Searched refs:fwmark (Results 1 - 8 of 8) sorted by relevance

/system/netd/server/
H A DFwmarkServer.cpp107 Fwmark fwmark; local
108 socklen_t fwmarkLen = sizeof(fwmark.intValue);
109 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
117 permission = static_cast<Permission>(permission | fwmark.permission);
122 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so
155 if (!fwmark.explicitlySelected) {
156 if (!fwmark.protectedFromVpn) {
157 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid());
158 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) {
159 fwmark
[all...]
H A DClatdController.cpp60 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets.
71 Fwmark fwmark; local
72 fwmark.netId = netId;
73 fwmark.explicitlySelected = true;
74 fwmark.protectedFromVpn = true;
75 fwmark.permission = PERMISSION_SYSTEM;
78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
H A DRouteController.cpp257 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
266 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif,
268 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask.
269 if (fwmark & ~mask) {
270 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark);
320 { &fwmark, mask ? sizeof(fwmark) : 0 },
347 uint32_t fwmark, uint32_
265 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
346 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
353 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask) argument
456 Fwmark fwmark; local
492 Fwmark fwmark; local
520 Fwmark fwmark; local
545 Fwmark fwmark; local
568 Fwmark fwmark; local
595 Fwmark fwmark; local
624 Fwmark fwmark; local
642 Fwmark fwmark; local
673 Fwmark fwmark; local
724 Fwmark fwmark; local
773 Fwmark fwmark; local
835 Fwmark fwmark; local
[all...]
H A DTetherController.cpp235 Fwmark fwmark; local
236 fwmark.netId = netId;
237 fwmark.explicitlySelected = true;
238 fwmark.protectedFromVpn = true;
239 fwmark.permission = PERMISSION_SYSTEM;
241 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns%s0x%x", SEPARATOR, fwmark.intValue);
246 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]);
H A DNetworkController.cpp188 Fwmark fwmark; local
189 fwmark.protectedFromVpn = true;
190 fwmark.permission = PERMISSION_SYSTEM;
196 fwmark.explicitlySelected = true;
219 fwmark.netId = *netId;
220 return fwmark.intValue;
284 Fwmark fwmark; local
285 fwmark.netId = nc.app_netid;
286 fwmark.explicitlySelected = explicitlySelected;
287 fwmark
[all...]
H A DSockDiagTest.cpp365 Fwmark fwmark; local
366 fwmark.netId = permissionTestcases[i].netId;
367 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected;
368 fwmark.permission = permissionTestcases[i].permission;
369 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
/system/netd/client/
H A DNetdClient.cpp139 // might itself cause another check with the fwmark server, which would be wasteful.
191 Fwmark fwmark; local
192 socklen_t fwmarkLen = sizeof(fwmark.intValue);
193 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
196 *netId = fwmark.netId;
/system/extras/tests/net_test/
H A Diproute.py225 Values for which the code knows the type (e.g., the fwmark ID in a
362 def FwmarkRule(self, version, is_add, fwmark, table, priority):
363 nlattr = self._NlAttrU32(FRA_FWMARK, fwmark)

Completed in 89 milliseconds