/external/compiler-rt/lib/tsan/tests/unit/ |
tsan_mman_test.cc | 19 uptr __tsan_get_current_allocated_bytes(); 20 uptr __tsan_get_heap_size(); 21 uptr __tsan_get_free_bytes(); 22 uptr __tsan_get_unmapped_bytes(); 23 uptr __tsan_get_estimated_allocated_size(uptr size); 25 uptr __tsan_get_allocated_size(void *p); 50 uptr pc = 0; 58 EXPECT_EQ(b->Size(), (uptr)10); 61 EXPECT_EQ(b2->Size(), (uptr)20) [all...] |
tsan_shadow_test.cc | 55 CHECK(IsAppMem((uptr)&global)); 56 CHECK(IsAppMem((uptr)&stack)); 57 CHECK(IsAppMem((uptr)heap)); 59 CHECK(IsShadowMem(MemToShadow((uptr)&global))); 60 CHECK(IsShadowMem(MemToShadow((uptr)&stack))); 61 CHECK(IsShadowMem(MemToShadow((uptr)heap))); 67 CHECK_EQ((uptr)data % kShadowSize, 0); 68 uptr s0 = MemToShadow((uptr)&data[0]); 71 CHECK_EQ(s0, MemToShadow((uptr)&data[i])) [all...] |
/external/compiler-rt/lib/asan/ |
asan_poisoning.cc | 20 void PoisonShadow(uptr addr, uptr size, u8 value) { 30 void PoisonShadowPartialRightRedzone(uptr addr, 31 uptr size, 32 uptr redzone_size, 45 explicit ShadowSegmentEndpoint(uptr address) { 67 void __asan_poison_memory_region(void const volatile *addr, uptr size) { 69 uptr beg_addr = (uptr)addr; 70 uptr end_addr = beg_addr + size [all...] |
asan_intercepted_functions.h | 24 using __sanitizer::uptr; 90 void* __stdcall CreateThread(void *sec, uptr st, void* start, 93 int memcmp(const void *a1, const void *a2, uptr size); 94 void memmove(void *to, const void *from, uptr size); 95 void* memset(void *block, int c, uptr size); 96 void* memcpy(void *to, const void *from, uptr size); 101 uptr strlen(const char *s); 102 char* strncat(char *to, const char* from, uptr size); 103 int strncmp(const char *s1, const char* s2, uptr size); 104 char* strncpy(char *to, const char* from, uptr size) [all...] |
asan_stats.cc | 29 uptr (&array)[kNumberOfSizeClasses]) { 31 for (uptr i = 0; i < kNumberOfSizeClasses; i++) { 75 static uptr max_malloced_memory; 80 uptr *dst = (uptr*)&accumulated_stats; 81 uptr *src = (uptr*)stats; 82 uptr num_fields = sizeof(*stats) / sizeof(uptr); 83 for (uptr i = 0; i < num_fields; i++) [all...] |
asan_mapping.h | 61 extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale; 62 extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset; 137 extern uptr AsanMappingProfile[]; 143 static uptr kHighMemEnd = 0x7fffffffffffULL; 144 static uptr kMidMemBeg = 0x3000000000ULL; 145 static uptr kMidMemEnd = 0x4fffffffffULL; 148 extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init. 151 static inline bool AddrIsInLowMem(uptr a) { 156 static inline bool AddrIsInLowShadow(uptr a) { 161 static inline bool AddrIsInHighMem(uptr a) [all...] |
asan_interceptors.h | 20 DECLARE_REAL(int, memcmp, const void *a1, const void *a2, uptr size) 21 DECLARE_REAL(void*, memcpy, void *to, const void *from, uptr size) 22 DECLARE_REAL(void*, memset, void *block, int c, uptr size) 24 DECLARE_REAL(uptr, strlen, const char *s) 25 DECLARE_REAL(char*, strncpy, char *to, const char *from, uptr size) 26 DECLARE_REAL(uptr, strnlen, const char *s, uptr maxlen)
|
/external/compiler-rt/lib/lsan/ |
lsan_interceptors.cc | 40 uptr stack_top = 0, stack_bottom = 0; \ 60 INTERCEPTOR(void*, malloc, uptr size) { 71 INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) { 79 INTERCEPTOR(void*, realloc, void *q, uptr size) { 85 INTERCEPTOR(void*, memalign, uptr alignment, uptr size) { 91 INTERCEPTOR(int, posix_memalign, void **memptr, uptr alignment, uptr size) { 99 INTERCEPTOR(void*, valloc, uptr size) [all...] |
lsan_thread.cc | 34 static const uptr kMaxThreads = 1 << 13; 35 static const uptr kThreadQuarantineSize = 64; 61 uptr stack_begin, stack_end, 80 u32 ThreadCreate(u32 parent_tid, uptr user_id, bool detached) { 85 void ThreadStart(u32 tid, uptr os_id) { 87 uptr stack_size = 0; 88 uptr tls_size = 0; 110 uptr uid = (uptr)arg; 117 u32 ThreadTid(uptr uid) [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_stackdepot.h | 23 u32 StackDepotPut(const uptr *stack, uptr size); 25 const uptr *StackDepotGet(u32 id, uptr *size); 28 uptr n_uniq_ids; 29 uptr mapped;
|
sanitizer_linux.cc | 77 uptr internal_mmap(void *addr, uptr length, int prot, int flags, 86 uptr internal_munmap(void *addr, uptr length) { 90 uptr internal_close(fd_t fd) { 94 uptr internal_open(const char *filename, int flags) { 98 uptr internal_open(const char *filename, int flags, u32 mode) { 102 uptr OpenFile(const char *filename, bool write) { 107 uptr internal_read(fd_t fd, void *buf, uptr count) [all...] |
sanitizer_allocator.cc | 23 extern "C" void *__libc_malloc(uptr size); 33 static void *RawInternalAlloc(uptr size, InternalAllocatorCache *cache) { 70 static void *RawInternalAlloc(uptr size, InternalAllocatorCache *cache) { 91 void *InternalAlloc(uptr size, InternalAllocatorCache *cache) { 113 void *LowLevelAllocator::Allocate(uptr size) { 117 uptr size_to_allocate = Max(size, GetPageSizeCached()); 122 low_level_alloc_callback((uptr)allocated_current_, 136 bool CallocShouldReturnNullDueToOverflow(uptr size, uptr n) { 138 uptr max = (uptr)-1L [all...] |
sanitizer_posix_libcdep.cc | 36 uptr GetThreadSelf() { 37 return (uptr)pthread_self(); 40 void FlushUnneededShadowMemory(uptr addr, uptr size) { 54 return (rlim.rlim_cur == (uptr)-1); 57 void SetStackSizeLimitInBytes(uptr limit) { 93 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp, 94 uptr stack_top, uptr stack_bottom, bool fast) [all...] |
sanitizer_quarantine.h | 29 static const uptr kSize = 1024; 31 uptr size; 32 uptr count; 38 // void *cb.Allocate(uptr size); 49 void Init(uptr size, uptr cache_size) { 55 void Put(Cache *c, Callback cb, Node *ptr, uptr size) { 73 uptr max_size_; 74 uptr min_size_; 75 uptr max_cache_size_ [all...] |
sanitizer_stoptheworld.h | 29 SuspendedThreadID GetThreadID(uptr index) const { 33 int GetRegistersAndSP(uptr index, uptr *buffer, uptr *sp) const; 35 static uptr RegisterCount(); 36 uptr thread_count() const { return thread_ids_.size(); } 38 for (uptr i = 0; i < thread_ids_.size(); i++) {
|
sanitizer_symbolizer_libcdep.cc | 29 LoadedModule::LoadedModule(const char *module_name, uptr base_address) { 35 void LoadedModule::addAddressRange(uptr beg, uptr end) { 42 bool LoadedModule::containsAddress(uptr address) const { 43 for (uptr i = 0; i < n_ranges_; i++) { 57 uptr prefix_len = internal_strcspn(str, delims); 79 uptr *result) { 83 *result = (uptr)internal_atoll(buff); 113 char *SendCommand(bool is_data, const char *module_name, uptr module_offset) { 136 bool readFromSymbolizer(char *buffer, uptr max_length) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_sync.cc | 20 SyncVar::SyncVar(uptr addr, u64 uid) 51 SyncVar* SyncTab::GetOrCreateAndLock(ThreadState *thr, uptr pc, 52 uptr addr, bool write_lock) { 56 SyncVar* SyncTab::GetIfExistsAndLock(uptr addr, bool write_lock) { 60 SyncVar* SyncTab::Create(ThreadState *thr, uptr pc, uptr addr) { 71 SyncVar* SyncTab::GetAndLock(ThreadState *thr, uptr pc, 72 uptr addr, bool write_lock, bool create) { 141 SyncVar* SyncTab::GetAndRemove(ThreadState *thr, uptr pc, uptr addr) [all...] |
tsan_rtl_report.cc | 40 file, line, cond, (uptr)v1, (uptr)v2); 60 uptr prefix_len = internal_strlen(prefix); 62 uptr path_prefix_len = internal_strlen(path_prefix); 108 for (uptr si = 0; si < trace.Size(); si++) { 109 const uptr pc = trace.Get(si); 113 const uptr pc1 = __sanitizer::StackTrace::GetPreviousInstructionPc(pc); 116 uptr pc1 = pc; 156 void ScopedReport::AddMemoryAccess(uptr addr, Shadow s, 167 for (uptr i = 0; i < mset->Size(); i++) [all...] |
tsan_rtl.cc | 82 uptr stk_addr, uptr stk_size, 83 uptr tls_addr, uptr tls_size) 102 uptr n_threads; 103 uptr n_running_threads; 123 uptr openrv = OpenFile(filename.data(), true); 165 void DontNeedShadowFor(uptr addr, uptr size) { 166 uptr shadow_beg = MemToShadow(addr) [all...] |
tsan_report.h | 34 uptr offset; 35 uptr pc; 49 uptr addr; 69 uptr addr; 70 uptr size; 72 uptr offset; 83 uptr pid;
|
tsan_vector.h | 47 uptr Size() const { 51 T &operator[](uptr i) { 56 const T &operator[](uptr i) const { 72 void Resize(uptr size) { 73 uptr old_size = Size(); 76 for (uptr i = old_size; i < size; i++) 87 void EnsureSize(uptr size) { 90 if (size <= (uptr)(last_ - begin_)) { 94 uptr cap0 = last_ - begin_; 95 uptr cap = 2 * cap0 [all...] |
/external/compiler-rt/lib/interception/ |
interception_win.h | 26 bool GetRealFunctionAddress(const char *func_name, uptr *func_addr); 29 bool OverrideFunction(uptr old_func, uptr new_func, uptr *orig_old_func); 35 #func, (::__interception::uptr*)&REAL(func)) 39 (::__interception::uptr)func, \ 40 (::__interception::uptr)WRAP(func), \ 41 (::__interception::uptr*)&REAL(func))
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_stacktrace_test.cc | 24 uptr fake_stack[10]; 25 uptr start_pc; 26 uptr fake_top; 27 uptr fake_bottom; 31 static uptr PC(uptr idx) { 38 for (uptr i = 0; i+1 < ARRAY_SIZE(fake_stack); i += 2) { 39 fake_stack[i] = (uptr)&fake_stack[i+2]; // fp 46 fake_top = (uptr)&fake_stack[ARRAY_SIZE(fake_stack) + 2]; 48 fake_bottom = (uptr)&fake_stack[-1] [all...] |
/external/compiler-rt/lib/msan/ |
msan_linux.cc | 36 static const uptr kMemBeg = 0x600000000000; 37 static const uptr kMemEnd = 0x7fffffffffff; 38 static const uptr kShadowBeg = MEM_TO_SHADOW(kMemBeg); 39 static const uptr kShadowEnd = MEM_TO_SHADOW(kMemEnd); 40 static const uptr kBad1Beg = 0x100000000; // 4G 41 static const uptr kBad1End = kShadowBeg - 1; 42 static const uptr kBad2Beg = kShadowEnd + 1; 43 static const uptr kBad2End = kMemBeg - 1; 44 static const uptr kOriginsBeg = kBad2Beg; 45 static const uptr kOriginsEnd = kBad2End [all...] |
msan.cc | 58 uptr stack_top, stack_bottom; 115 static const uptr kNumStackOriginDescrs = 1024 * 1024; 162 static void GetCurrentStackBounds(uptr *stack_top, uptr *stack_bottom) { 175 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp, 183 uptr stack_top, stack_bottom; 191 void PrintWarning(uptr pc, uptr bp) [all...] |