Searched refs:fwmark (Results 1 - 7 of 7) sorted by relevance

/system/netd/server/
H A DFwmarkServer.cpp110 Fwmark fwmark; local
111 socklen_t fwmarkLen = sizeof(fwmark.intValue);
112 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
120 permission = static_cast<Permission>(permission | fwmark.permission);
125 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so
158 if (!fwmark.explicitlySelected) {
159 if (!fwmark.protectedFromVpn) {
160 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid());
161 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) {
162 fwmark
[all...]
H A DClatdController.cpp63 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets.
74 Fwmark fwmark; local
75 fwmark.netId = netId;
76 fwmark.explicitlySelected = true;
77 fwmark.protectedFromVpn = true;
78 fwmark.permission = PERMISSION_SYSTEM;
81 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
H A DRouteController.cpp209 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
218 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif,
220 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask.
221 if (fwmark & ~mask) {
222 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark);
273 { &fwmark, mask ? sizeof(fwmark) : 0 },
304 uint32_t fwmark, uint32_
217 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
303 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
310 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask) argument
418 Fwmark fwmark; local
452 Fwmark fwmark; local
480 Fwmark fwmark; local
505 Fwmark fwmark; local
528 Fwmark fwmark; local
555 Fwmark fwmark; local
584 Fwmark fwmark; local
602 Fwmark fwmark; local
633 Fwmark fwmark; local
682 Fwmark fwmark; local
731 Fwmark fwmark; local
794 Fwmark fwmark; local
[all...]
H A DTetherController.cpp176 Fwmark fwmark; local
177 fwmark.netId = NetworkController::LOCAL_NET_ID;
178 fwmark.explicitlySelected = true;
179 fwmark.protectedFromVpn = true;
180 fwmark.permission = PERMISSION_SYSTEM;
182 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue);
249 Fwmark fwmark; local
250 fwmark.netId = netId;
251 fwmark.explicitlySelected = true;
252 fwmark
[all...]
H A DNetworkController.cpp193 Fwmark fwmark; local
194 fwmark.protectedFromVpn = true;
195 fwmark.permission = PERMISSION_SYSTEM;
201 fwmark.explicitlySelected = true;
224 fwmark.netId = *netId;
225 return fwmark.intValue;
289 Fwmark fwmark; local
290 fwmark.netId = nc.app_netid;
291 fwmark.explicitlySelected = explicitlySelected;
292 fwmark
[all...]
H A DSockDiagTest.cpp354 Fwmark fwmark; local
355 fwmark.netId = permissionTestcases[i].netId;
356 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected;
357 fwmark.permission = permissionTestcases[i].permission;
358 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
/system/netd/client/
H A DNetdClient.cpp139 // might itself cause another check with the fwmark server, which would be wasteful.
191 Fwmark fwmark; local
192 socklen_t fwmarkLen = sizeof(fwmark.intValue);
193 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
196 *netId = fwmark.netId;

Completed in 191 milliseconds