/system/netd/include/ |
H A D | Fwmark.h | 27 unsigned netId : 16; member in struct:Fwmark::__anon2067
|
H A D | FwmarkCommand.h | 73 unsigned netId; // used only in the SELECT_NETWORK command; ignored otherwise. member in struct:FwmarkCommand
|
/system/netd/server/ |
H A D | DummyNetwork.cpp | 30 DummyNetwork::DummyNetwork(unsigned netId) : Network(netId) { argument
|
H A D | LocalNetwork.cpp | 27 LocalNetwork::LocalNetwork(unsigned netId) : Network(netId) { argument 42 ALOGE("failed to add interface %s to local netId %u", interface.c_str(), mNetId); 54 ALOGE("failed to remove interface %s from local netId %u", interface.c_str(), mNetId);
|
H A D | Network.cpp | 30 ALOGE("deleting network with netId %u without clearing its interfaces", mNetId); 90 Network::Network(unsigned netId) : mNetId(netId) { argument
|
H A D | ClatdController.cpp | 64 unsigned netId = mNetCtrl->getNetworkForInterface(interface); local 65 if (netId == NETID_UNSET) { 66 ALOGE("interface %s not assigned to any netId", interface); 72 snprintf(netIdString, sizeof(netIdString), "%u", netId); 75 fwmark.netId = netId;
|
H A D | PhysicalNetwork.cpp | 30 WARN_UNUSED_RESULT int addToDefault(unsigned netId, const std::string& interface, argument 33 ALOGE("failed to add interface %s to default netId %u", interface.c_str(), netId); 42 WARN_UNUSED_RESULT int removeFromDefault(unsigned netId, const std::string& interface, argument 47 ALOGE("failed to remove interface %s from default netId %u", interface.c_str(), netId); 61 PhysicalNetwork::PhysicalNetwork(unsigned netId, PhysicalNetwork::Delegate* delegate) : argument 62 Network(netId), mDelegate(delegate), mPermission(PERMISSION_NONE), mIsDefault(false) { 77 ALOGE("Error closing sockets for netId %d permission change", mNetId); 82 ALOGE("Failed to close sockets changing netId [all...] |
H A D | VirtualNetwork.cpp | 29 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument 30 Network(netId), mHasDns(hasDns), mSecure(secure) { 75 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); 90 ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId); 108 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId); 121 ALOGE("failed to remove interface %s from VPN netId %u", interface.c_str(), mNetId);
|
H A D | NetdHwService.cpp | 68 unsigned netId; local 71 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId); 74 fwmark.netId = netId; 78 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret)); 84 #define RETURN_IF_NOT_OEM_NETWORK(netId) \ 85 if (((netId) < NetworkController::MIN_OEM_ID) || \ 86 ((netId) > NetworkController::MAX_OEM_ID)) { \ 91 unsigned netId = netHandleToNetId(netHandle); local 92 RETURN_IF_NOT_OEM_NETWORK(netId); 109 unsigned netId = netHandleToNetId(networkHandle); local 119 unsigned netId = netHandleToNetId(networkHandle); local 128 unsigned netId = netHandleToNetId(networkHandle); local 136 unsigned netId = netHandleToNetId(networkHandle); local [all...] |
H A D | XfrmController.h | 119 int netId; member in struct:android::net::XfrmEncapType::XfrmSaInfo
|
H A D | ResolverController.cpp | 114 int set(int32_t netId, const std::vector<std::string>& servers, const std::string& name, argument 118 netId, servers.size(), name.c_str(), fingerprints.size()); 138 mPrivateDnsModes[netId] = PrivateDnsMode::STRICT; 140 mPrivateDnsModes[netId] = PrivateDnsMode::OPPORTUNISTIC; 142 mPrivateDnsModes[netId] = PrivateDnsMode::OFF; 143 mPrivateDnsTransports.erase(netId); 148 auto netPair = mPrivateDnsTransports.find(netId); 150 // No TLS tracker yet for this netId. 152 std::tie(netPair, added) = mPrivateDnsTransports.emplace(netId, PrivateDnsTracker()); 154 ALOGE("Memory error while recording private DNS for netId 180 getStatus(unsigned netId) argument 206 clear(unsigned netId) argument 215 dump(DumpWriter& dw, unsigned netId) argument 296 recordPrivateDnsValidation(const DnsTlsServer& server, unsigned netId, bool success) argument 375 setDnsServers(unsigned netId, const char* searchDomains, const char** servers, int numservers, const __res_params* params) argument 388 clearDnsServers(unsigned netId) argument 397 flushDnsCache(unsigned netId) argument 407 getDnsInfo(unsigned netId, std::vector<std::string>* servers, std::vector<std::string>* domains, __res_params* params, std::vector<android::net::ResolverStats>* stats) argument 478 setResolverConfiguration(int32_t netId, const std::vector<std::string>& servers, const std::vector<std::string>& domains, const std::vector<int32_t>& params, const std::string& tlsName, const std::vector<std::string>& tlsServers, const std::set<std::vector<uint8_t>>& tlsFingerprints) argument 519 getResolverInfo(int32_t netId, std::vector<std::string>* servers, std::vector<std::string>* domains, std::vector<int32_t>* params, std::vector<int32_t>* stats) argument 542 dump(DumpWriter& dw, unsigned netId) argument [all...] |
H A D | SockDiag.cpp | 441 // Destroys all "live" (CONNECTED, SYN_SENT, SYN_RECV) TCP sockets on the specified netId where: 450 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 461 netIdMark.netId = netId; 462 netIdMask.netId = 0xffff; 483 // If netId matches, continue, otherwise, reject (i.e., leave socket alone). 526 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 527 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | CommandListener.cpp | 81 // strtoul() returns 0 on errors, which is fine because 0 is an invalid netId. 492 unsigned netId = stringToNetId(argv[3]); local 493 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4); 620 unsigned netId = stringToNetId(argv[2]); local 625 if (!parseAndExecuteSetNetDns(netId, argc, argv)) { 630 } else if (!strcmp(argv[1], "clearnetdns")) { // "resolver clearnetdns <netId>" 632 rc = gCtls->resolverCtrl.clearDnsServers(netId); 652 bool CommandListener::ResolverCmd::parseAndExecuteSetNetDns(int netId, int argc, argument 654 // "resolver setnetdns <netId> <domains> <dns1> [<dns2> ...] [--params <params>]" 671 return gCtls->resolverCtrl.setDnsServers(netId, arg 1328 unsigned netId = stringToNetId(argv[nextArg++]); local 1353 unsigned netId = stringToNetId(argv[3]); local 1377 unsigned netId = stringToNetId(argv[2]); local 1407 unsigned netId = stringToNetId(argv[2]); local 1423 unsigned netId = NETID_UNSET; local 1501 unsigned netId = stringToNetId(argv[3]); local [all...] |
H A D | DnsProxyListener.cpp | 479 unsigned netId = strtoul(argv[7], NULL, 10); local 480 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId); 484 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext); 538 unsigned netId = strtoul(argv[1], NULL, 10); local 539 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId); 550 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext); 684 unsigned netId = strtoul(argv[4], NULL, 10); local 685 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId); 701 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext);
|
H A D | NetworkController.cpp | 106 ALOGE("failed to add fallthrough to %s for VPN netId %u", physicalInterface.c_str(), 114 ALOGE("failed to remove fallthrough to %s for VPN netId %u", physicalInterface.c_str(), 156 int NetworkController::setDefaultNetwork(unsigned netId) { argument 159 if (netId == mDefaultNetId) { 163 if (netId != NETID_UNSET) { 164 Network* network = getNetworkLocked(netId); 166 ALOGE("no such netId %u", netId); 170 ALOGE("cannot set default to non-physical network with netId %u", netId); 193 getNetworkForDnsLocked(unsigned* netId, uid_t uid) const argument 243 getNetworkForDns(unsigned* netId, uid_t uid) const argument 285 getNetworkContext( unsigned netId, uid_t uid, struct android_net_context* netcontext) const argument 358 createPhysicalNetworkLocked(unsigned netId, Permission permission) argument 384 createPhysicalNetwork(unsigned netId, Permission permission) argument 415 createVirtualNetwork(unsigned netId, bool hasDns, bool secure) argument 435 destroyNetwork(unsigned netId) argument 488 addInterfaceToNetwork(unsigned netId, const char* interface) argument 515 removeInterfaceFromNetwork(unsigned netId, const char* interface) argument 565 addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) argument 582 removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) argument 600 addRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 605 removeRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 783 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument [all...] |
H A D | SockDiagTest.cpp | 288 unsigned netId; member in struct:android::net::__anon2101 355 fwmark.netId = permissionTestcases[i].netId; 422 if (permissionTestcases[i].netId != 42) return false;
|
H A D | TetherController.cpp | 209 fwmark.netId = NetworkController::LOCAL_NET_ID; 282 int TetherController::setDnsForwarders(unsigned netId, char **servers, int numServers) { argument 287 fwmark.netId = netId; 320 mDnsNetId = netId;
|
H A D | NetdNativeService.cpp | 184 binder::Status NetdNativeService::networkCreatePhysical(int32_t netId, argument 187 int ret = gCtls->netCtrl.createPhysicalNetwork(netId, stringToPermission(permission.c_str())); 191 binder::Status NetdNativeService::networkCreateVpn(int32_t netId, bool hasDns, bool secure) { argument 193 int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure); 197 binder::Status NetdNativeService::networkDestroy(int32_t netId) { argument 200 const int ret = gCtls->netCtrl.destroyNetwork(netId); 201 gCtls->resolverCtrl.clearDnsServers(netId); 205 binder::Status NetdNativeService::networkAddInterface(int32_t netId, const std::string& iface) { argument 207 int ret = gCtls->netCtrl.addInterfaceToNetwork(netId, iface.c_str()); 211 binder::Status NetdNativeService::networkRemoveInterface(int32_t netId, cons argument 217 networkAddUidRanges(int32_t netId, const std::vector<UidRange>& uidRangeArray) argument 225 networkRemoveUidRanges(int32_t netId, const std::vector<UidRange>& uidRangeArray) argument 299 setResolverConfiguration(int32_t netId, const std::vector<std::string>& servers, const std::vector<std::string>& domains, const std::vector<int32_t>& params, const std::string& tlsName, const std::vector<std::string>& tlsServers, const std::vector<std::string>& tlsFingerprints) argument 326 getResolverInfo(int32_t netId, std::vector<std::string>* servers, std::vector<std::string>* domains, std::vector<int32_t>* params, std::vector<int32_t>* stats) argument [all...] |
H A D | RouteController.cpp | 428 // An iptables rule to mark incoming packets on a network with the netId of the network. 435 WARN_UNUSED_RESULT int modifyIncomingPacketMark(unsigned netId, const char* interface, argument 439 fwmark.netId = netId; 469 // Notice that this rule doesn't use the netId. I.e., no matter what netId the user's socket may 500 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument 505 fwmark.netId = netId; 506 mask.netId 524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 576 modifyImplicitNetworkRule(unsigned netId, uint32_t table, bool add) argument 709 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument 718 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 781 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 968 addInterfaceToLocalNetwork(unsigned netId, const char* interface) argument 972 removeInterfaceFromLocalNetwork(unsigned netId, const char* interface) argument 976 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 985 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1000 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1010 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1023 modifyPhysicalNetworkPermission(unsigned netId, const char* interface, Permission oldPermission, Permission newPermission) argument 1041 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1047 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
/system/netd/client/ |
H A D | NetdClient.cpp | 97 // TODO: get the netId from the socket mark once we have continuous benchmark runs 98 FwmarkCommand command = {FwmarkCommand::ON_CONNECT_COMPLETE, /* netId (ignored) */ 0, 112 unsigned netId = netIdForProcess; local 113 if (netId != NETID_UNSET && FwmarkClient::shouldSetFwmark(domain)) { 114 if (int error = setNetworkForSocket(netId, socketFd)) { 121 unsigned getNetworkForResolv(unsigned netId) { argument 122 if (netId != NETID_UNSET) { 123 return netId; 129 netId = netIdForProcess; 130 if (netId ! 136 setNetworkForTarget(unsigned netId, std::atomic_uint* target) argument 194 getNetworkForSocket(unsigned* netId, int socketFd) argument 211 setNetworkForSocket(unsigned netId, int socketFd) argument 219 setNetworkForProcess(unsigned netId) argument 223 setNetworkForResolv(unsigned netId) argument 243 queryUserAccess(uid_t uid, unsigned netId) argument [all...] |