| /bionic/docs/ |
| D | status.md | 25 Missing functions are either obsolete or explicitly disallowed by SELinux: 39 * Locales. Although bionic contains the various `_l()` functions, the only 52 list of POSIX functions implemented by glibc but not by bionic. 58 New libc functions in U (API level 34): 73 New libc functions in T (API level 33): 78 New libc functions in S (API level 31): 88 New libc functions in R (API level 30): 98 New libc functions in Q (API level 29): 119 New libc functions in P (API level 28): 146 New libc functions in O (API level 26): [all …]
|
| D | 32-bit-abi.md | 5 On 32-bit Android, `off_t` is a signed 32-bit integer. This limits functions 13 to make `off64_t` and corresponding functions such as `ftruncate64` available. 14 Instead, whatever subset of those functions was available at your target API 20 all you need are functions like `read` that don't take/return `off_t`, large 30 all functions that take an `off_t` become unavailable. You've asked for their 32 increase your target API level, you'll have more and more of the functions 33 available. API 12 adds some of the `<unistd.h>` functions, API 21 adds `mmap`, 39 and `mmap` (but no other functions that are unavailable at your target 44 you'll have a 32-bit `off_t` and use the 32-bit functions. Make sure you
|
| D | clang_fortify_anatomy.md | 20 common library functions. Textually, these extensions exist purely in libc, but 26 - Buffer overruns in functions where pointers+sizes are passed (e.g., `memcpy`, 28 - Arguments with incorrect values passed to libc functions (e.g., 30 - Missing arguments to functions (e.g., `open()` with `O_CREAT`, but no mode 49 analysis of FORTIFY functions and commentary on builtins assume that code is 99 for many functions. This section intends to go through real-world examples of 100 FORTIFY functions in Bionic, breaking down how each part of these functions 211 - `__attribute__((overloadable))` mangles all calls to functions marked with 219 is generally needed by FORTIFY, but it carries the side-effect that functions 296 it introduces a tiny additional run-time cost to ensure that functions aren't [all …]
|
| D | fdsan.md | 47 …h a unique owner which is responsible for their closure. fdsan provides functions to associate a f… 49 The way this is implemented is by providing functions to set a 64-bit closure tag on a file descrip… 235 …tead of passing down the platform version from JNI, availability of the functions can be queried d… 345 // These functions are marked with __attribute__((weak)), so that their 366 * Solution: accept `unique_fd` instead of `int` in functions that take ownership.
|
| D | defines.md | 11 the system property functions. Common alternatives on this dimension are
|
| D | native_allocator.md | 25 Android supports a few non-standard functions and mallopt controls that 29 These are functions that are used to implement a memory leak detector 104 The libmemunreachable tests verify that the iterator functions are working
|
| D | libc_assembler.md | 142 functions that can be used to verify the above corner cases. See the
|
| D | elf-tls.md | 381 * Reference: [Currently unimplemented TLS functions in Android's libthread_tb][libthread_db.c] 555 memory on `pthread_create` and `dlopen`, so either function can return out-of-memory. Both functions 579 specialized `__tls_get_addr` and TLSDESC resolver functions.
|
| /bionic/tools/versioner/platforms/ |
| D | crtbegin.map.txt | 1 # This file lists the libc functions are included in `crtbegin.o` and not
|
| /bionic/libc/bionic/ |
| D | malloc_common_dynamic.h | 50 void SetGlobalFunctions(void* functions[]);
|
| D | malloc_common_dynamic.cpp | 243 void SetGlobalFunctions(void* functions[]) { in SetGlobalFunctions() argument 245 gFunctions[i] = functions[i]; in SetGlobalFunctions()
|
| /bionic/libc/malloc_debug/tests/ |
| D | malloc_debug_system_tests.cpp | 386 static FunctionInfo functions[] = { in VerifyLeak() local 429 for (size_t i = 0; i < sizeof(functions) / sizeof(FunctionInfo); i++) { in VerifyLeak() 431 << functions[i].name << " expected size " << functions[i].size); in VerifyLeak() 434 android::base::StringPrintf("leaked block of size %zu at", functions[i].size); in VerifyLeak() 436 std::string test = std::string("MallocTests.DISABLED_") + test_prefix + functions[i].name; in VerifyLeak()
|
| /bionic/libc/malloc_hooks/ |
| D | README.md | 23 On 32 bit systems, these two deprecated functions are also replaced: 56 For the two deprecated functions pvalloc and valloc, if \_\_memalign\_hook 68 the current default allocation functions. It is expected that if an
|
| /bionic/libc/async_safe/ |
| D | README.md | 6 it among threads, whereas these functions connect to liblog for each log message. While it's
|
| /bionic/linker/ |
| D | linker_soinfo.cpp | 488 static inline void call_array(const char* array_name __unused, F* functions, size_t count, in call_array() argument 490 if (functions == nullptr) { in call_array() 494 TRACE("[ Calling %s (size %zd) @ %p for '%s' ]", array_name, count, functions, realpath); in call_array() 501 TRACE("[ %s[%d] == %p ]", array_name, i, functions[i]); in call_array() 502 call_function("function", functions[i], realpath); in call_array()
|
| /bionic/libc/kernel/ |
| D | README.md | 12 exception of a couple static inline functions used for performance
|
| /bionic/ |
| D | android-changes-for-ndk-developers.md | 355 requires a new libc function `__register_atfork`. Code using these functions 459 detect hooking of C library functions might need to fix their code to cope 460 with IFUNC relocations. The affected functions are from `<string.h>`, but 461 may expand to include more functions (and more libraries) in future.
|
| D | README.md | 34 The C++ ABI support functions. The C++ compiler doesn't know how to implement 35 thread-safe static initialization and the like, so it just calls functions that 76 # functions are particular favorites.
|
| /bionic/libc/malloc_debug/ |
| D | README_marshmallow_and_earlier.md | 30 On 32 bit systems, these two deprecated functions are also replaced:
|
| D | README.md | 25 On 32 bit systems, these two deprecated functions are also replaced: 464 with a bad pointer. Only three functions do this checking: free,
|
| /bionic/benchmarks/ |
| D | README.md | 7 `bionic-benchmarks` is a command line tool for measuring the runtimes of libc functions. It is built
|
| /bionic/libc/ |
| D | SYSCALLS.TXT | 76 # On 32-bit systems we use prlimit64 to implement the rlimit64 functions. 193 # the POSIX functions don't set errno, and no architecture has posix_fadvise.
|
| D | Android.bp | 185 // some of this code runs before ifunc resolvers have made string.h functions work, so compile with 232 // from the linker before ifunc resolvers have made string.h functions available. 1622 // excludes functions selected using ifunc's (e.g. for string.h). Link in either 1623 // libc_static_dispatch or libc_dynamic_dispatch to provide those functions.
|
| /bionic/libm/ |
| D | Android.bp | 187 // The FreeBSD complex functions appear to be better, but they're incomplete. 423 "-Wl,--Bsymbolic-functions",
|
| /bionic/tests/ |
| D | Android.bp | 694 // Ensure we don't use FORTIFY'ed functions with the static analyzer/clang-tidy:
|