Searched refs:dynamic (Results 1 – 19 of 19) sorted by relevance
/bionic/tests/libs/ |
D | segment_gap_outer.lds | 2 # This starts off fairly normal: rodata, text, dynamic, data, bss with 9 .dynamic : {*(.dynamic)}
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 19 Our general practice with dynamic linker behavior changes is that they 31 * On a developer preview build, dynamic linker warnings will also show up 40 on the dynamic linker's search path. This meant that apps 44 dynamic linker's caching code cached failures too, so it was necessary 65 in that order. For API 23 and later, for any given library, the dynamic 71 libraries. The M dynamic linker searches the global group followed by 80 `libfoo.so` instead, letting the dynamic linker find the correct library 97 symbol lookup and is now supported by the dynamic linker in API 23 and 104 The dynamic linker now understands the difference 113 `"dir2/libx.so"` --- the dynamic linker couldn’t tell the difference [all …]
|
D | OWNERS | 11 # Still the best reviewer for changes related to the dynamic linker.
|
D | README.md | 4 C library, math library, and dynamic linker. 28 The dynamic linker interface library. This is actually just a bunch of stubs 29 that the dynamic linker replaces with pointers to its own implementation at 41 The dynamic linker. When you run a dynamically-linked executable, its ELF file
|
/bionic/tests/ |
D | link_test.cpp | 156 static r_debug* find_exe_r_debug(ElfW(Dyn)* dynamic) { in find_exe_r_debug() argument 157 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in find_exe_r_debug() 188 ElfW(Dyn)* dynamic; in TEST() 202 .dynamic = find_dynamic({ info->dlpi_phdr, info->dlpi_phnum }, info->dlpi_addr) in TEST() 219 ASSERT_EQ(info.dynamic, map->l_ld); in TEST()
|
D | Android.bp | 677 // Library of all tests (excluding the dynamic linker tests). 800 ldflags: ["-Wl,--export-dynamic"], 1123 "-Wl,--export-dynamic",
|
/bionic/benchmarks/linker_relocation/ |
D | README.md | 3 This benchmark measures the time spent in the dynamic linker to load a large set 15 static and dynamic linkers.
|
D | run_bench_with_ninja.sh | 40 --linker LINKER Run the benchmark using a specific dynamic linker
|
/bionic/linker/ |
D | linker_phdr.h | 56 const ElfW(Dyn)* dynamic() const { return dynamic_; } in ElfW() 139 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic,
|
D | linker_soinfo.h | 175 ElfW(Dyn)* dynamic; 445 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
|
D | linker_phdr.cpp | 1060 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic, in phdr_table_get_dynamic_section() argument 1062 *dynamic = nullptr; in phdr_table_get_dynamic_section() 1066 *dynamic = reinterpret_cast<ElfW(Dyn)*>(load_bias + phdr.p_vaddr); in phdr_table_get_dynamic_section()
|
D | ld.config.format.md | 4 linker-namespace setup for dynamic executables.
|
D | Android.bp | 247 // static_executable. This dynamic linker is actually a shared object linked with static 296 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
|
D | linker_main.cpp | 360 si->dynamic = nullptr; in linker_main() 664 tmp_linker_so.dynamic = nullptr; in __linker_init()
|
D | linker.cpp | 250 map->l_ld = info->dynamic; in notify_gdb_of_load() 1067 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in for_each_dt_needed() 1250 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in load_library() 2775 phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags); in prelink_image() 2784 if (dynamic == nullptr) { in prelink_image() 2791 DEBUG("dynamic = %p", dynamic); in prelink_image() 2819 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image() 3191 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
|
/bionic/docs/ |
D | elf-tls.md | 13 compiler, linker, dynamic loader, and libc. 93 R_TLS_DTPMOD(tls_var), // dynamic TP module ID 94 R_TLS_DTPOFF(tls_var), // dynamic TP offset 100 `R_TLS_DTPMOD` is a dynamic relocation to the index of the module containing `tls_var`, and 101 `R_TLS_DTPOFF` is a dynamic relocation to the offset of `tls_var` within its module's `PT_TLS` 141 // a dynamic relocation against symbol 0 => current module ID 154 variable with a dynamic initializer has an associated TLS guard variable.) 174 // allocated in the .got, resolved at load-time with a dynamic reloc. 255 // allocated in the .got, uses a dynamic relocation 261 The dynamic loader fills in the TLS descriptors. For a reference to a variable allocated in the [all …]
|
/bionic/libc/kernel/uapi/linux/ |
D | elf.h | 117 typedef struct dynamic { struct
|
/bionic/libc/ |
D | Android.bp | 1522 // This is a version of the static C library used by the dynamic linker that exclude malloc. It also
|
D | NOTICE | 5742 dynamic updates in TCP/IP networks by means of the Software. No immunity is
|