Home
last modified time | relevance | path

Searched refs:fwmark (Results 1 – 16 of 16) sorted by relevance

/system/netd/server/
DFwmarkServer.cpp153 Fwmark fwmark; in processClient() local
154 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient()
155 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient()
163 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
201 if (!fwmark.explicitlySelected) { in processClient()
202 if (!fwmark.protectedFromVpn) { in processClient()
203 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()); in processClient()
204 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) { in processClient()
205 fwmark.netId = mNetworkController->getDefaultNetwork(); in processClient()
234 netdEventListener->onConnectEvent(fwmark.netId, connectInfo.error, in processClient()
[all …]
DRouteController.cpp235 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
238 if (fwmark & ~mask) { in modifyIpRule()
239 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); in modifyIpRule()
290 { &fwmark, mask ? sizeof(fwmark) : 0 }, in modifyIpRule()
321 uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
323 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, in modifyIpRule()
328 uint32_t fwmark, uint32_t mask) { in modifyIpRule() argument
329 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule()
445 Fwmark fwmark; in modifyIncomingPacketMark() local
447 fwmark.netId = netId; in modifyIncomingPacketMark()
[all …]
DNetdHwService.cpp71 Fwmark fwmark; in createOemNetwork() local
72 fwmark.netId = netId; in createOemNetwork()
73 fwmark.explicitlySelected = true; in createOemNetwork()
74 fwmark.protectedFromVpn = true; in createOemNetwork()
75 fwmark.permission = PERMISSION_SYSTEM; in createOemNetwork()
76 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret)); in createOemNetwork()
DNetworkController.cpp191 Fwmark fwmark; in getNetworkForDnsLocked() local
192 fwmark.protectedFromVpn = true; in getNetworkForDnsLocked()
193 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDnsLocked()
202 fwmark.netId = *netId; in getNetworkForDnsLocked()
203 fwmark.explicitlySelected = true; in getNetworkForDnsLocked()
204 return fwmark.intValue; in getNetworkForDnsLocked()
211 fwmark.explicitlySelected = true; in getNetworkForDnsLocked()
235 fwmark.netId = *netId; in getNetworkForDnsLocked()
236 return fwmark.intValue; in getNetworkForDnsLocked()
311 Fwmark fwmark; in getNetworkContext() local
[all …]
DTetherController.cpp225 Fwmark fwmark; in startTethering() local
226 fwmark.netId = NetworkController::LOCAL_NET_ID; in startTethering()
227 fwmark.explicitlySelected = true; in startTethering()
228 fwmark.protectedFromVpn = true; in startTethering()
229 fwmark.permission = PERMISSION_SYSTEM; in startTethering()
231 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue); in startTethering()
351 Fwmark fwmark; in setDnsForwarders() local
352 fwmark.netId = netId; in setDnsForwarders()
353 fwmark.explicitlySelected = true; in setDnsForwarders()
354 fwmark.protectedFromVpn = true; in setDnsForwarders()
[all …]
DSockDiagTest.cpp356 Fwmark fwmark; in modifySocketForTest() local
357 fwmark.netId = permissionTestcases[i].netId; in modifySocketForTest()
358 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected; in modifySocketForTest()
359 fwmark.permission = permissionTestcases[i].permission; in modifySocketForTest()
360 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue)); in modifySocketForTest()
DClatdController.cpp365 fwmark.netId = netId; in init()
366 fwmark.explicitlySelected = true; in init()
367 fwmark.protectedFromVpn = true; in init()
368 fwmark.permission = PERMISSION_SYSTEM; in init()
370 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in init()
DClatdController.h64 Fwmark fwmark; member
DXfrmControllerTest.cpp439 Fwmark fwmark; in testIpSecAddSecurityAssociation() local
440 fwmark.intValue = outputmark.outputMark; in testIpSecAddSecurityAssociation()
441 EXPECT_EQ(testOutputNetid, fwmark.netId); in testIpSecAddSecurityAssociation()
442 EXPECT_EQ(PERMISSION_SYSTEM, fwmark.permission); in testIpSecAddSecurityAssociation()
443 EXPECT_TRUE(fwmark.explicitlySelected); in testIpSecAddSecurityAssociation()
444 EXPECT_TRUE(fwmark.protectedFromVpn); in testIpSecAddSecurityAssociation()
DXfrmController.cpp1318 Fwmark fwmark; in fillNlAttrXfrmOutputMark() local
1319 fwmark.netId = underlyingNetId; in fillNlAttrXfrmOutputMark()
1322 fwmark.permission = PERMISSION_SYSTEM; in fillNlAttrXfrmOutputMark()
1323 fwmark.explicitlySelected = true; in fillNlAttrXfrmOutputMark()
1324 fwmark.protectedFromVpn = true; in fillNlAttrXfrmOutputMark()
1325 output_mark->outputMark = fwmark.intValue; in fillNlAttrXfrmOutputMark()
/system/hardware/interfaces/net/netd/testutils/
DVtsHalNetNetdTestUtils.cpp89 int countRulesForFwmark(const uint32_t fwmark) { in countRulesForFwmark() argument
92 StringPrintf("from all fwmark 0x(%x|[0-9a-f]+%04x)/.* lookup ", fwmark, fwmark); in countRulesForFwmark()
DVtsHalNetNetdTestUtils.h42 int countRulesForFwmark(const uint32_t fwmark);
/system/netd/resolv/
DResolverController.cpp205 Fwmark fwmark; in setResolverConfiguration() local
206 fwmark.netId = resolverParams.netId; in setResolverConfiguration()
207 fwmark.explicitlySelected = true; in setResolverConfiguration()
208 fwmark.protectedFromVpn = true; in setResolverConfiguration()
209 fwmark.permission = PERMISSION_SYSTEM; in setResolverConfiguration()
216 const int err = gPrivateDnsConfiguration.set(resolverParams.netId, fwmark.intValue, tlsServers, in setResolverConfiguration()
/system/netd/client/
DNetdClient.cpp353 Fwmark fwmark; in getNetworkForSocket() local
354 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket()
355 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
358 *netId = fwmark.netId; in getNetworkForSocket()
/system/netd/tests/
Dbinder_test.cpp3167 bool sendIPv6PacketFromUid(uid_t uid, const in6_addr& dstAddr, Fwmark* fwmark, int tunFd) { in sendIPv6PacketFromUid() argument
3174 socklen_t fwmarkLen = sizeof(fwmark->intValue); in sendIPv6PacketFromUid()
3175 EXPECT_NE(-1, getsockopt(testSocket, SOL_SOCKET, SO_MARK, &(fwmark->intValue), &fwmarkLen)); in sendIPv6PacketFromUid()
3215 Fwmark fwmark; in expectVpnFallthroughWorks() local
3216 EXPECT_FALSE(sendIPv6PacketFromUid(0, outsideVpnAddr, &fwmark, fallthroughFd)); in expectVpnFallthroughWorks()
3217 EXPECT_FALSE(sendIPv6PacketFromUid(0, insideVpnAddr, &fwmark, fallthroughFd)); in expectVpnFallthroughWorks()
3223 EXPECT_TRUE(sendIPv6PacketFromUid(0, outsideVpnAddr, &fwmark, fallthroughFd)); in expectVpnFallthroughWorks()
3224 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3225 EXPECT_TRUE(sendIPv6PacketFromUid(0, insideVpnAddr, &fwmark, fallthroughFd)); in expectVpnFallthroughWorks()
3226 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
[all …]
/system/core/rootdir/
Dinit.rc156 # reflect fwmark from incoming packets onto generated replies
160 # set fwmark on accepted sockets