/aosp12/system/vold/ |
H A D | Checkpoint.cpp | 490 void relocate(Relocations& relocations, sector_t dest, sector_t source, int count) { in relocate() argument 492 auto s = --relocations.upper_bound(source); in relocate() 500 for (; s != relocations.end() && s->first < source + count; ++s) in relocate() 504 auto dest_end = --relocations.upper_bound(dest + count); in relocate() 505 relocations[dest + count] = dest + count - dest_end->first + dest_end->second; in relocate() 508 relocations.erase(relocations.lower_bound(dest), relocations.lower_bound(dest + count)); in relocate() 511 relocations.insert(slice.begin(), slice.end()); in relocate() 600 auto relocation = --relocations.upper_bound(sector); in relocatedRead() 617 Relocations relocations; in cp_restoreCheckpoint() local 618 relocations[0] = 0; in cp_restoreCheckpoint() [all …]
|
/aosp12/bionic/ |
H A D | android-changes-for-ndk-developers.md | 242 relocations. That is, the code must be loaded as is and must not be 245 The usual reason for text relocations is non-position independent 272 you're not generating ELF files that claim to have text relocations, 277 linker has issued warnings about text relocations since Android K 279 relocations. 282 no text relocations are necessary. The 284 has instructions for fixing text relocations, and more detailed 463 ## Relative relocations (RELR) 465 Android added experimental support for RELR relative relocations 472 The RELR encoding is unrelated to the earlier "packed relocations" [all …]
|
/aosp12/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | DiagRelocations.inc | 3 "Please call mcld::Linker::config before creating relocations", 4 "Please call mcld::Linker::config before creating relocations")
|
/aosp12/system/chre/build/sys_support/qcom/ |
H A D | uimage_v2.lcs | 59 /* Dynamic relocations for data */ 62 /* Dynamic relocations for PLT */
|
/aosp12/bionic/benchmarks/linker_relocation/ |
H A D | README.md | 4 of shared objects with many symbols and relocations. It mimics the work involved
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | untrusted_app_27.te | 19 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
H A D | untrusted_app_25.te | 30 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | untrusted_app_27.te | 19 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
H A D | untrusted_app_25.te | 30 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | untrusted_app_27.te | 19 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
H A D | untrusted_app_25.te | 30 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
/aosp12/system/sepolicy/private/ |
H A D | untrusted_app_27.te | 19 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
H A D | untrusted_app_25.te | 30 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | untrusted_app_27.te | 31 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
H A D | untrusted_app_25.te | 46 …om/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-ap…
|
/aosp12/bionic/docs/ |
H A D | elf-tls.md | 146 // These R_TLS_DTPOFF() relocations are resolved at link-time. 318 TLSDESC relocations. 337 static relocations, then replaces the sequence with a different one of equal size. It may need to 684 * On arm64, there are different sets of static LE relocations accommodating different ranges of 711 but that could change. (Clang [briefly used][D44355] load/store relocations, but it was reverted 716 relocations should be able to accommodate a negative TP offset. 744 Pros: Minimal linker change, no change to TLS relocations. 763 * x86/x86-64 relocations probably handle positive offsets without issue 866 * ["ELF for the ARM® Architecture."][arm-elf] List TLS relocations (traditional and TLSDESC). 871 * ["ELF for the ARM® 64-bit Architecture (AArch64)."][arm64-elf] Lists TLS relocations (traditional
|
/aosp12/bionic/tests/libs/ |
H A D | Android.bp | 1537 // Check that we support all kinds of relocations: regular, "relocation packer", 1550 srcs: ["relocations.cpp"], 1568 srcs: ["relocations.cpp"], 1577 srcs: ["relocations.cpp"], 1586 srcs: ["relocations.cpp"],
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | untrusted_app_all.te | 24 # Legacy text relocations
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | untrusted_app_all.te | 24 # Legacy text relocations
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | untrusted_app_all.te | 24 # Legacy text relocations
|
/aosp12/art/runtime/ |
H A D | oat_file.cc | 1981 const uint32_t* relocations = reinterpret_cast<const uint32_t*>(data_bimg_rel_ro_begin_); in GetBootImageRelocations() local 1983 return ArrayRef<const uint32_t>(relocations, relocations_end - relocations); in GetBootImageRelocations()
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | domain.te | 810 # Do not allow the introduction of new execmod rules. Text relocations 812 # The only exceptions are for NDK text relocations associated with 828 # with text relocations. b/20013628 .
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | domain.te | 817 # Do not allow the introduction of new execmod rules. Text relocations 819 # The only exceptions are for NDK text relocations associated with 835 # with text relocations. b/20013628 .
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | domain.te | 1113 # Do not allow the introduction of new execmod rules. Text relocations 1115 # The only exceptions are for NDK text relocations associated with 1130 # Do not allow the introduction of new execmod rules. Text relocations
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | domain.te | 1114 # Do not allow the introduction of new execmod rules. Text relocations 1116 # The only exceptions are for NDK text relocations associated with 1132 # with text relocations. b/20013628 .
|