Home
last modified time | relevance | path

Searched refs:user (Results 1 – 19 of 19) sorted by relevance

/bionic/libc/bionic/
Dinitgroups.c35 initgroups (const char *user, gid_t group) in initgroups() argument
42 if (getgrouplist(user, group, groups, &numgroups) < 0) { in initgroups()
46 if (getgrouplist(user,group,groups,&numgroups) < 0) { in initgroups()
/bionic/libc/include/sys/
Duser.h86 struct user { struct
152 struct user {
203 struct user {
/bionic/libc/kernel/uapi/linux/
Datmsap.h72 unsigned char user; member
81 unsigned char user; member
Dnet_dropmon.h47 struct net_dm_config_msg user; member
Dxfrm.h56 __kernel_uid32_t user; member
/bionic/libc/kernel/uapi/linux/netfilter/
Dx_tables.h32 } user; member
47 } user; member
57 {.target.u.user = {.target_size = XT_ALIGN(__size),.name = __name, }, \
/bionic/libc/kernel/tools/
Dkernel.py258 for user in fparser.getHeaderUsers(used):
259 needed[path].add(user)
267 for user in users:
268 self.needed[header].add(user)
/bionic/tests/
Dsys_ptrace_test.cpp134 …ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) << strerror(e… in set_watchpoint()
136 unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr); in set_watchpoint()
147 …ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) << strerror(errn… in set_watchpoint()
322 ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) in set_breakpoint()
325 unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr); in set_breakpoint()
336 ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) in set_breakpoint()
/bionic/docs/
Dfdtrack.md70 is critical to being useful for the initial user, system_server.
D32-bit-abi.md48 flag that should never be set by user code but sometimes is (by zlib,
Dfdsan.md42 …ity vulnerabilities are also possible (e.g. suppose thread two was saving user data to disk when a…
53 ### Enabling fdsan (as a user)
Dlibc_assembler.md118 NOTE: It is assumed that these commands are executed in adb as the shell user
Dclang_fortify_anatomy.md35 increasingly strict versions of it. In general, FORTIFY doesn't require user
135 FORTIFY'ed function from Bionic. From the user's perspective, it supports a few
Delf-tls.md598  ** and should not be used/included by user-serviceable parts of
/bionic/libc/kernel/
DREADME.md27 made into uapi files, but some user space code expects that these
/bionic/
DREADME.md8 See the [user documentation](docs/).
334 a non-root user, so the unit tests must also pass when not run as root.
Dandroid-changes-for-ndk-developers.md144 and reported to the user as space taken up by your app). Any .so file
175 In order to reduce the user impact of this transition, we've identified
/bionic/libc/
DSYSCALLS.TXT20 # been provided, allows the user to specify dispatch style syscalls.
/bionic/libc/malloc_debug/
DREADME.md608 Build fingerprint: 'google/taimen/taimen:8.1.0/OPM2.171026.006.C1/4769658:user/release-keys'