/system/netd/server/ |
H A D | VirtualNetwork.cpp | 46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument 57 if (int ret = sd.destroySockets(uidRanges, protectableUsers)) { 59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); 66 int VirtualNetwork::addUsers(const UidRanges& uidRanges, const std::set<uid_t>& protectableUsers) { argument 67 maybeCloseSockets(true, uidRanges, protectableUsers); 71 uidRanges)) { 76 mUidRanges.add(uidRanges); 80 int VirtualNetwork::removeUsers(const UidRanges& uidRanges, argument 82 maybeCloseSockets(false, uidRanges, protectableUsers); 86 mSecure, uidRanges)) { [all...] |
H A D | RouteController.h | 51 const UidRanges& uidRanges) WARN_UNUSED_RESULT; 53 const UidRanges& uidRanges) WARN_UNUSED_RESULT; 60 const UidRanges& uidRanges) WARN_UNUSED_RESULT; 62 const UidRanges& uidRanges) WARN_UNUSED_RESULT; 64 static int addUsersToRejectNonSecureNetworkRule(const UidRanges& uidRanges) 66 static int removeUsersFromRejectNonSecureNetworkRule(const UidRanges& uidRanges)
|
H A D | VirtualNetwork.h | 41 int addUsers(const UidRanges& uidRanges, 43 int removeUsers(const UidRanges& uidRanges, 50 int maybeCloseSockets(bool add, const UidRanges& uidRanges,
|
H A D | NetdNativeService.cpp | 139 UidRanges uidRanges(uidRangeArray); 143 err = RouteController::addUsersToRejectNonSecureNetworkRule(uidRanges); 145 err = RouteController::removeUsersFromRejectNonSecureNetworkRule(uidRanges); 166 UidRanges uidRanges(uids); 167 int err = sd.destroySockets(uidRanges, std::set<uid_t>(skipUids.begin(), skipUids.end()));
|
H A D | NetworkController.h | 77 int addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) WARN_UNUSED_RESULT; 78 int removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) WARN_UNUSED_RESULT;
|
H A D | RouteController.cpp | 772 WARN_UNUSED_RESULT int modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) { argument 778 for (const UidRanges::Range& range : uidRanges.getRanges()) { 791 const UidRanges& uidRanges, bool secure, bool add, 798 for (const UidRanges::Range& range : uidRanges.getRanges()) { 1035 bool secure, const UidRanges& uidRanges) { 1036 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, 1045 bool secure, const UidRanges& uidRanges) { 1046 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_DEL, 1067 int RouteController::addUsersToRejectNonSecureNetworkRule(const UidRanges& uidRanges) { argument 1068 return modifyRejectNonSecureNetworkRule(uidRanges, tru 790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 1034 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1044 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1071 removeUsersFromRejectNonSecureNetworkRule(const UidRanges& uidRanges) argument 1075 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1081 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
H A D | SockDiag.h | 56 int destroySockets(const UidRanges& uidRanges, const std::set<uid_t>& skipUids);
|
H A D | SockDiag.cpp | 350 int SockDiag::destroySockets(const UidRanges& uidRanges, const std::set<uid_t>& skipUids) { argument 356 uidRanges.hasUid(msg->idiag_uid) && 372 mSocketsDestroyed, uidRanges.toString().c_str(),
|
H A D | SockDiagTest.cpp | 238 UidRanges uidRanges; local 239 uidRanges.parseFrom(ARRAY_SIZE(uidRangeStrings), (char **) uidRangeStrings); 240 ret = mSd.destroySockets(uidRanges, skipUids); 259 // Include UIDs in uidRanges.
|
H A D | NetworkController.cpp | 465 int NetworkController::addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) { argument 476 if (int ret = static_cast<VirtualNetwork*>(network)->addUsers(uidRanges, mProtectableUsers)) { 482 int NetworkController::removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) { argument 493 if (int ret = static_cast<VirtualNetwork*>(network)->removeUsers(uidRanges,
|
H A D | CommandListener.cpp | 1746 UidRanges uidRanges; local 1747 if (!uidRanges.parseFrom(argc - 4, argv + 4)) { 1751 if (int ret = gCtls->netCtrl.addUsersToNetwork(netId, uidRanges)) { 1755 if (int ret = gCtls->netCtrl.removeUsersFromNetwork(netId, uidRanges)) {
|
/system/netd/server/binder/android/net/ |
H A D | INetd.aidl | 74 * @param uidRanges a set of non-overlapping, contiguous ranges of UIDs to which to apply or 82 void networkRejectNonSecureVpn(boolean add, in UidRange[] uidRanges); 87 void socketDestroy(in UidRange[] uidRanges, in int[] exemptUids);
|
/system/netd/tests/ |
H A D | binder_test.cpp | 265 std::vector<UidRange> uidRanges = { local 274 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(true, uidRanges).isOk()); 277 for (auto const& range : uidRanges) { 282 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(false, uidRanges).isOk()); 285 for (auto const& range : uidRanges) { 290 binder::Status status = mNetd->networkRejectNonSecureVpn(false, uidRanges); 351 std::vector<UidRange> uidRanges = { local 361 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUids).isOk()); 365 uidRanges = { 374 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUid [all...] |