Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 48) sorted by relevance

12

/bionic/libc/bionic/
Daccess.cpp32 int access(const char* path, int mode) { in access() function
Dbionic_arc4random.cpp42 static bool have_urandom = access("/dev/urandom", R_OK) == 0; in __libc_safe_arc4random_buf()
Dftw.cpp66 if (postorder || access(cur->fts_path, R_OK) == -1) continue; in do_nftw()
/bionic/libc/system_properties/
Dcontexts_split.cpp270 if (access("/system/etc/selinux/plat_property_contexts", R_OK) != -1) { in InitializeProperties()
277 if (access("/vendor/etc/selinux/vendor_property_contexts", R_OK) != -1) { in InitializeProperties()
287 if (access("/vendor_property_contexts", R_OK) != -1) { in InitializeProperties()
Dcontext_node.cpp93 return access(filename, R_OK) == 0; in CheckAccess()
Dsystem_properties.cpp76 if (access("/dev/__properties__/property_info", R_OK) == 0) { in Init()
/bionic/libc/
DSECCOMP_WHITELIST_APP.TXT10 int access:access(const char *pathname, int mode) lp32
/bionic/benchmarks/linker_relocation/gen/
Dliblinker_reloc_bench_009.S28 CALL(access)
Dliblinker_reloc_bench_023.S227 CALL(access)
Dliblinker_reloc_bench_081.S265 CALL(access)
Dliblinker_reloc_bench_076.S294 CALL(access)
Dliblinker_reloc_bench_031.S362 CALL(access)
/bionic/libc/kernel/uapi/rdma/
Dsiw-abi.h103 __aligned_u64 access; member
Drdma_user_rxe.h82 __u32 access; member
/bionic/docs/
Delf-tls.md58 address using a TLS "access model". The access models trade generality against efficiency. The four
70 A GD access can refer to a TLS variable anywhere. To access a variable `tls_var` using the
187 part of the executable (and referenced from the executable), then a GOT access can be avoided. The
199 The compiler selects an access model for each variable reference using these factors:
289 need to use an atomic or synchronized access of the global TLS generation counter.
320 The static linker can still relax a TLSDESC-based access to an IE/LE access.
336 to IE or LE. To relax a TLS access, the linker looks for an expected sequences of instructions and
364 arm32 linkers can't relax traditional TLS accesses. BFD can relax an arm32 TLSDESC access, but LLD
422 dynamic symbol table). Debuggers can access them, but applications can't.
434 read past the end of an out-of-date DTV or access an unloaded module. To be robust, it needs to
[all …]
/bionic/linker/
DAndroid.bp49 // We need to access Bionic private headers in the linker.
108 // We need to access Bionic private headers in the linker.
436 // We need to access Bionic private headers in the linker.
Dlinker_utils.cpp258 static bool ret = (getpid() == 1 && access("/proc/self/exe", F_OK) == -1); in is_first_stage_init()
Dlinker_config.cpp242 if (access(value.c_str(), R_OK) != 0) { in parse_config_file()
/bionic/tests/
Dftw_test.cpp66 if (access(fpath, R_OK) == 0) { in sanity_check_ftw()
/bionic/libc/include/
Dunistd.h206 int access(const char* __path, int __mode);
/bionic/libc/kernel/uapi/sound/
Dasoc.h188 __le32 access; member
Dasound.h725 unsigned int access; member
/bionic/tests/headers/posix/
Dunistd_h.c288 FUNCTION(access, int (*f)(const char*, int)); in unistd_h()
/bionic/libc/tools/
Dposix-2013.txt15 access
Dpylintrc60 # note). You have access to the variables errors warning, statement which

12