History log of /bionic/libdl/ (Results 1 – 25 of 129)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
Revision tags: android-11.0.0_r8, android-11.0.0_r7, m/android-11.0.0_r8, android-vts-10.0_r5, android-vts-11.0_r1, android-security-11.0.0_r1, android-platform-11.0.0_r1, android-cts-11.0_r1, android-11.0.0_r5, android-11.0.0_r4, android-11.0.0_r3, android-11.0.0_r2, android-11.0.0_r1, platform-tools-30.0.4, android-mainline-11.0.0_r2, android-r-beta-3, android-r-beta-2, android-mainline-11.0.0_r1, platform-tools-30.0.3, platform-tools-30.0.2, android-mainline-10.0.0_r11, platform-tools-30.0.1, platform-tools-30.0.0, android-r-preview-4, android-r-preview-3, android-r-preview-2
b11f7ffc18-Mar-2020 TreeHugger Robot

Merge "Revert "Statically link libdl.a to linker"" into rvc-dev

515a0e2e17-Mar-2020 Jooyung Han

Revert "Statically link libdl.a to linker"

This reverts commit ec829ed4ea3e0b2e1444ee4dfef660c49e392292.

Reason for revert: This workaround is not necessary with ag/10700799

Revert "Statically link libdl.a to linker"

This reverts commit ec829ed4ea3e0b2e1444ee4dfef660c49e392292.

Reason for revert: This workaround is not necessary with ag/10700799

Change-Id: I2bf469bfe00f3a70e67085abfb3822db6908d522
Bug: 150860940

show more ...

7a17cb4e13-Mar-2020 Jooyung Han

Merge "Add 29 to stubs.versions of libc/libdl/libm" into rvc-dev

ec829ed406-Mar-2020 Jiyong Park

Statically link libdl.a to linker

When libbase is built for an APEX, it uses dlsym to reflectively access
liblog symbols that are added in R. This is because the APEX where
libbasse

Statically link libdl.a to linker

When libbase is built for an APEX, it uses dlsym to reflectively access
liblog symbols that are added in R. This is because the APEX where
libbasse is packaged into might be running in pre-R devices where the
symbols don't exist in liblog.so.

This however causes a problem for a static executable in an APEX. Since
it is in an APEX, the dlsym is used. But libdl.so which provides dlsym
is not available to static executable. Currently, the dynamic linker is
the only executable in an APEX that all of its dependencies are
statically linked. Fixing the issue by providing fake dlsym by
statically linking to libdl.a.

Bug: 149569129
Test: m

Change-Id: I2e9e45d9876c2d6c878e541715389e6d1ef56996

show more ...

Revision tags: platform-tools-29.0.6, android-r-preview-1, android-vts-9.0_r14, android-vts-9.0_r13, android-vts-9.0_r12, android-cts-9.0_r13, android-cts-9.0_r12, android-cts-9.0_r11
f4e3d42f11-Jan-2020 Peter Collingbourne

Delete definitions of __aeabi_unwind_cpp_pr0.

These are no longer necessary now that LLVM no longer emits references to
this symbol on Android.

Bug: 144430859
Merged-In: I6c

Delete definitions of __aeabi_unwind_cpp_pr0.

These are no longer necessary now that LLVM no longer emits references to
this symbol on Android.

Bug: 144430859
Merged-In: I6c43338f755ce5a79e2df36bd3f2006a748fab27
(cherry picked from commit 27c1e220361b0b3ab0b8fae35e8767935e8680ec)
Change-Id: I6c43338f755ce5a79e2df36bd3f2006a748fab27

show more ...

7128923e27-Feb-2020 Jooyung Han

Add 29 to stubs.versions of libc/libdl/libm

Stubs of version 29 should be provided to those APEX modules targeting
previous SDK release.

Bug: 145796956
Test: m
Merged-In

Add 29 to stubs.versions of libc/libdl/libm

Stubs of version 29 should be provided to those APEX modules targeting
previous SDK release.

Bug: 145796956
Test: m
Merged-In: I9454fbf81377aba25e75a6fdfc77cbb070eaadde
Change-Id: I9454fbf81377aba25e75a6fdfc77cbb070eaadde
(cherry picked from commit 26ddc4dccf13a56aee8bd0941cdf2c001d186e72)

show more ...

5a39cee122-Jan-2020 Yifan Hong

Make ramdisk_available.

Test: pass
Bug: 147347110
Change-Id: I142311a7558a19d209bcd63207a88e12cf6f130e

Revision tags: android-vts-10.0_r4, android-vts-10.0_r3, android-cts-10.0_r5, android-cts-10.0_r4, android-cts-10.0_r3, android-mainline-10.0.0_r6, android-mainline-10.0.0_r8
3274cc4611-Nov-2019 Martin Stjernholm

Reland "Add libdl_android to the Runtime (aka Bionic) APEX".

Before this it ended up in /system.

Test: build & boot
Test: adb shell find system apex -name libdl_android.so | xar

Reland "Add libdl_android to the Runtime (aka Bionic) APEX".

Before this it ended up in /system.

Test: build & boot
Test: adb shell find system apex -name libdl_android.so | xargs adb shell ls -l
=>
apex/com.android.runtime/lib/bionic/libdl_android.so
apex/com.android.runtime/lib64/bionic/libdl_android.so
apex/com.android.runtime@1/lib/bionic/libdl_android.so
apex/com.android.runtime@1/lib64/bionic/libdl_android.so
system/lib/bootstrap/libdl_android.so
system/lib/libdl_android.so -> /apex/com.android.runtime/lib/bionic/libdl_android.so
system/lib64/bootstrap/libdl_android.so
system/lib64/libdl_android.so -> /apex/com.android.runtime/lib64/bionic/libdl_android.so
Test: atest CtsBionicTestCases
Test: Repro in b/144343305#comment8 together with ag/9754153
Bug: 135753770
Bug: 144343305
Change-Id: I9ccd10b711223ca474e91741711b7b8efd521b2d

show more ...

c74666eb08-Nov-2019 Yuexi Ma

Revert submission of topic 'libdl_android-in-apex'

Reason for revert: broke numerous major apps in app compat testing
Bug: 144100240

Change-Id: I50b440356bdbde3ac130da5d28d5ef20

Revert submission of topic 'libdl_android-in-apex'

Reason for revert: broke numerous major apps in app compat testing
Bug: 144100240

Change-Id: I50b440356bdbde3ac130da5d28d5ef20f8b63582

show more ...

a3b0eab306-Nov-2019 Martin Stjernholm

Add libdl_android to the Runtime APEX.

Before this it ended up in /system.

Test: build & boot
Test: adb shell find system apex -name libdl_android.so | xargs adb shell ls -l

Add libdl_android to the Runtime APEX.

Before this it ended up in /system.

Test: build & boot
Test: adb shell find system apex -name libdl_android.so | xargs adb shell ls -l
=>
apex/com.android.runtime/lib/bionic/libdl_android.so
apex/com.android.runtime/lib64/bionic/libdl_android.so
apex/com.android.runtime@1/lib/bionic/libdl_android.so
apex/com.android.runtime@1/lib64/bionic/libdl_android.so
system/lib/bootstrap/libdl_android.so
system/lib/libdl_android.so -> /apex/com.android.runtime/lib/bionic/libdl_android.so
system/lib64/bootstrap/libdl_android.so
system/lib64/libdl_android.so -> /apex/com.android.runtime/lib64/bionic/libdl_android.so
Bug: 135753770
Change-Id: Ibabb5714e8cc0454c77ae5d42d9650c345ff1b89

show more ...

Revision tags: platform-tools-29.0.5
22a6a05811-Oct-2019 Ryan Prichard

Move dl_unwind_find_exidx from libdl.a to libc.a

arm32 has two special APIs to find exidx exception handling info,
dl_unwind_find_exidx and __gnu_Unwind_Find_exdix. The two functions hav

Move dl_unwind_find_exidx from libdl.a to libc.a

arm32 has two special APIs to find exidx exception handling info,
dl_unwind_find_exidx and __gnu_Unwind_Find_exdix. The two functions have
identical behavior and function prototypes. libgcc's arm32 unwinder calls
__gnu_Unwind_Find_exdix, whereas LLVM's libunwind previously called
__gnu_Unwind_Find_exdix, but switched to dl_unwind_find_exidx as a result
of three patches (D30306, D30681, D39468).

In Bionic, for dynamic linking, __gnu_Unwind_Find_exdix in libc.so calls
dl_unwind_find_exidx in libdl.so.

For static executables, though, __gnu_Unwind_Find_exdix in libc.a used the
__exidx_* symbols, while dl_unwind_find_exidx in libdl.a(libdl_static.o)
was a return-0 no-op.

To fix the LLVM unwinder, replace the no-op dl_unwind_find_exidx in
libdl.a with a real function in libc.a(exidx_static.o), and have the GNU
function call the dl function for more consistency with dynamic linking.

dl_iterate_phdr follows a similar pattern, where the function exists in
libc.a and libdl.so (not libc.so or libdl.a).

This change makes unwinding work with an updated libunwind_llvm on arm32,
and it helps to allow unwinding in static executables without libdl.a.

Bug: https://github.com/android/ndk/issues/1094
Bug: http://b/141485154
Test: NDK tests, bionic unit tests
Change-Id: Ieeeb9b39a0e28544e21f9afe6fe51ef10d7c828c

show more ...

e87e0dcb02-Oct-2019 Jiyong Park

Restrict the availability of the bionic libs

The bionic libs are now restricted to be in the runtime APEX and the
platform (for bootstrapping). It can still be referenced from other

Restrict the availability of the bionic libs

The bionic libs are now restricted to be in the runtime APEX and the
platform (for bootstrapping). It can still be referenced from other
APEXes but can't be included there.

Bug: 139870423
Test: m
Change-Id: I7f99eef27ccf75844ca5c9a7ea866496841b738f

show more ...

Revision tags: ndk-r21d, ndk-r21c, ndk-r21b, ndk-r21-rc1, ndk-r21-beta2, ndk-r21-beta1, ndk-r21, android-vts-10.0_r2, android-cts-10.0_r2, platform-tools-29.0.4, platform-tools-29.0.3
191ecdc408-Aug-2019 Peter Collingbourne

Fix a few bionic test failures caused by hwasan global instrumentation.

The call to the load hook needs to be moved before the call to link_image()
because the latter calls ifunc resolve

Fix a few bionic test failures caused by hwasan global instrumentation.

The call to the load hook needs to be moved before the call to link_image()
because the latter calls ifunc resolvers which might access global
variables. This fixes a bunch of ifunc tests.

The dlfcn.segment_gap test is currently failing. One problem is that the name
of the .bss.end_of_gap section changes as a result of global instrumentation.
Add some wildcards in so that we match both names. The other problem seems
to be the same as b/139089152.

It turns out that we need to untag pointers in a few more places. Since we have
quite a few of these now it seems worth creating a function for it.

Test: bionic-unit-tests
Change-Id: I44e2b0904faacdda7cc0c5e844ffc09de01dea2d

show more ...

Revision tags: android-cts-9.0_r9, android-cts-9.0_r10, platform-tools-29.0.2
45f0a3b617-Jul-2019 Peter Collingbourne

Clear pointer tags as required for HWASAN for globals.

A future version of HWASAN will set pointer tags when taking the address of
a global. This means that we need to untag pointers in

Clear pointer tags as required for HWASAN for globals.

A future version of HWASAN will set pointer tags when taking the address of
a global. This means that we need to untag pointers in a couple of cases
where potential global pointers are passed to an interface that expects
untagged pointers:

- The WriteProtected class, whose only instances are globals, passes its
own address to mprotect. However, our device kernels do not currently
untag pointers passed to mprotect (the proposed upstream kernel patches
do, however, untag these pointers), so once HWASAN starts tagging global
pointers, this will start failing.
- The shadow_load function loads from a shadow that corresponds to the
address space bounds of loaded binaries. Since these address space
bounds are untagged, the pointer needs to be untagged to match.

Test: boots
Change-Id: I3f11ce6eb7261752e5ff6d039d04dd45516b236f

show more ...

Revision tags: android-o-mr1-iot-release-1.0.14, android-vts-10.0_r1, android-cts-10.0_r1, android-10.0.0_r6, android-10.0.0_r5, android-10.0.0_r47, android-10.0.0_r46, android-10.0.0_r4, android-10.0.0_r3, android-10.0.0_r2, android-10.0.0_r17, android-10.0.0_r11, android-10.0.0_r10, android-10.0.0_r1, android-10.0.0_r9, android-10.0.0_r8, android-10.0.0_r7, android-10.0.0_r14, android-10.0.0_r13, android-10.0.0_r12, android-10.0.0_r29, android-10.0.0_r28, android-10.0.0_r27, android-10.0.0_r26, android-10.0.0_r25, android-10.0.0_r24, android-10.0.0_r23, android-10.0.0_r22, android-10.0.0_r21, android-10.0.0_r20, android-10.0.0_r19, android-10.0.0_r18, android-10.0.0_r16, android-10.0.0_r15, android-mainline-10.0.0_r3, android-mainline-10.0.0_r2, android-mainline-10.0.0_r1, android-mainline-10.0.0_r9, android-mainline-10.0.0_r7, android-mainline-10.0.0_r5, android-mainline-10.0.0_r4, android-mainline-10.0.0_r10, android-10.0.0_r45, android-10.0.0_r44, android-10.0.0_r43, android-10.0.0_r42, android-10.0.0_r41, android-10.0.0_r40, android-10.0.0_r39, android-10.0.0_r38, android-10.0.0_r37, android-10.0.0_r36, android-10.0.0_r35, android-10.0.0_r34, android-10.0.0_r33, android-10.0.0_r32, android-10.0.0_r31, android-10.0.0_r30, android-o-mr1-iot-release-1.0.13, android-vts-9.0_r11, android-vts-9.0_r10, platform-tools-29.0.1, android-o-mr1-iot-release-1.0.12
78e42d8107-May-2019 Dimitry Ivanov

Merge "Enable native_bridge_support"

7ac2afbd07-May-2019 Yi Kong

Exclude libgcc_stripped wherever libgcc is excluded

Test: manual testing
Bug: 130267141
Bug: 29275768
Change-Id: If50420c05d36e6f680a36673e7c26ca7deb93b28

7f04880803-May-2019 dimitry

Enable native_bridge_support

Enable native bridge support for bionic libraries.
Makes it possible to use them in binaries for translated
architectures.

Bug: http://b/7715957

Enable native_bridge_support

Enable native bridge support for bionic libraries.
Makes it possible to use them in binaries for translated
architectures.

Bug: http://b/77159578
Test: make
Change-Id: Iccd4ad7aecfa5260cc15f09ca975d2e18987278a

show more ...

915c5fb922-Apr-2019 Elliott Hughes

libdl.a: make dlerror() always report an error.

Seems only logical, given that all the other calls fail.

(Only thing that's weird about this is that calling dlerror() usually
cl

libdl.a: make dlerror() always report an error.

Seems only logical, given that all the other calls fail.

(Only thing that's weird about this is that calling dlerror() usually
clears the error until you do something else that causes an error, but
that doesn't seem worth the bookkeeping?)

Bug: https://github.com/android-ndk/ndk/issues/965
Test: static unit tests still pass
Change-Id: I5e5401e148c5857f1dbab9c5a7f4a6fc43d8d626

show more ...

584bc62620-Apr-2019 Elliott Hughes

Move libdl and linker to static NOTICE files.

The libstdc++ directory has no copyright headers, so it was a no-op
anyway.

The interesting part will be switching libc and libm ov

Move libdl and linker to static NOTICE files.

The libstdc++ directory has no copyright headers, so it was a no-op
anyway.

The interesting part will be switching libc and libm over to genrules...

Test: N/A
Change-Id: Iec92562af40c451fdcb4a7468984878ec5dba2ce

show more ...

Revision tags: android-cts-9.0_r8, android-q-preview-6, android-q-preview-5, android-q-preview-4, android-q-preview-2.5
3ff116a602-Apr-2019 Jiyong Park

Load libc_malloc_* libraries from the runtime APEX

/system/lib/libc.so is a symlink to libc.so in the runtime APEX.
libc_malloc_* libraries are bundled with libc.so because they share

Load libc_malloc_* libraries from the runtime APEX

/system/lib/libc.so is a symlink to libc.so in the runtime APEX.
libc_malloc_* libraries are bundled with libc.so because they share
implementation details.

However, since libc.so is loaded in the default namespace where the
runtime APEX path (/apex/com.android.runtime/lib) is not accessible,
libc.so has been using libc_malloc_* from /system/lib. This is
wrong because libc.so (from the runtime APEX) and libc_malloc_* (from
the platform) may not be in-sync.

libc.so now uses android_dlopen_ext to load libc_malloc_* libraries
correctly from the "runtime" linker namespace.

Bug: 122566199
Test: bionic-unit-tests

Merged-In: I46980fbe89e93ea79a7760c9b8eb007af0ada8d8
Change-Id: I46980fbe89e93ea79a7760c9b8eb007af0ada8d8
(cherry picked from commit 4e46ac69c23c8585bce17c2e032986a37bf33aef)

show more ...

ce584e4f29-Mar-2019 dimitry

Fix CtsJniTestCases

The linker_namespaces test need android_get_LD_LIBRARY_PATH function.

Bug: http://b/129479780
Test: atest CtsJniTestCases
Change-Id: Iba5f74e1e4b5b1de173

Fix CtsJniTestCases

The linker_namespaces test need android_get_LD_LIBRARY_PATH function.

Bug: http://b/129479780
Test: atest CtsJniTestCases
Change-Id: Iba5f74e1e4b5b1de173150120293102524db2507
(cherry picked from commit 91b0c68009c6d6efbaab8f268a5c9afb141c5ab4)

show more ...

4b8b849328-Mar-2019 dimitry

Fix formatting

Test: make
Change-Id: I92b8893997c2fd75002e84070a3ca91fca4b110e

8868d9e919-Mar-2019 dimitry

Move platform-private symbols out of libdl.so

Symbols not intended to be accessible from apps are moved to libdl_android.so

Test: bionic-unit-tests
Bug: http://b/129387775
C

Move platform-private symbols out of libdl.so

Symbols not intended to be accessible from apps are moved to libdl_android.so

Test: bionic-unit-tests
Bug: http://b/129387775
Change-Id: Ib8ba6147a20cf56550c9a008f66570a2d419565a
(cherry picked from commit 2d6be9a751685b4c307632bf27e8c100310ad500)

show more ...

Revision tags: android-q-preview-1, android-o-mr1-iot-release-1.0.10
036e09c325-Feb-2019 Jiyong Park

Don't install *.mountpoint targets

The *.mountpoint targets that installs /bionic/lib/lib*.so and
/bionic/bin/linker* are no longer needed.

Now, /system/lib/lib*.so and /system/

Don't install *.mountpoint targets

The *.mountpoint targets that installs /bionic/lib/lib*.so and
/bionic/bin/linker* are no longer needed.

Now, /system/lib/lib*.so and /system/bin/linker* are simply symlinks to
the corresponding files in the runtime apex. For example,

/system/lib/libc.so -> /apex/com.android.runtime/lib/bionic/libc.so

This is made possible because we now activate APEXes even before the
data partition is mounted. Before the data partition mounting, the
APEXes from the system partition are ativated. After the data partition
is mounted, updated APEXes in the partition (if any) are activated. As a
result, the symlink always points to the valid path regardless of
whether /data is mounted or not.

Bug: 125549215
Test: device boots
Change-Id: Ie7d83686abe00b3c436f9f9db75d4244200a0fc9

show more ...

Revision tags: ndk-r20b, ndk-r20-beta3, ndk-r20-beta2, ndk-r20-beta1, ndk-r20
eeb2ee6516-Feb-2019 Pirama Arumuga Nainar

Clarify reason for native_coverage being off for libdl

Bug: http://b/124067925

It's off because it doesn't link with any system_shared_libs.

Test: N/A
Change-Id: I293fb

Clarify reason for native_coverage being off for libdl

Bug: http://b/124067925

It's off because it doesn't link with any system_shared_libs.

Test: N/A
Change-Id: I293fb9ba8df213f8f6bbec85135a974e5966f0cc

show more ...

123456