/system/core/storaged/include/ |
H A D | storaged_utils.h | 35 void sort_running_uids_info(std::vector<struct uid_info> &uids); 38 void log_console_running_uids_info(std::vector<struct uid_info> uids);
|
/system/netd/server/ |
H A D | FirewallController.cpp | 256 bool isWhitelist, const std::vector<int32_t>& uids) { 262 for (auto uid : uids) { 285 for (auto uid : uids) { 302 const char *name, bool isWhitelist, const std::vector<int32_t>& uids) { 303 std::string commands4 = makeUidRules(V4, name, isWhitelist, uids); 304 std::string commands6 = makeUidRules(V6, name, isWhitelist, uids); 255 makeUidRules(IptablesTarget target, const char *name, bool isWhitelist, const std::vector<int32_t>& uids) argument 301 replaceUidChain( const char *name, bool isWhitelist, const std::vector<int32_t>& uids) argument
|
H A D | NetworkController.h | 109 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 128 void allowProtect(const std::vector<uid_t>& uids); 129 void denyProtect(const std::vector<uid_t>& uids);
|
H A D | FirewallController.h | 30 // WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed 31 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed 86 const std::vector<int32_t>& uids);
|
H A D | FirewallControllerTest.cpp | 178 std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; local 179 EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids)); 194 std::vector<int32_t> uids = { 10023, 10059, 10124 }; local 195 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids));
|
H A D | NetdNativeService.h | 39 const std::vector<int32_t>& uids, bool *ret) override; 41 binder::Status networkRejectNonSecureVpn(bool enable, const std::vector<UidRange>& uids) 43 binder::Status socketDestroy(const std::vector<UidRange>& uids,
|
H A D | NetworkController.cpp | 470 const std::vector<uid_t>& uids) { 472 for (uid_t uid : uids) { 554 void NetworkController::allowProtect(const std::vector<uid_t>& uids) { argument 556 mProtectableUsers.insert(uids.begin(), uids.end()); 559 void NetworkController::denyProtect(const std::vector<uid_t>& uids) { argument 561 for (uid_t uid : uids) { 469 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument
|
H A D | NetdNativeService.cpp | 147 bool isWhitelist, const std::vector<int32_t>& uids, bool *ret) { 151 int err = gCtls->firewallCtrl.replaceUidChain(name.string(), isWhitelist, uids); 189 binder::Status NetdNativeService::socketDestroy(const std::vector<UidRange>& uids, argument 200 UidRanges uidRanges(uids); 146 firewallReplaceUidChain(const android::String16& chainName, bool isWhitelist, const std::vector<int32_t>& uids, bool *ret) argument
|
H A D | CommandListener.cpp | 1565 std::vector<uid_t> uids; local 1567 uids.push_back(strtoul(argv[i], NULL, 0)); 1570 gCtls->netCtrl.allowProtect(uids); 1572 gCtls->netCtrl.denyProtect(uids);
|
/system/core/storaged/ |
H A D | storaged_utils.cpp | 180 void sort_running_uids_info(std::vector<struct uid_info> &uids) { argument 181 std::sort(uids.begin(), uids.end(), cmp_uid_info); 185 void log_console_running_uids_info(std::vector<struct uid_info> uids) { argument 189 for (const auto& uid : uids) {
|
H A D | storaged_uid_monitor.cpp | 50 static void get_uid_names(const vector<int>& uids, const vector<std::string*>& uid_names) argument 66 binder::Status status = package_mgr->getNamesForUids(uids, &names); 93 vector<int> uids; local 120 uids.push_back(u.uid); 129 if (!uids.empty() && refresh_uid_names) { 130 get_uid_names(uids, uid_names); 136 static const int MAX_UID_RECORDS_SIZE = 1000 * 48; // 1000 uids in 48 hours
|
/system/netd/server/binder/android/net/ |
H A D | INetd.aidl | 38 * @param uids The list of UIDs to allow/deny. 41 boolean firewallReplaceUidChain(String chainName, boolean isWhitelist, in int[] uids);
|
/system/netd/tests/ |
H A D | binder_test.cpp | 165 std::vector<int32_t> uids(kNumUids); 167 uids[i] = randomUid(); 173 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), true, uids, &ret); local 176 EXPECT_EQ((int) uids.size() + 7, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); 177 EXPECT_EQ((int) uids.size() + 13, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str())); 188 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), false, uids, &ret); local 191 EXPECT_EQ((int) uids.size() + 5, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); 192 EXPECT_EQ((int) uids.size() + 5, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str()));
|