/bionic/libc/upstream-openbsd/lib/libc/string/ |
D | stpcpy.c | 40 stpcpy(char *to, const char *from) in stpcpy() argument 42 for (; (*to = *from) != '\0'; ++from, ++to); in stpcpy()
|
D | strcpy.c | 40 strcpy(char *to, const char *from) in strcpy() argument 44 for (; (*to = *from) != '\0'; ++from, ++to); in strcpy()
|
/bionic/libc/upstream-freebsd/lib/libc/string/ |
D | wcpcpy.c | 43 wcpcpy(wchar_t * __restrict to, const wchar_t * __restrict from) in wcpcpy() argument 46 for (; (*to = *from); ++from, ++to); in wcpcpy()
|
/bionic/tests/ |
D | dlext_private.h | 94 extern bool android_link_namespaces(android_namespace_t* from, 98 extern bool android_link_namespaces_all_libs(android_namespace_t* from,
|
/bionic/libdl/ |
D | Android.bp | 62 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 64 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so 65 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 66 // we use this property to make sure libc.so has its own copy of the code from 166 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols libdl.so pulls from 168 // a) pull symbols from libgcc.a and b) depend on libdl.so will not rely on libdl.so 169 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 170 // we use this property to make sure libc.so has its own copy of the code from
|
/bionic/linker/ |
D | ld.config.format.md | 28 # The following line maps section to a dir. Binaries ran from this location will use namespaces 68 # For every link define list of shared libraries. This is list of the libraries accessible from 83 # [Deprecated] This defines what libraries are allowed to be loaded from ns1 85 # This defines what libraries are allowed to be loaded from ns1
|
D | Android.bp | 346 // of __gnu_Unwind_Find_exidx from libc. An unresolved weak reference would create a 440 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from 442 // a) pull symbols from libgcc.a and b) depend on ld-android.so will not rely on ld-android.so 443 // to provide those symbols, but will instead pull them from libgcc.a. Specifically, 444 // we use this property to make sure libc.so has its own copy of the code from
|
/bionic/docs/ |
D | fdtrack.md | 16 handle unbalanced closes. This callback may be called from an async signal safe 29 `BIONIC_SIGNAL_FDTRACK` (available from `<bionic/reserved_signals.h>`) to the 42 and logcat from bugreports. 53 statically-linked and steps are taken to prevent the unwind from being
|
D | 32-bit-abi.md | 9 `fseeko` and `ftello` available. Instead they're always available from API 18 function `lseek64` were available right from the beginning in API 3. Secondly, 26 it became available for the platform, it wasn't available from the NDK until 95 times to/from the kernel, but we do not plan on adding support for
|
D | EINTR.md | 39 from Java programmers. Basically, all the libraries like `java.io.*` and 40 `java.net.*` hide this from you. (The same should be true of `android.*` too, 73 [Returning EINTR from close()](https://lwn.net/Articles/576478/)
|
D | elf-tls.md | 23 TLS Block". TLS variables within the Static TLS Block exist at fixed offsets from an 48 from TP is implementation-defined. 159 object), then its offset from the TP is known at load-time. The variable can be accessed with a few 187 part of the executable (and referenced from the executable), then a GOT access can be avoided. The 232 The code fragments above match the "traditional" TLS design from Drepper's document. For the GD and 375 gdb uses a libthread_db plugin library to retrieve thread-related information from a target. This 401 Both debuggers need metadata from the threading library (`libc.so` / `libpthread.so`) to find TLS 407 > expose the structure of the DTV via metadata exported as symbols from the .so itself, designed 416 `_thread_db_pthread_dtvp` | Offset from TP to DTV pointer (0 for variant 1, implementation-… 532 the prototype uses a [special function pointer] to call libc.so's `__tls_get_addr` from the loader. [all …]
|
/bionic/libc/malloc_debug/ |
D | README_api.md | 5 used to gather this data from a process. This tracking can be enabled using 47 The calls from within the malloc debug library are automatically removed. 57 if this allocation was created in a process forked from the Zygote process.
|
/bionic/libc/bionic/ |
D | heap_tagging.cpp | 177 static inline __attribute__((no_sanitize("memtag"))) void untag_memory(void* from, void* to) { in untag_memory() argument 184 : [Ptr] "+&r"(from) in untag_memory()
|
/bionic/libc/kernel/uapi/linux/netfilter/ |
D | xt_connbytes.h | 34 __aligned_u64 from; member
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 65 With API 22, load order switched from depth-first to breadth-first to 136 ## Opening shared libraries directly from an APK 138 In API level 23 and above, it’s possible to open a .so file directly from 141 older releases, the .so files were extracted from the APK file 145 that you want to load directly from your APK must be page aligned 149 Note that in API level 23 and above dlopen(3) will open a library from 172 as many developers found when Android 6.0 Marshmallow switched from 176 a set of libraries that see significant use from Google Play's 201 *Potential problems*: starting from API 24 the dynamic linker will not 202 load private libraries, preventing the application from loading. [all …]
|
D | README.md | 83 # files written by us and files taken from BSD. 88 # generate_uapi_headers.sh script should be used to go from a kernel tree to 91 # scrubbed headers from external/kernel-headers/. 97 # Contains the DNS resolver (originates from NetBSD code). 178 into your new file --- it's a good short example to start from. 196 what the system call returns from the RETURN VALUE of the man page), 197 but try to match the wording and style wording from _our_ existing 220 the header file, and that the change to libc.map.txt from step 5 is 237 similar system call and copy and paste from that. You'll definitely need to test 283 1. Use generate_uapi_headers.sh to go from a Linux source tree to appropriate [all …]
|
/bionic/libc/kernel/ |
D | README.md | 15 They can be included from C++, or when compiling code in strict ANSI mode. 31 Contains hand-modified versions of a few files from `original/scsi/` 32 that removes the kernel specific code from these files so they can 57 Automatically update all clean headers from the content of
|
/bionic/libc/kernel/uapi/linux/ |
D | nbd.h | 55 __be64 from; member
|
D | iso_fs.h | 23 #define ISODCL(from,to) (to - from + 1) argument
|
/bionic/tests/libs/ |
D | segment_gap_outer.lds | 14 # Now create the gap. We need a text segment first to prevent the linker from
|
/bionic/libc/tools/ |
D | Android.bp | 4 // all of the 'license_kinds' from "bionic_libc_license"
|
/bionic/libc/system_properties/ |
D | Android.bp | 4 // all of the 'license_kinds' from "bionic_libc_license"
|
/bionic/libc/async_safe/ |
D | Android.bp | 7 // all of the 'license_kinds' from "bionic_libc_license"
|
/bionic/libc/ |
D | NOTICE | 13 derived from this software without specific prior written permission. 39 be used to endorse or promote products derived from this software 81 may be used to endorse or promote products derived from this software 110 may be used to endorse or promote products derived from this software 363 products derived from this software without specific prior written 941 may be used to endorse or promote products derived from this software 989 may be used to endorse or promote products derived from this software 1009 All or some portions of this file are derived from material licensed 1023 may be used to endorse or promote products derived from this software 1052 may be used to endorse or promote products derived from this software [all …]
|
/bionic/libc/arch-x86/bionic/ |
D | syscall.S | 36 # Load all the arguments from the calling frame.
|