/bionic/libc/bionic/ |
D | initgroups.c | 35 initgroups (const char *user, gid_t group) in initgroups() argument 42 if (getgrouplist(user, group, groups, &numgroups) < 0) { in initgroups() 46 if (getgrouplist(user,group,groups,&numgroups) < 0) { in initgroups()
|
/bionic/libc/kernel/uapi/linux/ |
D | atmsap.h | 72 unsigned char user; member 81 unsigned char user; member
|
D | net_dropmon.h | 47 struct net_dm_config_msg user; member
|
D | xfrm.h | 56 __kernel_uid32_t user; member
|
/bionic/libc/include/sys/ |
D | user.h | 87 struct user { struct 153 struct user { 177 struct user { 220 struct user {
|
/bionic/libc/kernel/uapi/linux/netfilter/ |
D | x_tables.h | 32 } user; member 47 } user; member 57 {.target.u.user = {.target_size = XT_ALIGN(__size),.name = __name, }, \
|
/bionic/libc/kernel/tools/ |
D | kernel.py | 259 for user in fparser.getHeaderUsers(used): 260 needed[path].add(user) 268 for user in users: 269 self.needed[header].add(user)
|
/bionic/tests/ |
D | sys_ptrace_test.cpp | 128 …ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) << strerror(e… in set_watchpoint() 130 unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr); in set_watchpoint() 141 …ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) << strerror(errn… in set_watchpoint() 309 ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) in set_breakpoint() 312 unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr); in set_breakpoint() 323 ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) in set_breakpoint()
|
/bionic/libc/ |
D | SECCOMP_WHITELIST_SYSTEM.TXT | 20 # been provided, allows the user to specify dispatch style syscalls.
|
D | SECCOMP_BLACKLIST_COMMON.TXT | 23 # been provided, allows the user to specify dispatch style syscalls.
|
D | SECCOMP_WHITELIST_APP.TXT | 20 # been provided, allows the user to specify dispatch style syscalls.
|
D | SECCOMP_BLACKLIST_APP.TXT | 23 # been provided, allows the user to specify dispatch style syscalls.
|
D | SECCOMP_WHITELIST_COMMON.TXT | 20 # been provided, allows the user to specify dispatch style syscalls.
|
D | SYSCALLS.TXT | 19 # been provided, allows the user to specify dispatch style syscalls.
|
D | Android.bp | 1453 // include malloc. It's useful in situations when the user wants
|
/bionic/tools/bionicbb/ |
D | README.md | 72 If the buildbot has applied Verified-1 to a patchset, the user may add their own
|
/bionic/docs/ |
D | 32-bit-abi.md | 48 flag that should never be set by user code but sometimes is (by zlib,
|
D | fdsan.md | 38 …ity vulnerabilities are also possible (e.g. suppose thread two was saving user data to disk when a… 49 ### Enabling fdsan (as a user)
|
D | libc_assembler.md | 117 NOTE: It is assumed that these commands are executed in adb as the shell user
|
D | elf-tls.md | 598 ** and should not be used/included by user-serviceable parts of
|
/bionic/ |
D | README.md | 8 See the [user documentation](docs/). 238 a non-root user, so the unit tests must also pass when not run as root.
|
D | android-changes-for-ndk-developers.md | 124 and reported to the user as space taken up by your app). Any .so file 155 In order to reduce the user impact of this transition, we've identified
|
/bionic/libc/malloc_debug/ |
D | README.md | 536 Build fingerprint: 'google/taimen/taimen:8.1.0/OPM2.171026.006.C1/4769658:user/release-keys'
|