/system/netd/server/ |
D | FirewallController.cpp | 87 res |= execIptables(V4V6, "-A", LOCAL_INPUT, "-j", "DROP", NULL); in enableFirewall() 88 res |= execIptables(V4V6, "-A", LOCAL_OUTPUT, "-j", "REJECT", NULL); in enableFirewall() 89 res |= execIptables(V4V6, "-A", LOCAL_FORWARD, "-j", "REJECT", NULL); in enableFirewall() 104 res |= execIptables(V4V6, "-F", LOCAL_INPUT, NULL); in disableFirewall() 105 res |= execIptables(V4V6, "-F", LOCAL_OUTPUT, NULL); in disableFirewall() 106 res |= execIptables(V4V6, "-F", LOCAL_FORWARD, NULL); in disableFirewall() 162 res |= execIptables(V4V6, op, LOCAL_INPUT, "-i", iface, "-j", "RETURN", NULL); in setInterfaceRule() 163 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-o", iface, "-j", "RETURN", NULL); in setInterfaceRule() 259 res |= execIptables(V4V6, op, LOCAL_DOZABLE, "-m", "owner", "--uid-owner", in setUidRule() 263 res |= execIptables(V4V6, op, LOCAL_STANDBY, "-m", "owner", "--uid-owner", in setUidRule() [all …]
|
D | IptablesBaseTest.cpp | 56 if (target == V4 || target == V4V6) { in fakeExecIptables() 59 if (target == V6 || target == V4V6) { in fakeExecIptables() 80 if (target == V4 || target == V4V6) { in expectIptablesCommand() 83 if (target == V6 || target == V4V6) { in expectIptablesCommand() 87 return target == V4V6 ? 2 : 1; in expectIptablesCommand() 93 expected.push_back({ V4V6, cmd }); in expectIptablesCommands() 118 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
|
D | StrictController.cpp | 155 return execIptablesRestore(V4V6, commands); in disableStrict() 166 execIptables(V4V6, "-D", LOCAL_OUTPUT, in setUidCleartextPenalty() 169 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 172 execIptables(V4V6, "-D", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 178 res |= execIptables(V4V6, "-I", LOCAL_OUTPUT, in setUidCleartextPenalty() 183 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty() 187 res |= execIptables(V4V6, "-I", LOCAL_CLEAR_CAUGHT, in setUidCleartextPenalty()
|
D | FirewallControllerTest.cpp | 53 { V4V6, "-t filter -D INPUT -j fw_whitelist" }, in TEST_F() 90 { V4V6, "-t filter -D INPUT -j fw_blacklist" }, in TEST_F() 111 { V4V6, "-D fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F() 117 { V4V6, "-A fw_standby -m owner --uid-owner 12345 -j DROP" } in TEST_F() 125 { V4V6, "-I fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F() 131 { V4V6, "-D fw_dozable -m owner --uid-owner 54321 -j RETURN" } in TEST_F()
|
D | NetdConstants.cpp | 95 if (target == V4 || target == V4V6) { in execIptables() 99 if (target == V6 || target == V4V6) { in execIptables() 150 if (target == V4 || target == V4V6) { in execIptablesRestore() 153 if (target == V6 || target == V4V6) { in execIptablesRestore()
|
D | StrictControllerTest.cpp | 105 { V4V6, commandsCommon }, in TEST_F()
|
D | NetdConstants.h | 41 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | CommandListener.cpp | 213 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT); in CommandListener() 214 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD); in CommandListener() 215 createChildChains(V4V6, "filter", "OUTPUT", FILTER_OUTPUT); in CommandListener() 216 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING); in CommandListener() 217 createChildChains(V4V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING); in CommandListener()
|
D | BandwidthController.cpp | 273 iptablesRestoreFunction(V4V6, commands); in flushCleanTables() 300 return iptablesRestoreFunction(V4V6, commands); in enableBandwidthControl()
|
D | RouteController.cpp | 466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", in modifyIncomingPacketMark()
|