/bionic/libc/upstream-openbsd/lib/libc/string/ |
D | stpcpy.c | 40 stpcpy(char *to, const char *from) in stpcpy() argument 42 for (; (*to = *from) != '\0'; ++from, ++to); in stpcpy()
|
D | strcpy.c | 40 strcpy(char *to, const char *from) in strcpy() argument 44 for (; (*to = *from) != '\0'; ++from, ++to); in strcpy()
|
/bionic/libc/upstream-freebsd/lib/libc/string/ |
D | wcpcpy.c | 43 wcpcpy(wchar_t * __restrict to, const wchar_t * __restrict from) in wcpcpy() argument 46 for (; (*to = *from); ++from, ++to); in wcpcpy()
|
/bionic/libdl/ |
D | Android.bp | 45 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 47 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so 48 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 49 // we use this property to make sure libc.so has its own copy of the code from 137 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 139 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so 140 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 141 // we use this property to make sure libc.so has its own copy of the code from
|
D | NOTICE | 31 "Object" form shall mean any form resulting from mechanical 42 form, that is based on (or derived from) the Work and for which the 46 separable from, or merely link (or bind by name) to the interfaces of, 103 attribution notices from the Source form of the Work, 120 or as an addendum to the NOTICE text from the Work, provided
|
/bionic/tests/ |
D | dlext_private.h | 94 extern bool android_link_namespaces(android_namespace_t* from, 98 extern bool android_link_namespaces_all_libs(android_namespace_t* from,
|
/bionic/ |
D | README.md | 83 # files written by us and files taken from BSD. 88 # generate_uapi_headers.sh script should be used to go from a kernel tree to 91 # scrubbed headers from external/kernel-headers/. 97 # Contains the DNS resolver (originates from NetBSD code). 182 1. Use generate_uapi_headers.sh to go from a Linux source tree to appropriate 211 The tests are all built from the tests/ directory. 284 ### Coverage from device tests 294 `acov` will pull all coverage information from the device, push it to the right 297 ### Coverage from host tests 311 tests failures from impacting other tests. This also has the added benefit of [all …]
|
D | android-changes-for-ndk-developers.md | 60 With API 22, load order switched from depth-first to breadth-first to 131 ## Opening shared libraries directly from an APK 133 In API level 23 and above, it’s possible to open a .so file directly from 136 older releases, the .so files were extracted from the APK file 140 that you want to load directly from your APK must be page aligned 144 Note that in API level 23 and above dlopen(3) will open a library from 167 as many developers found when Android 6.0 Marshmallow switched from 171 a set of libraries that see significant use from Google Play's 198 *Potential problems*: starting from API 24 the dynamic linker will not 199 load private libraries, preventing the application from loading. [all …]
|
/bionic/libc/malloc_debug/ |
D | README_api.md | 5 used to gather this data from a process. This tracking can be enabled using 47 The calls from within the malloc debug library are automatically removed. 57 if this allocation was created in a process forked from the Zygote process.
|
D | README.md | 33 Before, a realloc from one size to a smaller size would not update the 122 are not spawned from a zygote process. 159 When this value is changed from the default, then the filename chosen 199 separate from the backtrace option, and happens automatically if this 205 When the list is full, an allocation is removed from the list and is 488 zygote process or in a process not spawned from the zygote. 1 means this 489 was allocated by an application after it forked off from the zygote process. 504 The second allocation record was create by an application spawned from the 561 FUNCTION\_OFFSET the hexadecimal offset from the beginning of the function. If 628 Any process spawned from this shell will run with malloc debug enabled [all …]
|
/bionic/linker/ |
D | ld.config.format.md | 28 # The following line maps section to a dir. Binaries ran from this location will use namespaces 68 # For every link define list of shared libraries. This is list of the libraries accessible from 83 # This defines what libraries are allowed to be loaded from ns1
|
D | Android.bp | 295 // of __gnu_Unwind_Find_exidx from libc. An unresolved weak reference would create a 368 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from 370 // a) pull symbols from libgcc.a and b) depend on ld-android.so will not rely on ld-android.so 371 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 372 // we use this property to make sure libc.so has its own copy of the code from
|
/bionic/libc/kernel/uapi/linux/netfilter/ |
D | xt_connbytes.h | 34 __aligned_u64 from; member
|
/bionic/libc/kernel/uapi/linux/ |
D | iso_fs.h | 23 #define ISODCL(from,to) (to - from + 1) argument
|
D | nbd.h | 55 __be64 from; member
|
D | userfaultfd.h | 59 __u64 from; member
|
/bionic/docs/ |
D | 32-bit-abi.md | 9 `fseeko` and `ftello` available. Instead they're always available from API 18 function `lseek64` were available right from the beginning in API 3. Secondly, 26 it became available for the platform, it wasn't available from the NDK until 95 times to/from the kernel, but we do not plan on adding support for
|
D | elf-tls.md | 23 TLS Block". TLS variables within the Static TLS Block exist at fixed offsets from an 48 from TP is implementation-defined. 159 object), then its offset from the TP is known at load-time. The variable can be accessed with a few 187 part of the executable (and referenced from the executable), then a GOT access can be avoided. The 232 The code fragments above match the "traditional" TLS design from Drepper's document. For the GD and 375 gdb uses a libthread_db plugin library to retrieve thread-related information from a target. This 401 Both debuggers need metadata from the threading library (`libc.so` / `libpthread.so`) to find TLS 407 > expose the structure of the DTV via metadata exported as symbols from the .so itself, designed 416 `_thread_db_pthread_dtvp` | Offset from TP to DTV pointer (0 for variant 1, implementation-… 532 the prototype uses a [special function pointer] to call libc.so's `__tls_get_addr` from the loader. [all …]
|
/bionic/tests/libs/ |
D | segment_gap_outer.lds | 14 # Now create the gap. We need a text segment first to prevent the linker from
|
D | Android.bp | 179 // Libraries used by dlext tests for open from a zip-file 317 // does not expose symbols from dependent library (libnstest_public_internal.so) 325 // libnstest_dlopened.so (library in private namespace dlopened from libnstest_root.so) 546 // is already loaded using the correct DT_RUNPATH from library B. 572 // D version for open-from-zip test with runpath 954 // which forces libtest_versioned_uselibv1 to use function v1 from 1175 // Library using symbol from libdl_test_df_1_global
|
/bionic/libc/ |
D | NOTICE | 13 derived from this software without specific prior written permission. 39 be used to endorse or promote products derived from this software 192 written by Steven G. Kargl with input from Bruce D. Evans 240 may be used to endorse or promote products derived from this software 269 may be used to endorse or promote products derived from this software 522 products derived from this software without specific prior written 1086 may be used to endorse or promote products derived from this software 1134 may be used to endorse or promote products derived from this software 1154 All or some portions of this file are derived from material licensed 1168 may be used to endorse or promote products derived from this software [all …]
|
D | Android.bp | 196 // from the linker before ifunc resolvers have made string.h functions available. 1620 // those new libraries from libgcc.a are not declared external; if that were the case, 1621 // then libc would not pull those symbols from libgcc.a as it should, instead relying 1622 // on the external symbols from the dependent libraries. That would create a "cloaked" 1786 "com.android.art.release", // from libdexfile_external 1787 "com.android.art.debug", // from libdexfile_external 2111 from: "include", 2118 from: "kernel/uapi", 2137 from: "kernel/android/uapi/linux", 2145 from: "kernel/android/scsi/scsi", [all …]
|
/bionic/libc/arch-x86/bionic/ |
D | syscall.S | 36 # Load all the arguments from the calling frame.
|
/bionic/benchmarks/linker_relocation/ |
D | README.md | 10 run the benchmark from `/data/benchmarktest[64]/linker-reloc-bench`.
|
/bionic/libc/kernel/ |
D | README.md | 15 They can be included from C++, or when compiling code in strict ANSI mode. 45 Automatically update all clean headers from the content of
|