Home
last modified time | relevance | path

Searched refs:x86 (Results 1 – 25 of 31) sorted by relevance

12

/bionic/libc/
Dlibc.map.txt12 __connect; # arm x86 introduced=21
20 __epoll_pwait; # arm x86 introduced=21
22 __exit; # arm x86 introduced=21
23 __fadvise64; # x86 introduced=21
25 __fcntl64; # arm x86
29 __fgets_chk; # introduced-arm=17 introduced-arm64=21 introduced-x86=17 introduced-x86_64=21
41 __fstatfs64; # arm x86
44 __getcpu; # arm x86 introduced-arm=12 introduced-x86=12
45 __getcwd; # arm x86
46 __getpid; # arm x86 introduced=21
[all …]
Dlibstdc++.map.txt8 _Znaj; # arm x86 weak
9 _ZnajRKSt9nothrow_t; # arm x86 weak
12 _Znwj; # arm x86 weak
13 _ZnwjRKSt9nothrow_t; # arm x86 weak
DAndroid.bp181 x86: {
183 "arch-x86/bionic/__libc_init_sysinfo.cpp",
184 "arch-x86/bionic/__libc_int0x80.S",
185 "arch-x86/bionic/__set_tls.cpp",
368 x86: {
613 x86: {
615 // x86 has custom implementations of all of these.
1128 x86: {
1130 "arch-x86/bionic/__bionic_clone.S",
1131 "arch-x86/bionic/_exit_with_stack_teardown.S",
[all …]
DSYSCALLS.TXT10 # arch ::= "arm" | "arm64" | "riscv64" | "x86" | "x86_64" | "lp32" | "lp64"
199 int __fadvise64:fadvise64_64(int, off64_t, off64_t, int) x86
276 # sockets for x86. These are done as an "indexed" call to socketcall syscall.
277 int __socket:socketcall:1(int, int, int) x86
278 int bind:socketcall:2(int, struct sockaddr*, int) x86
279 int __connect:socketcall:3(int, struct sockaddr*, socklen_t) x86
280 int listen:socketcall:4(int, int) x86
281 int getsockname:socketcall:6(int, struct sockaddr*, socklen_t*) x86
282 int getpeername:socketcall:7(int, struct sockaddr*, socklen_t*) x86
283 int __socketpair:socketcall:8(int, int, int, int*) x86
[all …]
DSECCOMP_ALLOWLIST_COMMON.TXT25 pid_t vfork() arm,x86,x86_64
37 int open(const char*, int, ...) arm,x86,x86_64
38 int stat64(const char*, stat64*) arm,x86
39 ssize_t readlink(const char*, char*, size_t) arm,x86,x86_64
40 int stat(const char*, stat*) arm,x86,x86_64
DSECCOMP_ALLOWLIST_APP.TXT49 void* mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset) x86
62 int renameat(int, const char*, int, const char*) arm,x86,arm64,x86_64
/bionic/tools/versioner/platforms/
Dlibc.map.txt12 __connect; # arm x86 introduced=21
20 __epoll_pwait; # arm x86 introduced=21
22 __exit; # arm x86 introduced=21
23 __fadvise64; # x86 introduced=21
25 __fcntl64; # arm x86
29 __fgets_chk; # introduced-arm=17 introduced-arm64=21 introduced-x86=17 introduced-x86_64=21
41 __fstatfs64; # arm x86
44 __getcpu; # arm x86 introduced-arm=12 introduced-x86=12
45 __getcwd; # arm x86
46 __getpid; # arm x86 introduced=21
[all …]
Dcrtbegin.map.txt6 atexit; # arm64 x86 x86_64
/bionic/libm/
Dlibm.map.txt30 cabsl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=23
75 cprojl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=23
85 csqrtl; # introduced-arm=21 introduced-arm64=23 introduced-x86=21 introduced-x86_64=23
113 feclearexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
114 fedisableexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
115 feenableexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
116 fegetenv; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
117 fegetexcept; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
118 fegetexceptflag; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
119 fegetround; # introduced-arm=21 introduced-arm64=21 introduced-x86=9 introduced-x86_64=21
[all …]
/bionic/tools/versioner/tests/arch_specific/platforms/
Dlibc.map.txt3 foo; # arm x86
4 bar; # x86
/bionic/tools/versioner/src/
DArch.h32 x86, enumerator
126 Arch::x86,
134 { Arch::x86, "i686-linux-android" },
146 { Arch::x86, 9 },
DArch.cpp34 case Arch::x86: in to_string()
48 {"x86", Arch::x86},
/bionic/benchmarks/
Drun-on-host.sh19 if [ ${HOST_OS}-${HOST_ARCH} = linux-x86 -o ${HOST_OS}-${HOST_ARCH} = linux-x86_64 ]; then
23 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then
/bionic/tests/
Drun-on-host.sh25 if [ ${HOST_OS}-${HOST_ARCH} = linux-x86 -o ${HOST_OS}-${HOST_ARCH} = linux-x86_64 ]; then
30 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then
DAndroid.bp114 x86: {
115 srcs: ["prebuilt-elf-files/x86/libtest_invalid-rw_load_segment.so"],
140 x86: {
141 srcs: ["prebuilt-elf-files/x86/libtest_invalid-unaligned_shdr_offset.so"],
166 x86: {
167 srcs: ["prebuilt-elf-files/x86/libtest_invalid-zero_shentsize.so"],
192 x86: {
193 srcs: ["prebuilt-elf-files/x86/libtest_invalid-zero_shstrndx.so"],
218 x86: {
219 srcs: ["prebuilt-elf-files/x86/libtest_invalid-empty_shdr_table.so"],
[all …]
/bionic/libdl/
DAndroid.bp84 // for x86, exclude libgcc_eh.a for the same reasons as above
97 x86: {
103 version_script: ":libdl.x86.map",
184 // for x86, exclude libgcc_eh.a for the same reasons as above
186 x86: {
265 name: "libdl.x86.map",
266 out: ["libdl.x86.map.txt"],
269 cmd: "$(location generate-version-script) x86 $(in) $(out)",
/bionic/tools/versioner/tests/arch_specific/
Drun.sh1 versioner headers -p platforms -r arm -r x86 -a 9 -i
/bionic/tools/versioner/tests/dependencies/
Drun.sh1 versioner headers dependencies -p platforms -r arm -r x86 -a 9
/bionic/tools/versioner/tests/missing_arch/
Drun.sh1 versioner headers -p platforms -r arm -r x86 -a 9 -i
/bionic/docs/
Delf-tls.md325 x86, x86-64).
352 x86 | yes | yes | yes
361 x86 (experimental) | yes | yes | unsupported relocs
388 LLDB more-or-less implemented Linux TLS debugging in [r192922][rL192922] ([D1944]) for x86 and
389 x86-64. [arm64 support came later][D5073]. However, the Linux TLS functionality no longer does
440 There are ptrace interfaces for reading the thread pointer for each of arm32, arm64, x86, and x86-64
476 * On arm32, x86, and x86_64, the loader [should reject a TLS relocation]. (XXX: I haven't verified
610 by GCC on x86 (and x86-64), where it is compatible with x86's TLS variant 2. We [modified Clang
625 * On x86/x86-64, it uses a fixed offset from the thread pointer (TP+0xf8 or TP+0x1d0) and
630 * x86: https://go-review.googlesource.com/c/go/+/16678
[all …]
/bionic/benchmarks/spawn/
DAndroid.bp100 // When this binary is installed to host/linux-x86/bin, its runpath is ${ORIGIN}/../lib64, which
101 // is fine for finding host/linux-x86/lib64/libc++.so. When it's installed to
102 // host/linux-x86/benchmarktest64/bionic-spawn-benchmarks, the runpath needs an extra "..". This
/bionic/build/
Dcoverage.sh22 LLVM_PROFDATA=${ANDROID_BUILD_TOP}/prebuilts/clang/host/linux-x86/llvm-binutils-stable/llvm-profdata
23 LLVM_COV=${ANDROID_BUILD_TOP}/prebuilts/clang/host/linux-x86/llvm-binutils-stable/llvm-cov
Drun-on-host.sh28 if [ ${TARGET_ARCH} = x86 -o ${TARGET_ARCH} = x86_64 ]; then
/bionic/tests/prebuilt-elf-files/
Dgen-libtest_invalid-local-tls.sh29 build x86 i686-linux-android29
/bionic/linker/
DAndroid.bp81 x86: {
241 "arch/x86/begin.S",
264 x86: {
310 x86: {
500 // for x86, exclude libgcc_eh.a for the same reasons as above
502 x86: {

12