/system/netd/server/ |
H A D | VirtualNetwork.cpp | 46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument 57 if (int ret = sd.destroySockets(uidRanges, protectableUsers, true /* excludeLoopback */)) { 59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); 66 int VirtualNetwork::addUsers(const UidRanges& uidRanges, const std::set<uid_t>& protectableUsers) { argument 67 maybeCloseSockets(true, uidRanges, protectableUsers); 71 uidRanges)) { 76 mUidRanges.add(uidRanges); 80 int VirtualNetwork::removeUsers(const UidRanges& uidRanges, argument 82 maybeCloseSockets(false, uidRanges, protectableUsers); 86 mSecure, uidRanges)) { [all...] |
H A D | NetworkController.cpp | 463 int NetworkController::addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) { argument 474 if (int ret = static_cast<VirtualNetwork*>(network)->addUsers(uidRanges, mProtectableUsers)) { 480 int NetworkController::removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) { argument 491 if (int ret = static_cast<VirtualNetwork*>(network)->removeUsers(uidRanges,
|
H A D | SockDiag.cpp | 374 int SockDiag::destroySockets(const UidRanges& uidRanges, const std::set<uid_t>& skipUids, argument 381 uidRanges.hasUid(msg->idiag_uid) && 402 mSocketsDestroyed, uidRanges.toString().c_str(),
|
H A D | SockDiagTest.cpp | 397 UidRanges uidRanges; local 398 uidRanges.parseFrom(ARRAY_SIZE(uidRangeStrings), (char **) uidRangeStrings); 399 ret = mSd.destroySockets(uidRanges, skipUids, excludeLoopback); 423 // Include UIDs in uidRanges.
|
H A D | CommandListener.cpp | 1746 UidRanges uidRanges; local 1747 if (!uidRanges.parseFrom(argc - 4, argv + 4)) { 1751 if (int ret = gCtls->netCtrl.addUsersToNetwork(netId, uidRanges)) { 1755 if (int ret = gCtls->netCtrl.removeUsersFromNetwork(netId, uidRanges)) {
|
H A D | RouteController.cpp | 772 WARN_UNUSED_RESULT int modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) { argument 778 for (const UidRanges::Range& range : uidRanges.getRanges()) { 791 const UidRanges& uidRanges, bool secure, bool add, 798 for (const UidRanges::Range& range : uidRanges.getRanges()) { 1035 bool secure, const UidRanges& uidRanges) { 1036 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, 1045 bool secure, const UidRanges& uidRanges) { 1046 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_DEL, 1067 int RouteController::addUsersToRejectNonSecureNetworkRule(const UidRanges& uidRanges) { argument 1068 return modifyRejectNonSecureNetworkRule(uidRanges, tru 790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 1034 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1044 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1071 removeUsersFromRejectNonSecureNetworkRule(const UidRanges& uidRanges) argument 1075 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1081 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
/system/netd/tests/ |
H A D | binder_test.cpp | 301 std::vector<UidRange> uidRanges = { local 310 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(true, uidRanges).isOk()); 313 for (auto const& range : uidRanges) { 318 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(false, uidRanges).isOk()); 321 for (auto const& range : uidRanges) { 326 binder::Status status = mNetd->networkRejectNonSecureVpn(false, uidRanges); 431 std::vector<UidRange> uidRanges = { local 441 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUids).isOk()); 445 uidRanges = { 454 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUid [all...] |