Home
last modified time | relevance | path

Searched refs:system (Results 1 – 25 of 36) sorted by relevance

12

/bionic/build/
Drun-on-host.sh31 if [ ! -d /system ]; then
33 sudo mkdir -p -m 0777 /system
34 mkdir -p -m 0777 /system/bin
35 mkdir -p -m 0777 /system/lib
36 mkdir -p -m 0777 /system/lib64
51 make_link /system/bin ${i}
53 ln -fs `realpath ${TARGET_OUT}/etc` /system/
55 make_link /system/lib ${i}
58 make_link /system/lib64 ${i}
/bionic/
DCleanSpec.mk53 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib/libGLES*)
54 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib64/libGLES*)
63 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/lib{,64})
DREADME.md32 are supplied by the system. Stuff like `__cxa_guard_acquire` and
35 #### linker/ --- /system/bin/linker and /system/bin/linker64
77 # See 'Adding system calls' later.
165 ## Adding libc wrappers for system calls
168 this system call?". The answer is usually "no".
170 The answer is "yes" if the system call is part of the POSIX standard.
172 The answer is probably "yes" if the system call has a wrapper in at
175 The answer may be "yes" if the system call has three/four distinct
182 Adding a system call usually involves:
187 2. Find the right header file to work in by looking up your system call
[all …]
Dandroid-changes-for-ndk-developers.md10 [unwinder documentation](https://android.googlesource.com/platform/system/unwinding/+/refs/heads/ma…
83 should avoid saying something like `/system/lib/libfoo.so` and just say
117 find `/system/lib/libc.so` because it’s already loaded. This also meant
124 machine’s file system) that used to work because we ignored everything
177 disabled by setting a system property (`debug.ld.greylist_disabled`).
285 no control over where your library will be installed by the system. A
325 a misconfiguration in your build system. A missing SONAME may lead to
341 configured your build system to generate incorrect SONAME entries (using
420 whole system by using the `debug.ld.all` system property instead of
/bionic/docs/
DEINTR.md5 If your code is blocked in a system call when a signal needs to be delivered,
6 the kernel needs to interrupt that system call. For something like a read(2)
13 system call, for which there is no equivalent "partial" success, such as
15 case the system call would already have returned), or there isn't.
18 errno to `EINTR`: "interrupted system call".
24 signal, so your code can just stay blocked in the system call it was already
56 In most cases, the fix is simple: wrap the system call with the
58 system call as long as the result is -1 and errno is `EINTR`.
89 something like adding an explicit loop around your system call, calculating
90 the timeout _inside_ the loop, and using `continue` each time the system call
Dfdsan.md179 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384)
180 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632)
181 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16)
182 #03 pc 00000000000003e4 /system/bin/fdsan_test (bystander()+84)
183 #04 pc 0000000000000918 /system/bin/fdsan_test
184 #05 pc 000000000006689c /system/lib64/libc.so (__pthread_start(void*)+36)
185 #06 pc 000000000000712c /system/lib64/libc.so (__start_thread+68)
220 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384)
221 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632)
222 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16)
[all …]
Dnative_allocator.md45 system. It is meant to be called after a call to `malloc_disable` to
125 If there are multiple devices connected to the system, use `-s <SERIAL>`
296 run on a trace of the allocations from a real world application or system
301 mmma -j system/extras/memory_replay
305 /system/bin/memory_replay32
306 /system/bin/memory_replay64
332 adb push system/extras/memory_replay/traces /data/local/tmp
374 tracking fragmentation is system\_server.txt which is an extremely long
387 system/extras/memory_replay/NativeInfo.cpp
Ddefines.md11 the system property functions. Common alternatives on this dimension are
39 choice when you use Linux-specific API, such as a Linux-specific system call or
Dstatus.md71 * New system call wrappers: `__riscv_flush_icache` (`<sys/cachectl.h>`),
97 * New system call wrappers: `preadv2`, `preadv64v2`, `pwritev2`,
107 * New system call wrappers: `pidfd_getfd`, `pidfd_open`, `pidfd_send_signal`,
184 * 2 new Linux system calls `quotactl` and `sync_file_range`
418 whatever build system they're using. The exact subset of FORTIFY available to
/bionic/linker/
Dld.config.format.md3 This document describes format of /system/etc/ld.config.txt file. This file can be used to customize
30 dir.example_section=/system/bin/example
54 namespace.default.search.paths = /system/${LIB}:/system/other/${LIB}
60 namespace.default.permitted.paths = /system/${LIB}
/bionic/libc/malloc_debug/
DREADME.md102 system runs too slowly with this option enabled, decreasing the maximum number
173 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/…
186 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/…
195 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/…
296 04-15 12:00:31.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so
297 …04-15 12:00:31.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne…
298 04-15 12:00:31.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so
299 04-15 12:00:31.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so
332 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so
333 …04-15 12:35:33.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne…
[all …]
DREADME_marshmallow_and_earlier.md15 On these old versions of the OS, you must be able to set system properties
39 Malloc debug is controlled by a system property that takes a numeric value
111 Using the special system property, libc.debug.malloc.program, will
/bionic/libc/arch-x86/bionic/
D__bionic_clone.S15 # Load system call arguments into registers.
29 # Make the system call.
Dsyscall.S30 # Get and save the system call entry address.
46 # Make the system call.
/bionic/libc/arch-arm64/bionic/
D__bionic_clone.S37 # Make the system call.
/bionic/libc/arch-x86_64/bionic/
Dsyscall.S54 # Make the system call.
/bionic/libc/bionic/
Dsystem.cpp39 int system(const char* command) { in system() function
/bionic/libc/tools/
DAndroid.bp16 // Generate the C++ policy sources for app and system seccomp-bpf filters.
/bionic/libc/arch-arm/bionic/
D__bionic_clone.S48 # Make the system call.
/bionic/libc/arch-riscv64/bionic/
D__bionic_clone.S39 # Make the system call.
/bionic/tests/libs/
Dheap_tagging_helper.cpp97 if (system(cmd.c_str()) == 0) { in main()
/bionic/tests/
Dstdlib_test.cpp482 TEST(stdlib, system) { in TEST() argument
485 status = system("exit 0"); in TEST()
489 status = system("exit 1"); in TEST()
499 ASSERT_NE(0, system(nullptr)); in TEST()
515 int status = system("-minus"); in TEST()
/bionic/tests/headers/posix/
Dstdlib_h.c136 FUNCTION(system, int (*f)(const char*)); in stdlib_h()
/bionic/libc/
DSYSCALLS.TXT1 # This file is used to automatically generate bionic's system call stubs.
169 # Paired off_t/off64_t system calls. On 64-bit systems,
171 # aliases. On 32-bit systems, we have two different system calls.
172 # That means that every system call in this section should take three lines.
210 # file system
DAndroid.bp68 "system/core/libcutils/include",
260 // Android uses a system property instead of /etc/localtime, so make callers crash.
263 "-DTZDIR=\"/system/usr/share/zoneinfo\"",
973 "bionic/system.cpp",
1780 "//system/core/debuggerd:__subpackages__",
1781 "//system/core/init:__subpackages__",
1782 "//system/core/libcutils:__subpackages__",
1783 "//system/memory/libmemunreachable:__subpackages__",
1784 "//system/unwinding/libunwindstack:__subpackages__",
1833 // The build system generally requires that any dependencies of a target
[all …]

12