Searched refs:uidStart (Results 1 - 2 of 2) sorted by relevance
/system/netd/server/ |
H A D | UidRanges.cpp | 57 uid_t uidStart = strtoul(argv[i], &endPtr, 0); local 61 uidEnd = uidStart; 72 if (uidEnd < uidStart) { 80 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) { 84 mRanges.push_back(UidRange(uidStart, uidEnd));
|
H A D | RouteController.cpp | 213 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that 219 const char* oif, uid_t uidStart, uid_t uidEnd) { 239 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) { 240 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd); 244 bool isUidRule = (uidStart != INVALID_UID); 263 struct fib_rule_uid_range uidRange = { uidStart, uidEnd }; 305 const char* oif, uid_t uidStart, uid_t uidEnd) { 306 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, 450 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, argument 470 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEn 217 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument 303 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument 502 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 525 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument [all...] |
Completed in 111 milliseconds