/bionic/build/ |
D | run-on-host.sh | 31 if [ ! -d /system ]; then 33 sudo mkdir -p -m 0777 /system 34 mkdir -p -m 0777 /system/bin 35 mkdir -p -m 0777 /system/lib 36 mkdir -p -m 0777 /system/lib64 51 make_link /system/bin ${i} 53 ln -fs `realpath ${TARGET_OUT}/etc` /system/ 55 make_link /system/lib ${i} 58 make_link /system/lib64 ${i}
|
/bionic/ |
D | CleanSpec.mk | 53 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib/libGLES*) 54 $(call add-clean-step, rm -f $(PRODUCT_OUT)/system/lib64/libGLES*) 63 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/lib{,64})
|
D | README.md | 32 are supplied by the system. Stuff like `__cxa_guard_acquire` and 35 #### linker/ --- /system/bin/linker and /system/bin/linker64 77 # See 'Adding system calls' later. 165 ## Adding libc wrappers for system calls 168 this system call?". The answer is usually "no". 170 The answer is "yes" if the system call is part of the POSIX standard. 172 The answer is probably "yes" if the system call has a wrapper in at 175 The answer may be "yes" if the system call has three/four distinct 182 Adding a system call usually involves: 187 2. Find the right header file to work in by looking up your system call [all …]
|
D | android-changes-for-ndk-developers.md | 10 [unwinder documentation](https://android.googlesource.com/platform/system/unwinding/+/refs/heads/ma… 83 should avoid saying something like `/system/lib/libfoo.so` and just say 117 find `/system/lib/libc.so` because it’s already loaded. This also meant 124 machine’s file system) that used to work because we ignored everything 177 disabled by setting a system property (`debug.ld.greylist_disabled`). 285 no control over where your library will be installed by the system. A 325 a misconfiguration in your build system. A missing SONAME may lead to 341 configured your build system to generate incorrect SONAME entries (using 420 whole system by using the `debug.ld.all` system property instead of
|
/bionic/docs/ |
D | EINTR.md | 5 If your code is blocked in a system call when a signal needs to be delivered, 6 the kernel needs to interrupt that system call. For something like a read(2) 13 system call, for which there is no equivalent "partial" success, such as 15 case the system call would already have returned), or there isn't. 18 errno to `EINTR`: "interrupted system call". 24 signal, so your code can just stay blocked in the system call it was already 56 In most cases, the fix is simple: wrap the system call with the 58 system call as long as the result is -1 and errno is `EINTR`. 89 something like adding an explicit loop around your system call, calculating 90 the timeout _inside_ the loop, and using `continue` each time the system call
|
D | fdsan.md | 179 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384) 180 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632) 181 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16) 182 #03 pc 00000000000003e4 /system/bin/fdsan_test (bystander()+84) 183 #04 pc 0000000000000918 /system/bin/fdsan_test 184 #05 pc 000000000006689c /system/lib64/libc.so (__pthread_start(void*)+36) 185 #06 pc 000000000000712c /system/lib64/libc.so (__start_thread+68) 220 #00 pc 0000000000008d90 /system/lib64/libc.so (fdsan_error(char const*, ...)+384) 221 #01 pc 0000000000008ba8 /system/lib64/libc.so (android_fdsan_close_with_tag+632) 222 #02 pc 00000000000092a0 /system/lib64/libc.so (close+16) [all …]
|
D | native_allocator.md | 45 system. It is meant to be called after a call to `malloc_disable` to 125 If there are multiple devices connected to the system, use `-s <SERIAL>` 296 run on a trace of the allocations from a real world application or system 301 mmma -j system/extras/memory_replay 305 /system/bin/memory_replay32 306 /system/bin/memory_replay64 332 adb push system/extras/memory_replay/traces /data/local/tmp 374 tracking fragmentation is system\_server.txt which is an extremely long 387 system/extras/memory_replay/NativeInfo.cpp
|
D | defines.md | 11 the system property functions. Common alternatives on this dimension are 39 choice when you use Linux-specific API, such as a Linux-specific system call or
|
D | status.md | 71 * New system call wrappers: `__riscv_flush_icache` (`<sys/cachectl.h>`), 97 * New system call wrappers: `preadv2`, `preadv64v2`, `pwritev2`, 107 * New system call wrappers: `pidfd_getfd`, `pidfd_open`, `pidfd_send_signal`, 184 * 2 new Linux system calls `quotactl` and `sync_file_range` 418 whatever build system they're using. The exact subset of FORTIFY available to
|
/bionic/linker/ |
D | ld.config.format.md | 3 This document describes format of /system/etc/ld.config.txt file. This file can be used to customize 30 dir.example_section=/system/bin/example 54 namespace.default.search.paths = /system/${LIB}:/system/other/${LIB} 60 namespace.default.permitted.paths = /system/${LIB}
|
/bionic/libc/malloc_debug/ |
D | README.md | 102 system runs too slowly with this option enabled, decreasing the maximum number 173 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 186 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 195 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 296 04-15 12:00:31.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so 297 …04-15 12:00:31.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne… 298 04-15 12:00:31.305 7412 7412 E malloc_debug: #02 pc 000a9e38 /system/lib/libc++.so 299 04-15 12:00:31.305 7412 7412 E malloc_debug: #03 pc 000a28a8 /system/lib/libc++.so 332 04-15 12:35:33.305 7412 7412 E malloc_debug: #00 pc 00029310 /system/lib/libc.so 333 …04-15 12:35:33.305 7412 7412 E malloc_debug: #01 pc 00021438 /system/lib/libc.so (ne… [all …]
|
D | README_marshmallow_and_earlier.md | 15 On these old versions of the OS, you must be able to set system properties 39 Malloc debug is controlled by a system property that takes a numeric value 111 Using the special system property, libc.debug.malloc.program, will
|
/bionic/libc/arch-x86/bionic/ |
D | __bionic_clone.S | 15 # Load system call arguments into registers. 29 # Make the system call.
|
D | syscall.S | 30 # Get and save the system call entry address. 46 # Make the system call.
|
/bionic/libc/arch-arm64/bionic/ |
D | __bionic_clone.S | 37 # Make the system call.
|
/bionic/libc/arch-x86_64/bionic/ |
D | syscall.S | 54 # Make the system call.
|
/bionic/libc/bionic/ |
D | system.cpp | 39 int system(const char* command) { in system() function
|
/bionic/libc/tools/ |
D | Android.bp | 16 // Generate the C++ policy sources for app and system seccomp-bpf filters.
|
/bionic/libc/arch-arm/bionic/ |
D | __bionic_clone.S | 48 # Make the system call.
|
/bionic/libc/arch-riscv64/bionic/ |
D | __bionic_clone.S | 39 # Make the system call.
|
/bionic/tests/libs/ |
D | heap_tagging_helper.cpp | 97 if (system(cmd.c_str()) == 0) { in main()
|
/bionic/tests/ |
D | stdlib_test.cpp | 482 TEST(stdlib, system) { in TEST() argument 485 status = system("exit 0"); in TEST() 489 status = system("exit 1"); in TEST() 499 ASSERT_NE(0, system(nullptr)); in TEST() 515 int status = system("-minus"); in TEST()
|
/bionic/tests/headers/posix/ |
D | stdlib_h.c | 136 FUNCTION(system, int (*f)(const char*)); in stdlib_h()
|
/bionic/libc/ |
D | SYSCALLS.TXT | 1 # This file is used to automatically generate bionic's system call stubs. 169 # Paired off_t/off64_t system calls. On 64-bit systems, 171 # aliases. On 32-bit systems, we have two different system calls. 172 # That means that every system call in this section should take three lines. 210 # file system
|
D | Android.bp | 68 "system/core/libcutils/include", 260 // Android uses a system property instead of /etc/localtime, so make callers crash. 263 "-DTZDIR=\"/system/usr/share/zoneinfo\"", 973 "bionic/system.cpp", 1780 "//system/core/debuggerd:__subpackages__", 1781 "//system/core/init:__subpackages__", 1782 "//system/core/libcutils:__subpackages__", 1783 "//system/memory/libmemunreachable:__subpackages__", 1784 "//system/unwinding/libunwindstack:__subpackages__", 1833 // The build system generally requires that any dependencies of a target [all …]
|