables(V4V6, "-F", LOCAL_FORWARD, NULL); in disableFirewall()
162 res |= execIptables(V4V6, op, LOCAL_INPUT, "-i", iface, "-j", "RETURN", NULL); in setInterfaceRule()
163 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-o", iface, "-j", "RETURN", NULL); in setInterfaceRule()
259 res |= execIptables(V4V6, op, LOCAL_DOZABLE, "-m", "owner", "--uid-owner", in setUidRule()
263 res |= execIptables(V4V6, op, LOCAL_STANDBY, "-m", "owner", "--uid-owner", in setUidRule()
[all …]
DIptablesBaseTest.cpp56 if (target == V4 || target == V4V6) { in fakeExecIptables()
59 if (target == V6 || target == V4V6) { in fakeExecIptables()
80 if (target == V4 || target == V4V6) { in expectIptablesCommand()
83 if (target == V6 || target == V4V6) { in expectIptablesCommand()
87 return target == V4V6 ? 2 : 1; in expectIptablesCommand()
93 expected.push_back({ V4V6, cmd }); in expectIptablesCommands()
118 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
DStrictController.cpp155 return execIptablesRestore(V4V6, commands); in disableStrict()
166 execIptables(V4V6, "-D", LOCAL_OUTPUT, in setUidCleartextPenalty()
169 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
172 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
178 res |= execIptables(V4V6, "-I", LOCAL_OUTPUT, in setUidCleartextPenalty()
183 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
187 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
DFirewallControllerTest.cpp53 { V4V6, "-t filter -D INPUT -j fw_whitelist" }, in TEST_F()
90 { V4V6, "-t filter -D INPUT -j fw_blacklist" }, in TEST_F()
111 { V4V6, "-D fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F()
117 { V4V6, "-A fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F()
125 { V4V6, "-I fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
131 { V4V6, "-D fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
DNetdConstants.cpp95 if (target == V4 || target == V4V6) { in execIptables()
99 if (target == V6 || target == V4V6) { in execIptables()
150 if (target == V4 || target == V4V6) { in execIptablesRestore()
153 if (target == V6 || target == V4V6) { in execIptablesRestore()
DStrictControllerTest.cpp105 { V4V6, commandsCommon }, in TEST_F()
DNetdConstants.h41 enum IptablesTarget { V4, V6, V4V6 }; enumerator
DCommandListener.cpp213 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT); in CommandListener()
214 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD); in CommandListener()
215 createChildChains(V4V6, "filter", "OUTPUT", FILTER_OUTPUT); in CommandListener()
216 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING); in CommandListener()
217 createChildChains(V4V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING); in CommandListener()
DBandwidthController.cpp273 iptablesRestoreFunction(V4V6, commands); in flushCleanTables()
300 return iptablesRestoreFunction(V4V6, commands); in enableBandwidthControl()
DRouteController.cpp466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", in modifyIncomingPacketMark()