Lines Matching refs:uidStart
236 const char* oif, uid_t uidStart, uid_t uidEnd) { in modifyIpRule() argument
256 if ((uidStart == INVALID_UID) != (uidEnd == INVALID_UID)) { in modifyIpRule()
257 ALOGE("incompatible start and end UIDs (%u vs %u)", uidStart, uidEnd); in modifyIpRule()
261 bool isUidRule = (uidStart != INVALID_UID); in modifyIpRule()
280 struct fib_rule_uid_range uidRange = { uidStart, uidEnd }; in modifyIpRule()
322 const char* oif, uid_t uidStart, uid_t uidEnd) { in modifyIpRule() argument
323 return modifyIpRule(action, priority, FR_ACT_TO_TBL, table, fwmark, mask, iif, oif, uidStart, in modifyIpRule()
480 WARN_UNUSED_RESULT int modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, in modifyVpnUidRangeRule() argument
500 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule()
533 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule() argument
548 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule()
556 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules() argument
567 if (uidStart == INVALID_UID && uidEnd == INVALID_UID) { in modifyOutputInterfaceRules()
576 fwmark.intValue, mask.intValue, IIF_LOOPBACK, interface, uidStart, uidEnd); in modifyOutputInterfaceRules()