History log of /system/netd/include/FwmarkCommand.h
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
794c5c714a4d4cf169769ec956845a6fb24e7ebc 31-Oct-2016 Hugo Benichi <hugobenichi@google.com> Add success/errno to connect() event reporting

Test: $ runtest -x system/netd/tests/netd_integration_test.cpp
Bug: 32198976
Change-Id: I050a1fc4172214f38d1ab9ca2b83d882766e9522
/system/netd/include/FwmarkCommand.h
4b9b78aa02336de9291e5085401cef44c03c3bba 06-Oct-2016 Michal Karpinski <mkarpinski@google.com> Add connect event reporting

Adds reporting of connect events including netId, destination IP address,
destination port, uid and connect latency.

Also enables the relevant tests in the connect_benchmark.

Currently ignores the new data it receives, further work will be
done in the subsequent CLs.

Test: for now just the benchmarking, in the future CTS

Bug: 29748723
Change-Id: Id9819552a6d9ad5efc1aff5262d44caa994952aa
/system/netd/include/FwmarkCommand.h
d1df597001aadd5d83c9a3d1fe8bbde2bc9256ca 06-May-2015 Paul Jensen <pauljensen@google.com> Add FwmarkServer support for querying whether a UID can access a NetID

This new FwmarkServer API is only accessible from system apps.

Bug:20470604
Change-Id: Ie2376cdddc10f658fcc5802ef3e8dc9f1948d5c0
/system/netd/include/FwmarkCommand.h
a69d9472ac48d4e09f049fb740e60b7217e03861 12-Jul-2014 Sreeram Ramachandran <sreeram@google.com> Introduce a SELECT_FOR_USER fwmarkd command.

This lets SYSTEM apps mark a socket with the network that would apply to an
arbitrary UID. I.e., either the VPN that applies to that user, or the default
network, if there's no such VPN.

This command will be used by system apps that proxy stuff for a user, so that
they can route the same way that user would have. Examples of such system apps
are the DnsProxyListener, MediaServer and DownloadManager.

The "explicit" bit is NOT set, so that if the user's VPN is a split tunnel, the
route lookup will fall-through to the default network as desired.

The "protect" bit is set, so that the socket bypasses any VPN applicable to the
system app itself. Note that even if the uid being proxied for is also subject
to the same VPN, this still works because the relevant rule doesn't care about
the protected bit (see modifyVpnSystemPermissionRule() in RouteController.cpp).

Change-Id: I4d501e5214b127f4ae9eaeb7befb1751cd102308
/system/netd/include/FwmarkCommand.h
efbe05d203f2f1cc3c24ddc111be159a1ff1f292 21-May-2014 Sreeram Ramachandran <sreeram@google.com> New network selection APIs.

Continued from: https://android-review.git.corp.google.com/#/c/94977/

Change-Id: Ie0576888f50a8ce91bbb0a4794708b406eb0aa35
/system/netd/include/FwmarkCommand.h
f4cfad361175a7f9ccf4d41e76a9b289c3c3da22 21-May-2014 Sreeram Ramachandran <sreeram@google.com> Move netd_client into netd.

Change-Id: Ie4b6b303225c93f2448a503d6ea9cebb552cbad5
/system/netd/include/FwmarkCommand.h