Searched refs:uidEnd (Results 1 - 2 of 2) sorted by relevance

/system/netd/server/
H A DUidRanges.cpp46 uid_t uidEnd; local
49 uidEnd = uidStart;
55 uidEnd = strtoul(endPtr, &endPtr, 0);
60 if (uidEnd < uidStart) {
68 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) {
72 mRanges.push_back(Range(uidStart, uidEnd));
H A DRouteController.cpp261 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that
267 const char* oif, uid_t uidStart, uid_t uidEnd) {
287 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) {
288 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd);
326 { &uidEnd, isUidRule ? sizeof(uidEnd) : 0 },
348 const char* oif, uid_t uidStart, uid_t uidEnd) {
350 uidEnd);
490 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, argument
510 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd);
265 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
346 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
[all...]

Completed in 47 milliseconds