diff options
| author | 2016-04-30 09:19:50 +0000 | |
|---|---|---|
| committer | 2016-04-30 09:19:51 +0000 | |
| commit | 6d1a776c26206ea44339f19e13b413aa7d25bd6d (patch) | |
| tree | e11d541efdee6ff062861794e41f70985c33cc36 | |
| parent | e7fefcb5650afddff544c008bc06ce748f635727 (diff) | |
| parent | 3fef7230d2d4c9e8bd49e52e7f319303f2867177 (diff) | |
Merge "Address review comments on ag/962875." into nyc-dev
| -rw-r--r-- | services/core/java/com/android/server/NetworkManagementService.java | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/services/core/java/com/android/server/NetworkManagementService.java b/services/core/java/com/android/server/NetworkManagementService.java index 9fc17a2a3a29..d73b06b07584 100644 --- a/services/core/java/com/android/server/NetworkManagementService.java +++ b/services/core/java/com/android/server/NetworkManagementService.java @@ -2048,13 +2048,13 @@ public class NetworkManagementService extends INetworkManagementService.Stub } } - private void closeSocketsForFirewallChain(int chain, String chainName) { + private void closeSocketsForFirewallChainLocked(int chain, String chainName) { // UID ranges to close sockets on. UidRange[] ranges; // UID ranges whose sockets we won't touch. int[] exemptUids; - SparseIntArray rules = getUidFirewallRules(chain); + final SparseIntArray rules = getUidFirewallRules(chain); int numUids = 0; if (getFirewallType(chain) == FIREWALL_TYPE_WHITELIST) { @@ -2119,7 +2119,7 @@ public class NetworkManagementService extends INetworkManagementService.Stub mFirewallChainStates.put(chain, enable); final String operation = enable ? "enable_chain" : "disable_chain"; - String chainName; + final String chainName; switch(chain) { case FIREWALL_CHAIN_STANDBY: chainName = FIREWALL_CHAIN_NAME_STANDBY; @@ -2146,7 +2146,7 @@ public class NetworkManagementService extends INetworkManagementService.Stub // whitelist and blacklist chains allow RSTs through. if (enable) { if (DBG) Slog.d(TAG, "Closing sockets after enabling chain " + chainName); - closeSocketsForFirewallChain(chain, chainName); + closeSocketsForFirewallChainLocked(chain, chainName); } } } |