Searched refs:dynamic (Results 1 – 20 of 20) sorted by relevance
/bionic/tests/libs/ |
D | segment_gap_outer.lds | 2 # This starts off fairly normal: rodata, text, dynamic, data, bss with 9 .dynamic : {*(.dynamic)}
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 21 Our general practice with dynamic linker behavior changes is that they 33 * On a developer preview build, dynamic linker warnings will also show up 43 on the dynamic linker's search path. This meant that apps 47 dynamic linker's caching code cached failures too, so it was necessary 69 in that order. For API level 23 and later, for any given library, the dynamic 75 libraries. The API level 23 dynamic linker searches the global group followed by 84 `libfoo.so` instead, letting the dynamic linker find the correct library 101 symbol lookup and is supported by Android's dynamic linker in API level 23 and 110 The dynamic linker now understands the difference 119 `"dir2/libx.so"` --- the dynamic linker couldn’t tell the difference [all …]
|
D | README.md | 4 C library, math library, and dynamic linker. 24 The dynamic linker interface library. This is actually just a bunch of stubs 25 that the dynamic linker replaces with pointers to its own implementation at 37 The dynamic linker. When you run a dynamically-linked executable, its ELF file
|
/bionic/tests/ |
D | link_test.cpp | 156 static r_debug* find_exe_r_debug(ElfW(Dyn)* dynamic) { in find_exe_r_debug() argument 157 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in find_exe_r_debug() 188 ElfW(Dyn)* dynamic; in TEST() 202 .dynamic = find_dynamic({ info->dlpi_phdr, info->dlpi_phnum }, info->dlpi_addr) in TEST() 219 ASSERT_EQ(info.dynamic, map->l_ld); in TEST()
|
D | Android.bp | 758 // Library of all tests (excluding the dynamic linker tests). 1050 ldflags: ["-Wl,--export-dynamic"], 1303 "-Wl,--export-dynamic",
|
/bionic/benchmarks/linker_relocation/ |
D | README.md | 3 This benchmark measures the time spent in the dynamic linker to load a large set 15 static and dynamic linkers.
|
D | run_bench_with_ninja.sh | 40 --linker LINKER Run the benchmark using a specific dynamic linker
|
/bionic/linker/ |
D | linker_phdr.h | 57 const ElfW(Dyn)* dynamic() const { return dynamic_; } in ElfW() 152 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic,
|
D | linker_soinfo.h | 177 ElfW(Dyn)* dynamic; 467 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) { in for_each_dt_needed()
|
D | linker_main.cpp | 372 si->dynamic = nullptr; in linker_main() 754 tmp_linker_so.dynamic = nullptr; in __linker_init() 795 for (const ElfW(Dyn)* d = tmp_linker_so.dynamic; d->d_tag != DT_NULL; ++d) { in __linker_init_post_relocation()
|
D | ld.config.format.md | 4 linker-namespace setup for dynamic executables.
|
D | linker.cpp | 284 map->l_ld = info->dynamic; in notify_gdb_of_load() 1102 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in for_each_dt_needed() 1283 for (const ElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { in load_library() 2840 phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags); in prelink_image() 2849 if (dynamic == nullptr) { in prelink_image() 2856 DEBUG("dynamic = %p", dynamic); in prelink_image() 2885 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image() 3294 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { in prelink_image()
|
D | linker_phdr.cpp | 1377 ElfW(Addr) load_bias, ElfW(Dyn)** dynamic, in phdr_table_get_dynamic_section() argument 1379 *dynamic = nullptr; in phdr_table_get_dynamic_section() 1383 *dynamic = reinterpret_cast<ElfW(Dyn)*>(load_bias + phdr.p_vaddr); in phdr_table_get_dynamic_section()
|
D | Android.bp | 331 // static_executable. This dynamic linker is actually a shared object linked with static 384 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
|
/bionic/docs/ |
D | elf-tls.md | 13 compiler, linker, dynamic loader, and libc. 93 R_TLS_DTPMOD(tls_var), // dynamic TP module ID 94 R_TLS_DTPOFF(tls_var), // dynamic TP offset 100 `R_TLS_DTPMOD` is a dynamic relocation to the index of the module containing `tls_var`, and 101 `R_TLS_DTPOFF` is a dynamic relocation to the offset of `tls_var` within its module's `PT_TLS` 141 // a dynamic relocation against symbol 0 => current module ID 154 variable with a dynamic initializer has an associated TLS guard variable.) 174 // allocated in the .got, resolved at load-time with a dynamic reloc. 255 // allocated in the .got, uses a dynamic relocation 261 The dynamic loader fills in the TLS descriptors. For a reference to a variable allocated in the [all …]
|
D | README.md | 4 C library, math library, and dynamic linker.
|
D | status.md | 75 * Added `LD_SHOW_AUXV` to the dynamic linker to dump the ELF auxiliary
|
D | clang_fortify_anatomy.md | 839 ….llvm.org/14.0.0/tools/clang/docs/AttributeReference.html#pass-object-size-pass-dynamic-object-size
|
/bionic/libc/ |
D | Android.bp | 1472 // This is a version of the static C library used by the dynamic linker that exclude malloc. It also
|
D | NOTICE | 4459 dynamic updates in TCP/IP networks by means of the Software. No immunity is
|