Lines Matching refs:table
150 void addTableName(uint32_t table, const std::string& name, std::string* contents) { in addTableName() argument
152 snprintf(tableString, sizeof(tableString), "%u", table); in addTableName()
266 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
304 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { in modifyIpRule()
317 { &FRATTR_TABLE, table != RT_TABLE_UNSPEC ? sizeof(FRATTR_TABLE) : 0 }, in modifyIpRule()
318 { &table, table != RT_TABLE_UNSPEC ? sizeof(table) : 0 }, in modifyIpRule()
346 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, in modifyIpRule() argument
349 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, in modifyIpRule()
353 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, in modifyIpRule() argument
355 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule()
361 WARN_UNUSED_RESULT int modifyIpRoute(uint16_t action, uint32_t table, const char* interface, in modifyIpRoute() argument
433 { &table, sizeof(table) }, in modifyIpRoute()
490 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, in modifyVpnUidRangeRule() argument
509 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnUidRangeRule()
518 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument
531 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnSystemPermissionRule()
542 WARN_UNUSED_RESULT int modifyExplicitNetworkRule(unsigned netId, uint32_t table, in modifyExplicitNetworkRule() argument
557 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_EXPLICIT_NETWORK, table, in modifyExplicitNetworkRule()
565 WARN_UNUSED_RESULT int modifyOutputInterfaceRules(const char* interface, uint32_t table, in modifyOutputInterfaceRules() argument
578 table, fwmark.intValue, mask.intValue, IIF_NONE, interface, in modifyOutputInterfaceRules()
584 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_OUTPUT_INTERFACE, table, in modifyOutputInterfaceRules()
593 WARN_UNUSED_RESULT int modifyImplicitNetworkRule(unsigned netId, uint32_t table, in modifyImplicitNetworkRule() argument
607 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_IMPLICIT_NETWORK, table, in modifyImplicitNetworkRule()
619 uint32_t table = getRouteTableForInterface(physicalInterface); in modifyVpnFallthroughRule() local
620 if (table == RT_TABLE_UNSPEC) { in modifyVpnFallthroughRule()
636 return modifyIpRule(action, RULE_PRIORITY_VPN_FALLTHROUGH, table, fwmark.intValue, in modifyVpnFallthroughRule()
685 uint32_t table = getRouteTableForInterface(interface); in configureDummyNetwork() local
686 if (table == RT_TABLE_UNSPEC) { in configureDummyNetwork()
699 if ((ret = modifyOutputInterfaceRules(interface, table, PERMISSION_NONE, in configureDummyNetwork()
705 if ((ret = modifyIpRoute(RTM_NEWROUTE, table, interface, "0.0.0.0/0", NULL))) { in configureDummyNetwork()
710 if ((ret = modifyIpRoute(RTM_NEWROUTE, table, interface, "::/0", NULL))) { in configureDummyNetwork()
753 uint32_t table = getRouteTableForInterface(interface); in modifyPhysicalNetwork() local
754 if (table == RT_TABLE_UNSPEC) { in modifyPhysicalNetwork()
761 if (int ret = modifyExplicitNetworkRule(netId, table, permission, INVALID_UID, INVALID_UID, in modifyPhysicalNetwork()
765 if (int ret = modifyOutputInterfaceRules(interface, table, permission, INVALID_UID, INVALID_UID, in modifyPhysicalNetwork()
769 return modifyImplicitNetworkRule(netId, table, permission, add); in modifyPhysicalNetwork()
793 uint32_t table = getRouteTableForInterface(interface); in modifyVirtualNetwork() local
794 if (table == RT_TABLE_UNSPEC) { in modifyVirtualNetwork()
799 if (int ret = modifyVpnUidRangeRule(table, range.first, range.second, secure, add)) { in modifyVirtualNetwork()
802 if (int ret = modifyExplicitNetworkRule(netId, table, PERMISSION_NONE, range.first, in modifyVirtualNetwork()
806 if (int ret = modifyOutputInterfaceRules(interface, table, PERMISSION_NONE, range.first, in modifyVirtualNetwork()
819 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork()
822 return modifyExplicitNetworkRule(netId, table, PERMISSION_NONE, UID_ROOT, UID_ROOT, add); in modifyVirtualNetwork()
830 uint32_t table = getRouteTableForInterface(interface); in modifyDefaultNetwork() local
831 if (table == RT_TABLE_UNSPEC) { in modifyDefaultNetwork()
844 return modifyIpRule(action, RULE_PRIORITY_DEFAULT_NETWORK, table, fwmark.intValue, in modifyDefaultNetwork()
850 uint32_t table = getRouteTableForInterface(outputInterface); in modifyTetheredNetwork() local
851 if (table == RT_TABLE_UNSPEC) { in modifyTetheredNetwork()
855 return modifyIpRule(action, RULE_PRIORITY_TETHERING, table, MARK_UNSET, MARK_UNSET, in modifyTetheredNetwork()
881 uint32_t table; in modifyRoute() local
884 table = getRouteTableForInterface(interface); in modifyRoute()
885 if (table == RT_TABLE_UNSPEC) { in modifyRoute()
891 table = ROUTE_TABLE_LOCAL_NETWORK; in modifyRoute()
895 table = ROUTE_TABLE_LEGACY_NETWORK; in modifyRoute()
899 table = ROUTE_TABLE_LEGACY_SYSTEM; in modifyRoute()
904 int ret = modifyIpRoute(action, table, interface, destination, nexthop); in modifyRoute()
915 uint32_t table = getRouteTableForInterface(interface); in flushRoutes() local
916 if (table == RT_TABLE_UNSPEC) { in flushRoutes()
921 snprintf(tableString, sizeof(tableString), "%u", table); in flushRoutes()