/external/libnl/src/ |
nl-fib-lookup.c | 20 " -f, --fwmark <int> Firewall mark\n" 38 uint64_t fwmark = 0; local 43 {"fwmark", 1, 0, 'f'}, 60 fwmark = strtoul(optarg, NULL, 0); 91 flnl_request_set_fwmark(request, fwmark);
|
/system/netd/server/ |
FwmarkServer.cpp | 19 #include "Fwmark.h" 88 Fwmark fwmark; local 89 socklen_t fwmarkLen = sizeof(fwmark.intValue); 90 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { 100 permission = static_cast<Permission>(permission | fwmark.permission); 105 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so 138 if (!fwmark.explicitlySelected) { 139 if (!fwmark.protectedFromVpn) { 140 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()) [all...] |
ClatdController.cpp | 31 #include "Fwmark.h" 60 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets. 71 Fwmark fwmark; local 72 fwmark.netId = netId; 73 fwmark.explicitlySelected = true; 74 fwmark.protectedFromVpn = true; 75 fwmark.permission = PERMISSION_SYSTEM; 78 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
|
TetherController.cpp | 34 #include "Fwmark.h" 207 Fwmark fwmark; local 208 fwmark.netId = netId; 209 fwmark.explicitlySelected = true; 210 fwmark.protectedFromVpn = true; 211 fwmark.permission = PERMISSION_SYSTEM; 213 snprintf(daemonCmd, sizeof(daemonCmd), "update_dns:0x%x", fwmark.intValue); 218 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]);
|
NetworkController.cpp | 35 #include "Fwmark.h" 181 Fwmark fwmark; local 182 fwmark.protectedFromVpn = true; 183 fwmark.permission = PERMISSION_SYSTEM; 188 fwmark.explicitlySelected = true; 200 fwmark.netId = *netId; 201 return fwmark.intValue;
|
RouteController.cpp | 19 #include "Fwmark.h" 248 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is 257 uint32_t fwmark, uint32_t mask, const char* iif, 259 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask. 260 if (fwmark & ~mask) { 261 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); 301 { &fwmark, mask ? sizeof(fwmark) : 0 } 430 Fwmark fwmark; local 466 Fwmark fwmark; local 494 Fwmark fwmark; local 519 Fwmark fwmark; local 542 Fwmark fwmark; local 559 Fwmark fwmark; local 588 Fwmark fwmark; local 606 Fwmark fwmark; local 637 Fwmark fwmark; local 653 Fwmark fwmark; local 746 Fwmark fwmark; local [all...] |
/external/iproute2/ip/ |
iprule.c | 36 fprintf(stderr, "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n"); 138 fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask); 140 fprintf(fp, "fwmark 0x%x ", mark); 293 } else if (strcmp(*argv, "fwmark") == 0) { 295 __u32 fwmark, fwmask; local 299 if (get_u32(&fwmark, *argv, 0)) 300 invarg("fwmark value is invalid\n", *argv); 301 addattr32(&req.n, sizeof(req), FRA_FWMARK, fwmark);
|
/system/netd/client/ |
NetdClient.cpp | 19 #include "Fwmark.h" 116 // might itself cause another check with the fwmark server, which would be wasteful. 168 Fwmark fwmark; local 169 socklen_t fwmarkLen = sizeof(fwmark.intValue); 170 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { 173 *netId = fwmark.netId;
|
/external/libnl/lib/fib_lookup/ |
lookup.c | 213 uint64_t fwmark; local 217 fwmark = flnl_request_get_fwmark(req); 222 fr.fl_fwmark = fwmark != UINT_LEAST64_MAX ? fwmark : 0;
|
/bionic/libc/kernel/uapi/linux/ |
ip_vs.h | 110 __u32 fwmark; member in struct:ip_vs_service_user 154 __u32 fwmark; member in struct:ip_vs_service_entry 184 __u32 fwmark; member in struct:ip_vs_get_dests
|
/development/ndk/platforms/android-L/include/linux/ |
ip_vs.h | 104 __u32 fwmark; member in struct:ip_vs_service_user 147 __u32 fwmark; member in struct:ip_vs_service_entry 177 __u32 fwmark; member in struct:ip_vs_get_dests
|
/external/kernel-headers/original/uapi/linux/ |
ip_vs.h | 135 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user 197 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry 237 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
|