HomeSort by relevance Sort by last modified time
    Searched defs:fwmark (Results 1 - 21 of 21) sorted by null

  /external/libnl/src/
nl-fib-lookup.c 20 " -f, --fwmark <int> Firewall mark\n"
38 uint64_t fwmark = 0; local
43 {"fwmark", 1, 0, 'f'},
60 fwmark = strtoul(optarg, NULL, 0);
91 flnl_request_set_fwmark(request, fwmark);
  /system/netd/server/
ClatdController.cpp 31 #include "Fwmark.h"
63 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets.
74 Fwmark fwmark; local
75 fwmark.netId = netId;
76 fwmark.explicitlySelected = true;
77 fwmark.protectedFromVpn = true;
78 fwmark.permission = PERMISSION_SYSTEM;
81 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
NetdHwService.cpp 21 #include "Fwmark.h"
73 Fwmark fwmark; local
74 fwmark.netId = netId;
75 fwmark.explicitlySelected = true;
76 fwmark.protectedFromVpn = true;
77 fwmark.permission = PERMISSION_SYSTEM;
78 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret));
FwmarkServer.cpp 19 #include "Fwmark.h"
159 Fwmark fwmark; local
160 socklen_t fwmarkLen = sizeof(fwmark.intValue);
161 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
169 permission = static_cast<Permission>(permission | fwmark.permission);
174 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so
207 if (!fwmark.explicitlySelected) {
208 if (!fwmark.protectedFromVpn) {
209 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid())
    [all...]
NetworkController.cpp 39 #include "Fwmark.h"
194 Fwmark fwmark; local
195 fwmark.protectedFromVpn = true;
196 fwmark.permission = PERMISSION_SYSTEM;
205 fwmark.netId = *netId;
206 fwmark.explicitlySelected = true;
207 return fwmark.intValue;
215 fwmark.explicitlySelected = true;
239 fwmark.netId = *netId
315 Fwmark fwmark; local
    [all...]
SockDiagTest.cpp 28 #include "Fwmark.h"
354 Fwmark fwmark; local
355 fwmark.netId = permissionTestcases[i].netId;
356 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected;
357 fwmark.permission = permissionTestcases[i].permission;
358 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
TetherController.cpp 43 #include "Fwmark.h"
208 Fwmark fwmark; local
209 fwmark.netId = NetworkController::LOCAL_NET_ID;
210 fwmark.explicitlySelected = true;
211 fwmark.protectedFromVpn = true;
212 fwmark.permission = PERMISSION_SYSTEM;
214 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue);
286 Fwmark fwmark; local
    [all...]
RouteController.cpp 31 #include "Fwmark.h"
225 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is
234 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif,
236 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask.
237 if (fwmark & ~mask) {
238 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark);
289 { &fwmark, mask ? sizeof(fwmark) : 0 }
437 Fwmark fwmark; local
474 Fwmark fwmark; local
502 Fwmark fwmark; local
527 Fwmark fwmark; local
550 Fwmark fwmark; local
577 Fwmark fwmark; local
607 Fwmark fwmark; local
625 Fwmark fwmark; local
656 Fwmark fwmark; local
764 Fwmark fwmark; local
828 Fwmark fwmark; local
    [all...]
  /external/iproute2/ip/
link_vti.c 34 " [ fwmark MARK ]\n"
72 unsigned int fwmark = 0; local
117 fwmark = rta_getattr_u32(vtiinfo[IFLA_VTI_FWMARK]);
189 } else if (strcmp(*argv, "fwmark") == 0) {
191 if (get_u32(&fwmark, *argv, 0))
192 invarg("invalid fwmark\n", *argv);
202 addattr32(n, 1024, IFLA_VTI_FWMARK, fwmark);
258 __u32 fwmark = rta_getattr_u32(tb[IFLA_VTI_FWMARK]); local
260 if (fwmark) {
263 snprintf(b1, sizeof(b1), "0x%x", fwmark);
    [all...]
link_vti6.c 35 fprintf(stderr, " [ fwmark MARK ]\n");
67 __u32 fwmark = 0; local
112 fwmark = rta_getattr_u32(vtiinfo[IFLA_VTI_FWMARK]);
187 } else if (strcmp(*argv, "fwmark") == 0) {
189 if (get_u32(&fwmark, *argv, 0))
190 invarg("invalid fwmark\n", *argv);
203 addattr32(n, 1024, IFLA_VTI_FWMARK, fwmark);
258 __u32 fwmark = rta_getattr_u32(tb[IFLA_VTI_FWMARK]); local
260 if (fwmark) {
261 snprintf(s2, sizeof(s2), "0x%x", fwmark);
    [all...]
link_ip6tnl.c 44 " [ fwmark MARK ]\n"
103 __u32 fwmark = 0; local
160 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]);
258 } else if (strcmp(*argv, "fwmark") == 0) {
262 fwmark = 0;
264 if (get_u32(&fwmark, *argv, 0))
265 invarg("invalid fwmark\n", *argv);
321 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark);
459 "fwmark inherit ",
462 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]) local
    [all...]
iprule.c 47 "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n"
69 unsigned int fwmark, fwmask; member in struct:__anon22174
118 if (filter.fwmark) {
123 if (filter.fwmark ^ mark)
251 fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask);
253 fprintf(fp, "fwmark 0x%x ", mark);
455 } else if (strcmp(*argv, "fwmark") == 0) {
457 __u32 fwmark, fwmask; local
463 if (get_u32(&fwmark, *argv, 0)
641 __u32 fwmark, fwmask; local
    [all...]
link_gre.c 46 " [ fwmark MARK ]\n"
99 __u32 fwmark = 0; local
176 fwmark = rta_getattr_u32(greinfo[IFLA_GRE_FWMARK]);
332 } else if (strcmp(*argv, "fwmark") == 0) {
334 if (get_u32(&fwmark, *argv, 0))
335 invarg("invalid fwmark\n", *argv);
372 addattr32(n, 1024, IFLA_GRE_FWMARK, fwmark);
487 __u32 fwmark = rta_getattr_u32(tb[IFLA_GRE_FWMARK]); local
489 if (fwmark) {
490 snprintf(s2, sizeof(s2), "0x%x", fwmark);
    [all...]
link_gre6.c 46 " [ fwmark MARK ]\n"
108 __u32 fwmark = 0; local
182 fwmark = rta_getattr_u32(greinfo[IFLA_GRE_FWMARK]);
350 } else if (strcmp(*argv, "fwmark") == 0) {
354 fwmark = 0;
356 if (get_u32(&fwmark, *argv, 0))
357 invarg("invalid fwmark\n", *argv);
389 addattr32(n, 1024, IFLA_GRE_FWMARK, fwmark);
545 "fwmark inherit ",
548 __u32 fwmark = rta_getattr_u32(tb[IFLA_GRE_FWMARK]) local
    [all...]
link_iptnl.c 57 fprintf(f, " [ fwmark MARK ]\n");
108 __u32 fwmark = 0; local
189 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]);
331 } else if (strcmp(*argv, "fwmark") == 0) {
333 if (get_u32(&fwmark, *argv, 0))
334 invarg("invalid fwmark\n", *argv);
356 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark);
561 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]); local
563 if (fwmark) {
564 snprintf(s2, sizeof(s2), "0x%x", fwmark);
    [all...]
  /system/netd/server/dns/
DnsTlsTransport.cpp 30 #include "Fwmark.h"
185 Fwmark fwmark; local
186 fwmark.permission = PERMISSION_SYSTEM;
187 fwmark.explicitlySelected = true;
188 fwmark.protectedFromVpn = true;
189 fwmark.netId = netid;
190 unsigned mark = fwmark.intValue;
  /external/libnl/lib/fib_lookup/
lookup.c 213 uint64_t fwmark; local
217 fwmark = flnl_request_get_fwmark(req);
222 fr.fl_fwmark = fwmark != UINT_LEAST64_MAX ? fwmark : 0;
  /system/netd/client/
NetdClient.cpp 27 #include "Fwmark.h"
88 // Latency measurement does not include time of sending commands to Fwmark
146 // might itself cause another check with the fwmark server, which would be wasteful.
198 Fwmark fwmark; local
199 socklen_t fwmarkLen = sizeof(fwmark.intValue);
200 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
203 *netId = fwmark.netId;
  /bionic/libc/kernel/uapi/linux/
ip_vs.h 92 __u32 fwmark; member in struct:ip_vs_service_user
127 __u32 fwmark; member in struct:ip_vs_service_entry
151 __u32 fwmark; member in struct:ip_vs_get_dests
  /external/kernel-headers/original/uapi/linux/
ip_vs.h 136 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user
198 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry
238 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
ip_vs.h 124 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user
186 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry
226 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests

Completed in 475 milliseconds