Searched refs:fwmark (Results 1 - 6 of 6) sorted by relevance

/system/netd/server/
H A DFwmarkServer.cpp88 Fwmark fwmark; local
89 socklen_t fwmarkLen = sizeof(fwmark.intValue);
90 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
100 permission = static_cast<Permission>(permission | fwmark.permission);
105 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so
138 if (!fwmark.explicitlySelected) {
139 if (!fwmark.protectedFromVpn) {
140 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid());
141 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) {
142 fwmark
[all...]
H A DClatdController.cpp60 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets.
71 Fwmark fwmark; local
72 fwmark.netId = netId;
73 fwmark.explicitlySelected = true;
74 fwmark.protectedFromVpn = true;
75 fwmark.permission = PERMISSION_SYSTEM;
78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
H A DRouteController.cpp248 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
257 uint32_t fwmark, uint32_t mask, const char* iif,
259 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask.
260 if (fwmark & ~mask) {
261 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark);
301 { &fwmark, mask ? sizeof(fwmark) : 0 },
328 uint32_t fwmark, uint32_
256 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
327 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask) argument
430 Fwmark fwmark; local
466 Fwmark fwmark; local
494 Fwmark fwmark; local
519 Fwmark fwmark; local
542 Fwmark fwmark; local
559 Fwmark fwmark; local
588 Fwmark fwmark; local
606 Fwmark fwmark; local
637 Fwmark fwmark; local
653 Fwmark fwmark; local
746 Fwmark fwmark; local
[all...]
H A DTetherController.cpp207 Fwmark fwmark; local
208 fwmark.netId = netId;
209 fwmark.explicitlySelected = true;
210 fwmark.protectedFromVpn = true;
211 fwmark.permission = PERMISSION_SYSTEM;
213 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns:0x%x", fwmark.intValue);
218 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]);
H A DNetworkController.cpp181 Fwmark fwmark; local
182 fwmark.protectedFromVpn = true;
183 fwmark.permission = PERMISSION_SYSTEM;
188 fwmark.explicitlySelected = true;
200 fwmark.netId = *netId;
201 return fwmark.intValue;
/system/netd/client/
H A DNetdClient.cpp116 // might itself cause another check with the fwmark server, which would be wasteful.
168 Fwmark fwmark; local
169 socklen_t fwmarkLen = sizeof(fwmark.intValue);
170 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
173 *netId = fwmark.netId;

Completed in 83 milliseconds