Home
last modified time | relevance | path

Searched refs:segment (Results 1 – 11 of 11) sorted by relevance

/bionic/libc/bionic/
Dbionic_elf_tls.cpp269 if (module.segment.init_size == 0) { in __init_static_tls()
275 module.segment.init_ptr, in __init_static_tls()
276 module.segment.init_size); in __init_static_tls()
375 const TlsSegment& segment = modules.module_table[module_idx].segment; in tls_get_addr_slow_path() local
379 mod_ptr = __libc_shared_globals()->tls_allocator.memalign(segment.aligned_size.align.value, in tls_get_addr_slow_path()
380 segment.aligned_size.size); in tls_get_addr_slow_path()
381 if (segment.init_size > 0) { in tls_get_addr_slow_path()
382 memcpy(mod_ptr, segment.init_ptr, segment.init_size); in tls_get_addr_slow_path()
389 mod_ptr, static_cast<void*>(static_cast<char*>(mod_ptr) + segment.aligned_size.size)); in tls_get_addr_slow_path()
Dlibc_init_static.cpp140 if (__bionic_get_tls_segment(phdr_start, phdr_ct, 0, &mod.segment)) { in layout_static_tls()
141 if (!__bionic_check_tls_align(mod.segment.aligned_size.align.value)) { in layout_static_tls()
143 progname, mod.segment.aligned_size.align.value); in layout_static_tls()
145 mod.static_offset = layout.reserve_exe_segment_and_tcb(&mod.segment, progname); in layout_static_tls()
/bionic/linker/
Dlinker_tls.cpp79 .segment = si_tls->segment, in register_tls_module()
120 …register_tls_module(somain, layout.reserve_exe_segment_and_tcb(&somain->get_tls()->segment, progna… in linker_setup_exe_static_tls()
153 static_offset = layout.reserve_solib_segment(si_tls->segment); in register_soinfo_tls()
Dlinker_soinfo.h151 TlsSegment segment; member
Dlinker.cpp2876 tls_->segment = tls_segment; in prelink_image()
/bionic/libc/private/
Dbionic_elf_tls.h85 size_t reserve_solib_segment(const TlsSegment& segment) { return reserve(segment.aligned_size); } in reserve_solib_segment()
128 TlsSegment segment; member
/bionic/tests/libs/
Dsegment_gap_outer.lds14 # Now create the gap. We need a text segment first to prevent the linker from
/bionic/docs/
Delf-tls.md40 an executable, the linker needs to know where an executable's TLS segment is relative to the TP so
45 if it hasn't been allocated yet). If the executable has a TLS segment, then it will always be module
102 segment.
482 XXX: A dynamic executable using ELF TLS would have a PT_TLS segment and no other distinguishing
733 * Add a `PT_ANDROID_TLS_TPOFF` segment?
750 TP-to-TLS-segment offset.
780 The layout conflict is apparently only a problem because an executable assumes that its TLS segment
782 shared object can still use the efficient IE access model, but its TLS segment offset is known at
784 LE, then the Bionic loader can place the executable's TLS segment at any offset from the TP, leaving
825 AOSP hikey960 build, only `/system/bin/netd` has a TLS segment, and it's only 32 bytes. As long as
[all …]
/bionic/libc/kernel/uapi/linux/
Dvfio.h230 __u16 segment; member
Dv4l2-controls.h1294 struct v4l2_vp8_segment segment; member
/bionic/
Dandroid-changes-for-ndk-developers.md369 Each segment in an ELF file has associated flags that tell the