Home
last modified time | relevance | path

Searched refs:linked (Results 1 – 7 of 7) sorted by relevance

/bionic/linker/
Dld.config.format.md65 # This declares linked namespaces - comma separated list.
69 # default namespace but loaded in the linked namespace.
DAndroid.bp247 // static_executable. This dynamic linker is actually a shared object linked with static
Dlinker.cpp1747 bool linked = local_group.visit([&](soinfo* si) { in find_libraries() local
1771 if (!linked) { in find_libraries()
/bionic/tests/
DAndroid.bp1026 // Tests for the device linked against bionic's static library. Run with:
1070 // Tests to run on the host and linked against glibc. Run with:
/bionic/docs/
Delf-tls.md335 object file compiled with `-fpic` is linked into an executable, the linker could relax GD accesses
577 The dynamic loader currently can't use ELF TLS, so any part of libc linked into the loader (i.e.
729 * Binaries linked with the flag crash on non-Bionic, and binaries without the flag crash on Bionic.
777 * statically-linked executables still need another workaround
787 This workaround doesn't help with statically-linked executables, but they're probably less of a
/bionic/
DREADME.md41 The dynamic linker. When you run a dynamically-linked executable, its ELF file
/bionic/libc/
DAndroid.bp789 // The following must not be statically linked into libc_ndk.a, because