Searched refs:with (Results 1 – 25 of 56) sorted by relevance
123
2 # This starts off fairly normal: rodata, text, dynamic, data, bss with15 # merging .bss with .custom_bss.
5 // you may not use this file except in compliance with the License.153 // Library used by dlext tests - with GNU RELRO program header219 // Library with soname which does not match filename554 // Depends on library A with a DT_RUNPATH564 // Depends on library A with an incorrect DT_RUNPATH. This does not matter576 // D depends on B, C, and Y with DT_RUNPATH.592 // D version for open-from-zip test with runpath648 // Build library with two parents680 // Build libtest_check_order_dlsym.so with its dependencies.756 // Build libtest_check_order_siblings.so with its dependencies.[all …]
4 you may not use this file except in compliance with the License.20 you may not use this file except in compliance with the License.36 Redistribution and use in source and binary forms, with or without43 the documentation and/or other materials provided with the64 you may not use this file except in compliance with the License.80 you may not use this file except in compliance with the License.96 Redistribution and use in source and binary forms, with or without103 the documentation and/or other materials provided with the124 you may not use this file except in compliance with the License.140 Redistribution and use in source and binary forms, with or without[all …]
4 you may not use this file except in compliance with the License.20 you may not use this file except in compliance with the License.36 you may not use this file except in compliance with the License.52 you may not use this file except in compliance with the License.68 you may not use this file except in compliance with the License.84 Redistribution and use in source and binary forms, with or without91 the documentation and/or other materials provided with the112 you may not use this file except in compliance with the License.128 Redistribution and use in source and binary forms, with or without135 the documentation and/or other materials provided with the[all …]
5 // you may not use this file except in compliance with the License.92 // Build benchmarks for the device (with bionic's .so). Run with:122 // Build benchmarks for the host (against glibc!). Run with:
4 Redistribution and use in source and binary forms, with or without11 the documentation and/or other materials provided with the32 Redistribution and use in source and binary forms, with or without39 the documentation and/or other materials provided with the60 Redistribution and use in source and binary forms, with or without67 the documentation and/or other materials provided with the88 Redistribution and use in source and binary forms, with or without95 the documentation and/or other materials provided with the116 Redistribution and use in source and binary forms, with or without123 the documentation and/or other materials provided with the[all …]
22 Every section starts with `[section_name]` (which is used in mappings) and it defines namespaces46 # Each namespace property starts with "namespace.<namespace-name>" The following is configuration52 # Default namespace search path. Note that ${LIB} here is substituted with "lib" for 32bit targets53 # and with "lib64" for 64bit ones.
4 // Redistribution and use in source and binary forms, with or without11 // the documentation and/or other materials provided with the37 // TODO: This benchmark doesn't work with TradeFed/atest because it doesn't copy its test libraries42 // work with TradeFed/atest.
4 of shared objects with many symbols and relocations. It mimics the work involved24 - with `--ninja`: generate a build.ninja instead, and build a set of ELF file
4 Redistribution and use in source and binary forms, with or without11 documentation and/or other materials provided with the distribution.31 Redistribution and use in source and binary forms, with or without37 documentation and/or other materials provided with the distribution.66 Based on the UCB version with the ID appearing below.72 Redistribution and use in source and binary forms, with or without79 documentation and/or other materials provided with the distribution.101 Redistribution and use in source and binary forms, with or without108 documentation and/or other materials provided with the distribution.131 purpose with or without fee is hereby granted, provided that the above[all …]
1 # This file is used to populate seccomp's allowlist policy in combination with SYSCALLS.TXT.
66 Whenever an allocation is created, initialize the data with a known75 This value enables everything enabled with value 1 plus these other options.79 a front guard). This buffer is filled with the pattern (0xaa). In addition,81 as a rear guard). This buffer is filled with the pattern (0xbb).89 entire allocation is filled with the value 0xef, and the backtrace at90 the time of the free is recorded. As with the backtrace on allocation,95 If the entire allocation is not filled with this value, an error is printed112 cause malloc debug to only be used on processes with that name. For example,
137 written by Steven G. Kargl with input from Bruce D. Evans173 you may not use this file except in compliance with the License.189 Redistribution and use in source and binary forms, with or without196 documentation and/or other materials provided with the distribution.215 you may not use this file except in compliance with the License.231 Redistribution and use in source and binary forms, with or without238 the documentation and/or other materials provided with the259 Redistribution and use in source and binary forms, with or without266 the documentation and/or other materials provided with the287 Redistribution and use in source and binary forms, with or without[all …]
33 enum ipt_reject_with with; member
34 __u32 with; member
4 Redistribution and use in source and binary forms, with or without11 the documentation and/or other materials provided with the32 Redistribution and use in source and binary forms, with or without39 the documentation and/or other materials provided with the
12 ELF TLS is a system for automatically allocating thread-local variables with cooperation among the15 Thread-local variables are declared in C and C++ with a specifier, e.g.:41 it can correctly relocate TLS accesses. Both variants are incompatible with Bionic's current44 Each thread has a "Dynamic Thread Vector" (DTV) with a pointer to each module's TLS block (or NULL154 variable with a dynamic initializer has an associated TLS guard variable.)159 object), then its offset from the TP is known at load-time. The variable can be accessed with a few174 // allocated in the .got, resolved at load-time with a dynamic reloc.201 * Code compiled with `-fpic` could be in a shared object, so use GD/LD.202 * The per-file default can be overridden with `-ftls-model=<model>`.204 * A variable can be annotated with `__attribute__((tls_model(...)))`. Clang may still use a more[all …]
10 …rs, on the other hand, are mandated by the POSIX standard to be allocated with the lowest availabl…45 …n be associated with a unique owner which is responsible for their closure. fdsan provides functio…49 If a file descriptor that's been marked with a tag is closed with an incorrect tag, or without a ta…57 …r, emit a warning to logcat, generate a tombstone, and then continue execution with fdsan disabled.65 …s proportional to the percentage of file descriptors in your process that are tagged with an owner.138 …t for us. Let's use `android::base::unique_fd` in `victim` to guard the file descriptor with fdsan:160 Now that we've guarded the file descriptor with fdsan, we should be able to find where the double c…233 …close_with_tag` closes a file descriptor with its tag. In the `<android/fdsan.h>` header, these ar…240 * Redistribution and use in source and binary forms, with or without247 * the documentation and/or other materials provided with the[all …]
32 that for most of the year, the OS builds with this set to 10,000 rather than the53 If your code can be built with a variety of different NDK versions, and needs to54 work around issues with some of them, use these macros to detect the versinon of55 the NDK you're being built with. Usually only `__NDK_MAJOR__` will be necessary.
18 control with that entity. For the purposes of this definition,82 with the Work to which such Contribution(s) was submitted. If You91 Work or Derivative Works thereof in any medium, with or without114 documentation, if provided along with the Derivative Works; or,128 reproduction, and distribution of the Work otherwise complies with137 with Licensor regarding such Contributions.152 risks associated with Your exercise of permissions under this License.169 or other liability obligations and/or rights consistent with this182 boilerplate notice, with the fields enclosed by brackets "[]"183 replaced with your own identifying information. (Don't include[all …]
5 Build with `LLVM_BUILD_HOST_TOOLS=true mma -j48`
4 you may not use this file except in compliance with the License.20 you may not use this file except in compliance with the License.