Searched refs:uidEnd (Results 1 - 2 of 2) sorted by relevance

/system/netd/server/
H A DUidRanges.cpp58 uid_t uidEnd; local
61 uidEnd = uidStart;
67 uidEnd = strtoul(endPtr, &endPtr, 0);
72 if (uidEnd < uidStart) {
80 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) {
84 mRanges.push_back(UidRange(uidStart, uidEnd));
H A DRouteController.cpp229 // + If |uidStart| and |uidEnd| are not INVALID_UID, the rule matches packets from UIDs in that
235 const char* oif, uid_t uidStart, uid_t uidEnd) {
255 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) {
256 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd);
279 struct fib_rule_uid_range uidRange = { uidStart, uidEnd };
321 const char* oif, uid_t uidStart, uid_t uidEnd) {
323 uidEnd);
472 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, argument
492 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd);
526 uid_t uidEnd, boo
233 modifyIpRule(uint16_t action, uint32_t priority, uint8_t ruleType, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
319 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask, const char* iif, const char* oif, uid_t uidStart, uid_t uidEnd) argument
524 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
547 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
[all...]

Completed in 94 milliseconds