Home
last modified time | relevance | path

Searched refs:fwmark (Results 1 – 8 of 8) sorted by relevance

/system/netd/server/
DFwmarkServer.cpp97 Fwmark fwmark; in processClient() local
98 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient()
99 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient()
107 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
145 if (!fwmark.explicitlySelected) { in processClient()
146 if (!fwmark.protectedFromVpn) { in processClient()
147 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()); in processClient()
148 } else if (!mNetworkController->isVirtualNetwork(fwmark.netId)) { in processClient()
149 fwmark.netId = mNetworkController->getDefaultNetwork(); in processClient()
156 fwmark.netId = command.netId; in processClient()
[all …]
DRouteController.cpp266 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
269 if (fwmark & ~mask) { in modifyIpRule()
270 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); in modifyIpRule()
320 { &fwmark, mask ? sizeof(fwmark) : 0 }, in modifyIpRule()
347 uint32_t fwmark, uint32_t mask, const char* iif, in modifyIpRule() argument
349 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, in modifyIpRule()
354 uint32_t fwmark, uint32_t mask) { in modifyIpRule() argument
355 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule()
456 Fwmark fwmark; in modifyIncomingPacketMark() local
458 fwmark.netId = netId; in modifyIncomingPacketMark()
[all …]
DClatdController.cpp71 Fwmark fwmark; in startClatd() local
72 fwmark.netId = netId; in startClatd()
73 fwmark.explicitlySelected = true; in startClatd()
74 fwmark.protectedFromVpn = true; in startClatd()
75 fwmark.permission = PERMISSION_SYSTEM; in startClatd()
78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in startClatd()
DTetherController.cpp235 Fwmark fwmark; in setDnsForwarders() local
236 fwmark.netId = netId; in setDnsForwarders()
237 fwmark.explicitlySelected = true; in setDnsForwarders()
238 fwmark.protectedFromVpn = true; in setDnsForwarders()
239 fwmark.permission = PERMISSION_SYSTEM; in setDnsForwarders()
241 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns%s0x%x", SEPARATOR, fwmark.intValue); in setDnsForwarders()
246 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
DNetworkController.cpp188 Fwmark fwmark; in getNetworkForDns() local
189 fwmark.protectedFromVpn = true; in getNetworkForDns()
190 fwmark.permission = PERMISSION_SYSTEM; in getNetworkForDns()
196 fwmark.explicitlySelected = true; in getNetworkForDns()
219 fwmark.netId = *netId; in getNetworkForDns()
220 return fwmark.intValue; in getNetworkForDns()
284 Fwmark fwmark; in getNetworkContext() local
285 fwmark.netId = nc.app_netid; in getNetworkContext()
286 fwmark.explicitlySelected = explicitlySelected; in getNetworkContext()
287 fwmark.protectedFromVpn = canProtect(uid); in getNetworkContext()
[all …]
/system/netd/client/
DNetdClient.cpp170 Fwmark fwmark; in getNetworkForSocket() local
171 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket()
172 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
175 *netId = fwmark.netId; in getNetworkForSocket()
/system/extras/tests/net_test/
Diproute.py362 def FwmarkRule(self, version, is_add, fwmark, table, priority): argument
363 nlattr = self._NlAttrU32(FRA_FWMARK, fwmark)
/system/core/rootdir/
Dinit.rc128 # reflect fwmark from incoming packets onto generated replies
132 # set fwmark on accepted sockets