Searched refs:program (Results 1 – 14 of 14) sorted by relevance
/bionic/libc/malloc_debug/ |
D | README_marshmallow_and_earlier.md | 99 When the program completes, all of the allocations that are still live 111 Using the special system property, libc.debug.malloc.program, will 113 if the property is set to ls, then only the program named ls will have malloc 126 adb shell setprop libc.debug.malloc.program ls
|
D | README.md | 145 dump heap data to be dumped to a file when the program exits. If the backtrace 155 the program exits and backtrace\_dump\_on\_exit is set. 161 when the program exits will be backtrace\_dump\_prefix.**PID**.exit.txt. 279 being placed on the list. When the program terminates, all of the allocations 318 Track all live allocations. When the program terminates, all of the live 322 free everything before the program terminates. 672 adb shell setprop libc.debug.malloc.program ls 678 adb shell setprop libc.debug.malloc.program app_process 734 program/application (Android O or later):
|
/bionic/libc/malloc_hooks/ |
D | README.md | 4 Malloc hooks allows a program to intercept all allocation/free calls that 9 property, or set a special environment variable and run your app/program. 105 Enable malloc hooks for a specific program/application:
|
/bionic/libc/bionic/ |
D | malloc_common_dynamic.cpp | 232 char program[PROP_VALUE_MAX]; in CheckLoadMallocDebug() local 233 if (__system_property_get(kDebugPropertyProgram, program) != 0 && in CheckLoadMallocDebug() 234 strstr(getprogname(), program) == nullptr) { in CheckLoadMallocDebug()
|
/bionic/docs/ |
D | EINTR.md | 27 C program that doesn't use any libraries, you can't realistically make this
|
D | native_allocator.md | 334 Since all of the traces come from applications, the `memory_replay` program 343 program also can process text files, but all trace files are currently
|
D | fdsan.md | 123 When running the program, the threads' executions will be interleaved as follows:
|
D | elf-tls.md | 22 object or executable. At program startup, TLS for all initially-loaded modules comprises the "Static 847 * It looks like glibc's ld.so re-relocates itself after loading a program, so a program's symbols
|
D | clang_fortify_anatomy.md | 141 program if more bytes are written than what is allowed. 390 This function itself boils down to a few small branches which abort the program
|
D | status.md | 397 overrun is detected, the program is safely aborted as in this
|
/bionic/ |
D | README.md | 38 has a `DT_INTERP` entry that says "use the following program to start me". On 264 than 2GiB, say -- so you may end up just writing a "meaningless" program whose
|
D | android-changes-for-ndk-developers.md | 377 $ readelf --program-headers -W libBadFlags.so | grep WE
|
/bionic/tests/libs/ |
D | Android.bp | 194 // Library used by dlext tests - with GNU RELRO program header 205 // Library used by dlext tests - without GNU RELRO program header
|
/bionic/libc/ |
D | NOTICE | 3229 ("CBOSS"), as part of the DARPA CHATS research program.
|