blob: ea34897314d4562febe34977d8e4f0ef899a6ee8 [file] [log] [blame]
Pierre Imai1cfa5432016-02-24 18:00:03 +09001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Bernie Innocenti196f1b82019-05-20 16:34:16 +090017#include <cinttypes>
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090018#include <regex>
19#include <set>
20#include <string>
21
Lorenzo Colitti05306fb2017-02-09 04:56:00 +090022#include <android-base/stringprintf.h>
Mike Yue7e332f2019-03-13 17:15:48 +080023#include <android-base/strings.h>
24#include <netdutils/Stopwatch.h>
Lorenzo Colitti05306fb2017-02-09 04:56:00 +090025
Lorenzo Colitti19ee8a82017-02-02 12:59:05 +090026#define LOG_TAG "Netd"
Logan Chien3f461482018-04-23 14:31:32 +080027#include <log/log.h>
Lorenzo Colitti19ee8a82017-02-02 12:59:05 +090028
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -070029#include "ConnmarkFlags.h"
Pierre Imai1cfa5432016-02-24 18:00:03 +090030#include "Controllers.h"
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090031#include "IdletimerController.h"
32#include "NetworkController.h"
33#include "RouteController.h"
Nathan Harold21299f72018-03-16 20:13:03 -070034#include "XfrmController.h"
Mike Yue7e332f2019-03-13 17:15:48 +080035#include "oem_iptables_hook.h"
Pierre Imai1cfa5432016-02-24 18:00:03 +090036
37namespace android {
38namespace net {
39
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -070040using android::base::Join;
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090041using android::base::StringAppendF;
Mike Yue7e332f2019-03-13 17:15:48 +080042using android::base::StringPrintf;
43using android::netdutils::Stopwatch;
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090044
Lorenzo Colitti341d3a02017-08-08 17:31:35 +090045auto Controllers::execIptablesRestore = ::execIptablesRestore;
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090046auto Controllers::execIptablesRestoreWithOutput = ::execIptablesRestoreWithOutput;
Lorenzo Colitti341d3a02017-08-08 17:31:35 +090047
Erik Klineb31fd692018-06-06 20:50:11 +090048netdutils::Log gLog("netd");
Luke Huang528af602018-08-29 19:06:05 +080049netdutils::Log gUnsolicitedLog("netdUnsolicited");
Erik Klineb31fd692018-06-06 20:50:11 +090050
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090051namespace {
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090052
Patrick Rohr282d8ac2023-05-08 12:00:46 -070053static constexpr char CONNMARK_MANGLE_INPUT[] = "connmark_mangle_INPUT";
54static constexpr char CONNMARK_MANGLE_OUTPUT[] = "connmark_mangle_OUTPUT";
55
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090056/**
57 * List of module chains to be created, along with explicit ordering. ORDERING
58 * IS CRITICAL, AND SHOULD BE TRIPLE-CHECKED WITH EACH CHANGE.
59 */
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090060static const std::vector<const char*> FILTER_INPUT = {
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090061 // Bandwidth should always be early in input chain, to make sure we
62 // correctly count incoming traffic against data plan.
63 BandwidthController::LOCAL_INPUT,
64 FirewallController::LOCAL_INPUT,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090065};
66
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090067static const std::vector<const char*> FILTER_FORWARD = {
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090068 OEM_IPTABLES_FILTER_FORWARD,
69 FirewallController::LOCAL_FORWARD,
70 BandwidthController::LOCAL_FORWARD,
Lorenzo Colittia93126d2017-08-24 13:28:19 +090071 TetherController::LOCAL_FORWARD,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090072};
73
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090074static const std::vector<const char*> FILTER_OUTPUT = {
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090075 OEM_IPTABLES_FILTER_OUTPUT,
76 FirewallController::LOCAL_OUTPUT,
77 StrictController::LOCAL_OUTPUT,
78 BandwidthController::LOCAL_OUTPUT,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090079};
80
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090081static const std::vector<const char*> RAW_PREROUTING = {
Maciej Żenczykowskie2d12d62021-06-10 17:23:22 -070082 IdletimerController::LOCAL_RAW_PREROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090083 BandwidthController::LOCAL_RAW_PREROUTING,
Lorenzo Colittia93126d2017-08-24 13:28:19 +090084 TetherController::LOCAL_RAW_PREROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090085};
86
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090087static const std::vector<const char*> MANGLE_POSTROUTING = {
Lorenzo Colitti05306fb2017-02-09 04:56:00 +090088 OEM_IPTABLES_MANGLE_POSTROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090089 BandwidthController::LOCAL_MANGLE_POSTROUTING,
90 IdletimerController::LOCAL_MANGLE_POSTROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +090091};
92
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090093static const std::vector<const char*> MANGLE_INPUT = {
Patrick Rohr282d8ac2023-05-08 12:00:46 -070094 CONNMARK_MANGLE_INPUT,
Joel Scherpelz08b84cd2017-05-22 13:11:54 +090095 WakeupController::LOCAL_MANGLE_INPUT,
Lorenzo Colittid78843e2017-03-27 05:52:31 +090096 RouteController::LOCAL_MANGLE_INPUT,
Lorenzo Colittid78843e2017-03-27 05:52:31 +090097};
98
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +090099static const std::vector<const char*> MANGLE_FORWARD = {
Lorenzo Colittia93126d2017-08-24 13:28:19 +0900100 TetherController::LOCAL_MANGLE_FORWARD,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900101};
102
Patrick Rohr282d8ac2023-05-08 12:00:46 -0700103static const std::vector<const char*> MANGLE_OUTPUT = {
104 CONNMARK_MANGLE_OUTPUT,
105};
106
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900107static const std::vector<const char*> NAT_PREROUTING = {
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900108 OEM_IPTABLES_NAT_PREROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900109};
110
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900111static const std::vector<const char*> NAT_POSTROUTING = {
Lorenzo Colittia93126d2017-08-24 13:28:19 +0900112 TetherController::LOCAL_NAT_POSTROUTING,
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900113};
114
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900115// Commands to create child chains and to match created chains in iptables -S output. Keep in sync.
116static const char* CHILD_CHAIN_TEMPLATE = "-A %s -j %s\n";
117static const std::regex CHILD_CHAIN_REGEX("^-A ([^ ]+) -j ([^ ]+)$",
118 std::regex_constants::extended);
119
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900120} // namespace
121
122/* static */
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900123std::set<std::string> Controllers::findExistingChildChains(const IptablesTarget target,
124 const char* table,
125 const char* parentChain) {
126 if (target == V4V6) {
127 ALOGE("findExistingChildChains only supports one protocol at a time");
128 abort();
129 }
130
131 std::set<std::string> existing;
132
133 // List the current contents of parentChain.
134 //
135 // TODO: there is no guarantee that nothing else modifies the chain in the few milliseconds
136 // between when we list the existing rules and when we delete them. However:
137 // - Since this code is only run on startup, nothing else in netd will be running.
138 // - While vendor code is known to add its own rules to chains created by netd, it should never
139 // be modifying the rules in childChains or the rules that hook said chains into their parent
140 // chains.
141 std::string command = StringPrintf("*%s\n-S %s\nCOMMIT\n", table, parentChain);
142 std::string output;
143 if (Controllers::execIptablesRestoreWithOutput(target, command, &output) == -1) {
Maciej Żenczykowski5a58ba32022-06-17 02:41:23 -0700144 ALOGE("Error listing chain %s in table %s", parentChain, table);
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900145 return existing;
146 }
147
148 // The only rules added by createChildChains are of the simple form "-A <parent> -j <child>".
149 // Find those rules and add each one's child chain to existing.
150 std::smatch matches;
151 std::stringstream stream(output);
152 std::string rule;
153 while (std::getline(stream, rule, '\n')) {
154 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) {
155 existing.insert(matches[2]);
156 }
157 }
158
159 return existing;
160}
161
162/* static */
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900163void Controllers::createChildChains(IptablesTarget target, const char* table,
164 const char* parentChain,
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900165 const std::vector<const char*>& childChains,
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900166 bool exclusive) {
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900167 std::string command = StringPrintf("*%s\n", table);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900168
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900169 // We cannot just clear all the chains we create because vendor code modifies filter OUTPUT and
170 // mangle POSTROUTING directly. So:
171 //
172 // - If we're the exclusive owner of this chain, simply clear it entirely.
173 // - If not, then list the chain's current contents to ensure that if we restart after a crash,
174 // we leave the existing rules alone in the positions they currently occupy. This is faster
175 // than blindly deleting our rules and recreating them, because deleting a rule that doesn't
176 // exists causes iptables-restore to quit, which takes ~30ms per delete. It's also more
177 // correct, because if we delete rules and re-add them, they'll be in the wrong position with
178 // regards to the vendor rules.
179 //
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900180 // TODO: Make all chains exclusive once vendor code uses the oem_* rules.
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900181 std::set<std::string> existingChildChains;
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900182 if (exclusive) {
183 // Just running ":chain -" flushes user-defined chains, but not built-in chains like INPUT.
184 // Since at this point we don't know if parentChain is a built-in chain, do both.
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900185 StringAppendF(&command, ":%s -\n", parentChain);
186 StringAppendF(&command, "-F %s\n", parentChain);
187 } else {
188 existingChildChains = findExistingChildChains(target, table, parentChain);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900189 }
190
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900191 for (const auto& childChain : childChains) {
192 // Always clear the child chain.
193 StringAppendF(&command, ":%s -\n", childChain);
194 // But only add it to the parent chain if it's not already there.
195 if (existingChildChains.find(childChain) == existingChildChains.end()) {
196 StringAppendF(&command, CHILD_CHAIN_TEMPLATE, parentChain, childChain);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900197 }
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900198 }
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900199 command += "COMMIT\n";
Lorenzo Colitti05306fb2017-02-09 04:56:00 +0900200 execIptablesRestore(target, command);
201}
202
Joel Scherpelz08b84cd2017-05-22 13:11:54 +0900203Controllers::Controllers()
Hungming Chenf0ac3df2022-04-22 15:25:23 +0800204 : wakeupCtrl(
Erik Klineb31fd692018-06-06 20:50:11 +0900205 [this](const WakeupController::ReportArgs& args) {
206 const auto listener = eventReporter.getNetdEventListener();
207 if (listener == nullptr) {
208 gLog.error("getNetdEventListener() returned nullptr. dropping wakeup event");
209 return;
210 }
211 String16 prefix = String16(args.prefix.c_str());
212 String16 srcIp = String16(args.srcIp.c_str());
213 String16 dstIp = String16(args.dstIp.c_str());
214 listener->onWakeupEvent(prefix, args.uid, args.ethertype, args.ipNextHeader,
215 args.dstHw, srcIp, dstIp, args.srcPort, args.dstPort,
216 args.timestampNs);
217 },
218 &iptablesRestoreCtrl) {
Erik Kline2c5aaa12016-06-08 13:24:45 +0900219 InterfaceController::initializeAll();
220}
Pierre Imai1cfa5432016-02-24 18:00:03 +0900221
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900222void Controllers::initChildChains() {
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900223 /*
224 * This is the only time we touch top-level chains in iptables; controllers
225 * should only mutate rules inside of their children chains, as created by
226 * the constants above.
227 *
228 * Modules should never ACCEPT packets (except in well-justified cases);
229 * they should instead defer to any remaining modules using RETURN, or
230 * otherwise DROP/REJECT.
231 */
232
Lorenzo Colitti05306fb2017-02-09 04:56:00 +0900233 // Create chains for child modules.
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900234 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT, true);
235 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD, true);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900236 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING, true);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900237 createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD, true);
Lorenzo Colittid78843e2017-03-27 05:52:31 +0900238 createChildChains(V4V6, "mangle", "INPUT", MANGLE_INPUT, true);
Patrick Rohr282d8ac2023-05-08 12:00:46 -0700239 createChildChains(V4V6, "mangle", "OUTPUT", MANGLE_OUTPUT, true);
Lorenzo Colitticda022e2017-02-03 12:35:46 +0900240 createChildChains(V4, "nat", "PREROUTING", NAT_PREROUTING, true);
241 createChildChains(V4, "nat", "POSTROUTING", NAT_POSTROUTING, true);
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900242
Lorenzo Colittiadc3a5f2017-08-08 17:23:12 +0900243 createChildChains(V4, "filter", "OUTPUT", FILTER_OUTPUT, false);
244 createChildChains(V6, "filter", "OUTPUT", FILTER_OUTPUT, false);
245 createChildChains(V4, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false);
246 createChildChains(V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false);
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900247}
248
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -0700249static void setupConnmarkIptablesHooks() {
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -0700250 // Rules to store parts of the fwmark (namely: netId, explicitlySelected, protectedFromVpn,
251 // permission) in connmark.
252 // Only saves the mark if no mark has been set before.
Patrick Rohrc31e2772024-05-15 21:31:09 +0000253 static_assert(std::string_view(CONNMARK_MANGLE_INPUT) == "connmark_mangle_INPUT");
254 static_assert(std::string_view(CONNMARK_MANGLE_OUTPUT) == "connmark_mangle_OUTPUT");
255 static_assert(CONNMARK_FWMARK_MASK == 0x000FFFFF);
256 const std::string cmd(
257 // CONNMARK:
258 // --save-mark [--nfmask nfmask] [--ctmask ctmask]
259 // Copy the packet mark (nfmark) to the connection mark (ctmark) using the given
260 // masks. The new nfmark value is determined as follows:
261 // ctmark = (ctmark & ~ctmask) ^ (nfmark & nfmask)
262 // i.e. ctmask defines what bits to clear and nfmask what bits of the nfmark to
263 // XOR into the ctmark. ctmask and nfmask default to 0xFFFFFFFF.
264 "*mangle\n"
265 "-A connmark_mangle_INPUT -m connmark --mark 0/0x000FFFFF "
266 "-j CONNMARK --save-mark --ctmask 0x000FFFFF --nfmask 0x000FFFFF\n"
267 "-A connmark_mangle_OUTPUT -m connmark --mark 0/0x000FFFFF "
268 "-j CONNMARK --save-mark --ctmask 0x000FFFFF --nfmask 0x000FFFFF\n"
269 "COMMIT\n");
270 execIptablesRestore(V4V6, cmd);
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -0700271}
272
Lorenzo Colitti341d3a02017-08-08 17:31:35 +0900273void Controllers::initIptablesRules() {
274 Stopwatch s;
275 initChildChains();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900276 gLog.info("Creating child chains: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900277
278 // Let each module setup their child chains
279 setupOemIptablesHook();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900280 gLog.info("Setting up OEM hooks: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900281
282 /* When enabled, DROPs all packets except those matching rules. */
283 firewallCtrl.setupIptablesHooks();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900284 gLog.info("Setting up FirewallController hooks: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900285
286 /* Does DROPs in FORWARD by default */
Lorenzo Colittia93126d2017-08-24 13:28:19 +0900287 tetherCtrl.setupIptablesHooks();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900288 gLog.info("Setting up TetherController hooks: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti19ee8a82017-02-02 12:59:05 +0900289
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900290 /*
291 * Does REJECT in INPUT, OUTPUT. Does counting also.
292 * No DROP/REJECT allowed later in netfilter-flow hook order.
293 */
294 bandwidthCtrl.setupIptablesHooks();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900295 gLog.info("Setting up BandwidthController hooks: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti19ee8a82017-02-02 12:59:05 +0900296
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900297 /*
298 * Counts in nat: PREROUTING, POSTROUTING.
299 * No DROP/REJECT allowed later in netfilter-flow hook order.
300 */
301 idletimerCtrl.setupIptablesHooks();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900302 gLog.info("Setting up IdletimerController hooks: %" PRId64 "us", s.getTimeAndResetUs());
Luke Huanga67dd562018-07-17 19:58:25 +0800303
304 /*
305 * Add rules for detecting IPv6/IPv4 TCP/UDP connections with TLS/DTLS header
306 */
307 strictCtrl.setupIptablesHooks();
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900308 gLog.info("Setting up StrictController hooks: %" PRId64 "us", s.getTimeAndResetUs());
Patrick Rohr2dbbb4b2023-05-08 14:47:45 -0700309
310 /*
311 * Add rules for storing netid in connmark.
312 */
313 setupConnmarkIptablesHooks();
314 gLog.info("Setting up connmark hooks: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900315}
316
317void Controllers::init() {
318 initIptablesRules();
Lorenzo Colitti19ee8a82017-02-02 12:59:05 +0900319 Stopwatch s;
Maciej Żenczykowski1c086e52019-03-29 23:13:49 -0700320
Maciej Żenczykowski38e049f2022-06-14 16:49:58 -0700321 if (int ret = bandwidthCtrl.enableBandwidthControl()) {
322 gLog.error("Failed to initialize BandwidthController (%s)", strerror(-ret));
323 // A failure to init almost definitely means that iptables failed to load
324 // our static ruleset, which then basically means network accounting will not work.
325 // As such simply exit netd. This may crash loop the system, but by failing
326 // to bootup we will trigger rollback and thus this offers us protection against
327 // a mainline update breaking things.
328 exit(1);
329 }
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900330 gLog.info("Enabling bandwidth control: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900331
Chenbo Fengc10a8a42017-12-15 13:56:33 -0800332 if (int ret = RouteController::Init(NetworkController::LOCAL_NET_ID)) {
Erik Klineb31fd692018-06-06 20:50:11 +0900333 gLog.error("Failed to initialize RouteController (%s)", strerror(-ret));
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900334 }
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900335 gLog.info("Initializing RouteController: %" PRId64 "us", s.getTimeAndResetUs());
Nathan Harold21299f72018-03-16 20:13:03 -0700336
337 netdutils::Status xStatus = XfrmController::Init();
338 if (!isOk(xStatus)) {
Erik Klineb31fd692018-06-06 20:50:11 +0900339 gLog.error("Failed to initialize XfrmController (%s)", netdutils::toString(xStatus).c_str());
Nathan Harold21299f72018-03-16 20:13:03 -0700340 };
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900341 gLog.info("Initializing XfrmController: %" PRId64 "us", s.getTimeAndResetUs());
Lorenzo Colitti1ed96e22017-02-02 12:21:56 +0900342}
343
Pierre Imai1cfa5432016-02-24 18:00:03 +0900344Controllers* gCtls = nullptr;
345
346} // namespace net
347} // namespace android