/system/netd/server/ |
H A D | VirtualNetwork.cpp | 49 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument 60 if (int ret = sd.destroySockets(uidRanges, protectableUsers, true /* excludeLoopback */)) { 62 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); 69 int VirtualNetwork::addUsers(const UidRanges& uidRanges, const std::set<uid_t>& protectableUsers) { argument 70 maybeCloseSockets(true, uidRanges, protectableUsers); 74 uidRanges)) { 79 mUidRanges.add(uidRanges); 83 int VirtualNetwork::removeUsers(const UidRanges& uidRanges, argument 85 maybeCloseSockets(false, uidRanges, protectableUsers); 89 mSecure, uidRanges)) { [all...] |
H A D | SockDiag.cpp | 353 int SockDiag::destroySockets(const UidRanges& uidRanges, const std::set<uid_t>& skipUids, argument 360 uidRanges.hasUid(msg->idiag_uid) && 381 mSocketsDestroyed, uidRanges.toString().c_str(),
|
H A D | CommandListener.cpp | 1540 UidRanges uidRanges; local 1541 if (!uidRanges.parseFrom(argc - 4, argv + 4)) { 1545 if (int ret = gCtls->netCtrl.addUsersToNetwork(netId, uidRanges)) { 1549 if (int ret = gCtls->netCtrl.removeUsersFromNetwork(netId, uidRanges)) {
|
H A D | NetworkController.cpp | 503 int NetworkController::addUsersToNetwork(unsigned netId, const UidRanges& uidRanges) { argument 514 if (int ret = static_cast<VirtualNetwork*>(network)->addUsers(uidRanges, mProtectableUsers)) { 520 int NetworkController::removeUsersFromNetwork(unsigned netId, const UidRanges& uidRanges) { argument 531 if (int ret = static_cast<VirtualNetwork*>(network)->removeUsers(uidRanges,
|
H A D | SockDiagTest.cpp | 386 UidRanges uidRanges; local 387 uidRanges.parseFrom(ARRAY_SIZE(uidRangeStrings), (char **) uidRangeStrings); 388 ret = mSd.destroySockets(uidRanges, skipUids, excludeLoopback); 412 // Include UIDs in uidRanges.
|
H A D | RouteController.cpp | 769 WARN_UNUSED_RESULT int modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) { argument 775 for (const UidRange& range : uidRanges.getRanges()) { 788 const UidRanges& uidRanges, bool secure, bool add, 795 for (const UidRange& range : uidRanges.getRanges()) { 1006 bool secure, const UidRanges& uidRanges) { 1007 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, 1016 bool secure, const UidRanges& uidRanges) { 1017 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_DEL, 1038 int RouteController::addUsersToRejectNonSecureNetworkRule(const UidRanges& uidRanges) { argument 1039 return modifyRejectNonSecureNetworkRule(uidRanges, tru 787 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 1005 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1015 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1042 removeUsersFromRejectNonSecureNetworkRule(const UidRanges& uidRanges) argument 1046 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1052 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
/system/netd/tests/ |
H A D | binder_test.cpp | 314 std::vector<UidRange> uidRanges = { local 323 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(true, uidRanges).isOk()); 326 for (auto const& range : uidRanges) { 331 ASSERT_TRUE(mNetd->networkRejectNonSecureVpn(false, uidRanges).isOk()); 334 for (auto const& range : uidRanges) { 339 binder::Status status = mNetd->networkRejectNonSecureVpn(false, uidRanges); 402 std::vector<UidRange> uidRanges = { local 412 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUids).isOk()); 416 uidRanges = { 425 EXPECT_TRUE(mNetd->socketDestroy(uidRanges, skipUid [all...] |