Home
last modified time | relevance | path

Searched refs:dynamic (Results 1 – 20 of 20) sorted by relevance

/bionic/tests/libs/
Dsegment_gap_outer.lds2 # This starts off fairly normal: rodata, text, dynamic, data, bss with
9 .dynamic : {*(.dynamic)}
/bionic/
Dandroid-changes-for-ndk-developers.md21 Our general practice with dynamic linker behavior changes is that they
33 * On a developer preview build, dynamic linker warnings will also show up
43 on the dynamic linker's search path. This meant that apps
47 dynamic linker's caching code cached failures too, so it was necessary
69 in that order. For API level 23 and later, for any given library, the dynamic
75 libraries. The API level 23 dynamic linker searches the global group followed by
84 `libfoo.so` instead, letting the dynamic linker find the correct library
101 symbol lookup and is supported by Android's dynamic linker in API level 23 and
110 The dynamic linker now understands the difference
119 `"dir2/libx.so"` --- the dynamic linker couldn’t tell the difference
[all …]
DREADME.md4 C library, math library, and dynamic linker.
24 The dynamic linker interface library. This is actually just a bunch of stubs
25 that the dynamic linker replaces with pointers to its own implementation at
37 The dynamic linker. When you run a dynamically-linked executable, its ELF file
/bionic/tests/
Dlink_test.cpp156 static r_debug* find_exe_r_debug(ElfW(Dyn)* dynamic) { in find_exe_r_debug() argument
157 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in find_exe_r_debug()
188 ElfW(Dyn)* dynamic; in TEST()
202 .dynamic = find_dynamic({ info->dlpi_phdr, info->dlpi_phnum }, info->dlpi_addr) in TEST()
219 ASSERT_EQ(info.dynamic, map->l_ld); in TEST()
DAndroid.bp758 // Library of all tests (excluding the dynamic linker tests).
1050 ldflags: ["-Wl,--export-dynamic"],
1303 "-Wl,--export-dynamic",
/bionic/benchmarks/linker_relocation/
DREADME.md3 This benchmark measures the time spent in the dynamic linker to load a large set
15 static and dynamic linkers.
Drun_bench_with_ninja.sh40 --linker LINKER Run the benchmark using a specific dynamic linker
/bionic/linker/
Dlinker_phdr.h57 const ElfW(Dyn)* dynamic() const { return dynamic_; } in ElfW()
152 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic,
Dlinker_soinfo.h177 ElfW(Dyn)* dynamic;
467 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
Dlinker_main.cpp372 si->dynamic = nullptr; in linker_main()
754 tmp_linker_so.dynamic = nullptr; in __linker_init()
795 for (const ElfW(Dyn)* d = tmp_linker_so.dynamic; d->d_tag != DT_NULL; ++d) { in __linker_init_post_relocation()
Dld.config.format.md4 linker-namespace setup for dynamic executables.
Dlinker.cpp284 map->l_ld = info->dynamic; in notify_gdb_of_load()
1102 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
1283 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in load_library()
2840 phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags); in prelink_image()
2849 if (dynamic == nullptr) { in prelink_image()
2856 DEBUG("dynamic = %p", dynamic); in prelink_image()
2885 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
3294 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
Dlinker_phdr.cpp1377 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic, in phdr_table_get_dynamic_section() argument
1379 *dynamic = nullptr; in phdr_table_get_dynamic_section()
1383 *dynamic = reinterpret_cast<ElfW(Dyn)*>(load_bias + phdr.p_vaddr); in phdr_table_get_dynamic_section()
DAndroid.bp331 // static_executable. This dynamic linker is actually a shared object linked with static
384 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
/bionic/docs/
Delf-tls.md13 compiler, linker, dynamic loader, and libc.
93     R_TLS_DTPMOD(tls_var), // dynamic TP module ID
94     R_TLS_DTPOFF(tls_var), // dynamic TP offset
100 `R_TLS_DTPMOD` is a dynamic relocation to the index of the module containing `tls_var`, and
101 `R_TLS_DTPOFF` is a dynamic relocation to the offset of `tls_var` within its module's `PT_TLS`
141     // a dynamic relocation against symbol 0 => current module ID
154 variable with a dynamic initializer has an associated TLS guard variable.)
174 // allocated in the .got, resolved at load-time with a dynamic reloc.
255   // allocated in the .got, uses a dynamic relocation
261 The dynamic loader fills in the TLS descriptors. For a reference to a variable allocated in the
[all …]
DREADME.md4 C library, math library, and dynamic linker.
Dstatus.md75 * Added `LD_SHOW_AUXV` to the dynamic linker to dump the ELF auxiliary
Dclang_fortify_anatomy.md839 ….llvm.org/14.0.0/tools/clang/docs/AttributeReference.html#pass-object-size-pass-dynamic-object-size
/bionic/libc/
DAndroid.bp1472 // This is a version of the static C library used by the dynamic linker that exclude malloc. It also
DNOTICE4459 dynamic updates in TCP/IP networks by means of the Software. No immunity is