Home
last modified time | relevance | path

Searched refs:uidStart (Results 1 – 2 of 2) sorted by relevance

/system/netd/server/
DUidRanges.cpp81 uid_t uidStart = strtoul(argv[i], &endPtr, 0); in parseFrom() local
85 uidEnd = uidStart; in parseFrom()
96 if (uidEnd < uidStart) { in parseFrom()
104 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) { in parseFrom()
108 mRanges.push_back(makeUidRangeParcel(uidStart, uidEnd)); in parseFrom()
DRouteController.cpp263 const char* iif, const char* oif, uid_t uidStart, in modifyIpRule() argument
284 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) { in modifyIpRule()
285 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd); in modifyIpRule()
289 bool isUidRule = (uidStart != INVALID_UID); in modifyIpRule()
308 struct fib_rule_uid_range uidRange = { uidStart, uidEnd }; in modifyIpRule()
350 const char* oif, uid_t uidStart, uid_t uidEnd) { in modifyIpRule() argument
351 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, in modifyIpRule()
509 [[nodiscard]] static int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, in modifyVpnUidRangeRule() argument
529 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule()
562 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument
[all …]