Searched refs:dynamic (Results 1 – 19 of 19) sorted by relevance
/bionic/tests/libs/ |
D | segment_gap_outer.lds | 2 # This starts off fairly normal: rodata, text, dynamic, data, bss with 9 .dynamic : {}
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 19 Our general practice with dynamic linker behavior changes is that they 31 * On a developer preview build, dynamic linker warnings will also show up 40 on the dynamic linker's search path. This meant that apps 44 dynamic linker's caching code cached failures too, so it was necessary 65 in that order. For API 23 and later, for any given library, the dynamic 71 libraries. The M dynamic linker searches the global group followed by 80 `libfoo.so` instead, letting the dynamic linker find the correct library 97 symbol lookup and is now supported by the dynamic linker in API 23 and 104 The dynamic linker now understands the difference 113 `"dir2/libx.so"` --- the dynamic linker couldn’t tell the difference [all …]
|
D | OWNERS | 11 # Still the best reviewer for changes related to the dynamic linker.
|
D | README.md | 4 C library, math library, and dynamic linker. 28 The dynamic linker interface library. This is actually just a bunch of stubs 29 that the dynamic linker replaces with pointers to its own implementation at 41 The dynamic linker. When you run a dynamically-linked executable, its ELF file
|
/bionic/tests/ |
D | link_test.cpp | 156 static r_debug* find_exe_r_debug(ElfW(Dyn)* dynamic) { in find_exe_r_debug() argument 157 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in find_exe_r_debug() 188 ElfW(Dyn)* dynamic; in TEST() 202 .dynamic = find_dynamic({ info->dlpi_phdr, info->dlpi_phnum }, info->dlpi_addr) in TEST() 219 ASSERT_EQ(info.dynamic, map->l_ld); in TEST()
|
D | Android.bp | 454 // Library of all tests (excluding the dynamic linker tests). 577 ldflags: ["-Wl,--export-dynamic"], 911 "-Wl,--export-dynamic",
|
/bionic/benchmarks/linker_relocation/ |
D | README.md | 3 This benchmark measures the time spent in the dynamic linker to load a large set 15 static and dynamic linkers.
|
D | run_bench_with_ninja.sh | 40 --linker LINKER Run the benchmark using a specific dynamic linker
|
/bionic/linker/ |
D | linker_phdr.h | 54 const ElfW(Dyn)* dynamic() const { return dynamic_; } in ElfW() 133 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic,
|
D | linker_soinfo.h | 175 ElfW(Dyn)* dynamic; 435 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
|
D | linker_phdr.cpp | 1015 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic, in phdr_table_get_dynamic_section() argument 1017 *dynamic = nullptr; in phdr_table_get_dynamic_section() 1021 *dynamic = reinterpret_cast<ElfW(Dyn)*>(load_bias + phdr.p_vaddr); in phdr_table_get_dynamic_section()
|
D | ld.config.format.md | 4 linker-namespace setup for dynamic executables.
|
D | linker_main.cpp | 360 si->dynamic = nullptr; in linker_main() 665 tmp_linker_so.dynamic = nullptr; in __linker_init()
|
D | Android.bp | 245 // static_executable. This dynamic linker is actually a shared object linked with static 294 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
|
D | linker.cpp | 250 map->l_ld = info->dynamic; in notify_gdb_of_load() 1079 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in for_each_dt_needed() 1264 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in load_library() 2781 phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags); in prelink_image() 2790 if (dynamic == nullptr) { in prelink_image() 2797 DEBUG("dynamic = %p", dynamic); in prelink_image() 2825 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image() 3197 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
|
/bionic/docs/ |
D | elf-tls.md | 13 compiler, linker, dynamic loader, and libc. 93 R_TLS_DTPMOD(tls_var), // dynamic TP module ID 94 R_TLS_DTPOFF(tls_var), // dynamic TP offset 100 `R_TLS_DTPMOD` is a dynamic relocation to the index of the module containing `tls_var`, and 101 `R_TLS_DTPOFF` is a dynamic relocation to the offset of `tls_var` within its module's `PT_TLS` 141 // a dynamic relocation against symbol 0 => current module ID 154 variable with a dynamic initializer has an associated TLS guard variable.) 174 // allocated in the .got, resolved at load-time with a dynamic reloc. 255 // allocated in the .got, uses a dynamic relocation 261 The dynamic loader fills in the TLS descriptors. For a reference to a variable allocated in the [all …]
|
/bionic/libc/kernel/uapi/linux/ |
D | elf.h | 117 typedef struct dynamic { struct
|
/bionic/libc/ |
D | Android.bp | 1520 // This is a version of the static C library used by the dynamic linker that exclude malloc. It also
|
D | NOTICE | 5866 dynamic updates in TCP/IP networks by means of the Software. No immunity is
|