Home
last modified time | relevance | path

Searched refs:fwmark (Results 1 – 8 of 8) sorted by relevance

/system/netd/server/
DFwmarkServer.cpp97 Fwmark fwmark; in processClient() local
98 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient()
99 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient()
107 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
145 if (!fwmark.explicitlySelected) { in processClient()
146 if (!fwmark.protectedFromVpn) { in processClient()
147 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()); in processClient()
148 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) { in processClient()
149 fwmark.netId = mNetworkController->getDefaultNetwork(); in processClient()
156 fwmark.netId = command.netId; in processClient()
[all …]
DRouteController.cpp258 uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
261 if (fwmark & ~mask) { in modifyIpRule()
262 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); in modifyIpRule()
312 { &fwmark, mask ? sizeof(fwmark) : 0 }, in modifyIpRule()
339 uint32_t fwmark, uint32_t mask) { in modifyIpRule() argument
340 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule()
441 Fwmark fwmark; in modifyIncomingPacketMark() local
443 fwmark.netId = netId; in modifyIncomingPacketMark()
444 fwmark.explicitlySelected = true; in modifyIncomingPacketMark()
445 fwmark.protectedFromVpn = true; in modifyIncomingPacketMark()
[all …]
DClatdController.cpp71 Fwmark fwmark; in startClatd() local
72 fwmark.netId = netId; in startClatd()
73 fwmark.explicitlySelected = true; in startClatd()
74 fwmark.protectedFromVpn = true; in startClatd()
75 fwmark.permission = PERMISSION_SYSTEM; in startClatd()
78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in startClatd()
DTetherController.cpp228 Fwmark fwmark; in setDnsForwarders() local
229 fwmark.netId = netId; in setDnsForwarders()
230 fwmark.explicitlySelected = true; in setDnsForwarders()
231 fwmark.protectedFromVpn = true; in setDnsForwarders()
232 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders()
234 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns:0x%x", fwmark.intValue); in setDnsForwarders()
239 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
DNetworkController.cpp184 Fwmark fwmark; in getNetworkForDns() local
185 fwmark.protectedFromVpn = true; in getNetworkForDns()
186 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDns()
191 fwmark.explicitlySelected = true; in getNetworkForDns()
203 fwmark.netId = *netId; in getNetworkForDns()
204 return fwmark.intValue; in getNetworkForDns()
253 Fwmark fwmark; in getNetworkContext() local
254 fwmark.netId = nc.app_netid; in getNetworkContext()
255 nc.app_mark = fwmark.intValue; in getNetworkContext()
/system/netd/client/
DNetdClient.cpp170 Fwmark fwmark; in getNetworkForSocket() local
171 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket()
172 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
175 *netId = fwmark.netId; in getNetworkForSocket()
/system/extras/tests/net_test/
Diproute.py464 def FwmarkRule(self, version, is_add, fwmark, table, priority): argument
465 nlattr = self._NlAttrU32(FRA_FWMARK, fwmark)
/system/core/rootdir/
Dinit.rc103 # reflect fwmark from incoming packets onto generated replies
107 # set fwmark on accepted sockets