ukanth / afwall

AFWall+ (Android Firewall +) - iptables based firewall for Android
GNU General Public License v3.0
2.81k stars 453 forks source link

afwall-tor-reject #956

Open abidal3 opened 5 years ago

abidal3 commented 5 years ago

AFWall is disabled when add Tor rules for apps. But it's okay if disable option Enable inbound connections.

Log: Start processing next state Using applySaved4IptablesRules command 'ip6tables -A afwall-input -j afwall-tor-reject' exited with status 1 Start processing next state State of rootShell: BUSY Forcefully changing the state BUSY command 'iptables -A afwall-input -j afwall-tor-reject' exited with status 1

Jookia commented 5 years ago

I don't quite understand what the problem is here. What should be happening, and what actually happens?

abidal3 commented 5 years ago

What should be happening, and what actually happens?

When option Enable inbound connections is checked and Tor rules is enabled for apps then AFWall isn't started and there is error on iptables in log.

Jookia commented 5 years ago

This doesn't happen on my device. Have you tried rebooting?

abidal3 commented 5 years ago

Have you tried rebooting?

Yes, of course.

Jookia commented 4 years ago

Orbot has actually been broken on my phone so I'm currently unable to test or fix the code. My guess would be that the ordering is somehow wrong and it wants to jump to afwall-tor-reject before it's added?

When I get Orbot working again I'll look in to this and see what's up.

On Sat, Apr 11, 2020 at 05:42:39AM -0700, Jake Stańczak wrote:

Same problem with newest version, on Mi 9t with lineage 17.1.

command 'iptables -A afwall-input -j afwall-tor-reject' exited with status 1

-- You are receiving this because you commented. Reply to this email directly or view it on GitHub: https://github.com/ukanth/afwall/issues/956#issuecomment-612412604

PureIncompetence commented 3 years ago

I can confirm this bug, it happens to me on official LOS 17 just as @abidal3 described it: When I try to apply new rules that contain at least one which routes traffic through tor, I get the the error-notification "Error applying firewall rules. Click to open settings" and the firewall gets disabled. If I disable the option "Enable inbound connections", everything works as expected. I tried 3 AFWall-versions: 3.4, 3.5 and 3.5.2 -> Got the same behaviour on each of them. On the other hand I tested with a friends device (also with LOS 17), which has exactly the same AFWall-Settings and I can't reproduce the problem with it.

I looked through logcat and found the following entry, which I assume to be related, as it always appears, when I try to apply the rules: [CODE] command 'iptables -A afwall-input -j afwall-tor-reject' exited with status 1 Output: iptables: Invalid argument. Run `dmesg' for more information. [/CODE] When grepping for iptables in the output of dmesg, I got: [CODE] adb shell su -c dmesg | grep -i iptables [ 824.176835] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1314.159697] [ 1229] 0 1229 8505 928 12 3 0 -1000 iptables-restor [/CODE]

Jookia commented 3 years ago

Unfortunately I can't fix this as Orbot no longer works on my phone

On Tue, May 18, 2021 at 10:08:27AM -0700, PureIncompetence wrote:

I can confirm this bug, it happens to me on official LOS 17 just as @abidal3 described it: When I try to apply new rules that contain at least one which routes traffic through tor, I get the the error-notification "Error applying firewall rules. Click to open settings" and the firewall gets disabled. If I disable the option "Enable inbound connections", everything works as expected. I tried 3 AFWall-versions: 3.4, 3.5 and 3.5.2 -> Got the same behaviour on each of them. On the other hand I tested with a friends device (also with LOS 17), which has exactly the same AFWall-Settings and I can't reproduce the problem with it.

I looked through logcat and found the following entry, which I assume to be related, as it always appears, when I try to apply the rules: [CODE] command 'iptables -A afwall-input -j afwall-tor-reject' exited with status 1 Output: iptables: Invalid argument. Run `dmesg' for more information. [/CODE] When grepping for iptables in the output of dmesg, I got: [CODE] adb shell su -c dmesg | grep -i iptables [ 824.176835] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1314.159697] [ 1229] 0 1229 8505 928 12 3 0 -1000 iptables-restor [/CODE]

-- You are receiving this because you commented. Reply to this email directly or view it on GitHub: https://github.com/ukanth/afwall/issues/956#issuecomment-843368733

PureIncompetence commented 3 years ago

You don't need to have Orbot on your phone to replicate the bug. Just enable "Allow inbound connections" and Tor control and try to activate it for any app. I tried that with and without Orbot installed on the phone, and the behaviour was exactly the same I described above.

PureIncompetence commented 9 months ago

I've got another case to which this bugreport applies: LineageOS 20 on an OnePlus 6T (fajita). I will give as much detail as possible to help narrowing down the cause, adhering to the official template for bug reporting.

1363 also seems to be the same problem as described here.

If more information for debugging is missing, please ask. I will do my best to provide it. I'm happy to test possible fixes and/or workarounds, as this is not a daily driver. Imho this bug is a huge regression for many power users.

Edit: After trying other available ROMs on the OnePlus 6T I can confirm that the bug also occurs on the following ones:

That means that I didn't find any A13+ ROM yet, where it does not occur. /Edit

Edit 2: The same problem occurs on the following older LOS versions:

/Edit 2

Edit 3: Same goes with the latest version 11.1.2.2 of OxygenOS (OnePlus stock ROM). Exactly the same error. /Edit 3

  • AFWall+ Mode (whitelist [default enabled]/blacklist)

Whitelist Mode

  • Android ROM + exact version number

LineageOS 20 (Android 13) on OnePlus 6T

  • What steps will reproduce the problem?
  1. install LineageOS
  2. flash Magisk
  3. install AFWall (v3.6.0 donation version, APK from F-Droid - also tried v3.5.3)
  4. enable Preferences -> Rules/Connectivity -> Tor control
  5. enable Preferences -> Experimental -> Enable inbound connections
  6. activate TOR-checkbox on any app
  7. Apply

Installing / using Orbot is not necessary / relevant to reproduce this bug!

  • Additional security software installed (like XPrivacy/Avast)? Is it really deactivated?!

None.

  • What is the expected output? What do you see instead?

The expected result would be a successful application of the newly set rules (including all implicitly set rules). This combination works perfectly on other devices running OmniROM and LineageOS (both Android 11).

Instead, after the usual popup countdown - which by the way pauses briefly for the third last rule rule (153 of 155) - I get the error message Error applying firewall rules. Click to open setttings. As soon as I disable the TOR checkbox or deactivate Enable inbound connections and reapply the rules, it works again.

  • Attach your exported rules.log (IPv4 + IPv6)

I didn't get AFWall+ to export the v6rules, the button show rules -> enable IPv6 rules didn't do anything. /storage/emulated/0/Android/data/dev.ukanth.ufirewall/files/IPv4rules.log :

` ========== IPv4 Rules ========== Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 afwall-input all -- * * 0.0.0.0/0 0.0.0.0/0 50378 23M bw_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0 50378 23M fw_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 oem_fwd all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 fw_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 bw_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 tetherctrl_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 1 packets, 144 bytes) pkts bytes target prot opt in out source destination 1 144 afwall all -- * * 0.0.0.0/0 0.0.0.0/0 11202 2329K nm_qti_filter_ssdp_dropper all -- * * 0.0.0.0/0 0.0.0.0/0 11202 2329K oem_out all -- * * 0.0.0.0/0 0.0.0.0/0 11202 2329K fw_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 11202 2329K st_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 11202 2329K bw_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall (1 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED 0 0 afwall-vpn all -- * tun+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-vpn all -- * ppp+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-vpn all -- * tap+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-vpn all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] mark match 0x3c/0xfffc 0 0 afwall-vpn all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] mark match 0x40/0xfff8 0 0 afwall-wifi all -- * eth+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-wifi all -- * wlan+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-wifi all -- * tiwlan+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-wifi all -- * ra+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-wifi all -- * bnep+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * rmnet+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * pdp+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * uwbr+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * wimax+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * vsnet+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * rmnet_sdio+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * ccmni+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * qmi+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * svnet0+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * ccemni+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * wwan+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * cdma_rmnet+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * clat4+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * cc2mni+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * bond1+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * rmnet_smux+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * ccinet+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * v4-rmnet+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * seth_w+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * v4-rmnet_data+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * rmnet_ipa+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * rmnet_data+ 0.0.0.0/0 0.0.0.0/0 0 0 afwall-3g all -- * r_rmnet_data+ 0.0.0.0/0 0.0.0.0/0 1 144 afwall-tor all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g (23 references) pkts bytes target prot opt in out source destination 0 0 afwall-3g-postcustom all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g-fork (2 references) pkts bytes target prot opt in out source destination 0 0 afwall-3g-home all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g-home (1 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1016 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1020 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10177 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10178 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10179 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10181 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g-postcustom (1 references) pkts bytes target prot opt in out source destination 0 0 afwall-3g-fork all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g-roam (0 references) pkts bytes target prot opt in out source destination 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-3g-tether (0 references) pkts bytes target prot opt in out source destination 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 udp dpt:53 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 9999 udp dpt:53 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1052 udp dpt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 tcp dpt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 9999 tcp dpt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1052 tcp dpt:53 0 0 afwall-3g-fork all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-input (1 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED Chain afwall-reject (20 references) pkts bytes target prot opt in out source destination 0 0 NFLOG all -- * * 0.0.0.0/0 0.0.0.0/0 nflog-prefix "{AFL}" nflog-group 40 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain afwall-tether (0 references) pkts bytes target prot opt in out source destination 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-tor (1 references) pkts bytes target prot opt in out source destination 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x500 Chain afwall-tor-reject (0 references) pkts bytes target prot opt in out source destination 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10181 Chain afwall-vpn (5 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1020 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10177 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10179 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10181 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi (5 references) pkts bytes target prot opt in out source destination 0 0 afwall-wifi-postcustom all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi-fork (2 references) pkts bytes target prot opt in out source destination 0 0 afwall-wifi-wan all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi-lan (0 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1016 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1020 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10178 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10179 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10180 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi-postcustom (1 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1014 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1010 0 0 afwall-wifi-fork all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi-tether (0 references) pkts bytes target prot opt in out source destination 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 udp spt:67 dpt:68 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 9999 udp spt:67 dpt:68 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1073 udp spt:67 dpt:68 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 udp spt:53 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 9999 udp spt:53 0 0 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1052 udp spt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 tcp spt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 9999 tcp spt:53 0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1052 tcp spt:53 0 0 afwall-wifi-fork all -- * * 0.0.0.0/0 0.0.0.0/0 Chain afwall-wifi-wan (1 references) pkts bytes target prot opt in out source destination 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1016 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1020 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10177 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10178 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10179 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10181 0 0 afwall-reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 owner UID match 0 0 0 afwall-reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 owner UID match 0 0 0 afwall-reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain bw_FORWARD (1 references) pkts bytes target prot opt in out source destination 0 0 bw_costly_tun0 all -- tun0 * 0.0.0.0/0 0.0.0.0/0 0 0 bw_costly_tun0 all -- * tun0 0.0.0.0/0 0.0.0.0/0 Chain bw_INPUT (1 references) pkts bytes target prot opt in out source destination 50378 23M bw_global_alert all -- * * 0.0.0.0/0 0.0.0.0/0 103 40004 bw_costly_tun0 all -- tun0 * 0.0.0.0/0 0.0.0.0/0 0 0 RETURN esp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x100000/0x100000 50378 23M MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x100000 Chain bw_OUTPUT (1 references) pkts bytes target prot opt in out source destination 11202 2329K bw_global_alert all -- * * 0.0.0.0/0 0.0.0.0/0 45 13752 bw_costly_tun0 all -- * tun0 0.0.0.0/0 0.0.0.0/0 Chain bw_costly_shared (0 references) pkts bytes target prot opt in out source destination 0 0 bw_penalty_box all -- * * 0.0.0.0/0 0.0.0.0/0 Chain bw_costly_tun0 (4 references) pkts bytes target prot opt in out source destination 148 53756 bw_penalty_box all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota tun0: 9223372036854775807 bytes reject-with icmp-port-unreachable Chain bw_data_saver (1 references) pkts bytes target prot opt in out source destination 8 416 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 Chain bw_global_alert (2 references) pkts bytes target prot opt in out source destination 7585 8094K all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota globalAlert: 2097152 bytes Chain bw_happy_box (1 references) pkts bytes target prot opt in out source destination 140 53340 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 match bpf 6 0 0 1937339183 8 416 bw_data_saver all -- * * 0.0.0.0/0 0.0.0.0/0 Chain bw_penalty_box (2 references) pkts bytes target prot opt in out source destination 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 match bpf 5 0 0 1937339183 reject-with icmp-port-unreachable 148 53756 bw_happy_box all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw_FORWARD (1 references) pkts bytes target prot opt in out source destination Chain fw_INPUT (1 references) pkts bytes target prot opt in out source destination Chain fw_OUTPUT (1 references) pkts bytes target prot opt in out source destination Chain nm_mdmprxy_doze_mode_skip (0 references) pkts bytes target prot opt in out source destination Chain nm_mdmprxy_iface_pkt_fwder (0 references) pkts bytes target prot opt in out source destination Chain nm_qti_filter_ssdp_dropper (1 references) pkts bytes target prot opt in out source destination 0 0 DROP udp -- * r_rmnet_data+ 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 0 0 DROP udp -- * rmnet_data+ 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 Chain oem_fwd (1 references) pkts bytes target prot opt in out source destination Chain oem_out (1 references) pkts bytes target prot opt in out source destination Chain st_OUTPUT (1 references) pkts bytes target prot opt in out source destination Chain st_clear_caught (2 references) pkts bytes target prot opt in out source destination Chain st_clear_detect (0 references) pkts bytes target prot opt in out source destination 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x2000000/0x2000000 reject-with icmp-port-unreachable 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x1000000/0x1000000 0 0 CONNMARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0xffff0000=0x16030000&&0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x4&0xff0000=0x10000" CONNMARK or 0x1000000 0 0 CONNMARK udp -- * * 0.0.0.0/0 0.0.0.0/0 u32 "0x0>>0x16&0x3c@0x8&0xffff0000=0x16fe0000&&0x0>>0x16&0x3c@0x14&0xff0000=0x10000" CONNMARK or 0x1000000 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x1000000/0x1000000 0 0 st_clear_caught tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0x0=0x0" 0 0 st_clear_caught udp -- * * 0.0.0.0/0 0.0.0.0/0 Chain st_penalty_log (0 references) pkts bytes target prot opt in out source destination 0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK or 0x1000000 0 0 NFLOG all -- * * 0.0.0.0/0 0.0.0.0/0 Chain st_penalty_reject (0 references) pkts bytes target prot opt in out source destination 0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK or 0x2000000 0 0 NFLOG all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain tetherctrl_FORWARD (1 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain tetherctrl_counters (0 references) pkts bytes target prot opt in out source destination ================== Network interfaces ================== r_rmnet_data0 rmnet_data1 rmnet_data10 r_rmnet_data2 rmnet_data3 p2p0 ip_vti0 r_rmnet_data4 ip6tnl0 rmnet_data5 r_rmnet_data6 rmnet_data7 dummy0 r_rmnet_data8 ip6_vti0 rmnet_data9 rmnet_data0 lo r_rmnet_data1 rmnet_data2 sit0 wlan0 r_rmnet_data3 bonding_masters rmnet_data4 bond0 r_rmnet_data5 rmnet_data6 r_rmnet_data7 rmnet_data8 rmnet_ipa0 ======== ifconfig ======== bond0 Link encap:Ethernet HWaddr D6:7B:46:6A:57:23 BROADCAST MASTER MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) dummy0 Link encap:Ethernet HWaddr 7E:6D:B8:79:FD:AE UP BROADCAST RUNNING NOARP MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:527 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:89488 (87.3 KiB) ip6_vti0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 NOARP MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) ip6tnl0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 NOARP MTU:1452 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) ip_vti0 Link encap:UNSPEC HWaddr 00-00-00-00-01-00-00-00-00-00-00-00-00-00-00-00 NOARP MTU:1480 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:2130 errors:0 dropped:0 overruns:0 frame:0 TX packets:2130 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:732638 (715.4 KiB) TX bytes:732638 (715.4 KiB) p2p0 Link encap:Ethernet HWaddr 64:A2:F9:EB:E0:D3 BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:3000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data2 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data3 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data4 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data5 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data6 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data7 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) r_rmnet_data8 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 UP RUNNING MTU:1500 Metric:1 RX packets:15 errors:0 dropped:0 overruns:0 frame:0 TX packets:15 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1170 (1.1 KiB) TX bytes:1123 (1.0 KiB) rmnet_data1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data10 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data2 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data3 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data4 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data5 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data6 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data7 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data8 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_data9 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 [NO FLAGS] MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) rmnet_ipa0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 UP RUNNING MTU:2000 Metric:1 RX packets:11 errors:0 dropped:0 overruns:0 frame:0 TX packets:14 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1350 (1.3 KiB) TX bytes:1243 (1.2 KiB) sit0 Link encap:UNSPEC HWaddr 00-00-00-00-01-00-00-00-00-00-00-00-00-00-00-00 NOARP MTU:1480 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) wlan0 Link encap:Ethernet HWaddr 6A:9F:43:05:6A:50 BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:76125 errors:0 dropped:0 overruns:0 frame:0 TX packets:5615 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:3000 RX bytes:21918554 (20.9 MiB) TX bytes:1207623 (1.1 MiB) =========== System info =========== Android version: 13 Manufacturer: OnePlus Model: ONEPLUS A6013 Build: lineage_fajita 13 TQ3A.230901.001 03d7eda26c Active interface: unknown Wifi Tether status: unknown Bluetooth Tether status: unknown Usb Tether status: unknown Roam status: no IPv4 subnet: IPv6 subnet: /system/bin/su: 298648 bytes /system/xbin/su: not present /data/magisk/magisk: not present /system/app/Superuser.apk: not present Superuser: com.topjohnwu.magisk v26.4 =========== Preferences =========== activeRules: true addDelay: false appVersion: 20220615 bb_path: builtin controlIPv6: false copyOldExports: true disableIcons: false disableTaskerToast: false dns_value: disable enableAdmin: false enableConfirm: true enableDeviceCheck: false enableIPv6: true enableInbound: true enableLAN: true enableLogService: true enableRoam: false enableTether: false enableTor: true enableVPN: true forward_chain: true forward_chain_v6: true hasRoot: true input_chain: true input_chain_v6: true ipt_path: builtin ipurchaseddonatekey: true locale: en logTarget: NFLOG logTargets: NFLOG,LOG notification_priority: 0 notifyAppInstall: false oldLogView: true output_chain: true output_chain_v6: true passSetting: p0 patternMax: 3 runNotification: true showAllApps: true showFilter: true showHostName: false showUid: true supportDualApps: false sysColor: -1337344 theme: G widgetX: 1080 widgetY: 2126 Profile Mode : whitelist Status : Disabled `
  • Please provide any additional information below (e.g. logcat).

adb shell su -c logcat -v long while starting AFWall+ :

` [ 01-24 19:19:23.223 1400: 1624 I/ActivityManager ] Start proc 2977:dev.ukanth.ufirewall/u0a183 for next-top-activity {dev.ukanth.ufirewall/dev.ukanth.ufirewall.MainActivity} [ 01-24 19:19:23.234 22907:22912 I/adbd ] jdwp connection from 2977 [ 01-24 19:19:23.102 0: 0 I/binder ] 2977:2977 ioctl 40046210 7fe70a2990 returned -22 [ 01-24 19:19:23.241 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 171979766; UID 10183; state: ENABLED [ 01-24 19:19:23.252 2977: 2977 V/GraphicsEnvironment ] ANGLE Developer option for 'dev.ukanth.ufirewall' set to: 'default' [ 01-24 19:19:23.252 2977: 2977 V/GraphicsEnvironment ] ANGLE GameManagerService for dev.ukanth.ufirewall: false [ 01-24 19:19:23.252 2977: 2977 V/GraphicsEnvironment ] Neither updatable production driver nor prerelease driver is supported. [ 01-24 19:19:23.253 2977: 2977 D/NetworkSecurityConfig ] No Network Security Config specified, using platform default [ 01-24 19:19:23.253 2977: 2977 D/NetworkSecurityConfig ] No Network Security Config specified, using platform default [ 01-24 19:19:23.269 2977: 2977 I/AFWall ] Selected Profile: AFWallPrefs [ 01-24 19:19:23.285 1400: 2056 D/ConnectivityService ] NetReassign [no changes] [ 01-24 19:19:23.293 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 210923482; UID 10183; state: DISABLED [ 01-24 19:19:23.293 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 37756858; UID 10183; state: ENABLED [ 01-24 19:19:23.310 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 171228096; UID 10183; state: ENABLED [ 01-24 19:19:23.319 2977: 2977 I/AFWall ] Received cmds: #1 [ 01-24 19:19:23.319 2977: 2977 D/AFWall ] Hashing4....false [ 01-24 19:19:23.319 2977: 2977 D/AFWall ] Starting root shell(4)... [ 01-24 19:19:23.326 1400:24206 D/CompatibilityChangeReporter ] Compat change id reported: 161145287; UID 10183; state: DISABLED [ 01-24 19:19:23.329 2977: 2977 I/AFWall ] Selected Profile: AFWallPrefs [ 01-24 19:19:23.333 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 183155436; UID 10183; state: DISABLED [ 01-24 19:19:23.366 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 237531167; UID 10183; state: DISABLED [ 01-24 19:19:23.368 2977: 3010 W/Parcel ] Expecting binder but got null! [ 01-24 19:19:23.371 1400: 2302 D/CoreBackPreview ] Window{bf3352b u0 dev.ukanth.ufirewall/dev.ukanth.ufirewall.MainActivity}: Setting back callback OnBackInvokedCallbackInfo{mCallback=android.window.IOnBackInvokedCallback$Stub$Proxy@3cec321, mPriority=0} [ 01-24 19:19:23.373 2977: 2977 D/CompatibilityChangeReporter ] Compat change id reported: 160794467; UID 10183; state: ENABLED [ 01-24 19:19:23.378 2977: 2977 D/BluetoothPan ] Binding service... [ 01-24 19:19:23.378 1400: 2302 D/BluetoothManagerService ] Trying to bind to profile: 5, while Bluetooth was disabled [ 01-24 19:19:23.378 2977: 2977 I/AFWall ] Starting Log Service: /data/user/0/dev.ukanth.ufirewall/app_bin/nflog 40 for LogTarget: NFLOG [ 01-24 19:19:23.379 2977: 2977 I/AFWall ] Staring log watcher [ 01-24 19:19:23.382 2977: 2977 I/AFWall ] Starting Log Service: /data/user/0/dev.ukanth.ufirewall/app_bin/nflog 40 for LogTarget: NFLOG [ 01-24 19:19:23.382 2977: 2977 I/AFWall ] Staring log watcher [ 01-24 19:19:23.394 2977: 3010 I/AdrenoGLES-0 ] QUALCOMM build : 8e5405b, I57aaec3440 Build Date : 05/21/21 OpenGL ES Shader Compiler Version: EV031.32.02.10 Local Branch : mybranchebba1dbe-451b-f160-ac81-1458d0b52ae8 Remote Branch : quic/gfx-adreno.lnx.1.0.r135-rel Remote Branch : NONE Reconstruct Branch : NOTHING [ 01-24 19:19:23.394 2977: 3010 I/AdrenoGLES-0 ] Build Config : S P 10.0.7 AArch64 [ 01-24 19:19:23.394 2977: 3010 I/AdrenoGLES-0 ] Driver Path : /vendor/lib64/egl/libGLESv2_adreno.so [ 01-24 19:19:23.396 2977: 3010 I/AdrenoGLES-0 ] PFP: 0x016ee190, ME: 0x00000000 [ 01-24 19:19:23.406 3023: 3023 D/AndroidRuntime ] >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<< [ 01-24 19:19:23.408 1043: 1114 I/SDM ] HWCDisplay::GetColorModeCount: Supported color mode count = 3 [ 01-24 19:19:23.409 1043: 1114 I/SDM ] HWCDisplay::GetColorModes: Supports color mode[0] = 0 [ 01-24 19:19:23.409 1043: 1114 I/SDM ] HWCDisplay::GetColorModes: Supports color mode[1] = 7 [ 01-24 19:19:23.409 1043: 1114 I/SDM ] HWCDisplay::GetColorModes: Supports color mode[2] = 9 [ 01-24 19:19:23.409 1138: 1257 E/HWComposer ] getSupportedContentTypes: getSupportedContentTypes failed for display 4630946253560767361: Unsupported (8) [ 01-24 19:19:23.409 2977: 3010 E/OpenGLRenderer ] Unable to match the desired swap behavior. [ 01-24 19:19:23.410 3023: 3023 I/AndroidRuntime ] Using default boot image [ 01-24 19:19:23.410 3023: 3023 I/AndroidRuntime ] Leaving lock profiling enabled [ 01-24 19:19:23.275 0: 0 I/binder ] 2977:3010 ioctl 40046210 72a0173194 returned -22 [ 01-24 19:19:23.411 641: 641 I/hwservicemanager ] getTransport: Cannot find entry android.hardware.graphics.mapper@4.0::IMapper/default in either framework or device VINTF manifest. [ 01-24 19:19:23.411 2977: 3039 I/Gralloc4 ] mapper 4.x is not supported [ 01-24 19:19:23.412 641: 641 I/hwservicemanager ] getTransport: Cannot find entry android.hardware.graphics.mapper@3.0::IMapper/default in either framework or device VINTF manifest. [ 01-24 19:19:23.412 2977: 3039 W/Gralloc3 ] mapper 3.x is not supported [ 01-24 19:19:23.412 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc70d50 [ 01-24 19:19:23.412 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc75790 [ 01-24 19:19:23.413 3023: 3023 I/app_process ] Core platform API reporting enabled, enforcing=false [ 01-24 19:19:23.416 641: 641 I/hwservicemanager ] getTransport: Cannot find entry android.hardware.graphics.allocator@4.0::IAllocator/default in either framework or device VINTF manifest. [ 01-24 19:19:23.418 640: 640 I/servicemanager ] Could not find android.hardware.graphics.allocator.IAllocator/default in the VINTF manifest. [ 01-24 19:19:23.418 2977: 3039 W/Gralloc4 ] allocator 4.x is not supported [ 01-24 19:19:23.419 641: 641 I/hwservicemanager ] getTransport: Cannot find entry android.hardware.graphics.allocator@3.0::IAllocator/default in either framework or device VINTF manifest. [ 01-24 19:19:23.419 2977: 3039 W/Gralloc3 ] allocator 3.x is not supported [ 01-24 19:19:23.422 2977: 3039 I/Gralloc2 ] Adding additional valid usage bits: 0x8202000 [ 01-24 19:19:23.477 3036: 3036 D/AndroidRuntime ] >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<< [ 01-24 19:19:23.481 3036: 3036 I/AndroidRuntime ] Using default boot image [ 01-24 19:19:23.481 3036: 3036 I/AndroidRuntime ] Leaving lock profiling enabled [ 01-24 19:19:23.484 3036: 3036 I/app_process ] Core platform API reporting enabled, enforcing=false [ 01-24 19:19:23.489 2977: 2977 D/AFWall ] Root shell(4) is open [ 01-24 19:19:23.489 2977: 2977 I/AFWall ] Start processing next state(4) [ 01-24 19:19:23.499 1400: 1612 I/ActivityTaskManager ] Displayed dev.ukanth.ufirewall/.MainActivity: +305ms [ 01-24 19:19:23.524 3023: 3023 D/app_process ] Time zone APEX ICU file found: /apex/com.android.tzdata/etc/icu/icu_tzdata.dat [ 01-24 19:19:23.524 3023: 3023 D/app_process ] I18n APEX ICU file found: /apex/com.android.i18n/etc/icu/icudt70l.dat [ 01-24 19:19:23.528 1400:31010 D/CompatibilityChangeReporter ] Compat change id reported: 214016041; UID 10183; state: DISABLED [ 01-24 19:19:23.564 3023: 3023 D/AndroidRuntime ] Calling main entry com.android.commands.content.Content [ 01-24 19:19:23.429 0: 0 I/binder ] 3023:3023 ioctl 40046210 7fdffb97c0 returned -22 [ 01-24 19:19:23.577 3023: 3023 D/AndroidRuntime ] Shutting down VM [ 01-24 19:19:23.578 2167: 2335 W/Parcel ] Expecting binder but got null! [ 01-24 19:19:23.443 0: 0 I/binder ] 3023:3023 ioctl 40046210 7fdffb99a4 returned -22 [ 01-24 19:19:23.583 1400: 2302 D/CoreBackPreview ] Window{34513ad u0 Toast}: Setting back callback OnBackInvokedCallbackInfo{mCallback=android.window.IOnBackInvokedCallback$Stub$Proxy@6813a73, mPriority=0} [ 01-24 19:19:23.594 2513: 2513 W/FrameTracker ] Missing HWUI jank callback for vsyncId: 1256136, CUJ=J [ 01-24 19:19:23.594 2513: 2513 W/FrameTracker ] Missing HWUI jank callback for vsyncId: 1256158, CUJ=J [ 01-24 19:19:23.594 2167: 2335 E/OpenGLRenderer ] Unable to match the desired swap behavior. [ 01-24 19:19:23.595 3036: 3036 D/app_process ] Time zone APEX ICU file found: /apex/com.android.tzdata/etc/icu/icu_tzdata.dat [ 01-24 19:19:23.595 3036: 3036 D/app_process ] I18n APEX ICU file found: /apex/com.android.i18n/etc/icu/icudt70l.dat [ 01-24 19:19:23.628 3036: 3036 D/AndroidRuntime ] Calling main entry com.android.commands.content.Content [ 01-24 19:19:23.493 0: 0 I/binder ] 3036:3036 ioctl 40046210 7fca962190 returned -22 [ 01-24 19:19:23.642 3036: 3036 D/AndroidRuntime ] Shutting down VM [ 01-24 19:19:23.508 0: 0 I/binder ] 3036:3036 ioctl 40046210 7fca962374 returned -22 [ 01-24 19:19:23.693 1400: 2491 D/CoreBackPreview ] Window{1aabb28 u0 Splash Screen dev.ukanth.ufirewall EXITING}: Setting back callback null [ 01-24 19:19:23.694 1400:31010 W/InputManager-JNI ] Input channel object '1aabb28 Splash Screen dev.ukanth.ufirewall (client)' was disposed without first being removed with the input manager! [ 01-24 19:19:23.698 1400: 1400 I/NotificationService ] Cannot find enqueued record for key: 0|dev.ukanth.ufirewall|33347|null|10183 [ 01-24 19:19:23.567 0: 0 I/CPU4 ] update max cpu_capacity 1024 [ 01-24 19:19:23.795 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc6fc10 [ 01-24 19:19:23.795 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc797b0 [ 01-24 19:19:23.795 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc73450 [ 01-24 19:19:23.795 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc73450 [ 01-24 19:19:23.795 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc797b0 [ 01-24 19:19:24.315 0: 0 I/init ] Untracked pid 3022 exited with status 0 [ 01-24 19:19:24.315 0: 0 I/init ] Untracked pid 3022 did not have an associated service entry and will not be reaped [ 01-24 19:19:24.369 0: 0 I/init ] Untracked pid 3035 exited with status 0 [ 01-24 19:19:24.369 0: 0 I/init ] Untracked pid 3035 did not have an associated service entry and will not be reaped [ 01-24 19:19:26.063 1400:31010 D/CoreBackPreview ] Window{34513ad u0 Toast}: Setting back callback null [ 01-24 19:19:26.069 1400:31010 W/InputManager-JNI ] Input channel object '34513ad Toast (client)' was disposed without first being removed with the input manager! [ 01-24 19:19:26.084 1400:31010 W/NotificationService ] Toast already killed. pkg=com.topjohnwu.magisk token=android.os.BinderProxy@a343260 [ 01-24 19:19:26.093 2167: 2335 W/Parcel ] Expecting binder but got null! [ 01-24 19:19:26.099 1400: 2491 D/CoreBackPreview ] Window{a527fde u0 Toast}: Setting back callback OnBackInvokedCallbackInfo{mCallback=android.window.IOnBackInvokedCallback$Stub$Proxy@71a148c, mPriority=0} [ 01-24 19:19:26.109 2167: 2335 E/OpenGLRenderer ] Unable to match the desired swap behavior. [ 01-24 19:19:26.246 1400: 1523 I/system_server ] Background concurrent copying GC freed 719802(36MB) AllocSpace objects, 24(684KB) LOS objects, 75% free, 20MB/80MB, paused 115us,102us total 146.838ms [ 01-24 19:19:26.285 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.286 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.287 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.287 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.287 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.289 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.289 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.290 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.290 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.291 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.291 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.291 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.291 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.292 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.292 1400: 1525 W/System ] A resource failed to call release. [ 01-24 19:19:26.292 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:19:26.294 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.295 1400: 1525 W/System ] A resource failed to call HardwareBuffer.close. [ 01-24 19:19:26.295 1400: 1525 W/System ] A resource failed to call close. [ 01-24 19:19:26.296 1400: 1525 W/System ] A resource failed to call close. [ 01-24 19:19:26.729 1400: 3329 E/TaskPersister ] File error accessing recents directory (directory doesn't exist?). [ 01-24 19:19:28.658 1400: 2491 D/CoreBackPreview ] Window{a527fde u0 Toast}: Setting back callback null [ 01-24 19:19:28.665 1400: 2491 W/InputManager-JNI ] Input channel object 'a527fde Toast (client)' was disposed without first being removed with the input manager! [ 01-24 19:19:28.677 1400: 2491 W/NotificationService ] Toast already killed. pkg=com.topjohnwu.magisk token=android.os.BinderProxy@bd52db7 `

adb shell su -c logcat -v long while trying to apply the rules and getting the error:

` [ 01-24 19:21:07.574 1400: 2491 D/CoreBackPreview ] Window{981d4cb u0 dev.ukanth.ufirewall/dev.ukanth.ufirewall.MainActivity}: Setting back callback OnBackInvokedCallbackInfo{mCallback=android.window.IOnBackInvokedCallback$Stub$Proxy@2c12fd, mPriority=0} [ 01-24 19:21:07.574 2977: 3041 I/AFWall ] Using applySavedIptablesRules [ 01-24 19:21:07.575 2977: 3123 I/AFWall ] Constructing rules for v6 [ 01-24 19:21:07.576 2977: 3121 I/AFWall ] Constructing rules for v4 [ 01-24 19:21:07.576 2977: 3123 I/AFWall ] Forcing configuration: false [ 01-24 19:21:07.576 2977: 3121 I/AFWall ] Forcing configuration: true [ 01-24 19:21:07.577 2977: 3123 I/AFWall ] no ipv6 found: true, [ 01-24 19:21:07.577 2977: 3123 I/AFWall ] No ipaddress found for LAN [ 01-24 19:21:07.578 2977: 3121 I/AFWall ] no ipv4 found:true, [ 01-24 19:21:07.578 2977: 3121 I/AFWall ] No ipaddress found for LAN [ 01-24 19:21:07.585 2977: 3010 E/OpenGLRenderer ] Unable to match the desired swap behavior. [ 01-24 19:21:07.587 2977: 3121 I/AFWall ] Total # of rules for v4 170 [ 01-24 19:21:07.587 2977: 3121 I/AFWall ] Using applySaved4IptablesRules [ 01-24 19:21:07.588 2977: 3121 I/AFWall ] Received cmds: #170 [ 01-24 19:21:07.588 2977: 3121 D/AFWall ] Hashing4....false [ 01-24 19:21:07.588 2977: 3121 I/AFWall ] Start processing next state(4) [ 01-24 19:21:07.593 2977: 3123 I/AFWall ] Total # of rules for v6 154 [ 01-24 19:21:07.594 2977: 3123 I/AFWall ] Using applySavedIp6tablesRules [ 01-24 19:21:07.594 2977: 3123 I/AFWall6 ] Received cmds: #154 [ 01-24 19:21:07.594 2977: 3123 D/AFWall6 ] Starting root shell(6)... [ 01-24 19:21:07.628 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:21:07.628 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:21:07.628 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:21:07.641 2977: 3137 D/AFWall6 ] Root shell(6) is open [ 01-24 19:21:07.641 2977: 3137 I/AFWall6 ] Start processing next state(6) [ 01-24 19:21:07.680 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -P OUTPUT DROP' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.697 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -P OUTPUT DROP' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.707 3156: 3156 D/AndroidRuntime ] >>>>>> START com.android.internal.os.RuntimeInit uid 0 <<<<<< [ 01-24 19:21:07.712 3156: 3156 I/AndroidRuntime ] Using default boot image [ 01-24 19:21:07.712 3156: 3156 I/AndroidRuntime ] Leaving lock profiling enabled [ 01-24 19:21:07.715 3156: 3156 I/app_process ] Core platform API reporting enabled, enforcing=false [ 01-24 19:21:07.730 2977: 3010 D/OpenGLRenderer ] endAllActiveAnimators on 0x742b123630 (MenuPopupWindow$MenuDropDownListView) with handle 0x733b11eaa0 [ 01-24 19:21:07.732 1400: 2491 D/CoreBackPreview ] Window{584ee53 u0 PopupWindow:636266e}: Setting back callback null [ 01-24 19:21:07.732 1400: 2302 W/InputManager-JNI ] Input channel object '584ee53 PopupWindow:636266e (client)' was disposed without first being removed with the input manager! [ 01-24 19:21:07.744 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc78e50 [ 01-24 19:21:07.745 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc77e90 [ 01-24 19:21:07.762 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.780 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:07.795 1400: 1400 W/NotificationHistory ] Attempted to add notif for locked/gone/disabled user 0 [ 01-24 19:21:07.813 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:07.822 3156: 3156 D/app_process ] Time zone APEX ICU file found: /apex/com.android.tzdata/etc/icu/icu_tzdata.dat [ 01-24 19:21:07.822 3156: 3156 D/app_process ] I18n APEX ICU file found: /apex/com.android.i18n/etc/icu/icudt70l.dat [ 01-24 19:21:07.857 3156: 3156 D/AndroidRuntime ] Calling main entry com.android.commands.content.Content [ 01-24 19:21:07.723 0: 0 I/binder ] 3156:3156 ioctl 40046210 7ffe411660 returned -22 [ 01-24 19:21:07.861 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-input' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.873 3156: 3156 D/AndroidRuntime ] Shutting down VM [ 01-24 19:21:07.739 0: 0 I/binder ] 3156:3156 ioctl 40046210 7ffe411844 returned -22 [ 01-24 19:21:07.893 2167: 2335 W/Parcel ] Expecting binder but got null! [ 01-24 19:21:07.900 1400: 2302 D/CoreBackPreview ] Window{ecae977 u0 Toast}: Setting back callback OnBackInvokedCallbackInfo{mCallback=android.window.IOnBackInvokedCallback$Stub$Proxy@d56e4d, mPriority=0} [ 01-24 19:21:07.909 2167: 2335 E/OpenGLRenderer ] Unable to match the desired swap behavior. [ 01-24 19:21:07.942 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -F afwall-vpn' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.963 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-wifi' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:07.837 0: 0 W/ ] IRQ6 no longer affine to CPU7 [ 01-24 19:21:07.996 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-wifi' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:08.147 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -N afwall-wifi-wan' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.247 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -N afwall-tor' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.285 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -F afwall-tor' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.350 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-3g-roam' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.370 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -N afwall-tether' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.391 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -N afwall-tether' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:08.447 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-wifi-tether' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.519 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-wifi-wan' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.538 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -D OUTPUT -j afwall' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.561 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -D OUTPUT -j afwall' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:08.583 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -D OUTPUT -j afwall' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:08.650 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-tor' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.670 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -I INPUT 1 -j afwall-input' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.692 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-tor-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.718 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-tor-reject' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:08.602 0: 0 I/init ] Untracked pid 3153 exited with status 0 [ 01-24 19:21:08.602 0: 0 I/init ] Untracked pid 3153 did not have an associated service entry and will not be reaped [ 01-24 19:21:08.746 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -N afwall-tor-reject' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:08.806 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -m state --state ESTABLISHED -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:08.834 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -m state --state ESTABLISHED -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:08.854 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -m state --state ESTABLISHED -j RETURN' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:08.921 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -F afwall-3g-postcustom' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.169 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -t nat -F afwall' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.195 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -t nat -F afwall' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:09.217 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -o tap+ -j afwall-vpn' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.353 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -t nat -D OUTPUT -j afwall' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.375 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -o tiwlan+ -j afwall-wifi' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.400 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -t nat -I OUTPUT 1 -j afwall' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.441 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-3g -j afwall-3g-postcustom' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.464 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -o rmnet+ -j afwall-3g' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.668 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-3g-postcustom' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.688 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-3g-postcustom' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:09.709 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-3g-postcustom' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:09.730 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -o cdma_rmnet+ -j afwall-3g' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.762 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -F afwall-3g-fork' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.819 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall -o bond1+ -j afwall-3g' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.898 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-postcustom -m owner --uid-owner 1014 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:09.962 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-postcustom -m owner --uid-owner 1010 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.014 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-postcustom -j afwall-wifi-fork' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.037 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-tether -m owner --uid-owner 0 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.058 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-tether -m owner --uid-owner 0 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:10.083 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-tether -m owner --uid-owner 0 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:10.105 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-tether -m owner --uid-owner 0 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 4/10) [ 01-24 19:21:10.285 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-tether -m owner --uid-owner 9999 -p tcp --sport=53 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.345 1400: 2491 D/CoreBackPreview ] Window{ecae977 u0 Toast}: Setting back callback null [ 01-24 19:21:10.350 1400: 2491 W/InputManager-JNI ] Input channel object 'ecae977 Toast (client)' was disposed without first being removed with the input manager! [ 01-24 19:21:10.356 1400: 2491 W/NotificationService ] Toast already killed. pkg=com.topjohnwu.magisk token=android.os.BinderProxy@4f8874e [ 01-24 19:21:10.359 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc78a30 [ 01-24 19:21:10.360 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc7add0 [ 01-24 19:21:10.360 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc79ab0 [ 01-24 19:21:10.416 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-tether -m owner --uid-owner 0 -p tcp --dport=53 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.484 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-tether -m owner --uid-owner 1052 -p tcp --dport=53 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.562 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall -o wimax+ -j afwall-3g' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.619 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-home -m owner --uid-owner 1020 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.684 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-home -m owner --uid-owner 10178 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.705 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-home -m owner --uid-owner 10178 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:10.726 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-home -m owner --uid-owner 10178 -j RETURN' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:10.747 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-home -m owner --uid-owner 10178 -j RETURN' exited with status 4, retrying (attempt 4/10) [ 01-24 19:21:10.918 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-roam -p tcp --dport 53 -m owner --uid-owner 0 -j afwall-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:10.943 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-3g-roam -p tcp --dport 53 -m owner --uid-owner 0 -j afwall-reject' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:11.032 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -m owner --uid-owner 1016 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.053 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -m owner --uid-owner 1016 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:11.074 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -m owner --uid-owner 1016 -j RETURN' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:11.094 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -m owner --uid-owner 1016 -j RETURN' exited with status 4, retrying (attempt 4/10) [ 01-24 19:21:11.116 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -m owner --uid-owner 1016 -j RETURN' exited with status 4, retrying (attempt 5/10) [ 01-24 19:21:11.181 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 9999 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.211 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 9999 -p udp --sport=67 --dport=68 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:11.266 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-wan -p udp --dport 53 -m owner --uid-owner 0 -j afwall-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.329 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 9999 -p udp --sport=53 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.351 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 9999 -p udp --sport=53 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:11.372 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 9999 -p udp --sport=53 -j RETURN' exited with status 4, retrying (attempt 3/10) [ 01-24 19:21:11.394 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-wifi-lan -m owner --uid-owner 1020 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.531 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 1052 -p tcp --sport=53 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.561 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-wifi-tether -m owner --uid-owner 1052 -p tcp --sport=53 -j RETURN' exited with status 4, retrying (attempt 2/10) [ 01-24 19:21:11.617 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-vpn -m owner --uid-owner 10177 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.625 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:21:11.750 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-vpn -j afwall-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.814 2977: 3137 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-tether -p tcp --dport 53 -m owner --uid-owner 0 -j afwall-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.883 2977: 3138 D/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-tor-reject -m owner --uid-owner 10181 -j afwall-reject' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:11.811 0: 0 E/x_tables ] ip6_tables: owner match: used from hooks INPUT/OUTPUT, but only valid from OUTPUT/POSTROUTING [ 01-24 19:21:11.948 2977: 3138 I/AFWall6 ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/ip6tables -A afwall-input -j afwall-tor-reject' exited with status 1 Output: [ 01-24 19:21:11.961 2977: 2977 D/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-3g-home -m owner --uid-owner 1020 -j RETURN' exited with status 4, retrying (attempt 1/10) [ 01-24 19:21:13.074 1138: 1191 W/TransactionTracing ] Could not find layer id -1 [ 01-24 19:21:13.155 1400: 2491 D/CoreBackPreview ] Window{981d4cb u0 dev.ukanth.ufirewall/dev.ukanth.ufirewall.MainActivity}: Setting back callback null [ 01-24 19:21:13.157 1400: 2491 W/InputManager-JNI ] Input channel object '981d4cb dev.ukanth.ufirewall/dev.ukanth.ufirewall.MainActivity (client)' was disposed without first being removed with the input manager! [ 01-24 19:21:13.017 0: 0 E/x_tables ] ip_tables: owner match: used from hooks INPUT, but only valid from OUTPUT/POSTROUTING [ 01-24 19:21:13.175 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc77950 [ 01-24 19:21:13.175 1138: 1191 W/TransactionTracing ] Could not find layer handle 0x70efc71bf0 [ 01-24 19:21:13.179 1400: 1615 V/WindowManager ] Unknown focus tokens, dropping reportFocusChanged [ 01-24 19:21:13.195 2977: 2977 I/AFWall ] command '/data/user/0/dev.ukanth.ufirewall/app_bin/iptables -A afwall-input -j afwall-tor-reject' exited with status 1 Output: `

adb shell su -c dmesg -T --follow | grep -Ei afwall\|tables while trying to apply the rules:

` x_tables: ip6_tables: owner match: used from hooks INPUT/OUTPUT, but only valid from OUTPUT/POSTROUTING x_tables: ip_tables: owner match: used from hooks INPUT, but only valid from OUTPUT/POSTROUTING `
  • Which binaries are used for BusyBox/IPTables?

Built-In/Built-/In, but it doesn't seem to matter, as I've tried all possible combinations of both options without any success.

  • Which DNS-proxy option is in usage?

Disable DNS via netd, but that doesnt seem to matter either, as I've also tried with states "Enable DNS via netd" and "Auto".

  • Are the experimental options enabled/disabled?!

Yes, with "Enable inbound connections" being the only one active.