/bionic/linker/ |
D | linked_list.h | 44 LinkedListIterator(const LinkedListIterator<T>& that) : entry_(that.entry_) {} in LinkedListIterator() argument 47 LinkedListIterator<T>& operator=(const LinkedListIterator<T>& that) { 48 entry_ = that.entry_; 61 bool operator==(const LinkedListIterator<T>& that) const { 62 return entry_ == that.entry_; 65 bool operator!=(const LinkedListIterator<T>& that) const { 66 return entry_ != that.entry_; 87 LinkedList(LinkedList&& that) noexcept { in LinkedList() argument 88 this->head_ = that.head_; in LinkedList() 89 this->tail_ = that.tail_; in LinkedList() [all …]
|
D | Android.bp | 25 // each binary. There's a linker script that sets all of that up (generated by 217 // Leave the symbols in the shared library so that stack unwinders can produce 311 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from 312 // libgcc.a are made static to ld-android.so. This in turn ensures that libraries that 399 // Parts of the linker that we're testing.
|
/bionic/docs/ |
D | libc_assembler.md | 9 verify that the routine is being properly tested. 10 * Rerun the benchmarks using the updated image that uses the code for 13 * Verify that unwind information for new routine looks sane. See the [Unwind Info](#unwind-info) se… 16 Make sure that you benchmark both the big and little cores to verify that 61 The last argument is the name of the one function that you want to 65 **bionic/benchmarks/suites**. Look at the examples in that file to see 66 how to add a benchmark for a function that doesn't already exist. 93 that if the device does not get up to the maximum cpu frequency, the results 98 Another potential issue is that the device can overheat when running the 100 or choose a device that is less likely to overheat. To detect these kind [all …]
|
D | 32-bit-abi.md | 6 that use `off_t` to working on files no larger than 2GiB. 20 all you need are functions like `read` that don't take/return `off_t`, large 28 compiled with that was actually using a 32-bit `off_t`. With a new enough NDK, 30 all functions that take an `off_t` become unavailable. You've asked for their 35 [linker map](libc/libc.map.txt) for full details. Note also that in NDK r16 and 38 that's often needed. This means that code using `_FILE_OFFSET_BITS=64` 39 and `mmap` (but no other functions that are unavailable at your target 46 aren't aware that `_FILE_OFFSET_BITS` is set. You might also have to 48 flag that should never be set by user code but sometimes is (by zlib, 50 doesn't compile, you can insert this just before the line that's failing [all …]
|
D | fdsan.md | 38 Assertion failures are probably the most innocuous result that can arise from these bugs: silent da… 43 …ile descriptor with an owner; if someone tries to close a file descriptor that they don't own, dep… 45 …that identifies the type of the owner (`enum android_fdan_owner_type` in [`<android/fdsan.h>`](htt… 47 If a file descriptor that's been marked with a tag is closed with an incorrect tag, or without a ta… 63 …ror is proportional to the percentage of file descriptors in your process that are tagged with an … 68 Let's look at a simple contrived example that uses sleeps to force a particular interleaving of thr… 136 This implies that either we're accidentally closing out file descriptor too early, or someone else … 158 Now that we've guarded the file descriptor with fdsan, we should be able to find where the double c… 186 …hen tracking down double-closes in processes that have sparse fdsan coverage. What actually happen… 227 …ed types like `unique_fd` and `ParcelFileDescriptor`, to improve the odds that double closes in ot… [all …]
|
D | status.md | 52 * `aligned_alloc` correctly verifies that `size` is a multiple of `alignment`. 252 Note that this doesn't change behavior as much as you might think: the 254 the lookup, so there was still a race between that and the dereference 255 in the caller, given that callers actually need the tid to pass to some 280 use `pthread_gettid_np` at some point that you know the thread to be 289 POSIX says that `sem_wait` can be interrupted by delivery of a 291 bug we found that existing code relied on the old behavior. To preserve 303 Note that in recent releases Android's FORTIFY has been extended to 317 need to manually enable FORTIFY by setting that themselves in whatever
|
/bionic/ |
D | README.md | 29 that the dynamic linker replaces with pointers to its own implementation at 35 thread-safe static initialization and the like, so it just calls functions that 42 has a `DT_INTERP` entry that says "use the following program to start me". On 43 Android, that's either `linker` or `linker64` (depending on whether it's a 45 into memory and resolving references to symbols (so that when your code tries to 69 # Each architecture has its own subdirectory for stuff that isn't shared 70 # because it's architecture-specific. There will be a .mk file in here that 117 # because the Linux kernel interface is sufficiently different that we 119 # legacy mess that needs to be sorted out, either by replacing it with 124 # The code that implements the functionality to enable debugging of [all …]
|
D | android-changes-for-ndk-developers.md | 16 Our general practice with dynamic linker behavior changes is that they 24 * Warnings about any behavior change that will affect a library if you 25 increase your target API level will appear in logcat when that library 26 is loaded, even if you're not yet targeting that API level. 29 as toasts. Experience has shown that many developers don’t habitually 37 on the dynamic linker's search path. This meant that apps 58 in that order. For API 23 and later, for any given library, the dynamic 65 the local group. This allows ASAN, for example, to ensure that it can 72 correctly in API 23 and later. Note that RTLD_LOCAL is the default, 73 so even calls to dlopen(3) that didn’t explicitly use RTLD_LOCAL will [all …]
|
/bionic/libc/malloc_debug/ |
D | README_marshmallow_and_earlier.md | 9 functional until API level 19, so using it on a version older than that 19 When malloc debug is enabled, it works by adding a shim layer that replaces 39 Malloc debug is controlled by a system property that takes a numeric value 40 named libc.debug.malloc. It has only a few distinct modes that enables a 46 that contains information about the allocation. 73 that contains information about the allocation. 94 on the list is removed and verified that it still contains the pattern 0xef. 99 When the program completes, all of the allocations that are still live 112 cause malloc debug to only be used on processes with that name. For example,
|
D | README.md | 13 When malloc debug is enabled, it works by adding a shim layer that replaces 60 padded so that it is a multiple of 8 bytes on 32 bit systems and 16 bytes 61 on 64 bit systems to make sure that the allocation returned is aligned 64 This option adds a special header to all allocations that contains the guard 84 This option adds a special header to all allocations that contains 105 Note that any backtrace frames that occur within the malloc backtrace library 112 Before P, this option adds a special header to all allocations that contains 113 the backtrace and information about the original allocation. After that, this 119 that dumped when running am dumpheap -n. The default is to dump this data 121 used with native only executables that run for a while since these processes [all …]
|
D | README_api.md | 4 in a process. The libc library in Android exports two calls that can be 12 *info* is set to a buffer allocated by the call that contains all of 17 *total\_memory* is set to the sum of all allocation sizes that are live at 21 that are present for each allocation.
|
/bionic/libc/kernel/android/ |
D | README.TXT | 1 The files under the uapi directory are android kernel uapi header files that 10 declarations that can't be directly used by userspace. The glibc
|
/bionic/tools/bionicbb/ |
D | README.md | 5 service that interacts with gerrit. 35 for a Jenkins account that has the appropriate permissions to launch the jobs 55 Bionicbb polls a gmail account to find changes that need to be built. The gmail 60 Gerrit does offer a streaming notification service that would be _far_ better, 68 One drawback to this approach is that it's a hassle to set up the project
|
/bionic/libc/kernel/ |
D | README.TXT | 4 Bionic comes with a processed set of all of the uapi Linux kernel headers that 10 declarations and constructs that usually result in compilation failure. 23 also includes the header files that are generated by building the kernel 69 Before running the command to import the headers, make sure that you have 86 After this, you will need to build/test the tree to make sure that these
|
/bionic/libdl/ |
D | Android.bp | 39 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 40 // libgcc.a are made static to libdl.so. This in turn ensures that libraries that 120 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 121 // libgcc.a are made static to libdl.so. This in turn ensures that libraries that
|
/bionic/libc/ |
D | SECCOMP_WHITELIST_SYSTEM.TXT | 2 # Note that the resultant policy is applied only to zygote spawned processes. 19 # - The call_id parameter, given that func_name and syscall_name have
|
D | SECCOMP_BLACKLIST_COMMON.TXT | 2 # Note that the resultant policy is applied only to zygote spawned processes. 22 # - The call_id parameter, given that func_name and syscall_name have
|
D | NOTICE | 6 modification, are permitted provided that the following conditions are met: 34 modification, are permitted provided that the following conditions are met: 62 modification, are permitted provided that the following conditions 89 modification, are permitted provided that the following conditions are met: 118 software is freely granted, provided that this notice 128 software is freely granted, provided that this notice 141 software is freely granted, provided that this notice 154 software is freely granted, provided that this notice 168 software is freely granted, provided that this notice 178 software is freely granted, provided that this notice [all …]
|
D | SECCOMP_BLACKLIST_APP.TXT | 2 # Note that the resultant policy is applied only to zygote spawned processes. 22 # - The call_id parameter, given that func_name and syscall_name have 33 # the process still has CAP_SYS_ADMIN; changing the uid would remove that capability.
|
D | SECCOMP_WHITELIST_APP.TXT | 2 # Note that the resultant policy is applied only to zygote spawned processes. 19 # - The call_id parameter, given that func_name and syscall_name have
|
/bionic/libc/malloc_hooks/ |
D | README.md | 4 Malloc hooks allows a program to intercept all allocation/free calls that 11 When malloc hooks is enabled, it works by adding a shim layer that replaces 62 the caller must guarantee that it does not depend on allocations/frees 68 the current default allocation functions. It is expected that if an 115 of 32. This meant that to create a wrap property with the name of the app, it
|
/bionic/tests/headers/posix/ |
D | Android.bp | 21 "-Wno-absolute-value", // broken clang diagnostic that doesn't understand <tgmath.h>
|
/bionic/tests/libs/ |
D | Android.bp | 265 // 1. Check that private libraries loaded in different namespaces are 266 // different. Check that dlsym does not confuse them. 267 // 2. Check that public libraries loaded in different namespaces are shared 269 // 3. Check that namespace sticks on dlopen 270 // 4. Check that having access to shared library (libnstest_public.so) 332 // 1. Check that namespace a exposes libnstest_ns_a_public1 to 335 // 2. Check that namespace b exposes all libraries to namespace a. 689 // Check that RTLD_NEXT of a libc symbol works in dlopened library 698 // Library with constructor that calls dlopen() b/7941716 743 // Library that depends on the library with constructor that calls dlopen() b/7941716
|
/bionic/libc/tools/ |
D | pylintrc | 80 # List of builtins function names that should not be used, separated by a comma 121 # Regular expression which should only match function or class names that do 125 # Minimum line length for functions/classes that require docstrings, shorter 180 # List of additional names supposed to be defined in builtins. Remember that 190 # Regexp for a line that is allowed to be longer than the limit. 231 # Argument names that match this expression will be ignored. Default to name 278 # Exceptions that will emit a warning when being caught. Defaults to
|
/bionic/libc/bionic/scudo/ |
D | Android.bp | 49 // Will be referencing other libc code that won't be defined here.
|