/external/libnl/src/ |
nl-fib-lookup.c | 20 " -f, --fwmark <int> Firewall mark\n" 38 uint64_t fwmark = 0; local 43 {"fwmark", 1, 0, 'f'}, 60 fwmark = strtoul(optarg, NULL, 0); 91 flnl_request_set_fwmark(request, fwmark);
|
/system/netd/server/ |
ClatdController.cpp | 31 #include "Fwmark.h" 63 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets. 74 Fwmark fwmark; local 75 fwmark.netId = netId; 76 fwmark.explicitlySelected = true; 77 fwmark.protectedFromVpn = true; 78 fwmark.permission = PERMISSION_SYSTEM; 81 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue);
|
NetdHwService.cpp | 21 #include "Fwmark.h" 73 Fwmark fwmark; local 74 fwmark.netId = netId; 75 fwmark.explicitlySelected = true; 76 fwmark.protectedFromVpn = true; 77 fwmark.permission = PERMISSION_SYSTEM; 78 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret));
|
FwmarkServer.cpp | 19 #include "Fwmark.h" 159 Fwmark fwmark; local 160 socklen_t fwmarkLen = sizeof(fwmark.intValue); 161 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { 169 permission = static_cast<Permission>(permission | fwmark.permission); 174 // Called before a socket connect() happens. Set an appropriate NetId into the fwmark so 207 if (!fwmark.explicitlySelected) { 208 if (!fwmark.protectedFromVpn) { 209 fwmark.netId = mNetworkController->getNetworkForConnect(client->getUid()) [all...] |
NetworkController.cpp | 39 #include "Fwmark.h" 194 Fwmark fwmark; local 195 fwmark.protectedFromVpn = true; 196 fwmark.permission = PERMISSION_SYSTEM; 205 fwmark.netId = *netId; 206 fwmark.explicitlySelected = true; 207 return fwmark.intValue; 215 fwmark.explicitlySelected = true; 239 fwmark.netId = *netId 315 Fwmark fwmark; local [all...] |
SockDiagTest.cpp | 28 #include "Fwmark.h" 354 Fwmark fwmark; local 355 fwmark.netId = permissionTestcases[i].netId; 356 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected; 357 fwmark.permission = permissionTestcases[i].permission; 358 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
|
TetherController.cpp | 43 #include "Fwmark.h" 208 Fwmark fwmark; local 209 fwmark.netId = NetworkController::LOCAL_NET_ID; 210 fwmark.explicitlySelected = true; 211 fwmark.protectedFromVpn = true; 212 fwmark.permission = PERMISSION_SYSTEM; 214 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue); 286 Fwmark fwmark; local [all...] |
RouteController.cpp | 31 #include "Fwmark.h" 225 // + If |mask| is non-zero, the rule matches the specified fwmark and mask. Otherwise, |fwmark| is 234 uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, 236 // Ensure that if you set a bit in the fwmark, it's not being ignored by the mask. 237 if (fwmark & ~mask) { 238 ALOGE("mask 0x%x does not select all the bits set in fwmark 0x%x", mask, fwmark); 289 { &fwmark, mask ? sizeof(fwmark) : 0 } 437 Fwmark fwmark; local 474 Fwmark fwmark; local 502 Fwmark fwmark; local 527 Fwmark fwmark; local 550 Fwmark fwmark; local 577 Fwmark fwmark; local 607 Fwmark fwmark; local 625 Fwmark fwmark; local 656 Fwmark fwmark; local 764 Fwmark fwmark; local 828 Fwmark fwmark; local [all...] |
/external/iproute2/ip/ |
link_vti.c | 34 " [ fwmark MARK ]\n" 72 unsigned int fwmark = 0; local 117 fwmark = rta_getattr_u32(vtiinfo[IFLA_VTI_FWMARK]); 189 } else if (strcmp(*argv, "fwmark") == 0) { 191 if (get_u32(&fwmark, *argv, 0)) 192 invarg("invalid fwmark\n", *argv); 202 addattr32(n, 1024, IFLA_VTI_FWMARK, fwmark); 258 __u32 fwmark = rta_getattr_u32(tb[IFLA_VTI_FWMARK]); local 260 if (fwmark) { 263 snprintf(b1, sizeof(b1), "0x%x", fwmark); [all...] |
link_vti6.c | 35 fprintf(stderr, " [ fwmark MARK ]\n"); 67 __u32 fwmark = 0; local 112 fwmark = rta_getattr_u32(vtiinfo[IFLA_VTI_FWMARK]); 187 } else if (strcmp(*argv, "fwmark") == 0) { 189 if (get_u32(&fwmark, *argv, 0)) 190 invarg("invalid fwmark\n", *argv); 203 addattr32(n, 1024, IFLA_VTI_FWMARK, fwmark); 258 __u32 fwmark = rta_getattr_u32(tb[IFLA_VTI_FWMARK]); local 260 if (fwmark) { 261 snprintf(s2, sizeof(s2), "0x%x", fwmark); [all...] |
link_ip6tnl.c | 44 " [ fwmark MARK ]\n" 103 __u32 fwmark = 0; local 160 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]); 258 } else if (strcmp(*argv, "fwmark") == 0) { 262 fwmark = 0; 264 if (get_u32(&fwmark, *argv, 0)) 265 invarg("invalid fwmark\n", *argv); 321 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark); 459 "fwmark inherit ", 462 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]) local [all...] |
iprule.c | 47 "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n" 69 unsigned int fwmark, fwmask; member in struct:__anon22174 118 if (filter.fwmark) { 123 if (filter.fwmark ^ mark) 251 fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask); 253 fprintf(fp, "fwmark 0x%x ", mark); 455 } else if (strcmp(*argv, "fwmark") == 0) { 457 __u32 fwmark, fwmask; local 463 if (get_u32(&fwmark, *argv, 0) 641 __u32 fwmark, fwmask; local [all...] |
link_gre.c | 46 " [ fwmark MARK ]\n" 99 __u32 fwmark = 0; local 176 fwmark = rta_getattr_u32(greinfo[IFLA_GRE_FWMARK]); 332 } else if (strcmp(*argv, "fwmark") == 0) { 334 if (get_u32(&fwmark, *argv, 0)) 335 invarg("invalid fwmark\n", *argv); 372 addattr32(n, 1024, IFLA_GRE_FWMARK, fwmark); 487 __u32 fwmark = rta_getattr_u32(tb[IFLA_GRE_FWMARK]); local 489 if (fwmark) { 490 snprintf(s2, sizeof(s2), "0x%x", fwmark); [all...] |
link_gre6.c | 46 " [ fwmark MARK ]\n" 108 __u32 fwmark = 0; local 182 fwmark = rta_getattr_u32(greinfo[IFLA_GRE_FWMARK]); 350 } else if (strcmp(*argv, "fwmark") == 0) { 354 fwmark = 0; 356 if (get_u32(&fwmark, *argv, 0)) 357 invarg("invalid fwmark\n", *argv); 389 addattr32(n, 1024, IFLA_GRE_FWMARK, fwmark); 545 "fwmark inherit ", 548 __u32 fwmark = rta_getattr_u32(tb[IFLA_GRE_FWMARK]) local [all...] |
link_iptnl.c | 57 fprintf(f, " [ fwmark MARK ]\n"); 108 __u32 fwmark = 0; local 189 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]); 331 } else if (strcmp(*argv, "fwmark") == 0) { 333 if (get_u32(&fwmark, *argv, 0)) 334 invarg("invalid fwmark\n", *argv); 356 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark); 561 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]); local 563 if (fwmark) { 564 snprintf(s2, sizeof(s2), "0x%x", fwmark); [all...] |
/system/netd/server/dns/ |
DnsTlsTransport.cpp | 30 #include "Fwmark.h" 185 Fwmark fwmark; local 186 fwmark.permission = PERMISSION_SYSTEM; 187 fwmark.explicitlySelected = true; 188 fwmark.protectedFromVpn = true; 189 fwmark.netId = netid; 190 unsigned mark = fwmark.intValue;
|
/external/libnl/lib/fib_lookup/ |
lookup.c | 213 uint64_t fwmark; local 217 fwmark = flnl_request_get_fwmark(req); 222 fr.fl_fwmark = fwmark != UINT_LEAST64_MAX ? fwmark : 0;
|
/system/netd/client/ |
NetdClient.cpp | 27 #include "Fwmark.h" 88 // Latency measurement does not include time of sending commands to Fwmark 146 // might itself cause another check with the fwmark server, which would be wasteful. 198 Fwmark fwmark; local 199 socklen_t fwmarkLen = sizeof(fwmark.intValue); 200 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { 203 *netId = fwmark.netId;
|
/bionic/libc/kernel/uapi/linux/ |
ip_vs.h | 92 __u32 fwmark; member in struct:ip_vs_service_user 127 __u32 fwmark; member in struct:ip_vs_service_entry 151 __u32 fwmark; member in struct:ip_vs_get_dests
|
/external/kernel-headers/original/uapi/linux/ |
ip_vs.h | 136 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user 198 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry 238 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
ip_vs.h | 124 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_user 186 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_service_entry 226 __u32 fwmark; /* firwall mark of service */ member in struct:ip_vs_get_dests
|