Home
last modified time | relevance | path

Searched refs:functions (Results 1 – 25 of 25) sorted by relevance

/bionic/docs/
Dstatus.md25 Missing functions are either obsolete or explicitly disallowed by SELinux:
39 * Locales. Although bionic contains the various `_l()` functions, the only
52 list of POSIX functions implemented by glibc but not by bionic.
58 New libc functions in U (API level 34):
73 New libc functions in T (API level 33):
78 New libc functions in S (API level 31):
88 New libc functions in R (API level 30):
98 New libc functions in Q (API level 29):
119 New libc functions in P (API level 28):
146 New libc functions in O (API level 26):
[all …]
D32-bit-abi.md5 On 32-bit Android, `off_t` is a signed 32-bit integer. This limits functions
13 to make `off64_t` and corresponding functions such as `ftruncate64` available.
14 Instead, whatever subset of those functions was available at your target API
20 all you need are functions like `read` that don't take/return `off_t`, large
30 all functions that take an `off_t` become unavailable. You've asked for their
32 increase your target API level, you'll have more and more of the functions
33 available. API 12 adds some of the `<unistd.h>` functions, API 21 adds `mmap`,
39 and `mmap` (but no other functions that are unavailable at your target
44 you'll have a 32-bit `off_t` and use the 32-bit functions. Make sure you
Dclang_fortify_anatomy.md20 common library functions. Textually, these extensions exist purely in libc, but
26 - Buffer overruns in functions where pointers+sizes are passed (e.g., `memcpy`,
28 - Arguments with incorrect values passed to libc functions (e.g.,
30 - Missing arguments to functions (e.g., `open()` with `O_CREAT`, but no mode
49 analysis of FORTIFY functions and commentary on builtins assume that code is
99 for many functions. This section intends to go through real-world examples of
100 FORTIFY functions in Bionic, breaking down how each part of these functions
211 - `__attribute__((overloadable))` mangles all calls to functions marked with
219 is generally needed by FORTIFY, but it carries the side-effect that functions
296 it introduces a tiny additional run-time cost to ensure that functions aren't
[all …]
Dfdsan.md47 …h a unique owner which is responsible for their closure. fdsan provides functions to associate a f…
49 The way this is implemented is by providing functions to set a 64-bit closure tag on a file descrip…
235 …tead of passing down the platform version from JNI, availability of the functions can be queried d…
345 // These functions are marked with __attribute__((weak)), so that their
366 * Solution: accept `unique_fd` instead of `int` in functions that take ownership.
Ddefines.md11 the system property functions. Common alternatives on this dimension are
Dnative_allocator.md25 Android supports a few non-standard functions and mallopt controls that
29 These are functions that are used to implement a memory leak detector
104 The libmemunreachable tests verify that the iterator functions are working
Dlibc_assembler.md142 functions that can be used to verify the above corner cases. See the
Delf-tls.md381 * Reference: [Currently unimplemented TLS functions in Android's libthread_tb][libthread_db.c]
555 memory on `pthread_create` and `dlopen`, so either function can return out-of-memory. Both functions
579 specialized `__tls_get_addr` and TLSDESC resolver functions.
/bionic/tools/versioner/platforms/
Dcrtbegin.map.txt1 # This file lists the libc functions are included in `crtbegin.o` and not
/bionic/libc/bionic/
Dmalloc_common_dynamic.h50 void SetGlobalFunctions(void* functions[]);
Dmalloc_common_dynamic.cpp243 void SetGlobalFunctions(void* functions[]) { in SetGlobalFunctions() argument
245 gFunctions[i] = functions[i]; in SetGlobalFunctions()
/bionic/libc/malloc_debug/tests/
Dmalloc_debug_system_tests.cpp386 static FunctionInfo functions[] = { in VerifyLeak() local
429 for (size_t i = 0; i < sizeof(functions) / sizeof(FunctionInfo); i++) { in VerifyLeak()
431 << functions[i].name << " expected size " << functions[i].size); in VerifyLeak()
434 android::base::StringPrintf("leaked block of size %zu at", functions[i].size); in VerifyLeak()
436 std::string test = std::string("MallocTests.DISABLED_") + test_prefix + functions[i].name; in VerifyLeak()
/bionic/libc/malloc_hooks/
DREADME.md23 On 32 bit systems, these two deprecated functions are also replaced:
56 For the two deprecated functions pvalloc and valloc, if \_\_memalign\_hook
68 the current default allocation functions. It is expected that if an
/bionic/libc/async_safe/
DREADME.md6 it among threads, whereas these functions connect to liblog for each log message. While it's
/bionic/linker/
Dlinker_soinfo.cpp488 static inline void call_array(const char* array_name __unused, F* functions, size_t count, in call_array() argument
490 if (functions == nullptr) { in call_array()
494 TRACE("[ Calling %s (size %zd) @ %p for '%s' ]", array_name, count, functions, realpath); in call_array()
501 TRACE("[ %s[%d] == %p ]", array_name, i, functions[i]); in call_array()
502 call_function("function", functions[i], realpath); in call_array()
/bionic/libc/kernel/
DREADME.md12 exception of a couple static inline functions used for performance
/bionic/
Dandroid-changes-for-ndk-developers.md355 requires a new libc function `__register_atfork`. Code using these functions
459 detect hooking of C library functions might need to fix their code to cope
460 with IFUNC relocations. The affected functions are from `<string.h>`, but
461 may expand to include more functions (and more libraries) in future.
DREADME.md34 The C++ ABI support functions. The C++ compiler doesn't know how to implement
35 thread-safe static initialization and the like, so it just calls functions that
76 # functions are particular favorites.
/bionic/libc/malloc_debug/
DREADME_marshmallow_and_earlier.md30 On 32 bit systems, these two deprecated functions are also replaced:
DREADME.md25 On 32 bit systems, these two deprecated functions are also replaced:
464 with a bad pointer. Only three functions do this checking: free,
/bionic/benchmarks/
DREADME.md7 `bionic-benchmarks` is a command line tool for measuring the runtimes of libc functions. It is built
/bionic/libc/
DSYSCALLS.TXT76 # On 32-bit systems we use prlimit64 to implement the rlimit64 functions.
193 # the POSIX functions don't set errno, and no architecture has posix_fadvise.
DAndroid.bp185 // some of this code runs before ifunc resolvers have made string.h functions work, so compile with
232 // from the linker before ifunc resolvers have made string.h functions available.
1622 // excludes functions selected using ifunc's (e.g. for string.h). Link in either
1623 // libc_static_dispatch or libc_dynamic_dispatch to provide those functions.
/bionic/libm/
DAndroid.bp187 // The FreeBSD complex functions appear to be better, but they're incomplete.
423 "-Wl,--Bsymbolic-functions",
/bionic/tests/
DAndroid.bp694 // Ensure we don't use FORTIFY'ed functions with the static analyzer/clang-tidy: