Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 41) sorted by relevance

12

/bionic/libc/upstream-openbsd/lib/libc/string/
Dstpcpy.c40 stpcpy(char *to, const char *from) in stpcpy() argument
42 for (; (*to = *from) != '\0'; ++from, ++to); in stpcpy()
Dstrcpy.c40 strcpy(char *to, const char *from) in strcpy() argument
44 for (; (*to = *from) != '\0'; ++from, ++to); in strcpy()
/bionic/libc/upstream-freebsd/lib/libc/string/
Dwcpcpy.c43 wcpcpy(wchar_t * __restrict to, const wchar_t * __restrict from) in wcpcpy() argument
46 for (; (*to = *from); ++from, ++to); in wcpcpy()
/bionic/libdl/
DAndroid.bp45 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from
47 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so
48 // to provide those symbols, but will instead pull them from libgcc.a. Specifically,
49 // we use this property to make sure libc.so has its own copy of the code from
137 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from
139 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so
140 // to provide those symbols, but will instead pull them from libgcc.a. Specifically,
141 // we use this property to make sure libc.so has its own copy of the code from
DNOTICE31 "Object" form shall mean any form resulting from mechanical
42 form, that is based on (or derived from) the Work and for which the
46 separable from, or merely link (or bind by name) to the interfaces of,
103 attribution notices from the Source form of the Work,
120 or as an addendum to the NOTICE text from the Work, provided
/bionic/tests/
Ddlext_private.h94 extern bool android_link_namespaces(android_namespace_t* from,
98 extern bool android_link_namespaces_all_libs(android_namespace_t* from,
/bionic/
DREADME.md83 # files written by us and files taken from BSD.
88 # generate_uapi_headers.sh script should be used to go from a kernel tree to
91 # scrubbed headers from external/kernel-headers/.
97 # Contains the DNS resolver (originates from NetBSD code).
182 1. Use generate_uapi_headers.sh to go from a Linux source tree to appropriate
211 The tests are all built from the tests/ directory.
284 ### Coverage from device tests
294 `acov` will pull all coverage information from the device, push it to the right
297 ### Coverage from host tests
311 tests failures from impacting other tests. This also has the added benefit of
[all …]
Dandroid-changes-for-ndk-developers.md60 With API 22, load order switched from depth-first to breadth-first to
131 ## Opening shared libraries directly from an APK
133 In API level 23 and above, it’s possible to open a .so file directly from
136 older releases, the .so files were extracted from the APK file
140 that you want to load directly from your APK must be page aligned
144 Note that in API level 23 and above dlopen(3) will open a library from
167 as many developers found when Android 6.0 Marshmallow switched from
171 a set of libraries that see significant use from Google Play's
198 *Potential problems*: starting from API 24 the dynamic linker will not
199 load private libraries, preventing the application from loading.
[all …]
/bionic/libc/malloc_debug/
DREADME_api.md5 used to gather this data from a process. This tracking can be enabled using
47 The calls from within the malloc debug library are automatically removed.
57 if this allocation was created in a process forked from the Zygote process.
DREADME.md33 Before, a realloc from one size to a smaller size would not update the
122 are not spawned from a zygote process.
159 When this value is changed from the default, then the filename chosen
199 separate from the backtrace option, and happens automatically if this
205 When the list is full, an allocation is removed from the list and is
488 zygote process or in a process not spawned from the zygote. 1 means this
489 was allocated by an application after it forked off from the zygote process.
504 The second allocation record was create by an application spawned from the
561 FUNCTION\_OFFSET the hexadecimal offset from the beginning of the function. If
628 Any process spawned from this shell will run with malloc debug enabled
[all …]
/bionic/linker/
Dld.config.format.md28 # The following line maps section to a dir. Binaries ran from this location will use namespaces
68 # For every link define list of shared libraries. This is list of the libraries accessible from
83 # This defines what libraries are allowed to be loaded from ns1
DAndroid.bp295 // of __gnu_Unwind_Find_exidx from libc. An unresolved weak reference would create a
368 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from
370 // a) pull symbols from libgcc.a and b) depend on ld-android.so will not rely on ld-android.so
371 // to provide those symbols, but will instead pull them from libgcc.a. Specifically,
372 // we use this property to make sure libc.so has its own copy of the code from
/bionic/libc/kernel/uapi/linux/netfilter/
Dxt_connbytes.h34 __aligned_u64 from; member
/bionic/libc/kernel/uapi/linux/
Diso_fs.h23 #define ISODCL(from,to) (to - from + 1) argument
Dnbd.h55 __be64 from; member
Duserfaultfd.h59 __u64 from; member
/bionic/docs/
D32-bit-abi.md9 `fseeko` and `ftello` available. Instead they're always available from API
18 function `lseek64` were available right from the beginning in API 3. Secondly,
26 it became available for the platform, it wasn't available from the NDK until
95 times to/from the kernel, but we do not plan on adding support for
Delf-tls.md23 TLS Block". TLS variables within the Static TLS Block exist at fixed offsets from an
48 from TP is implementation-defined.
159 object), then its offset from the TP is known at load-time. The variable can be accessed with a few
187 part of the executable (and referenced from the executable), then a GOT access can be avoided. The
232 The code fragments above match the "traditional" TLS design from Drepper's document. For the GD and
375 gdb uses a libthread_db plugin library to retrieve thread-related information from a target. This
401 Both debuggers need metadata from the threading library (`libc.so` / `libpthread.so`) to find TLS
407 > expose the structure of the DTV via metadata exported as symbols from the .so itself, designed
416 `_thread_db_pthread_dtvp` | Offset from TP to DTV pointer (0 for variant 1, implementation-…
532 the prototype uses a [special function pointer] to call libc.so's `__tls_get_addr` from the loader.
[all …]
/bionic/tests/libs/
Dsegment_gap_outer.lds14 # Now create the gap. We need a text segment first to prevent the linker from
DAndroid.bp179 // Libraries used by dlext tests for open from a zip-file
317 // does not expose symbols from dependent library (libnstest_public_internal.so)
325 // libnstest_dlopened.so (library in private namespace dlopened from libnstest_root.so)
546 // is already loaded using the correct DT_RUNPATH from library B.
572 // D version for open-from-zip test with runpath
954 // which forces libtest_versioned_uselibv1 to use function v1 from
1175 // Library using symbol from libdl_test_df_1_global
/bionic/libc/
DNOTICE13 derived from this software without specific prior written permission.
39 be used to endorse or promote products derived from this software
192 written by Steven G. Kargl with input from Bruce D. Evans
240 may be used to endorse or promote products derived from this software
269 may be used to endorse or promote products derived from this software
522 products derived from this software without specific prior written
1086 may be used to endorse or promote products derived from this software
1134 may be used to endorse or promote products derived from this software
1154 All or some portions of this file are derived from material licensed
1168 may be used to endorse or promote products derived from this software
[all …]
DAndroid.bp196 // from the linker before ifunc resolvers have made string.h functions available.
1620 // those new libraries from libgcc.a are not declared external; if that were the case,
1621 // then libc would not pull those symbols from libgcc.a as it should, instead relying
1622 // on the external symbols from the dependent libraries. That would create a "cloaked"
1786 "com.android.art.release", // from libdexfile_external
1787 "com.android.art.debug", // from libdexfile_external
2111 from: "include",
2118 from: "kernel/uapi",
2137 from: "kernel/android/uapi/linux",
2145 from: "kernel/android/scsi/scsi",
[all …]
/bionic/libc/arch-x86/bionic/
Dsyscall.S36 # Load all the arguments from the calling frame.
/bionic/benchmarks/linker_relocation/
DREADME.md10 run the benchmark from `/data/benchmarktest[64]/linker-reloc-bench`.
/bionic/libc/kernel/
DREADME.md15 They can be included from C++, or when compiling code in strict ANSI mode.
45 Automatically update all clean headers from the content of

12