/system/netd/include/ |
H A D | Fwmark.h | 27 unsigned netId : 16; member in struct:Fwmark::__anon1890
|
H A D | FwmarkCommand.h | 64 unsigned netId; // used only in the SELECT_NETWORK command; ignored otherwise. member in struct:FwmarkCommand
|
/system/netd/server/ |
H A D | DummyNetwork.cpp | 30 DummyNetwork::DummyNetwork(unsigned netId) : Network(netId) { argument
|
H A D | LocalNetwork.cpp | 27 LocalNetwork::LocalNetwork(unsigned netId) : Network(netId) { argument 42 ALOGE("failed to add interface %s to local netId %u", interface.c_str(), mNetId); 54 ALOGE("failed to remove interface %s from local netId %u", interface.c_str(), mNetId);
|
H A D | Network.cpp | 30 ALOGE("deleting network with netId %u without clearing its interfaces", mNetId); 90 Network::Network(unsigned netId) : mNetId(netId) { argument
|
H A D | ClatdController.cpp | 64 unsigned netId = mNetCtrl->getNetworkForInterface(interface); local 65 if (netId == NETID_UNSET) { 66 ALOGE("interface %s not assigned to any netId", interface); 72 snprintf(netIdString, sizeof(netIdString), "%u", netId); 75 fwmark.netId = netId;
|
H A D | PhysicalNetwork.cpp | 30 WARN_UNUSED_RESULT int addToDefault(unsigned netId, const std::string& interface, argument 33 ALOGE("failed to add interface %s to default netId %u", interface.c_str(), netId); 42 WARN_UNUSED_RESULT int removeFromDefault(unsigned netId, const std::string& interface, argument 47 ALOGE("failed to remove interface %s from default netId %u", interface.c_str(), netId); 61 PhysicalNetwork::PhysicalNetwork(unsigned netId, PhysicalNetwork::Delegate* delegate) : argument 62 Network(netId), mDelegate(delegate), mPermission(PERMISSION_NONE), mIsDefault(false) { 77 ALOGE("Error closing sockets for netId %d permission change", mNetId); 82 ALOGE("Failed to close sockets changing netId [all...] |
H A D | VirtualNetwork.cpp | 29 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument 30 Network(netId), mHasDns(hasDns), mSecure(secure) { 75 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); 90 ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId); 108 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId); 121 ALOGE("failed to remove interface %s from VPN netId %u", interface.c_str(), mNetId);
|
H A D | ResolverController.cpp | 46 int ResolverController::setDnsServers(unsigned netId, const char* searchDomains, argument 49 ALOGD("setDnsServers netId = %u\n", netId); 51 return -_resolv_set_nameservers_for_net(netId, servers, numservers, searchDomains, params); 54 int ResolverController::clearDnsServers(unsigned netId) { argument 55 _resolv_set_nameservers_for_net(netId, NULL, 0, "", NULL); 57 ALOGD("clearDnsServers netId = %u\n", netId); 62 int ResolverController::flushDnsCache(unsigned netId) { argument 64 ALOGD("flushDnsCache netId 72 getDnsInfo(unsigned netId, std::vector<std::string>* servers, std::vector<std::string>* domains, __res_params* params, std::vector<android::net::ResolverStats>* stats) argument 143 setResolverConfiguration(int32_t netId, const std::vector<std::string>& servers, const std::vector<std::string>& domains, const std::vector<int32_t>& params) argument 176 getResolverInfo(int32_t netId, std::vector<std::string>* servers, std::vector<std::string>* domains, std::vector<int32_t>* params, std::vector<int32_t>* stats) argument 199 dump(DumpWriter& dw, unsigned netId) argument [all...] |
H A D | TetherController.cpp | 177 fwmark.netId = NetworkController::LOCAL_NET_ID; 245 int TetherController::setDnsForwarders(unsigned netId, char **servers, int numServers) { argument 250 fwmark.netId = netId; 283 mDnsNetId = netId;
|
H A D | XfrmController.h | 89 int netId; member in struct:android::net::XfrmSaInfo
|
H A D | NetworkController.cpp | 104 ALOGE("failed to add fallthrough to %s for VPN netId %u", physicalInterface.c_str(), 112 ALOGE("failed to remove fallthrough to %s for VPN netId %u", physicalInterface.c_str(), 154 int NetworkController::setDefaultNetwork(unsigned netId) { argument 157 if (netId == mDefaultNetId) { 161 if (netId != NETID_UNSET) { 162 Network* network = getNetworkLocked(netId); 164 ALOGE("no such netId %u", netId); 168 ALOGE("cannot set default to non-physical network with netId %u", netId); 191 getNetworkForDns(unsigned* netId, uid_t uid) const argument 261 getNetworkContext( unsigned netId, uid_t uid, struct android_net_context* netcontext) const argument 324 createPhysicalNetwork(unsigned netId, Permission permission) argument 348 createVirtualNetwork(unsigned netId, bool hasDns, bool secure) argument 367 destroyNetwork(unsigned netId) argument 408 addInterfaceToNetwork(unsigned netId, const char* interface) argument 424 removeInterfaceFromNetwork(unsigned netId, const char* interface) argument 473 addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) argument 490 removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) argument 508 addRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 513 removeRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 624 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument [all...] |
H A D | SockDiag.cpp | 388 // Destroys all "live" (CONNECTED, SYN_SENT, SYN_RECV) TCP sockets on the specified netId where: 397 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 408 netIdMark.netId = netId; 409 netIdMask.netId = 0xffff; 430 // If netId matches, continue, otherwise, reject (i.e., leave socket alone). 473 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 474 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | DnsProxyListener.cpp | 339 unsigned netId = strtoul(argv[7], NULL, 10); local 343 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext); 397 unsigned netId = strtoul(argv[1], NULL, 10); local 407 uint32_t mark = mDnsProxyListener->mNetCtrl->getNetworkForDns(&netId, uid); 411 new DnsProxyListener::GetHostByNameHandler(cli, name, af, netId, mark, metricsLevel, 418 SocketClient* c, char* name, int af, unsigned netId, uint32_t mark, const int metricsLevel, 423 mNetId(netId), 531 unsigned netId = strtoul(argv[4], NULL, 10); local 546 uint32_t mark = mDnsProxyListener->mNetCtrl->getNetworkForDns(&netId, uid); 549 new DnsProxyListener::GetHostByAddrHandler(cli, addr, addrLen, addrFamily, netId, mar 417 GetHostByNameHandler( SocketClient* c, char* name, int af, unsigned netId, uint32_t mark, const int metricsLevel, const android::sp<android::net::metrics::INetdEventListener>& netdEventListener) argument 554 GetHostByAddrHandler(SocketClient* c, void* address, int addressLen, int addressFamily, unsigned netId, uint32_t mark) argument [all...] |
H A D | NetdNativeService.cpp | 201 binder::Status NetdNativeService::setResolverConfiguration(int32_t netId, argument 207 int err = gCtls->resolverCtrl.setResolverConfiguration(netId, servers, domains, params); 215 binder::Status NetdNativeService::getResolverInfo(int32_t netId, argument 221 int err = gCtls->resolverCtrl.getResolverInfo(netId, servers, domains, params, stats);
|
H A D | SockDiagTest.cpp | 288 unsigned netId; member in struct:android::net::__anon1908 355 fwmark.netId = permissionTestcases[i].netId; 422 if (permissionTestcases[i].netId != 42) return false;
|
H A D | CommandListener.cpp | 73 // strtoul() returns 0 on errors, which is fine because 0 is an invalid netId. 504 unsigned netId = stringToNetId(argv[3]); local 505 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4); 632 unsigned netId = stringToNetId(argv[2]); local 637 if (!parseAndExecuteSetNetDns(netId, argc, argv)) { 642 } else if (!strcmp(argv[1], "clearnetdns")) { // "resolver clearnetdns <netId>" 644 rc = gCtls->resolverCtrl.clearDnsServers(netId); 664 bool CommandListener::ResolverCmd::parseAndExecuteSetNetDns(int netId, int argc, argument 666 // "resolver setnetdns <netId> <domains> <dns1> [<dns2> ...] [--params <params>]" 683 return gCtls->resolverCtrl.setDnsServers(netId, arg 1396 unsigned netId = stringToNetId(argv[nextArg++]); local 1421 unsigned netId = stringToNetId(argv[3]); local 1445 unsigned netId = stringToNetId(argv[2]); local 1475 unsigned netId = stringToNetId(argv[2]); local 1489 unsigned netId = NETID_UNSET; local 1567 unsigned netId = stringToNetId(argv[3]); local [all...] |
H A D | RouteController.cpp | 409 // An iptables rule to mark incoming packets on a network with the netId of the network. 416 WARN_UNUSED_RESULT int modifyIncomingPacketMark(unsigned netId, const char* interface, argument 420 fwmark.netId = netId; 447 // Notice that this rule doesn't use the netId. I.e., no matter what netId the user's socket may 478 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument 483 fwmark.netId = netId; 484 mask.netId 502 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 553 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 701 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument 709 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 748 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 934 addInterfaceToLocalNetwork(unsigned netId, const char* interface) argument 938 removeInterfaceFromLocalNetwork(unsigned netId, const char* interface) argument 942 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 951 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 966 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 976 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 989 modifyPhysicalNetworkPermission(unsigned netId, const char* interface, Permission oldPermission, Permission newPermission) argument 1007 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1013 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
/system/netd/client/ |
H A D | NetdClient.cpp | 97 // TODO: get the netId from the socket mark once we have continuous benchmark runs 98 FwmarkCommand command = {FwmarkCommand::ON_CONNECT_COMPLETE, /* netId (ignored) */ 0, 112 unsigned netId = netIdForProcess; local 113 if (netId != NETID_UNSET && FwmarkClient::shouldSetFwmark(domain)) { 114 if (int error = setNetworkForSocket(netId, socketFd)) { 121 unsigned getNetworkForResolv(unsigned netId) { argument 122 if (netId != NETID_UNSET) { 123 return netId; 125 netId = netIdForProcess; 126 if (netId ! 132 setNetworkForTarget(unsigned netId, std::atomic_uint* target) argument 187 getNetworkForSocket(unsigned* netId, int socketFd) argument 204 setNetworkForSocket(unsigned netId, int socketFd) argument 212 setNetworkForProcess(unsigned netId) argument 216 setNetworkForResolv(unsigned netId) argument 236 queryUserAccess(uid_t uid, unsigned netId) argument [all...] |