Searched defs:netId (Results 1 - 20 of 20) sorted by relevance

/system/netd/include/
H A DFwmark.h27 unsigned netId : 16; member in struct:Fwmark::__anon2067
H A DFwmarkCommand.h73 unsigned netId; // used only in the SELECT_NETWORK command; ignored otherwise. member in struct:FwmarkCommand
/system/netd/server/
H A DDummyNetwork.cpp30 DummyNetwork::DummyNetwork(unsigned netId) : Network(netId) { argument
H A DLocalNetwork.cpp27 LocalNetwork::LocalNetwork(unsigned netId) : Network(netId) { argument
42 ALOGE("failed to add interface %s to local netId %u", interface.c_str(), mNetId);
54 ALOGE("failed to remove interface %s from local netId %u", interface.c_str(), mNetId);
H A DNetwork.cpp30 ALOGE("deleting network with netId %u without clearing its interfaces", mNetId);
90 Network::Network(unsigned netId) : mNetId(netId) { argument
H A DClatdController.cpp64 unsigned netId = mNetCtrl->getNetworkForInterface(interface); local
65 if (netId == NETID_UNSET) {
66 ALOGE("interface %s not assigned to any netId", interface);
72 snprintf(netIdString, sizeof(netIdString), "%u", netId);
75 fwmark.netId = netId;
H A DPhysicalNetwork.cpp30 WARN_UNUSED_RESULT int addToDefault(unsigned netId, const std::string& interface, argument
33 ALOGE("failed to add interface %s to default netId %u", interface.c_str(), netId);
42 WARN_UNUSED_RESULT int removeFromDefault(unsigned netId, const std::string& interface, argument
47 ALOGE("failed to remove interface %s from default netId %u", interface.c_str(), netId);
61 PhysicalNetwork::PhysicalNetwork(unsigned netId, PhysicalNetwork::Delegate* delegate) : argument
62 Network(netId), mDelegate(delegate), mPermission(PERMISSION_NONE), mIsDefault(false) {
77 ALOGE("Error closing sockets for netId %d permission change", mNetId);
82 ALOGE("Failed to close sockets changing netId
[all...]
H A DVirtualNetwork.cpp29 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument
30 Network(netId), mHasDns(hasDns), mSecure(secure) {
75 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId);
90 ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId);
108 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
121 ALOGE("failed to remove interface %s from VPN netId %u", interface.c_str(), mNetId);
H A DNetdHwService.cpp68 unsigned netId; local
71 int ret = gCtls->netCtrl.createPhysicalOemNetwork(permission, &netId);
74 fwmark.netId = netId;
78 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret));
84 #define RETURN_IF_NOT_OEM_NETWORK(netId) \
85 if (((netId) < NetworkController::MIN_OEM_ID) || \
86 ((netId) > NetworkController::MAX_OEM_ID)) { \
91 unsigned netId = netHandleToNetId(netHandle); local
92 RETURN_IF_NOT_OEM_NETWORK(netId);
109 unsigned netId = netHandleToNetId(networkHandle); local
119 unsigned netId = netHandleToNetId(networkHandle); local
128 unsigned netId = netHandleToNetId(networkHandle); local
136 unsigned netId = netHandleToNetId(networkHandle); local
[all...]
H A DXfrmController.h119 int netId; member in struct:android::net::XfrmEncapType::XfrmSaInfo
H A DResolverController.cpp114 int set(int32_t netId, const std::vector<std::string>& servers, const std::string& name, argument
118 netId, servers.size(), name.c_str(), fingerprints.size());
138 mPrivateDnsModes[netId] = PrivateDnsMode::STRICT;
140 mPrivateDnsModes[netId] = PrivateDnsMode::OPPORTUNISTIC;
142 mPrivateDnsModes[netId] = PrivateDnsMode::OFF;
143 mPrivateDnsTransports.erase(netId);
148 auto netPair = mPrivateDnsTransports.find(netId);
150 // No TLS tracker yet for this netId.
152 std::tie(netPair, added) = mPrivateDnsTransports.emplace(netId, PrivateDnsTracker());
154 ALOGE("Memory error while recording private DNS for netId
180 getStatus(unsigned netId) argument
206 clear(unsigned netId) argument
215 dump(DumpWriter& dw, unsigned netId) argument
296 recordPrivateDnsValidation(const DnsTlsServer& server, unsigned netId, bool success) argument
375 setDnsServers(unsigned netId, const char* searchDomains, const char** servers, int numservers, const __res_params* params) argument
388 clearDnsServers(unsigned netId) argument
397 flushDnsCache(unsigned netId) argument
407 getDnsInfo(unsigned netId, std::vector<std::string>* servers, std::vector<std::string>* domains, __res_params* params, std::vector<android::net::ResolverStats>* stats) argument
478 setResolverConfiguration(int32_t netId, const std::vector<std::string>& servers, const std::vector<std::string>& domains, const std::vector<int32_t>& params, const std::string& tlsName, const std::vector<std::string>& tlsServers, const std::set<std::vector<uint8_t>>& tlsFingerprints) argument
519 getResolverInfo(int32_t netId, std::vector<std::string>* servers, std::vector<std::string>* domains, std::vector<int32_t>* params, std::vector<int32_t>* stats) argument
542 dump(DumpWriter& dw, unsigned netId) argument
[all...]
H A DSockDiag.cpp441 // Destroys all "live" (CONNECTED, SYN_SENT, SYN_RECV) TCP sockets on the specified netId where:
450 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument
461 netIdMark.netId = netId;
462 netIdMask.netId = 0xffff;
483 // If netId matches, continue, otherwise, reject (i.e., leave socket alone).
526 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms",
527 mSocketsDestroyed, netId, permission, s.timeTaken());
H A DCommandListener.cpp81 // strtoul() returns 0 on errors, which is fine because 0 is an invalid netId.
492 unsigned netId = stringToNetId(argv[3]); local
493 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4);
620 unsigned netId = stringToNetId(argv[2]); local
625 if (!parseAndExecuteSetNetDns(netId, argc, argv)) {
630 } else if (!strcmp(argv[1], "clearnetdns")) { // "resolver clearnetdns <netId>"
632 rc = gCtls->resolverCtrl.clearDnsServers(netId);
652 bool CommandListener::ResolverCmd::parseAndExecuteSetNetDns(int netId, int argc, argument
654 // "resolver setnetdns <netId> <domains> <dns1> [<dns2> ...] [--params <params>]"
671 return gCtls->resolverCtrl.setDnsServers(netId, arg
1328 unsigned netId = stringToNetId(argv[nextArg++]); local
1353 unsigned netId = stringToNetId(argv[3]); local
1377 unsigned netId = stringToNetId(argv[2]); local
1407 unsigned netId = stringToNetId(argv[2]); local
1423 unsigned netId = NETID_UNSET; local
1501 unsigned netId = stringToNetId(argv[3]); local
[all...]
H A DDnsProxyListener.cpp479 unsigned netId = strtoul(argv[7], NULL, 10); local
480 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId);
484 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext);
538 unsigned netId = strtoul(argv[1], NULL, 10); local
539 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId);
550 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext);
684 unsigned netId = strtoul(argv[4], NULL, 10); local
685 const bool useLocalNameservers = checkAndClearUseLocalNameserversFlag(&netId);
701 mDnsProxyListener->mNetCtrl->getNetworkContext(netId, uid, &netcontext);
H A DNetworkController.cpp106 ALOGE("failed to add fallthrough to %s for VPN netId %u", physicalInterface.c_str(),
114 ALOGE("failed to remove fallthrough to %s for VPN netId %u", physicalInterface.c_str(),
156 int NetworkController::setDefaultNetwork(unsigned netId) { argument
159 if (netId == mDefaultNetId) {
163 if (netId != NETID_UNSET) {
164 Network* network = getNetworkLocked(netId);
166 ALOGE("no such netId %u", netId);
170 ALOGE("cannot set default to non-physical network with netId %u", netId);
193 getNetworkForDnsLocked(unsigned* netId, uid_t uid) const argument
243 getNetworkForDns(unsigned* netId, uid_t uid) const argument
285 getNetworkContext( unsigned netId, uid_t uid, struct android_net_context* netcontext) const argument
358 createPhysicalNetworkLocked(unsigned netId, Permission permission) argument
384 createPhysicalNetwork(unsigned netId, Permission permission) argument
415 createVirtualNetwork(unsigned netId, bool hasDns, bool secure) argument
435 destroyNetwork(unsigned netId) argument
488 addInterfaceToNetwork(unsigned netId, const char* interface) argument
515 removeInterfaceFromNetwork(unsigned netId, const char* interface) argument
565 addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) argument
582 removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) argument
600 addRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument
605 removeRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument
783 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument
[all...]
H A DSockDiagTest.cpp288 unsigned netId; member in struct:android::net::__anon2101
355 fwmark.netId = permissionTestcases[i].netId;
422 if (permissionTestcases[i].netId != 42) return false;
H A DTetherController.cpp209 fwmark.netId = NetworkController::LOCAL_NET_ID;
282 int TetherController::setDnsForwarders(unsigned netId, char **servers, int numServers) { argument
287 fwmark.netId = netId;
320 mDnsNetId = netId;
H A DNetdNativeService.cpp184 binder::Status NetdNativeService::networkCreatePhysical(int32_t netId, argument
187 int ret = gCtls->netCtrl.createPhysicalNetwork(netId, stringToPermission(permission.c_str()));
191 binder::Status NetdNativeService::networkCreateVpn(int32_t netId, bool hasDns, bool secure) { argument
193 int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure);
197 binder::Status NetdNativeService::networkDestroy(int32_t netId) { argument
200 const int ret = gCtls->netCtrl.destroyNetwork(netId);
201 gCtls->resolverCtrl.clearDnsServers(netId);
205 binder::Status NetdNativeService::networkAddInterface(int32_t netId, const std::string& iface) { argument
207 int ret = gCtls->netCtrl.addInterfaceToNetwork(netId, iface.c_str());
211 binder::Status NetdNativeService::networkRemoveInterface(int32_t netId, cons argument
217 networkAddUidRanges(int32_t netId, const std::vector<UidRange>& uidRangeArray) argument
225 networkRemoveUidRanges(int32_t netId, const std::vector<UidRange>& uidRangeArray) argument
299 setResolverConfiguration(int32_t netId, const std::vector<std::string>& servers, const std::vector<std::string>& domains, const std::vector<int32_t>& params, const std::string& tlsName, const std::vector<std::string>& tlsServers, const std::vector<std::string>& tlsFingerprints) argument
326 getResolverInfo(int32_t netId, std::vector<std::string>* servers, std::vector<std::string>* domains, std::vector<int32_t>* params, std::vector<int32_t>* stats) argument
[all...]
H A DRouteController.cpp428 // An iptables rule to mark incoming packets on a network with the netId of the network.
435 WARN_UNUSED_RESULT int modifyIncomingPacketMark(unsigned netId, const char* interface, argument
439 fwmark.netId = netId;
469 // Notice that this rule doesn't use the netId. I.e., no matter what netId the user's socket may
500 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument
505 fwmark.netId = netId;
506 mask.netId
524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
576 modifyImplicitNetworkRule(unsigned netId, uint32_t table, bool add) argument
709 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument
718 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
781 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument
968 addInterfaceToLocalNetwork(unsigned netId, const char* interface) argument
972 removeInterfaceFromLocalNetwork(unsigned netId, const char* interface) argument
976 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
985 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
1000 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1010 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1023 modifyPhysicalNetworkPermission(unsigned netId, const char* interface, Permission oldPermission, Permission newPermission) argument
1041 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1047 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
[all...]
/system/netd/client/
H A DNetdClient.cpp97 // TODO: get the netId from the socket mark once we have continuous benchmark runs
98 FwmarkCommand command = {FwmarkCommand::ON_CONNECT_COMPLETE, /* netId (ignored) */ 0,
112 unsigned netId = netIdForProcess; local
113 if (netId != NETID_UNSET && FwmarkClient::shouldSetFwmark(domain)) {
114 if (int error = setNetworkForSocket(netId, socketFd)) {
121 unsigned getNetworkForResolv(unsigned netId) { argument
122 if (netId != NETID_UNSET) {
123 return netId;
129 netId = netIdForProcess;
130 if (netId !
136 setNetworkForTarget(unsigned netId, std::atomic_uint* target) argument
194 getNetworkForSocket(unsigned* netId, int socketFd) argument
211 setNetworkForSocket(unsigned netId, int socketFd) argument
219 setNetworkForProcess(unsigned netId) argument
223 setNetworkForResolv(unsigned netId) argument
243 queryUserAccess(uid_t uid, unsigned netId) argument
[all...]

Completed in 3458 milliseconds