Searched refs:uidEnd (Results 1 - 2 of 2) sorted by relevance

/system/netd/server/
H A DUidRanges.cpp58 uid_t uidEnd; local
61 uidEnd = uidStart;
67 uidEnd = strtoul(endPtr, &endPtr, 0);
72 if (uidEnd < uidStart) {
80 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) {
84 mRanges.push_back(UidRange(uidStart, uidEnd));
H A DRouteController.cpp224 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that
230 const char* oif, uid_t uidStart, uid_t uidEnd) {
250 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) {
251 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd);
274 struct fib_rule_uid_range uidRange = { uidStart, uidEnd };
316 const char* oif, uid_t uidStart, uid_t uidEnd) {
318 uidEnd);
466 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, argument
486 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd);
520 uid_t uidEnd, boo
228 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
314 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
518 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
541 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
[all...]

Completed in 69 milliseconds