Home
last modified time | relevance | path

Searched refs:that (Results 1 – 25 of 37) sorted by relevance

12

/bionic/linker/
Dlinked_list.h44 LinkedListIterator(const LinkedListIterator<T>& that) : entry_(that.entry_) {} in LinkedListIterator() argument
47 LinkedListIterator<T>& operator=(const LinkedListIterator<T>& that) {
48 entry_ = that.entry_;
61 bool operator==(const LinkedListIterator<T>& that) const {
62 return entry_ == that.entry_;
65 bool operator!=(const LinkedListIterator<T>& that) const {
66 return entry_ != that.entry_;
87 LinkedList(LinkedList&& that) noexcept { in LinkedList() argument
88 this->head_ = that.head_; in LinkedList()
89 this->tail_ = that.tail_; in LinkedList()
[all …]
DAndroid.bp25 // each binary. There's a linker script that sets all of that up (generated by
217 // Leave the symbols in the shared library so that stack unwinders can produce
311 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from
312 // libgcc.a are made static to ld-android.so. This in turn ensures that libraries that
399 // Parts of the linker that we're testing.
/bionic/docs/
Dlibc_assembler.md9 verify that the routine is being properly tested.
10 * Rerun the benchmarks using the updated image that uses the code for
13 * Verify that unwind information for new routine looks sane. See the [Unwind Info](#unwind-info) se…
16 Make sure that you benchmark both the big and little cores to verify that
61 The last argument is the name of the one function that you want to
65 **bionic/benchmarks/suites**. Look at the examples in that file to see
66 how to add a benchmark for a function that doesn't already exist.
93 that if the device does not get up to the maximum cpu frequency, the results
98 Another potential issue is that the device can overheat when running the
100 or choose a device that is less likely to overheat. To detect these kind
[all …]
D32-bit-abi.md6 that use `off_t` to working on files no larger than 2GiB.
20 all you need are functions like `read` that don't take/return `off_t`, large
28 compiled with that was actually using a 32-bit `off_t`. With a new enough NDK,
30 all functions that take an `off_t` become unavailable. You've asked for their
35 [linker map](libc/libc.map.txt) for full details. Note also that in NDK r16 and
38 that's often needed. This means that code using `_FILE_OFFSET_BITS=64`
39 and `mmap` (but no other functions that are unavailable at your target
46 aren't aware that `_FILE_OFFSET_BITS` is set. You might also have to
48 flag that should never be set by user code but sometimes is (by zlib,
50 doesn't compile, you can insert this just before the line that's failing
[all …]
Dfdsan.md38 Assertion failures are probably the most innocuous result that can arise from these bugs: silent da…
43 …ile descriptor with an owner; if someone tries to close a file descriptor that they don't own, dep…
45that identifies the type of the owner (`enum android_fdan_owner_type` in [`<android/fdsan.h>`](htt…
47 If a file descriptor that's been marked with a tag is closed with an incorrect tag, or without a ta…
63 …ror is proportional to the percentage of file descriptors in your process that are tagged with an …
68 Let's look at a simple contrived example that uses sleeps to force a particular interleaving of thr…
136 This implies that either we're accidentally closing out file descriptor too early, or someone else …
158 Now that we've guarded the file descriptor with fdsan, we should be able to find where the double c…
186 …hen tracking down double-closes in processes that have sparse fdsan coverage. What actually happen…
227 …ed types like `unique_fd` and `ParcelFileDescriptor`, to improve the odds that double closes in ot…
[all …]
Dstatus.md52 * `aligned_alloc` correctly verifies that `size` is a multiple of `alignment`.
252 Note that this doesn't change behavior as much as you might think: the
254 the lookup, so there was still a race between that and the dereference
255 in the caller, given that callers actually need the tid to pass to some
280 use `pthread_gettid_np` at some point that you know the thread to be
289 POSIX says that `sem_wait` can be interrupted by delivery of a
291 bug we found that existing code relied on the old behavior. To preserve
303 Note that in recent releases Android's FORTIFY has been extended to
317 need to manually enable FORTIFY by setting that themselves in whatever
/bionic/
DREADME.md29 that the dynamic linker replaces with pointers to its own implementation at
35 thread-safe static initialization and the like, so it just calls functions that
42 has a `DT_INTERP` entry that says "use the following program to start me". On
43 Android, that's either `linker` or `linker64` (depending on whether it's a
45 into memory and resolving references to symbols (so that when your code tries to
69 # Each architecture has its own subdirectory for stuff that isn't shared
70 # because it's architecture-specific. There will be a .mk file in here that
117 # because the Linux kernel interface is sufficiently different that we
119 # legacy mess that needs to be sorted out, either by replacing it with
124 # The code that implements the functionality to enable debugging of
[all …]
Dandroid-changes-for-ndk-developers.md16 Our general practice with dynamic linker behavior changes is that they
24 * Warnings about any behavior change that will affect a library if you
25 increase your target API level will appear in logcat when that library
26 is loaded, even if you're not yet targeting that API level.
29 as toasts. Experience has shown that many developers don’t habitually
37 on the dynamic linker's search path. This meant that apps
58 in that order. For API 23 and later, for any given library, the dynamic
65 the local group. This allows ASAN, for example, to ensure that it can
72 correctly in API 23 and later. Note that RTLD_LOCAL is the default,
73 so even calls to dlopen(3) that didn’t explicitly use RTLD_LOCAL will
[all …]
/bionic/libc/malloc_debug/
DREADME_marshmallow_and_earlier.md9 functional until API level 19, so using it on a version older than that
19 When malloc debug is enabled, it works by adding a shim layer that replaces
39 Malloc debug is controlled by a system property that takes a numeric value
40 named libc.debug.malloc. It has only a few distinct modes that enables a
46 that contains information about the allocation.
73 that contains information about the allocation.
94 on the list is removed and verified that it still contains the pattern 0xef.
99 When the program completes, all of the allocations that are still live
112 cause malloc debug to only be used on processes with that name. For example,
DREADME.md13 When malloc debug is enabled, it works by adding a shim layer that replaces
60 padded so that it is a multiple of 8 bytes on 32 bit systems and 16 bytes
61 on 64 bit systems to make sure that the allocation returned is aligned
64 This option adds a special header to all allocations that contains the guard
84 This option adds a special header to all allocations that contains
105 Note that any backtrace frames that occur within the malloc backtrace library
112 Before P, this option adds a special header to all allocations that contains
113 the backtrace and information about the original allocation. After that, this
119 that dumped when running am dumpheap -n. The default is to dump this data
121 used with native only executables that run for a while since these processes
[all …]
DREADME_api.md4 in a process. The libc library in Android exports two calls that can be
12 *info* is set to a buffer allocated by the call that contains all of
17 *total\_memory* is set to the sum of all allocation sizes that are live at
21 that are present for each allocation.
/bionic/libc/kernel/android/
DREADME.TXT1 The files under the uapi directory are android kernel uapi header files that
10 declarations that can't be directly used by userspace. The glibc
/bionic/tools/bionicbb/
DREADME.md5 service that interacts with gerrit.
35 for a Jenkins account that has the appropriate permissions to launch the jobs
55 Bionicbb polls a gmail account to find changes that need to be built. The gmail
60 Gerrit does offer a streaming notification service that would be _far_ better,
68 One drawback to this approach is that it's a hassle to set up the project
/bionic/libc/kernel/
DREADME.TXT4 Bionic comes with a processed set of all of the uapi Linux kernel headers that
10 declarations and constructs that usually result in compilation failure.
23 also includes the header files that are generated by building the kernel
69 Before running the command to import the headers, make sure that you have
86 After this, you will need to build/test the tree to make sure that these
/bionic/libdl/
DAndroid.bp39 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from
40 // libgcc.a are made static to libdl.so. This in turn ensures that libraries that
120 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from
121 // libgcc.a are made static to libdl.so. This in turn ensures that libraries that
/bionic/libc/
DSECCOMP_WHITELIST_SYSTEM.TXT2 # Note that the resultant policy is applied only to zygote spawned processes.
19 # - The call_id parameter, given that func_name and syscall_name have
DSECCOMP_BLACKLIST_COMMON.TXT2 # Note that the resultant policy is applied only to zygote spawned processes.
22 # - The call_id parameter, given that func_name and syscall_name have
DNOTICE6 modification, are permitted provided that the following conditions are met:
34 modification, are permitted provided that the following conditions are met:
62 modification, are permitted provided that the following conditions
89 modification, are permitted provided that the following conditions are met:
118 software is freely granted, provided that this notice
128 software is freely granted, provided that this notice
141 software is freely granted, provided that this notice
154 software is freely granted, provided that this notice
168 software is freely granted, provided that this notice
178 software is freely granted, provided that this notice
[all …]
DSECCOMP_BLACKLIST_APP.TXT2 # Note that the resultant policy is applied only to zygote spawned processes.
22 # - The call_id parameter, given that func_name and syscall_name have
33 # the process still has CAP_SYS_ADMIN; changing the uid would remove that capability.
DSECCOMP_WHITELIST_APP.TXT2 # Note that the resultant policy is applied only to zygote spawned processes.
19 # - The call_id parameter, given that func_name and syscall_name have
/bionic/libc/malloc_hooks/
DREADME.md4 Malloc hooks allows a program to intercept all allocation/free calls that
11 When malloc hooks is enabled, it works by adding a shim layer that replaces
62 the caller must guarantee that it does not depend on allocations/frees
68 the current default allocation functions. It is expected that if an
115 of 32. This meant that to create a wrap property with the name of the app, it
/bionic/tests/headers/posix/
DAndroid.bp21 "-Wno-absolute-value", // broken clang diagnostic that doesn't understand <tgmath.h>
/bionic/tests/libs/
DAndroid.bp265 // 1. Check that private libraries loaded in different namespaces are
266 // different. Check that dlsym does not confuse them.
267 // 2. Check that public libraries loaded in different namespaces are shared
269 // 3. Check that namespace sticks on dlopen
270 // 4. Check that having access to shared library (libnstest_public.so)
332 // 1. Check that namespace a exposes libnstest_ns_a_public1 to
335 // 2. Check that namespace b exposes all libraries to namespace a.
689 // Check that RTLD_NEXT of a libc symbol works in dlopened library
698 // Library with constructor that calls dlopen() b/7941716
743 // Library that depends on the library with constructor that calls dlopen() b/7941716
/bionic/libc/tools/
Dpylintrc80 # List of builtins function names that should not be used, separated by a comma
121 # Regular expression which should only match function or class names that do
125 # Minimum line length for functions/classes that require docstrings, shorter
180 # List of additional names supposed to be defined in builtins. Remember that
190 # Regexp for a line that is allowed to be longer than the limit.
231 # Argument names that match this expression will be ignored. Default to name
278 # Exceptions that will emit a warning when being caught. Defaults to
/bionic/libc/bionic/scudo/
DAndroid.bp49 // Will be referencing other libc code that won't be defined here.

12