/external/compiler-rt/lib/tsan/tests/unit/ |
tsan_mman_test.cc | 19 uptr __tsan_get_current_allocated_bytes(); 20 uptr __tsan_get_heap_size(); 21 uptr __tsan_get_free_bytes(); 22 uptr __tsan_get_unmapped_bytes(); 23 uptr __tsan_get_estimated_allocated_size(uptr size); 25 uptr __tsan_get_allocated_size(void *p); 50 uptr pc = 0; 58 EXPECT_EQ(b->Size(), (uptr)10); 61 EXPECT_EQ(b2->Size(), (uptr)20) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_clock.h | 26 uptr size() const { 64 uptr size() const { 74 uptr nclk_;
|
tsan_defs.h | 52 const uptr kShadowCnt = TSAN_SHADOW_COUNT; 58 const uptr kShadowCnt = 4; 62 const uptr kShadowCell = 8; 65 const uptr kShadowSize = 8; 68 const uptr kShadowMultiplier = kShadowSize * kShadowCnt / kShadowCell; 156 MD5Hash md5_hash(const void *data, uptr size);
|
tsan_rtl_report.cc | 40 file, line, cond, (uptr)v1, (uptr)v2); 60 uptr prefix_len = internal_strlen(prefix); 62 uptr path_prefix_len = internal_strlen(path_prefix); 108 for (uptr si = 0; si < trace.Size(); si++) { 109 const uptr pc = trace.Get(si); 113 const uptr pc1 = __sanitizer::StackTrace::GetPreviousInstructionPc(pc); 116 uptr pc1 = pc; 156 void ScopedReport::AddMemoryAccess(uptr addr, Shadow s, 167 for (uptr i = 0; i < mset->Size(); i++) [all...] |
tsan_symbolize_addr2line_linux.cc | 33 uptr base; 41 uptr base; 42 uptr end; 105 m->base = (uptr)info->dlpi_addr; 113 (uptr)s->p_type, (uptr)s->p_offset, (uptr)s->p_vaddr, 114 (uptr)s->p_paddr, (uptr)s->p_filesz, (uptr)s->p_memsz [all...] |
tsan_symbolize.cc | 39 ReportStack *NewReportStackEntry(uptr addr) { 72 ReportStack *SymbolizeCode(uptr addr) { 76 static const uptr kMaxAddrFrames = 16; 78 for (uptr i = 0; i < kMaxAddrFrames; i++) 80 uptr addr_frames_num = __sanitizer::SymbolizeCode(addr, addr_frames.data(), 86 for (uptr i = 0; i < addr_frames_num; i++) { 99 ReportLocation *SymbolizeData(uptr addr) {
|
tsan_interceptors.cc | 51 extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 52 extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 63 extern "C" void *__libc_malloc(uptr size); 64 extern "C" void *__libc_calloc(uptr size, uptr n); 65 extern "C" void *__libc_realloc(void *ptr, uptr size); 139 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 149 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 157 uptr pc [all...] |
tsan_platform_mac.cc | 49 uptr GetShadowMemoryConsumption() { 58 uptr shadow = (uptr)MmapFixedNoReserve(kLinuxShadowBeg,
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_suppressions.h | 35 uptr weight; 43 uptr SuppressionCount();
|
sanitizer_atomic_msvc.h | 73 DCHECK(!((uptr)a % sizeof(*a))); 90 DCHECK(!((uptr)a % sizeof(*a))); 106 DCHECK(!((uptr)a % sizeof(*a))); 114 DCHECK(!((uptr)a % sizeof(*a))); 127 DCHECK(!((uptr)a % sizeof(*a))); 142 DCHECK(!((uptr)a % sizeof(*a))); 159 uptr *cmp, 160 uptr xchg, 162 uptr cmpv = *cmp; 163 uptr prev = (uptr)_InterlockedCompareExchangePointer [all...] |
sanitizer_lfstack.h | 40 u64 xch = (u64)(uptr)p | cnt; 41 p->next = (T*)(uptr)(cmp & kPtrMask); 51 T *cur = (T*)(uptr)(cmp & kPtrMask); 56 u64 xch = (u64)(uptr)nxt | cnt;
|
sanitizer_stoptheworld_linux_libcdep.cc | 116 uptr waitpid_status; 133 for (uptr i = 0; i < suspended_threads_list_.thread_count(); i++) { 150 for (uptr i = 0; i < suspended_threads_list_.thread_count(); i++) 231 for (uptr signal_index = 0; signal_index < ARRAY_SIZE(kUnblockedSignals); 259 explicit ScopedStackSpaceWithGuard(uptr stack_size) { 264 guard_start_ = (uptr)MmapOrDie(stack_size_ + guard_size_, 266 CHECK_EQ(guard_start_, (uptr)Mprotect((uptr)guard_start_, guard_size_)); 276 uptr stack_size_; 277 uptr guard_size_ [all...] |
sanitizer_atomic.h | 51 typedef uptr Type;
|
/external/compiler-rt/lib/asan/ |
asan_rtl.cc | 31 uptr AsanMappingProfile[kAsanMappingProfileSize]; 61 file, line, cond, (uptr)v1, (uptr)v2); 89 CHECK((uptr)common_flags()->malloc_context_size <= kStackTraceMax); 212 uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; 223 static void ReserveShadowMemoryRange(uptr beg, uptr end) { 226 uptr size = end - beg + 1; 236 static void OnLowLevelAllocate(uptr ptr, uptr size) [all...] |
asan_interceptors.cc | 30 static inline bool QuickCheckForUnpoisonedRegion(uptr beg, uptr size) { 45 uptr __offset = (uptr)(offset); \ 46 uptr __size = (uptr)(size); \ 47 uptr __bad = 0; \ 61 static inline bool RangesOverlap(const char *offset1, uptr length1, 62 const char *offset2, uptr length2) { 82 static inline uptr MaybeRealStrnlen(const char *s, uptr maxlen) [all...] |
asan_mac.h | 32 uptr _cfisa;
|
asan_mac.cc | 43 void GetPcSpBp(void *context, uptr *pc, uptr *sp, uptr *bp) { 61 uptr len = 0, maxlen = sizeof(version) / sizeof(version[0]); 62 for (uptr i = 0; i < maxlen; i++) version[i] = '\0'; 118 uptr name_len = internal_strlen(name); 120 uptr len = internal_strlen(*environ); 147 CHECK(dladdr((void*)((uptr)__asan_init), &info)); 150 uptr old_env_len = dyld_insert_libraries ? 152 uptr fname_len = internal_strlen(info.dli_fname) [all...] |
asan_posix.cc | 33 static const uptr kAltStackSize = SIGSTKSZ * 4; // SIGSTKSZ is not enough. 53 uptr addr = (uptr)siginfo->si_addr; 56 uptr pc, sp, bp;
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_printf_test.cc | 24 uptr len = internal_snprintf(buf, sizeof(buf), 43 uptr len = internal_snprintf(buf, 4, "%s", "abcdef"); // NOLINT 44 EXPECT_EQ(len, (uptr)6); 70 uptr val; 72 val = (uptr)0x12345678; 74 val = (uptr)0x123456789ULL; 109 uptr len = internal_snprintf(buf, sizeof(buf), fmt, arg1, arg2);
|
sanitizer_stoptheworld_test.cc | 60 for (uptr i = 0; i < 1000; i++) { 92 static const uptr kThreadCount = 50; 93 static const uptr kStopWorldAfter = 10; // let this many threads spawn first 98 volatile uptr thread_index; 114 uptr this_thread_index = __sync_fetch_and_add( 149 for (uptr j = 0; j < kThreadCount; j++) 152 for (uptr i = 0; i < 10; i++) { 154 for (uptr j = 0; j < kThreadCount; j++) 187 for (uptr i = 0; i < kThreadCount; i++)
|
sanitizer_thread_registry_test.cc | 33 static void CheckThreadQuantity(ThreadRegistry *registry, uptr exp_total, 34 uptr exp_running, uptr exp_alive) { 35 uptr total, running, alive; 46 static uptr get_uid(u32 tid) { 56 uptr uid = (uptr)arg; 161 uptr shard; // started from 1. 168 uptr shard = (uptr)arg [all...] |
sanitizer_linux_test.cc | 67 for (uptr i = 0; i < kThreadCount; i++) { 79 for (uptr i = 0; i < pthread_ids_.size(); i++) 85 static const uptr kThreadCount = 20; 160 for (uptr i = 0; i < 2; i++) { 201 *(uptr *)((char *)ThreadSelf() + ThreadSelfOffset()) == ThreadSelf(); 216 uptr descr_addr = ThreadSelf(); 222 return (void *)((uptr)stackaddr + stacksize - descr_addr); 230 EXPECT_EQ((uptr)result, ThreadDescriptorSize()); 242 for (uptr i = 0; i < ARRAY_SIZE(paths); i++) 243 for (uptr j = 0; j < ARRAY_SIZE(suffixes); j++) [all...] |
/external/compiler-rt/lib/interception/ |
interception.h | 26 typedef __sanitizer::uptr SIZE_T; 94 const uptr replacement; 95 const uptr original; 104 { reinterpret_cast<const uptr>(WRAP(func_name)), \ 105 reinterpret_cast<const uptr>(func_name) } \ 114 { reinterpret_cast<const uptr>(wrapper_name), \ 115 reinterpret_cast<const uptr>(func_name) } \ 221 // so we use casting via an integral type __interception::uptr, 227 typedef unsigned long long uptr; // NOLINT typedef in namespace:__interception 229 typedef unsigned long uptr; // NOLIN [all...] |
interception_win.cc | 22 bool GetRealFunctionAddress(const char *func_name, uptr *func_addr) { 31 *func_addr = (uptr)GetProcAddress(GetModuleHandleA(DLLS[i]), func_name); 59 bool OverrideFunction(uptr old_func, uptr new_func, uptr *orig_old_func) { 136 *orig_old_func = (uptr)trampoline;
|
/external/compiler-rt/lib/ubsan/ |
ubsan_handlers_cxx.cc | 49 << Range(Pointer, Pointer + sizeof(uptr), "invalid vptr"); 53 << Range(Pointer, Pointer + sizeof(uptr), "vptr for %0"); 61 << Range(Pointer, Pointer + sizeof(uptr), "vptr for %2 base class of %1");
|