Searched refs:system (Results 1 – 25 of 32) sorted by relevance
12
/bionic/build/ |
D | run-on-host.sh | 31 if [ ! -d /system ]; then 33 sudo mkdir -p -m 0777 /system 34 mkdir -p -m 0777 /system/bin 35 mkdir -p -m 0777 /system/lib 36 mkdir -p -m 0777 /system/lib64 51 make_link /system/bin ${i} 53 ln -fs `realpath ${TARGET_OUT}/etc` /system/ 55 make_link /system/lib ${i} 58 make_link /system/lib64 ${i}
|
/bionic/ |
D | CleanSpec.mk | 53 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib/libGLES*) 54 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib64/libGLES*) 63 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/lib{,64})
|
D | README.md | 36 are supplied by the system. Stuff like `__cxa_guard_acquire` and 39 #### linker/ --- /system/bin/linker and /system/bin/linker64 79 # See 'Adding system calls' later. 142 ## Adding libc wrappers for system calls 145 this system call?". The answer is usually "no". 147 The answer is "yes" if the system call is part of the POSIX standard. 149 The answer is probably "yes" if the system call has a wrapper in at 152 The answer may be "yes" if the system call has three/four distinct 159 Adding a system call usually involves: 175 correct system call is being made.) [all …]
|
D | android-changes-for-ndk-developers.md | 10 [unwinder documentation](https://android.googlesource.com/platform/system/unwinding/+/refs/heads/ma… 84 should avoid saying something like `/system/lib/libfoo.so` and just say 116 find `/system/lib/libc.so` because it’s already loaded. This also meant 123 machine’s file system) that used to work because we ignored everything 184 system property (`debug.ld.greylist_disabled`). This property is ignored 292 no control over where your library will be installed by the system. A 332 or a misconfiguration in your build system. A missing SONAME may lead 348 configured your build system to generate incorrect SONAME entries (using 423 whole system by using the `debug.ld.all` system property instead of
|
/bionic/linker/ |
D | ld.config.format.md | 3 This document describes format of /system/etc/ld.config.txt file. This file can be used to customize 30 dir.example_section=/system/bin/example 54 namespace.default.search.paths = /system/${LIB}:/system/other/${LIB} 60 namespace.default.permitted.paths = /system/${LIB}
|
/bionic/libc/arch-x86/bionic/ |
D | __bionic_clone.S | 15 # Load system call arguments into registers. 29 # Make the system call.
|
D | syscall.S | 30 # Get and save the system call entry address. 46 # Make the system call.
|
/bionic/libc/malloc_debug/ |
D | README.md | 102 system runs too slowly with this option enabled, decreasing the maximum number 224 04-15 12:00:31.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so 225 …04-15 12:00:31.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne… 226 04-15 12:00:31.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so 227 04-15 12:00:31.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so 260 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so 261 …04-15 12:35:33.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne… 262 04-15 12:35:33.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so 263 04-15 12:35:33.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so 266 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so [all …]
|
D | README_marshmallow_and_earlier.md | 15 On these old versions of the OS, you must be able to set system properties 39 Malloc debug is controlled by a system property that takes a numeric value 111 Using the special system property, libc.debug.malloc.program, will
|
/bionic/docs/ |
D | fdsan.md | 177 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384) 178 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632) 179 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16) 180 #03 pc 00000000000003e4 /system/bin/fdsan_test (bystander()+84) 181 #04 pc 0000000000000918 /system/bin/fdsan_test 182 #05 pc 000000000006689c /system/lib64/libc.so (__pthread_start(void*)+36) 183 #06 pc 000000000000712c /system/lib64/libc.so (__start_thread+68) 218 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384) 219 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632) 220 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16) [all …]
|
D | defines.md | 11 the system property functions. Common alternatives on this dimension are 39 choice when you use Linux-specific API, such as a Linux-specific system call or
|
D | native_allocator.md | 45 system. It is meant to be called after a call to `malloc_disable` to 125 If there are multiple devices connected to the system, use `-s <SERIAL>` 296 run on a trace of the allocations from a real world application or system 301 mmma -j system/extras/memory_replay 305 /system/bin/memory_replay32 306 /system/bin/memory_replay64 332 adb push system/extras/memory_replay/traces /data/local/tmp 374 tracking fragmentation is system\_server.txt which is an extremely long 387 system/extras/memory_replay/NativeInfo.cpp
|
D | elf-tls.md | 12 ELF TLS is a system for automatically allocating thread-local variables with cooperation among the 213 intent that only a few core system libraries would use static TLS. Non-core libraries also sometimes 599 ** the system (e.g. applications). 601 ** It is only provided here for the benefit of the system dynamic 602 ** linker and the OpenGL sub-system (which needs to access the 639 * Android's "native bridge" system allows the Zygote to load an app solib of a non-native ABI. (For 816 it is typically zero. After [Bionic's pthread key system was rewritten to be 825 AOSP hikey960 build, only `/system/bin/netd` has a TLS segment, and it's only 32 bytes. As long as 826 `/system/bin/app_process{32,64}` limits its use of TLS memory, then the pthread keys could be
|
D | 32-bit-abi.md | 45 grep thoroughly in both your source and your build system: many people
|
/bionic/libc/arch-arm64/bionic/ |
D | __bionic_clone.S | 37 # Make the system call.
|
/bionic/libc/arch-x86_64/bionic/ |
D | syscall.S | 54 # Make the system call.
|
/bionic/libc/bionic/ |
D | system.cpp | 39 int system(const char* command) { in system() function
|
/bionic/libc/tools/ |
D | Android.bp | 16 // Generate the C++ policy sources for app and system seccomp-bpf filters.
|
/bionic/libc/arch-arm/bionic/ |
D | __bionic_clone.S | 48 # Make the system call.
|
/bionic/tests/headers/posix/ |
D | stdlib_h.c | 136 FUNCTION(system, int (*f)(const char*)); in stdlib_h()
|
/bionic/libc/include/ |
D | stdlib.h | 94 int system(const char* __command);
|
/bionic/tests/ |
D | stdlib_test.cpp | 480 TEST(stdlib, system) { in TEST() argument 483 status = system("exit 0"); in TEST() 487 status = system("exit 1"); in TEST() 495 ASSERT_NE(0, system(nullptr)); in TEST()
|
/bionic/libc/ |
D | SYSCALLS.TXT | 1 # This file is used to automatically generate bionic's system call stubs. 162 # Paired off_t/off64_t system calls. On 64-bit systems, 164 # aliases. On 32-bit systems, we have two different system calls. 165 # That means that every system call in this section should take three lines. 198 # file system
|
D | Android.bp | 86 "system/core/libcutils/include", 255 "-DTZDIR=\"/system/usr/share/zoneinfo\"", 1167 "bionic/system.cpp", 1837 "//system/core/debuggerd:__subpackages__", 1838 "//system/core/libcutils:__subpackages__", 1839 "//system/memory/libmemunreachable:__subpackages__", 1840 "//system/unwinding/libunwindstack:__subpackages__", 1888 // The build system generally requires that any dependencies of a target 1944 "//system/core/property_service/libpropertyinfoparser", 1945 "//system/extras/toolchain-extras", [all …]
|
/bionic/libc/malloc_hooks/ |
D | README.md | 8 There are two ways to enable these hooks, set a special system
|
12