Home
last modified time | relevance | path

Searched refs:uidEnd (Results 1 – 2 of 2) sorted by relevance

/system/netd/server/
DUidRanges.cpp58 uid_t uidEnd; in parseFrom() local
61 uidEnd = uidStart; in parseFrom()
67 uidEnd = strtoul(endPtr, &endPtr, 0); in parseFrom()
72 if (uidEnd < uidStart) { in parseFrom()
80 if (uidStart == INVALID_UID || uidEnd == INVALID_UID) { in parseFrom()
84 mRanges.push_back(UidRange(uidStart, uidEnd)); in parseFrom()
DRouteController.cpp235 const char* oif, uid_t uidStart, uid_t uidEnd) { in modifyIpRule() argument
255 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) { in modifyIpRule()
256 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd); in modifyIpRule()
279 struct fib_rule_uid_range uidRange = { uidStart, uidEnd }; in modifyIpRule()
321 const char* oif, uid_t uidStart, uid_t uidEnd) { in modifyIpRule() argument
323 uidEnd); in modifyIpRule()
472 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, in modifyVpnUidRangeRule() argument
492 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule()
526 uid_t uidEnd, bool add) { in modifyExplicitNetworkRule() argument
540 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule()
[all …]