Home
last modified time | relevance | path

Searched refs:system (Results 1 – 25 of 32) sorted by relevance

12

/bionic/build/
Drun-on-host.sh31 if [ ! -d /system ]; then
33 sudo mkdir -p -m 0777 /system
34 mkdir -p -m 0777 /system/bin
35 mkdir -p -m 0777 /system/lib
36 mkdir -p -m 0777 /system/lib64
51 make_link /system/bin ${i}
53 ln -fs `realpath ${TARGET_OUT}/etc` /system/
55 make_link /system/lib ${i}
58 make_link /system/lib64 ${i}
/bionic/
DCleanSpec.mk53 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib/libGLES*)
54 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib64/libGLES*)
63 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/lib{,64})
DREADME.md36 are supplied by the system. Stuff like `__cxa_guard_acquire` and
39 #### linker/ --- /system/bin/linker and /system/bin/linker64
79 # See 'Adding system calls' later.
142 ## Adding libc wrappers for system calls
145 this system call?". The answer is usually "no".
147 The answer is "yes" if the system call is part of the POSIX standard.
149 The answer is probably "yes" if the system call has a wrapper in at
152 The answer may be "yes" if the system call has three/four distinct
159 Adding a system call usually involves:
175 correct system call is being made.)
[all …]
Dandroid-changes-for-ndk-developers.md10 [unwinder documentation](https://android.googlesource.com/platform/system/unwinding/+/refs/heads/ma…
84 should avoid saying something like `/system/lib/libfoo.so` and just say
116 find `/system/lib/libc.so` because it’s already loaded. This also meant
123 machine’s file system) that used to work because we ignored everything
184 system property (`debug.ld.greylist_disabled`). This property is ignored
292 no control over where your library will be installed by the system. A
332 or a misconfiguration in your build system. A missing SONAME may lead
348 configured your build system to generate incorrect SONAME entries (using
423 whole system by using the `debug.ld.all` system property instead of
/bionic/linker/
Dld.config.format.md3 This document describes format of /system/etc/ld.config.txt file. This file can be used to customize
30 dir.example_section=/system/bin/example
54 namespace.default.search.paths = /system/${LIB}:/system/other/${LIB}
60 namespace.default.permitted.paths = /system/${LIB}
/bionic/libc/arch-x86/bionic/
D__bionic_clone.S15 # Load system call arguments into registers.
29 # Make the system call.
Dsyscall.S30 # Get and save the system call entry address.
46 # Make the system call.
/bionic/libc/malloc_debug/
DREADME.md102 system runs too slowly with this option enabled, decreasing the maximum number
224 04-15 12:00:31.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so
225 …04-15 12:00:31.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne…
226 04-15 12:00:31.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so
227 04-15 12:00:31.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so
260 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so
261 …04-15 12:35:33.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne…
262 04-15 12:35:33.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so
263 04-15 12:35:33.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so
266 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so
[all …]
DREADME_marshmallow_and_earlier.md15 On these old versions of the OS, you must be able to set system properties
39 Malloc debug is controlled by a system property that takes a numeric value
111 Using the special system property, libc.debug.malloc.program, will
/bionic/docs/
Dfdsan.md177 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384)
178 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632)
179 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16)
180 #03 pc 00000000000003e4 /system/bin/fdsan_test (bystander()+84)
181 #04 pc 0000000000000918 /system/bin/fdsan_test
182 #05 pc 000000000006689c /system/lib64/libc.so (__pthread_start(void*)+36)
183 #06 pc 000000000000712c /system/lib64/libc.so (__start_thread+68)
218 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384)
219 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632)
220 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16)
[all …]
Ddefines.md11 the system property functions. Common alternatives on this dimension are
39 choice when you use Linux-specific API, such as a Linux-specific system call or
Dnative_allocator.md45 system. It is meant to be called after a call to `malloc_disable` to
125 If there are multiple devices connected to the system, use `-s <SERIAL>`
296 run on a trace of the allocations from a real world application or system
301 mmma -j system/extras/memory_replay
305 /system/bin/memory_replay32
306 /system/bin/memory_replay64
332 adb push system/extras/memory_replay/traces /data/local/tmp
374 tracking fragmentation is system\_server.txt which is an extremely long
387 system/extras/memory_replay/NativeInfo.cpp
Delf-tls.md12 ELF TLS is a system for automatically allocating thread-local variables with cooperation among the
213 intent that only a few core system libraries would use static TLS. Non-core libraries also sometimes
599  ** the system (e.g. applications).
601  ** It is only provided here for the benefit of the system dynamic
602  ** linker and the OpenGL sub-system (which needs to access the
639 * Android's "native bridge" system allows the Zygote to load an app solib of a non-native ABI. (For
816 it is typically zero. After [Bionic's pthread key system was rewritten to be
825 AOSP hikey960 build, only `/system/bin/netd` has a TLS segment, and it's only 32 bytes. As long as
826 `/system/bin/app_process{32,64}` limits its use of TLS memory, then the pthread keys could be
D32-bit-abi.md45 grep thoroughly in both your source and your build system: many people
/bionic/libc/arch-arm64/bionic/
D__bionic_clone.S37 # Make the system call.
/bionic/libc/arch-x86_64/bionic/
Dsyscall.S54 # Make the system call.
/bionic/libc/bionic/
Dsystem.cpp39 int system(const char* command) { in system() function
/bionic/libc/tools/
DAndroid.bp16 // Generate the C++ policy sources for app and system seccomp-bpf filters.
/bionic/libc/arch-arm/bionic/
D__bionic_clone.S48 # Make the system call.
/bionic/tests/headers/posix/
Dstdlib_h.c136 FUNCTION(system, int (*f)(const char*)); in stdlib_h()
/bionic/libc/include/
Dstdlib.h94 int system(const char* __command);
/bionic/tests/
Dstdlib_test.cpp480 TEST(stdlib, system) { in TEST() argument
483 status = system("exit 0"); in TEST()
487 status = system("exit 1"); in TEST()
495 ASSERT_NE(0, system(nullptr)); in TEST()
/bionic/libc/
DSYSCALLS.TXT1 # This file is used to automatically generate bionic's system call stubs.
162 # Paired off_t/off64_t system calls. On 64-bit systems,
164 # aliases. On 32-bit systems, we have two different system calls.
165 # That means that every system call in this section should take three lines.
198 # file system
DAndroid.bp86 "system/core/libcutils/include",
255 "-DTZDIR=\"/system/usr/share/zoneinfo\"",
1167 "bionic/system.cpp",
1837 "//system/core/debuggerd:__subpackages__",
1838 "//system/core/libcutils:__subpackages__",
1839 "//system/memory/libmemunreachable:__subpackages__",
1840 "//system/unwinding/libunwindstack:__subpackages__",
1888 // The build system generally requires that any dependencies of a target
1944 "//system/core/property_service/libpropertyinfoparser",
1945 "//system/extras/toolchain-extras",
[all …]
/bionic/libc/malloc_hooks/
DREADME.md8 There are two ways to enable these hooks, set a special system

12