Searched refs:fwmark (Results 1 – 8 of 8) sorted by relevance
/system/netd/server/ |
D | FwmarkServer.cpp | 97 Fwmark fwmark; in processClient() local 98 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient() 99 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient() 107 permission = static_cast<Permission>(permission | fwmark.permission); in processClient() 145 if (!fwmark.explicitlySelected) { in processClient() 146 if (!fwmark.protectedFromVpn) { in processClient() 147 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()); in processClient() 148 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) { in processClient() 149 fwmark.netId = mNetworkController->getDefaultNetwork(); in processClient() 156 fwmark.netId = command.netId; in processClient() [all …]
|
D | RouteController.cpp | 258 uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument 261 if (fwmark & ~mask) { in modifyIpRule() 262 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); in modifyIpRule() 312 { &fwmark, mask ? sizeof(fwmark) : 0 }, in modifyIpRule() 339 uint32_t fwmark, uint32_t mask) { in modifyIpRule() argument 340 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule() 441 Fwmark fwmark; in modifyIncomingPacketMark() local 443 fwmark.netId = netId; in modifyIncomingPacketMark() 444 fwmark.explicitlySelected = true; in modifyIncomingPacketMark() 445 fwmark.protectedFromVpn = true; in modifyIncomingPacketMark() [all …]
|
D | ClatdController.cpp | 71 Fwmark fwmark; in startClatd() local 72 fwmark.netId = netId; in startClatd() 73 fwmark.explicitlySelected = true; in startClatd() 74 fwmark.protectedFromVpn = true; in startClatd() 75 fwmark.permission = PERMISSION_SYSTEM; in startClatd() 78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in startClatd()
|
D | TetherController.cpp | 228 Fwmark fwmark; in setDnsForwarders() local 229 fwmark.netId = netId; in setDnsForwarders() 230 fwmark.explicitlySelected = true; in setDnsForwarders() 231 fwmark.protectedFromVpn = true; in setDnsForwarders() 232 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders() 234 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns:0x%x", fwmark.intValue); in setDnsForwarders() 239 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
|
D | NetworkController.cpp | 184 Fwmark fwmark; in getNetworkForDns() local 185 fwmark.protectedFromVpn = true; in getNetworkForDns() 186 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDns() 191 fwmark.explicitlySelected = true; in getNetworkForDns() 203 fwmark.netId = *netId; in getNetworkForDns() 204 return fwmark.intValue; in getNetworkForDns() 253 Fwmark fwmark; in getNetworkContext() local 254 fwmark.netId = nc.app_netid; in getNetworkContext() 255 nc.app_mark = fwmark.intValue; in getNetworkContext()
|
/system/netd/client/ |
D | NetdClient.cpp | 170 Fwmark fwmark; in getNetworkForSocket() local 171 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket() 172 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket() 175 *netId = fwmark.netId; in getNetworkForSocket()
|
/system/extras/tests/net_test/ |
D | iproute.py | 464 def FwmarkRule(self, version, is_add, fwmark, table, priority): argument 465 nlattr = self._NlAttrU32(FRA_FWMARK, fwmark)
|
/system/core/rootdir/ |
D | init.rc | 103 # reflect fwmark from incoming packets onto generated replies 107 # set fwmark on accepted sockets
|