Home
last modified time | relevance | path

Searched refs:dynamic (Results 1 – 19 of 19) sorted by relevance

/bionic/tests/libs/
Dsegment_gap_outer.lds2 # This starts off fairly normal: rodata, text, dynamic, data, bss with
9 .dynamic : {}
/bionic/
Dandroid-changes-for-ndk-developers.md19 Our general practice with dynamic linker behavior changes is that they
31 * On a developer preview build, dynamic linker warnings will also show up
40 on the dynamic linker's search path. This meant that apps
44 dynamic linker's caching code cached failures too, so it was necessary
65 in that order. For API 23 and later, for any given library, the dynamic
71 libraries. The M dynamic linker searches the global group followed by
80 `libfoo.so` instead, letting the dynamic linker find the correct library
97 symbol lookup and is now supported by the dynamic linker in API 23 and
104 The dynamic linker now understands the difference
113 `"dir2/libx.so"` --- the dynamic linker couldn’t tell the difference
[all …]
DOWNERS11 # Still the best reviewer for changes related to the dynamic linker.
DREADME.md4 C library, math library, and dynamic linker.
28 The dynamic linker interface library. This is actually just a bunch of stubs
29 that the dynamic linker replaces with pointers to its own implementation at
41 The dynamic linker. When you run a dynamically-linked executable, its ELF file
/bionic/tests/
Dlink_test.cpp156 static r_debug* find_exe_r_debug(ElfW(Dyn)* dynamic) { in find_exe_r_debug() argument
157 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in find_exe_r_debug()
188 ElfW(Dyn)* dynamic; in TEST()
202 .dynamic = find_dynamic({ info->dlpi_phdr, info->dlpi_phnum }, info->dlpi_addr) in TEST()
219 ASSERT_EQ(info.dynamic, map->l_ld); in TEST()
DAndroid.bp454 // Library of all tests (excluding the dynamic linker tests).
577 ldflags: ["-Wl,--export-dynamic"],
911 "-Wl,--export-dynamic",
/bionic/benchmarks/linker_relocation/
DREADME.md3 This benchmark measures the time spent in the dynamic linker to load a large set
15 static and dynamic linkers.
Drun_bench_with_ninja.sh40 --linker LINKER Run the benchmark using a specific dynamic linker
/bionic/linker/
Dlinker_phdr.h54 const ElfW(Dyn)* dynamic() const { return dynamic_; } in ElfW()
133 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic,
Dlinker_soinfo.h175 ElfW(Dyn)* dynamic;
435 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
Dlinker_phdr.cpp1015 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic, in phdr_table_get_dynamic_section() argument
1017 *dynamic = nullptr; in phdr_table_get_dynamic_section()
1021 *dynamic = reinterpret_cast<ElfW(Dyn)*>(load_bias + phdr.p_vaddr); in phdr_table_get_dynamic_section()
Dld.config.format.md4 linker-namespace setup for dynamic executables.
Dlinker_main.cpp360 si->dynamic = nullptr; in linker_main()
665 tmp_linker_so.dynamic = nullptr; in __linker_init()
DAndroid.bp245 // static_executable. This dynamic linker is actually a shared object linked with static
294 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
Dlinker.cpp250 map->l_ld = info->dynamic; in notify_gdb_of_load()
1079 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
1264 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in load_library()
2781 phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags); in prelink_image()
2790 if (dynamic == nullptr) { in prelink_image()
2797 DEBUG("dynamic = %p", dynamic); in prelink_image()
2825 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
3197 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
/bionic/docs/
Delf-tls.md13 compiler, linker, dynamic loader, and libc.
93     R_TLS_DTPMOD(tls_var), // dynamic TP module ID
94     R_TLS_DTPOFF(tls_var), // dynamic TP offset
100 `R_TLS_DTPMOD` is a dynamic relocation to the index of the module containing `tls_var`, and
101 `R_TLS_DTPOFF` is a dynamic relocation to the offset of `tls_var` within its module's `PT_TLS`
141     // a dynamic relocation against symbol 0 => current module ID
154 variable with a dynamic initializer has an associated TLS guard variable.)
174 // allocated in the .got, resolved at load-time with a dynamic reloc.
255   // allocated in the .got, uses a dynamic relocation
261 The dynamic loader fills in the TLS descriptors. For a reference to a variable allocated in the
[all …]
/bionic/libc/kernel/uapi/linux/
Delf.h117 typedef struct dynamic { struct
/bionic/libc/
DAndroid.bp1520 // This is a version of the static C library used by the dynamic linker that exclude malloc. It also
DNOTICE5866 dynamic updates in TCP/IP networks by means of the Software. No immunity is