794c5c714a4d4cf169769ec956845a6fb24e7ebc |
|
31-Oct-2016 |
Hugo Benichi <hugobenichi@google.com> |
Add success/errno to connect() event reporting Test: $ runtest -x system/netd/tests/netd_integration_test.cpp Bug: 32198976 Change-Id: I050a1fc4172214f38d1ab9ca2b83d882766e9522
/system/netd/include/FwmarkCommand.h
|
4b9b78aa02336de9291e5085401cef44c03c3bba |
|
06-Oct-2016 |
Michal Karpinski <mkarpinski@google.com> |
Add connect event reporting Adds reporting of connect events including netId, destination IP address, destination port, uid and connect latency. Also enables the relevant tests in the connect_benchmark. Currently ignores the new data it receives, further work will be done in the subsequent CLs. Test: for now just the benchmarking, in the future CTS Bug: 29748723 Change-Id: Id9819552a6d9ad5efc1aff5262d44caa994952aa
/system/netd/include/FwmarkCommand.h
|
d1df597001aadd5d83c9a3d1fe8bbde2bc9256ca |
|
06-May-2015 |
Paul Jensen <pauljensen@google.com> |
Add FwmarkServer support for querying whether a UID can access a NetID This new FwmarkServer API is only accessible from system apps. Bug:20470604 Change-Id: Ie2376cdddc10f658fcc5802ef3e8dc9f1948d5c0
/system/netd/include/FwmarkCommand.h
|
a69d9472ac48d4e09f049fb740e60b7217e03861 |
|
12-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Introduce a SELECT_FOR_USER fwmarkd command. This lets SYSTEM apps mark a socket with the network that would apply to an arbitrary UID. I.e., either the VPN that applies to that user, or the default network, if there's no such VPN. This command will be used by system apps that proxy stuff for a user, so that they can route the same way that user would have. Examples of such system apps are the DnsProxyListener, MediaServer and DownloadManager. The "explicit" bit is NOT set, so that if the user's VPN is a split tunnel, the route lookup will fall-through to the default network as desired. The "protect" bit is set, so that the socket bypasses any VPN applicable to the system app itself. Note that even if the uid being proxied for is also subject to the same VPN, this still works because the relevant rule doesn't care about the protected bit (see modifyVpnSystemPermissionRule() in RouteController.cpp). Change-Id: I4d501e5214b127f4ae9eaeb7befb1751cd102308
/system/netd/include/FwmarkCommand.h
|
efbe05d203f2f1cc3c24ddc111be159a1ff1f292 |
|
21-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
New network selection APIs. Continued from: https://android-review.git.corp.google.com/#/c/94977/ Change-Id: Ie0576888f50a8ce91bbb0a4794708b406eb0aa35
/system/netd/include/FwmarkCommand.h
|
f4cfad361175a7f9ccf4d41e76a9b289c3c3da22 |
|
21-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Move netd_client into netd. Change-Id: Ie4b6b303225c93f2448a503d6ea9cebb552cbad5
/system/netd/include/FwmarkCommand.h
|