Searched refs:x86 (Results 1 – 25 of 30) sorted by relevance
12
12 __connect; # arm x86 introduced=2120 __epoll_pwait; # arm x86 introduced=2122 __exit; # arm x86 introduced=2123 __fadvise64; # x86 introduced=2125 __fcntl64; # arm x8629 __fgets_chk; # introduced-arm=17 introduced-arm64=21 introduced-x86=17 introduced-x86_64=2141 __fstatfs64; # arm x8644 __getcpu; # arm x86 introduced-arm=12 introduced-x86=1245 __getcwd; # arm x8646 __getpid; # arm x86 introduced=21[all …]
6 atexit; # arm64 x86 x86_64
8 _Znaj; # arm x86 weak9 _ZnajRKSt9nothrow_t; # arm x86 weak12 _Znwj; # arm x86 weak13 _ZnwjRKSt9nothrow_t; # arm x86 weak
168 x86: {170 "arch-x86/bionic/__libc_init_sysinfo.cpp",171 "arch-x86/bionic/__set_tls.cpp",330 x86: {630 x86: {875 x86: {877 "arch-x86/generic/string/memcmp.S",878 "arch-x86/generic/string/strcmp.S",879 "arch-x86/generic/string/strncmp.S",880 "arch-x86/generic/string/strcat.S",[all …]
10 # arch ::= "arm" | "arm64" | "x86" | "x86_64" | "lp32" | "lp64"186 int __fadvise64:fadvise64_64(int, off64_t, off64_t, int) x86263 # sockets for x86. These are done as an "indexed" call to socketcall syscall.264 int __socket:socketcall:1(int, int, int) x86265 int bind:socketcall:2(int, struct sockaddr*, int) x86266 int __connect:socketcall:3(int, struct sockaddr*, socklen_t) x86267 int listen:socketcall:4(int, int) x86268 int getsockname:socketcall:6(int, struct sockaddr*, socklen_t*) x86269 int getpeername:socketcall:7(int, struct sockaddr*, socklen_t*) x86270 int __socketpair:socketcall:8(int, int, int, int*) x86[all …]
19 pid_t vfork:vfork() arm,x86,x86_6431 int open:open(const char*, int, ...) arm,x86,x86_6432 int stat64:stat64(const char*, struct stat64*) arm,x8633 ssize_t readlink:readlink(const char*, char*, size_t) arm,x86,x86_64
30 cabsl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=2375 cprojl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=2385 csqrtl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=23113 feclearexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21114 fedisableexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21115 feenableexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21116 fegetenv; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21117 fegetexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21118 fegetexceptflag; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21119 fegetround; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21[all …]
325 x86: {328 "x86/ceil.S",329 "x86/ceilf.S",330 "x86/floor.S",331 "x86/floorf.S",332 "x86/rint.S",333 "x86/rintf.S",334 "x86/sqrt.S",335 "x86/sqrtf.S",336 "x86/trunc.S",[all …]
59 "-Wl,--exclude-libs=libclang_rt.builtins-x86-android.a",63 // for x86, exclude libgcc_eh.a for the same reasons as above73 x86: {79 version_script: ":libdl.x86.map",151 "-Wl,--exclude-libs=libclang_rt.builtins-x86-android.a",155 // for x86, exclude libgcc_eh.a for the same reasons as above157 x86: {235 name: "libdl.x86.map",236 out: ["libdl.x86.map"],239 cmd: "$(location :bionic-generate-version-script) x86 $(in) $(out)",
31 x86, enumerator124 Arch::x86,131 { Arch::x86, "i686-linux-android" },142 { Arch::x86, 9 },
31 case Arch::x86: in to_string()44 {"x86", Arch::x86},
167 { "introduced_in_x86", { &arch_availability[Arch::x86].introduced } }, in VisitDeclaratorDecl()170 &arch_availability[Arch::x86].introduced } }, in VisitDeclaratorDecl()
3 foo; # arm x864 bar; # x86
92 x86: {93 srcs: ["prebuilt-elf-files/x86/libtest_invalid-rw_load_segment.so"],115 x86: {116 srcs: ["prebuilt-elf-files/x86/libtest_invalid-unaligned_shdr_offset.so"],138 x86: {139 srcs: ["prebuilt-elf-files/x86/libtest_invalid-zero_shentsize.so"],161 x86: {162 srcs: ["prebuilt-elf-files/x86/libtest_invalid-zero_shstrndx.so"],184 x86: {185 srcs: ["prebuilt-elf-files/x86/libtest_invalid-empty_shdr_table.so"],[all …]
20 if [ ${HOST_OS}-${HOST_ARCH} = linux-x86 -o ${HOST_OS}-${HOST_ARCH} = linux-x86_64 ]; then25 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then
19 ifeq ($(HOST_OS)-$(HOST_ARCH),$(filter $(HOST_OS)-$(HOST_ARCH),linux-x86 linux-x86_64))
19 if [ ${HOST_OS}-${HOST_ARCH} = linux-x86 -o ${HOST_OS}-${HOST_ARCH} = linux-x86_64 ]; then23 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then
325 x86, x86-64).352 x86 | yes | yes | yes361 x86 (experimental) | yes | yes | unsupported relocs388 LLDB more-or-less implemented Linux TLS debugging in [r192922][rL192922] ([D1944]) for x86 and389 x86-64. [arm64 support came later][D5073]. However, the Linux TLS functionality no longer does440 There are ptrace interfaces for reading the thread pointer for each of arm32, arm64, x86, and x86-64476 * On arm32, x86, and x86_64, the loader [should reject a TLS relocation]. (XXX: I haven't verified610 by GCC on x86 (and x86-64), where it is compatible with x86's TLS variant 2. We [modified Clang625 * On x86/x86-64, it uses a fixed offset from the thread pointer (TP+0xf8 or TP+0x1d0) and630 * x86: https://go-review.googlesource.com/c/go/+/16678[all …]
66 x86: {199 "arch/x86/begin.S",215 x86: { version_script: "linker.generic.map" },236 x86: {382 "-Wl,--exclude-libs=libclang_rt.builtins-x86-android.a",386 // for x86, exclude libgcc_eh.a for the same reasons as above388 x86: {
97 // When this binary is installed to host/linux-x86/bin, its runpath is ${ORIGIN}/../lib64, which98 // is fine for finding host/linux-x86/lib64/libc++.so. When it's installed to99 // host/linux-x86/benchmarktest64/bionic-spawn-benchmarks, the runpath needs an extra "..".
1 versioner headers -p platforms -r arm -r x86 -a 9 -i
1 versioner headers dependencies -p platforms -r arm -r x86 -a 9
28 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then