diff --git a/aosp/packages/modules/Connectivity/service-t/jni/com_android_server_net_NetworkStatsService.cpp b/aosp/packages/modules/Connectivity/service-t/jni/com_android_server_net_NetworkStatsService.cpp
index 493ff1af44d07607329e717f82ada4c513e0224a..83dd56c65c67f7cfdf113d51fa4829e7bd60dd9a 100644
--- a/aosp/packages/modules/Connectivity/service-t/jni/com_android_server_net_NetworkStatsService.cpp
+++ b/aosp/packages/modules/Connectivity/service-t/jni/com_android_server_net_NetworkStatsService.cpp
@@ -42,7 +42,7 @@ namespace android {
static void nativeRegisterIface(JNIEnv* env, jclass clazz, jstring iface) {
ScopedUtfChars iface8(env, iface);
if (iface8.c_str() == nullptr) return;
- bpfRegisterIface(iface8.c_str());
+ // bpfRegisterIface(iface8.c_str());
}
static jobject statsValueToEntry(JNIEnv* env, StatsValue* stats) {
diff --git a/aosp/packages/modules/Connectivity/service/src/com/android/server/NetIdManager.java b/aosp/packages/modules/Connectivity/service/src/com/android/server/NetIdManager.java
new file mode 100644
index 0000000000000000000000000000000000000000..3405747994195f08394ebaa5a5b6aebbad30ac6b
--- /dev/null
+++ b/aosp/packages/modules/Connectivity/service/src/com/android/server/NetIdManager.java
@@ -0,0 +1,99 @@
+/*
+ * Copyright (C) 2019 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.android.server;
+
+import android.annotation.NonNull;
+import android.net.ConnectivityManager;
+import android.util.SparseBooleanArray;
+
+import com.android.internal.annotations.GuardedBy;
+import com.android.internal.annotations.VisibleForTesting;
+
+/**
+ * Class used to reserve and release net IDs.
+ *
+ *
Instances of this class are thread-safe.
+ *
+ * NetIds are currently 16 bits long and consume 16 bits in the fwmark.
+ * The reason they are large is that applications might get confused if the netId counter
+ * wraps - for example, Network#equals would return true for a current network
+ * and a long-disconnected network.
+ * We could in theory fix this by splitting the identifier in two, e.g., a 24-bit generation
+ * counter and an 8-bit netId. Java Network objects would be constructed from the full 32-bit
+ * number, but only the 8-bit number would be used by netd and the fwmark.
+ * We'd have to fix all code that assumes that it can take a netId or a mark and construct
+ * a Network object from it.
+ */
+public class NetIdManager {
+ // Sequence number for Networks; keep in sync with system/netd/NetworkController.cpp
+ public static final int MIN_NET_ID = 101; // some reserved marks
+ // Top IDs reserved by IpSecService
+ public static final int MAX_NET_ID = ConnectivityManager.getIpSecNetIdRange().getLower() - 1;
+
+ @GuardedBy("mNetIdInUse")
+ private final SparseBooleanArray mNetIdInUse = new SparseBooleanArray();
+
+ @GuardedBy("mNetIdInUse")
+ private int mLastNetId = MIN_NET_ID - 1;
+
+ private final int mMaxNetId;
+
+ public NetIdManager() {
+ this(MAX_NET_ID);
+ }
+
+ @VisibleForTesting
+ NetIdManager(int maxNetId) {
+ mMaxNetId = maxNetId;
+ }
+
+ /**
+ * Get the first netId that follows the provided lastId and is available.
+ */
+ private int getNextAvailableNetIdLocked(
+ int lastId, @NonNull SparseBooleanArray netIdInUse) {
+ int netId = lastId;
+ for (int i = MIN_NET_ID; i <= mMaxNetId; i++) {
+ netId = netId < mMaxNetId ? netId + 1 : MIN_NET_ID;
+ if (!netIdInUse.get(netId)) {
+ return netId;
+ }
+ }
+ throw new IllegalStateException("No free netIds");
+ }
+
+ /**
+ * Reserve a new ID for a network.
+ */
+ public int reserveNetId() {
+ synchronized (mNetIdInUse) {
+ mLastNetId = getNextAvailableNetIdLocked(mLastNetId, mNetIdInUse);
+ // Make sure NetID unused. http://b/16815182
+ mNetIdInUse.put(mLastNetId, true);
+ return mLastNetId;
+ }
+ }
+
+ /**
+ * Clear a previously reserved ID for a network.
+ */
+ public void releaseNetId(int id) {
+ synchronized (mNetIdInUse) {
+ mNetIdInUse.delete(id);
+ }
+ }
+}
diff --git a/aosp/packages/modules/NetworkStack/jni/network_stack_utils_jni.cpp b/aosp/packages/modules/NetworkStack/jni/network_stack_utils_jni.cpp
new file mode 100644
index 0000000000000000000000000000000000000000..577b0deecd95978251385fec5e7af250eefebe23
--- /dev/null
+++ b/aosp/packages/modules/NetworkStack/jni/network_stack_utils_jni.cpp
@@ -0,0 +1,250 @@
+/*
+ * Copyright 2019, The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#define LOG_TAG "NetworkStackUtils-JNI"
+
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+
+#include
+
+#include
+#include
+
+#include
+#include
+
+namespace android {
+constexpr const char NETWORKSTACKUTILS_PKG_NAME[] =
+ "com/android/networkstack/util/NetworkStackUtils";
+
+static const uint16_t kDhcpClientPort = 68;
+
+static bool checkLenAndCopy(JNIEnv* env, const jbyteArray& addr, int len, void* dst) {
+ if (env->GetArrayLength(addr) != len) {
+ return false;
+ }
+ env->GetByteArrayRegion(addr, 0, len, reinterpret_cast(dst));
+ return true;
+}
+
+static void network_stack_utils_addArpEntry(JNIEnv *env, jclass clazz, jbyteArray ethAddr,
+ jbyteArray ipv4Addr, jstring ifname, jobject javaFd) {
+ arpreq req = {};
+ sockaddr_in& netAddrStruct = *reinterpret_cast(&req.arp_pa);
+ sockaddr& ethAddrStruct = req.arp_ha;
+
+ ethAddrStruct.sa_family = ARPHRD_ETHER;
+ if (!checkLenAndCopy(env, ethAddr, ETH_ALEN, ethAddrStruct.sa_data)) {
+ jniThrowException(env, "java/io/IOException", "Invalid ethAddr length");
+ return;
+ }
+
+ netAddrStruct.sin_family = AF_INET;
+ if (!checkLenAndCopy(env, ipv4Addr, sizeof(in_addr), &netAddrStruct.sin_addr)) {
+ jniThrowException(env, "java/io/IOException", "Invalid ipv4Addr length");
+ return;
+ }
+
+ int ifLen = env->GetStringLength(ifname);
+ // IFNAMSIZ includes the terminating NULL character
+ if (ifLen >= IFNAMSIZ) {
+ jniThrowException(env, "java/io/IOException", "ifname too long");
+ return;
+ }
+ env->GetStringUTFRegion(ifname, 0, ifLen, req.arp_dev);
+
+ req.arp_flags = ATF_COM; // Completed entry (ha valid)
+ int fd = netjniutils::GetNativeFileDescriptor(env, javaFd);
+ if (fd < 0) {
+ jniThrowExceptionFmt(env, "java/io/IOException", "Invalid file descriptor");
+ return;
+ }
+ // See also: man 7 arp
+ if (ioctl(fd, SIOCSARP, &req)) {
+ jniThrowExceptionFmt(env, "java/io/IOException", "ioctl error: %s", strerror(errno));
+ return;
+ }
+}
+
+// fd is a "socket(AF_PACKET, SOCK_RAW, ETH_P_IP)"
+// which guarantees packets already have skb->protocol == htons(ETH_P_IP)
+static void network_stack_utils_attachDhcpFilter(JNIEnv *env, jclass clazz, jobject javaFd) {
+ static sock_filter filter_code[] = {
+ // Check the protocol is UDP.
+ BPF_LOAD_IPV4_U8(protocol),
+ BPF2_REJECT_IF_NOT_EQUAL(IPPROTO_UDP),
+
+ // Check this is not a fragment.
+ BPF_LOAD_IPV4_BE16(frag_off),
+ BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK),
+
+ // Get the IP header length.
+ BPF_LOADX_NET_RELATIVE_IPV4_HLEN,
+
+ // Check the destination port.
+ BPF_LOAD_NETX_RELATIVE_DST_PORT,
+ BPF2_REJECT_IF_NOT_EQUAL(kDhcpClientPort),
+
+ BPF_ACCEPT,
+ };
+ const sock_fprog filter = {
+ sizeof(filter_code) / sizeof(filter_code[0]),
+ filter_code,
+ };
+
+ int fd = netjniutils::GetNativeFileDescriptor(env, javaFd);
+ if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &filter, sizeof(filter)) != 0) {
+ jniThrowErrnoException(env, "setsockopt(SO_ATTACH_FILTER)", errno);
+ }
+}
+
+// fd is a "socket(AF_PACKET, SOCK_RAW, ETH_P_IPV6)"
+// which guarantees packets already have skb->protocol == htons(ETH_P_IPV6)
+static void network_stack_utils_attachRaFilter(JNIEnv *env, jclass clazz, jobject javaFd) {
+ static sock_filter filter_code[] = {
+ BPF_LOADX_CONSTANT_IPV6_HLEN,
+
+ // Check IPv6 Next Header is ICMPv6.
+ BPF_LOAD_IPV6_U8(nexthdr),
+ BPF2_REJECT_IF_NOT_EQUAL(IPPROTO_ICMPV6),
+
+ // Check ICMPv6 type is Router Advertisement.
+ BPF_LOAD_NETX_RELATIVE_ICMP_TYPE,
+ BPF2_REJECT_IF_NOT_EQUAL(ND_ROUTER_ADVERT),
+
+ BPF_ACCEPT,
+ };
+ static const sock_fprog filter = {
+ sizeof(filter_code) / sizeof(filter_code[0]),
+ filter_code,
+ };
+
+ int fd = netjniutils::GetNativeFileDescriptor(env, javaFd);
+ if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &filter, sizeof(filter)) != 0) {
+ jniThrowErrnoException(env, "setsockopt(SO_ATTACH_FILTER)", errno);
+ }
+}
+
+// TODO: Move all this filter code into libnetutils.
+// fd is a "socket(AF_PACKET, SOCK_RAW, ETH_P_ALL)"
+static void network_stack_utils_attachControlPacketFilter(
+ JNIEnv *env, jclass clazz, jobject javaFd) {
+ // Capture all:
+ // - ARPs
+ // - DHCPv4 packets
+ // - Router Advertisements & Solicitations
+ // - Neighbor Advertisements & Solicitations
+ //
+ // tcpdump:
+ // arp or
+ // '(ip and udp port 68)' or
+ // '(icmp6 and ip6[40] >= 133 and ip6[40] <= 136)'
+ static sock_filter filter_code[] = {
+ // Load the ethertype from skb->protocol
+ BPF_LOAD_SKB_PROTOCOL,
+
+ // Accept all ARP.
+ // TODO: Figure out how to better filter ARPs on noisy networks.
+ BPF2_ACCEPT_IF_EQUAL(ETHERTYPE_ARP),
+
+ // If IPv4: (otherwise jump to the 'IPv6 ...' below)
+ BPF_JUMP_IF_NOT_EQUAL(ETHERTYPE_IP, 14),
+
+ // Check the protocol is UDP.
+ BPF_LOAD_IPV4_U8(protocol),
+ BPF2_REJECT_IF_NOT_EQUAL(IPPROTO_UDP),
+
+ // Check this is not a fragment.
+ BPF_LOAD_IPV4_BE16(frag_off),
+ BPF2_REJECT_IF_ANY_MASKED_BITS_SET(IP_MF | IP_OFFMASK),
+
+ // Get the IP header length.
+ BPF_LOADX_NET_RELATIVE_IPV4_HLEN,
+
+ // Check the source port.
+ BPF_LOAD_NETX_RELATIVE_SRC_PORT,
+ BPF2_ACCEPT_IF_EQUAL(kDhcpClientPort),
+
+ // Check the destination port.
+ BPF_LOAD_NETX_RELATIVE_DST_PORT,
+ BPF2_ACCEPT_IF_EQUAL(kDhcpClientPort),
+
+ // Reject any other UDPv4
+ BPF_REJECT,
+
+ // IPv6 ...
+ BPF2_REJECT_IF_NOT_EQUAL(ETHERTYPE_IPV6),
+ // Assume standard, 40-byte, extension header-less ipv6 packet
+ BPF_LOADX_CONSTANT_IPV6_HLEN,
+ // ... check IPv6 Next Header is ICMPv6 (ignore fragments), ...
+ BPF_LOAD_IPV6_U8(nexthdr),
+ BPF2_REJECT_IF_NOT_EQUAL(IPPROTO_ICMPV6),
+ // ... and check the ICMPv6 type is one of RS/RA/NS/NA.
+ BPF_LOAD_NETX_RELATIVE_ICMP_TYPE,
+ BPF3_REJECT_IF_NOT_IN_RANGE(ND_ROUTER_SOLICIT, ND_NEIGHBOR_ADVERT),
+
+ BPF_ACCEPT,
+ };
+ static const sock_fprog filter = {
+ sizeof(filter_code) / sizeof(filter_code[0]),
+ filter_code,
+ };
+
+ int fd = netjniutils::GetNativeFileDescriptor(env, javaFd);
+ if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &filter, sizeof(filter)) != 0) {
+ jniThrowErrnoException(env, "setsockopt(SO_ATTACH_FILTER)", errno);
+ }
+}
+
+/*
+ * JNI registration.
+ */
+static const JNINativeMethod gNetworkStackUtilsMethods[] = {
+ /* name, signature, funcPtr */
+ { "addArpEntry", "([B[BLjava/lang/String;Ljava/io/FileDescriptor;)V", (void*) network_stack_utils_addArpEntry },
+ { "attachDhcpFilter", "(Ljava/io/FileDescriptor;)V", (void*) network_stack_utils_attachDhcpFilter },
+ { "attachRaFilter", "(Ljava/io/FileDescriptor;)V", (void*) network_stack_utils_attachRaFilter },
+ { "attachControlPacketFilter", "(Ljava/io/FileDescriptor;)V", (void*) network_stack_utils_attachControlPacketFilter },
+};
+
+extern "C" jint JNI_OnLoad(JavaVM* vm, void*) {
+ JNIEnv *env;
+ if (vm->GetEnv(reinterpret_cast(&env), JNI_VERSION_1_6) != JNI_OK) {
+ __android_log_print(ANDROID_LOG_ERROR, LOG_TAG, "ERROR: GetEnv failed");
+ return JNI_ERR;
+ }
+
+ // if (jniRegisterNativeMethods(env, NETWORKSTACKUTILS_PKG_NAME,
+ // gNetworkStackUtilsMethods, NELEM(gNetworkStackUtilsMethods)) < 0) {
+ // return JNI_ERR;
+ // }
+
+ return JNI_VERSION_1_6;
+
+}
+}; // namespace android
diff --git a/aosp/packages/modules/NetworkStack/src/com/android/networkstack/util/NetworkStackUtils.java b/aosp/packages/modules/NetworkStack/src/com/android/networkstack/util/NetworkStackUtils.java
new file mode 100755
index 0000000000000000000000000000000000000000..3b38f1c41b8084652bcba88b3e1d39d86cdf9052
--- /dev/null
+++ b/aosp/packages/modules/NetworkStack/src/com/android/networkstack/util/NetworkStackUtils.java
@@ -0,0 +1,438 @@
+/*
+ * Copyright (C) 2019 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.android.networkstack.util;
+
+import android.content.Context;
+import android.net.IpPrefix;
+import android.net.LinkAddress;
+import android.net.MacAddress;
+import android.system.ErrnoException;
+import android.util.Log;
+
+import androidx.annotation.NonNull;
+import androidx.annotation.Nullable;
+
+import com.android.net.module.util.DeviceConfigUtils;
+import com.android.net.module.util.HexDump;
+
+import java.io.FileDescriptor;
+import java.io.IOException;
+import java.net.Inet4Address;
+import java.net.Inet6Address;
+import java.net.InetAddress;
+import java.net.UnknownHostException;
+
+/**
+ * Collection of utilities for the network stack.
+ */
+public class NetworkStackUtils {
+ private static final String TAG = "NetworkStackUtils";
+
+ /**
+ * A list of captive portal detection specifications used in addition to the fallback URLs.
+ * Each spec has the format url@@/@@statusCodeRegex@@/@@contentRegex. Specs are separated
+ * by "@@,@@".
+ */
+ public static final String CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS =
+ "captive_portal_fallback_probe_specs";
+
+ /**
+ * A comma separated list of URLs used for captive portal detection in addition to the
+ * fallback HTTP url associated with the CAPTIVE_PORTAL_FALLBACK_URL settings.
+ */
+ public static final String CAPTIVE_PORTAL_OTHER_FALLBACK_URLS =
+ "captive_portal_other_fallback_urls";
+
+ /**
+ * A comma separated list of URLs used for captive portal detection in addition to the HTTP url
+ * associated with the CAPTIVE_PORTAL_HTTP_URL settings.
+ */
+ public static final String CAPTIVE_PORTAL_OTHER_HTTP_URLS = "captive_portal_other_http_urls";
+
+ /**
+ * A comma separated list of URLs used for network validation. in addition to the HTTPS url
+ * associated with the CAPTIVE_PORTAL_HTTPS_URL settings.
+ */
+ public static final String CAPTIVE_PORTAL_OTHER_HTTPS_URLS = "captive_portal_other_https_urls";
+
+ /**
+ * Which User-Agent string to use in the header of the captive portal detection probes.
+ * The User-Agent field is unset when this setting has no value (HttpUrlConnection default).
+ */
+ public static final String CAPTIVE_PORTAL_USER_AGENT = "captive_portal_user_agent";
+
+ /**
+ * Whether to use HTTPS for network validation. This is enabled by default and the setting
+ * needs to be set to 0 to disable it. This setting is a misnomer because captive portals
+ * don't actually use HTTPS, but it's consistent with the other settings.
+ */
+ public static final String CAPTIVE_PORTAL_USE_HTTPS = "captive_portal_use_https";
+
+ /**
+ * The URL used for HTTPS captive portal detection upon a new connection.
+ * A 204 response code from the server is used for validation.
+ */
+ public static final String CAPTIVE_PORTAL_HTTPS_URL = "captive_portal_https_url";
+
+ /**
+ * The URL used for HTTP captive portal detection upon a new connection.
+ * A 204 response code from the server is used for validation.
+ */
+ public static final String CAPTIVE_PORTAL_HTTP_URL = "captive_portal_http_url";
+
+ /**
+ * The URL used for fallback HTTP captive portal detection when previous HTTP
+ * and HTTPS captive portal detection attemps did not return a conclusive answer.
+ */
+ public static final String CAPTIVE_PORTAL_FALLBACK_URL = "captive_portal_fallback_url";
+
+ /**
+ * What to do when connecting a network that presents a captive portal.
+ * Must be one of the CAPTIVE_PORTAL_MODE_* constants above.
+ *
+ * The default for this setting is CAPTIVE_PORTAL_MODE_PROMPT.
+ */
+ public static final String CAPTIVE_PORTAL_MODE = "captive_portal_mode";
+
+ /**
+ * Don't attempt to detect captive portals.
+ */
+ public static final int CAPTIVE_PORTAL_MODE_IGNORE = 0;
+
+ /**
+ * When detecting a captive portal, display a notification that
+ * prompts the user to sign in.
+ */
+ public static final int CAPTIVE_PORTAL_MODE_PROMPT = 1;
+
+ /**
+ * When detecting a captive portal, immediately disconnect from the
+ * network and do not reconnect to that network in the future.
+ */
+ public static final int CAPTIVE_PORTAL_MODE_AVOID = 2;
+
+ /**
+ * DNS probe timeout for network validation. Enough for 3 DNS queries 5 seconds apart.
+ */
+ public static final int DEFAULT_CAPTIVE_PORTAL_DNS_PROBE_TIMEOUT = 12500;
+
+ /**
+ * List of fallback probe specs to use for detecting captive portals. This is an alternative to
+ * fallback URLs that provides more flexibility on detection rules. Empty, so unused by default.
+ */
+ public static final String[] DEFAULT_CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS =
+ new String[] {};
+
+ /**
+ * The default list of HTTP URLs to use for detecting captive portals.
+ */
+ public static final String[] DEFAULT_CAPTIVE_PORTAL_HTTP_URLS =
+ new String [] {"http://connectivitycheck.gstatic.com/generate_204"};
+
+ /**
+ * The default list of HTTPS URLs for network validation, to use for confirming internet
+ * connectivity.
+ */
+ public static final String[] DEFAULT_CAPTIVE_PORTAL_HTTPS_URLS =
+ new String [] {"https://www.google.com/generate_204"};
+
+ /**
+ * Minimum module version at which to enable the DHCP Rapid Commit option.
+ */
+ public static final String DHCP_RAPID_COMMIT_VERSION = "dhcp_rapid_commit_version";
+
+ /**
+ * Minimum module version at which to enable the IP address conflict detection feature.
+ */
+ public static final String DHCP_IP_CONFLICT_DETECT_VERSION = "dhcp_ip_conflict_detect_version";
+
+ /**
+ * Minimum module version at which to enable slow DHCP retransmission approach in renew/rebind
+ * state suggested in RFC2131 section 4.4.5.
+ */
+ public static final String DHCP_SLOW_RETRANSMISSION_VERSION =
+ "dhcp_slow_retransmission_version";
+
+ /**
+ * Experiment flag to enable considering DNS probes returning private IP addresses as failed
+ * when attempting to detect captive portals.
+ *
+ * This flag is enabled if !=0 and less than the module APK version.
+ */
+ public static final String DNS_PROBE_PRIVATE_IP_NO_INTERNET_VERSION =
+ "dns_probe_private_ip_no_internet";
+
+ /**
+ * Experiment flag to enable validation metrics sent by NetworkMonitor.
+ *
+ * Metrics are sent by default. They can be disabled by setting the flag to a number greater
+ * than the APK version (for example 999999999).
+ * @see DeviceConfigUtils#isFeatureEnabled(Context, String, String, boolean)
+ */
+ public static final String VALIDATION_METRICS_VERSION = "validation_metrics_version";
+
+ /**
+ * Experiment flag to enable sending gratuitous multicast unsolicited Neighbor Advertisements
+ * to propagate new assigned IPv6 GUA as quickly as possible.
+ */
+ public static final String IPCLIENT_GRATUITOUS_NA_VERSION = "ipclient_gratuitous_na_version";
+
+ /**
+ * Experiment flag to enable sending Gratuitous APR and Gratuitous Neighbor Advertisement for
+ * all assigned IPv4 and IPv6 GUAs after completing L2 roaming.
+ */
+ public static final String IPCLIENT_GARP_NA_ROAMING_VERSION =
+ "ipclient_garp_na_roaming_version";
+
+ /**
+ * Experiment flag to check if an on-link IPv6 link local DNS is acceptable. The default flag
+ * value is true, just add this flag for A/B testing to see if this fix works as expected via
+ * experiment rollout.
+ */
+ public static final String IPCLIENT_ACCEPT_IPV6_LINK_LOCAL_DNS_VERSION =
+ "ipclient_accept_ipv6_link_local_dns_version";
+
+ /**
+ * Experiment flag to enable "mcast_resolicit" neighbor parameter in IpReachabilityMonitor,
+ * set it to 3 by default.
+ */
+ public static final String IP_REACHABILITY_MCAST_RESOLICIT_VERSION =
+ "ip_reachability_mcast_resolicit_version";
+
+ /**
+ * Experiment flag to attempt to ignore the on-link IPv6 DNS server which fails to respond to
+ * address resolution.
+ */
+ public static final String IP_REACHABILITY_IGNORE_INCOMPLETE_IPV6_DNS_SERVER_VERSION =
+ "ip_reachability_ignore_incompleted_ipv6_dns_server_version";
+
+ /**
+ * Experiment flag to attempt to ignore the IPv6 default router which fails to respond to
+ * address resolution.
+ */
+ public static final String IP_REACHABILITY_IGNORE_INCOMPLETE_IPV6_DEFAULT_ROUTER_VERSION =
+ "ip_reachability_ignore_incompleted_ipv6_default_router_version";
+
+ /**
+ * Experiment flag to treat router MAC address changes as a failure only on roam.
+ */
+ public static final String IP_REACHABILITY_ROUTER_MAC_CHANGE_FAILURE_ONLY_AFTER_ROAM_VERSION =
+ "ip_reachability_router_mac_change_failure_only_after_roam_version";
+
+ /**
+ * Experiment flag to ignore all NUD failures from kernel organic.
+ */
+ public static final String IP_REACHABILITY_IGNORE_ORGANIC_NUD_FAILURE_VERSION =
+ "ip_reachability_ignore_organic_nud_failure_version";
+
+ /**
+ * Experiment flag to enable DHCPv6 Prefix Delegation(RFC8415) in IpClient.
+ */
+ public static final String IPCLIENT_DHCPV6_PREFIX_DELEGATION_VERSION =
+ "ipclient_dhcpv6_prefix_delegation_version";
+
+ /**
+ * Experiment flag to enable new ra filter.
+ */
+ public static final String APF_NEW_RA_FILTER_VERSION = "apf_new_ra_filter_version";
+
+ /**
+ * Experiment flag to enable the feature of polling counters in Apf.
+ */
+ public static final String APF_POLLING_COUNTERS_VERSION = "apf_polling_counters_version";
+
+ /**
+ * Experiment flag to enable the feature of ignoring any individual RA section with lifetime
+ * below accept_ra_min_lft sysctl.
+ */
+ public static final String IPCLIENT_IGNORE_LOW_RA_LIFETIME_VERSION =
+ "ipclient_ignore_low_ra_lifetime_version";
+
+ /**
+ * Feature flag to send private DNS resolution queries and probes on a background thread.
+ */
+ public static final String NETWORKMONITOR_ASYNC_PRIVDNS_RESOLUTION =
+ "networkmonitor_async_privdns_resolution";
+
+ /**
+ * Experiment flag to populate the IP link address lifetime such as deprecationTime and
+ * expirationtTime.
+ */
+ public static final String IPCLIENT_POPULATE_LINK_ADDRESS_LIFETIME_VERSION =
+ "ipclient_populate_link_address_lifetime_version";
+
+
+ /**** BEGIN Feature Kill Switch Flags ****/
+
+ /**
+ * Kill switch flag to disable the feature of parsing netlink events from kernel directly
+ * instead from netd aidl interface by flag push.
+ */
+ public static final String IPCLIENT_PARSE_NETLINK_EVENTS_FORCE_DISABLE =
+ "ipclient_parse_netlink_events_force_disable";
+
+ /**
+ * Kill switch flag to disable the feature of handle light doze mode in Apf.
+ */
+ public static final String APF_HANDLE_LIGHT_DOZE_FORCE_DISABLE =
+ "apf_handle_light_doze_force_disable";
+
+ /**
+ * Kill switch flag to disable the feature of skipping Tcp socket info polling when light
+ * doze mode is enabled.
+ */
+ public static final String SKIP_TCP_POLL_IN_LIGHT_DOZE = "skip_tcp_poll_in_light_doze_mode";
+
+ /**
+ * Experiment flag to enable the feature of re-evaluate when network resumes.
+ */
+ public static final String REEVALUATE_WHEN_RESUME = "reevaluate_when_resume";
+
+ /**
+ * Kill switch flag to disable the feature of ignoring Tcp socket info for uids which
+ * networking are blocked.
+ */
+ public static final String IGNORE_TCP_INFO_FOR_BLOCKED_UIDS =
+ "ignore_tcp_info_for_blocked_uids";
+
+ static {
+ System.loadLibrary("networkstackutilsjni");
+ }
+
+ /**
+ * Convert IPv6 multicast address to ethernet multicast address in network order.
+ */
+ public static MacAddress ipv6MulticastToEthernetMulticast(@NonNull final Inet6Address addr) {
+ final byte[] etherMulticast = new byte[6];
+ final byte[] ipv6Multicast = addr.getAddress();
+ etherMulticast[0] = (byte) 0x33;
+ etherMulticast[1] = (byte) 0x33;
+ etherMulticast[2] = ipv6Multicast[12];
+ etherMulticast[3] = ipv6Multicast[13];
+ etherMulticast[4] = ipv6Multicast[14];
+ etherMulticast[5] = ipv6Multicast[15];
+ return MacAddress.fromBytes(etherMulticast);
+ }
+
+ /**
+ * Convert IPv6 unicast or anycast address to solicited node multicast address
+ * per RFC4291 section 2.7.1.
+ */
+ @Nullable
+ public static Inet6Address ipv6AddressToSolicitedNodeMulticast(
+ @NonNull final Inet6Address addr) {
+ final byte[] address = new byte[16];
+ address[0] = (byte) 0xFF;
+ address[1] = (byte) 0x02;
+ address[11] = (byte) 0x01;
+ address[12] = (byte) 0xFF;
+ address[13] = addr.getAddress()[13];
+ address[14] = addr.getAddress()[14];
+ address[15] = addr.getAddress()[15];
+ try {
+ return (Inet6Address) InetAddress.getByAddress(address);
+ } catch (UnknownHostException e) {
+ Log.e(TAG, "Invalid host IP address " + addr.getHostAddress(), e);
+ return null;
+ }
+ }
+
+ /**
+ * Check whether a link address is IPv6 global preferred unicast address.
+ */
+ public static boolean isIPv6GUA(@NonNull final LinkAddress address) {
+ return address.isIpv6() && address.isGlobalPreferred();
+ }
+
+ /**
+ * Convert 48bits MAC address to 64bits link-layer address(EUI64).
+ * 1. insert the 0xFFFE in the middle of mac address
+ * 2. flip the 7th bit(universal/local) of the first byte.
+ */
+ public static byte[] macAddressToEui64(@NonNull final MacAddress hwAddr) {
+ final byte[] eui64 = new byte[8];
+ final byte[] mac48 = hwAddr.toByteArray();
+ System.arraycopy(mac48 /* src */, 0 /* srcPos */, eui64 /* dest */, 0 /* destPos */,
+ 3 /* length */);
+ eui64[3] = (byte) 0xFF;
+ eui64[4] = (byte) 0xFE;
+ System.arraycopy(mac48 /* src */, 3 /* srcPos */, eui64 /* dest */, 5 /* destPos */,
+ 3 /* length */);
+ eui64[0] = (byte) (eui64[0] ^ 0x02); // flip 7th bit
+ return eui64;
+ }
+
+ /**
+ * Generate an IPv6 address based on the given prefix(/64) and stable interface
+ * identifier(EUI64).
+ */
+ @Nullable
+ public static Inet6Address createInet6AddressFromEui64(@NonNull final IpPrefix prefix,
+ @NonNull final byte[] eui64) {
+ if (prefix.getPrefixLength() > 64) {
+ Log.e(TAG, "Invalid IPv6 prefix length " + prefix.getPrefixLength());
+ return null;
+ }
+ final byte[] address = new byte[16];
+ System.arraycopy(prefix.getRawAddress() /* src */, 0 /* srcPos */, address /* dest */,
+ 0 /* destPos*/, 8 /* length */);
+ System.arraycopy(eui64 /* src */, 0 /* srcPos */, address /* dest */, 8 /* destPos */,
+ eui64.length);
+ try {
+ return (Inet6Address) InetAddress.getByAddress(address);
+ } catch (UnknownHostException e) {
+ Log.e(TAG, "Invalid IPv6 address " + HexDump.toHexString(address), e);
+ return null;
+ }
+ }
+
+ /**
+ * Attaches a socket filter that accepts DHCP packets to the given socket.
+ */
+ public static void attachDhcpFilter(FileDescriptor fd) throws ErrnoException {
+ }
+
+ /**
+ * Attaches a socket filter that accepts ICMPv6 router advertisements to the given socket.
+ * @param fd the socket's {@link FileDescriptor}.
+ */
+ public static void attachRaFilter(FileDescriptor fd) throws ErrnoException {
+ }
+
+ /**
+ * Attaches a socket filter that accepts L2-L4 signaling traffic required for IP connectivity.
+ *
+ * This includes: all ARP, ICMPv6 RS/RA/NS/NA messages, and DHCPv4 exchanges.
+ *
+ * @param fd the socket's {@link FileDescriptor}.
+ */
+ public static void attachControlPacketFilter(FileDescriptor fd) throws ErrnoException {
+ }
+
+ /**
+ * Add an entry into the ARP cache.
+ */
+ public static void addArpEntry(Inet4Address ipv4Addr, android.net.MacAddress ethAddr,
+ String ifname, FileDescriptor fd) throws IOException {
+ addArpEntry(ethAddr.toByteArray(), ipv4Addr.getAddress(), ifname, fd);
+ }
+
+ private static void addArpEntry(byte[] ethAddr, byte[] netAddr, String ifname,
+ FileDescriptor fd) throws IOException {
+ }
+
+}