/system/netd/server/ |
D | FirewallControllerTest.cpp | 159 std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; in TEST_F() local 160 EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids)); in TEST_F() 173 std::vector<int32_t> uids = { 10023, 10059, 10124 }; in TEST_F() local 174 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids)); in TEST_F()
|
D | NetdNativeService.h | 39 const std::vector<int32_t>& uids, bool *ret) override; 41 binder::Status networkRejectNonSecureVpn(bool enable, const std::vector<UidRange>& uids) 43 binder::Status socketDestroy(const std::vector<UidRange>& uids,
|
D | FirewallController.cpp | 294 std::vector<int32_t> uids; in createChain() local 295 return replaceUidChain(childChain, type == WHITELIST, uids); in createChain() 299 bool isWhitelist, const std::vector<int32_t>& uids) { in makeUidRules() argument 323 for (auto uid : uids) { in makeUidRules() 339 const char *name, bool isWhitelist, const std::vector<int32_t>& uids) { in replaceUidChain() argument 340 std::string commands4 = makeUidRules(V4, name, isWhitelist, uids); in replaceUidChain() 341 std::string commands6 = makeUidRules(V6, name, isWhitelist, uids); in replaceUidChain()
|
D | NetworkController.h | 72 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 91 void allowProtect(const std::vector<uid_t>& uids); 92 void denyProtect(const std::vector<uid_t>& uids);
|
D | NetdNativeService.cpp | 113 bool isWhitelist, const std::vector<int32_t>& uids, bool *ret) { in firewallReplaceUidChain() argument 117 int err = gCtls->firewallCtrl.replaceUidChain(name.string(), isWhitelist, uids); in firewallReplaceUidChain() 155 binder::Status NetdNativeService::socketDestroy(const std::vector<UidRange>& uids, in socketDestroy() argument 166 UidRanges uidRanges(uids); in socketDestroy()
|
D | NetworkController.cpp | 430 const std::vector<uid_t>& uids) { in setPermissionForUsers() argument 432 for (uid_t uid : uids) { in setPermissionForUsers() 516 void NetworkController::allowProtect(const std::vector<uid_t>& uids) { in allowProtect() argument 518 mProtectableUsers.insert(uids.begin(), uids.end()); in allowProtect() 521 void NetworkController::denyProtect(const std::vector<uid_t>& uids) { in denyProtect() argument 523 for (uid_t uid : uids) { in denyProtect()
|
D | FirewallController.h | 87 const std::vector<int32_t>& uids);
|
D | CommandListener.cpp | 1771 std::vector<uid_t> uids; in runCommand() local 1773 uids.push_back(strtoul(argv[i], NULL, 0)); in runCommand() 1776 gCtls->netCtrl.allowProtect(uids); in runCommand() 1778 gCtls->netCtrl.denyProtect(uids); in runCommand()
|
/system/netd/tests/ |
D | binder_test.cpp | 132 std::vector<int32_t> uids(kNumUids); in TEST_F() local 134 uids[i] = randomUid(); in TEST_F() 140 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), true, uids, &ret); in TEST_F() 143 EXPECT_EQ((int) uids.size() + 5, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); in TEST_F() 144 EXPECT_EQ((int) uids.size() + 11, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str())); in TEST_F() 155 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), false, uids, &ret); in TEST_F() 158 EXPECT_EQ((int) uids.size() + 3, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); in TEST_F() 159 EXPECT_EQ((int) uids.size() + 3, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str())); in TEST_F()
|
/system/netd/server/binder/android/net/ |
D | INetd.aidl | 41 boolean firewallReplaceUidChain(String chainName, boolean isWhitelist, in int[] uids); in firewallReplaceUidChain() argument
|
/system/nativepower/daemon/ |
D | power_manager.h | 82 const int* uids,
|
D | power_manager_stub.cc | 106 const int* uids, in updateWakeLockUids() argument
|
D | power_manager.cc | 90 const int* uids, in updateWakeLockUids() argument
|
/system/nativepower/include/nativepower/ |
D | power_manager_stub.h | 86 const int* uids,
|
/system/sepolicy/ |
D | seapp_contexts | 76 # neverallow non-isolated uids into isolated_app domain
|