Home | History | Annotate | Download | only in server

Lines Matching defs:fwmark

19 #include "Fwmark.h"
248 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
257 uint32_t fwmark, uint32_t mask, const char* iif,
259 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask.
260 if (fwmark & ~mask) {
261 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark);
301 { &fwmark, mask ? sizeof(fwmark) : 0 },
328 uint32_t fwmark, uint32_t mask) {
329 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID,
424 // + Use the right fwmark for (and thus correctly route) replies (e.g.: TCP RST, ICMP errors, ping
430 Fwmark fwmark;
432 fwmark.netId = netId;
433 fwmark.explicitlySelected = true;
434 fwmark.protectedFromVpn = true;
435 fwmark.permission = permission;
438 snprintf(markString, sizeof(markString), "0x%x", fwmark.intValue);
466 Fwmark fwmark;
467 Fwmark mask;
469 fwmark.protectedFromVpn = false;
479 fwmark.explicitlySelected = false;
483 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
494 Fwmark fwmark;
495 Fwmark mask;
497 fwmark.netId = netId;
500 fwmark.permission = PERMISSION_SYSTEM;
505 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
513 // Even though we check permissions at the time we set a netId into the fwmark of a socket, we need
519 Fwmark fwmark;
520 Fwmark mask;
522 fwmark.netId = netId;
525 fwmark.explicitlySelected = true;
528 fwmark.permission = permission;
532 fwmark.intValue, mask.intValue, IIF_NONE, OIF_NONE, uidStart, uidEnd);
542 Fwmark fwmark;
543 Fwmark mask;
545 fwmark.permission = permission;
549 fwmark.intValue, mask.intValue, IIF_NONE, interface, uidStart, uidEnd);
559 Fwmark fwmark;
560 Fwmark mask;
562 fwmark.netId = netId;
565 fwmark.explicitlySelected = false;
568 fwmark.permission = permission;
572 fwmark.intValue, mask.intValue);
588 Fwmark fwmark;
589 Fwmark mask;
591 fwmark.netId = vpnNetId;
594 fwmark.explicitlySelected = false;
597 fwmark.permission = permission;
600 return modifyIpRule(action, RULE_PRIORITY_VPN_FALLTHROUGH, table, fwmark.intValue,
606 Fwmark fwmark;
607 Fwmark mask;
609 fwmark.explicitlySelected = false;
614 fwmark.intValue, mask.intValue)) {
618 ROUTE_TABLE_LEGACY_NETWORK, fwmark.intValue, mask.intValue)) {
622 fwmark.permission = PERMISSION_SYSTEM;
627 fwmark.intValue, mask.intValue);
637 Fwmark fwmark;
638 Fwmark mask;
640 fwmark.explicitlySelected = false;
644 fwmark.intValue, mask.intValue);
653 Fwmark fwmark;
654 Fwmark mask;
656 fwmark.netId = NETID_UNSET;
660 fwmark.intValue, mask.intValue, IIF_NONE, OIF_NONE, UID_ROOT, UID_ROOT);
746 Fwmark fwmark;
747 Fwmark mask;
749 fwmark.netId = NETID_UNSET;
752 fwmark.permission = permission;
755 return modifyIpRule(action, RULE_PRIORITY_DEFAULT_NETWORK, table, fwmark.intValue,