HomeSort by relevance Sort by last modified time
    Searched full:uptr (Results 51 - 75 of 194) sorted by null

1 23 4 5 6 7 8

  /external/compiler-rt/lib/tsan/tests/unit/
tsan_mman_test.cc 19 uptr __tsan_get_current_allocated_bytes();
20 uptr __tsan_get_heap_size();
21 uptr __tsan_get_free_bytes();
22 uptr __tsan_get_unmapped_bytes();
23 uptr __tsan_get_estimated_allocated_size(uptr size);
25 uptr __tsan_get_allocated_size(void *p);
50 uptr pc = 0;
58 EXPECT_EQ(b->Size(), (uptr)10);
61 EXPECT_EQ(b2->Size(), (uptr)20)
    [all...]
tsan_shadow_test.cc 55 CHECK(IsAppMem((uptr)&global));
56 CHECK(IsAppMem((uptr)&stack));
57 CHECK(IsAppMem((uptr)heap));
59 CHECK(IsShadowMem(MemToShadow((uptr)&global)));
60 CHECK(IsShadowMem(MemToShadow((uptr)&stack)));
61 CHECK(IsShadowMem(MemToShadow((uptr)heap)));
67 CHECK_EQ((uptr)data % kShadowSize, 0);
68 uptr s0 = MemToShadow((uptr)&data[0]);
71 CHECK_EQ(s0, MemToShadow((uptr)&data[i]))
    [all...]
  /external/compiler-rt/lib/asan/
asan_poisoning.cc 20 void PoisonShadow(uptr addr, uptr size, u8 value) {
30 void PoisonShadowPartialRightRedzone(uptr addr,
31 uptr size,
32 uptr redzone_size,
45 explicit ShadowSegmentEndpoint(uptr address) {
67 void __asan_poison_memory_region(void const volatile *addr, uptr size) {
69 uptr beg_addr = (uptr)addr;
70 uptr end_addr = beg_addr + size
    [all...]
asan_intercepted_functions.h 24 using __sanitizer::uptr;
90 void* __stdcall CreateThread(void *sec, uptr st, void* start,
93 int memcmp(const void *a1, const void *a2, uptr size);
94 void memmove(void *to, const void *from, uptr size);
95 void* memset(void *block, int c, uptr size);
96 void* memcpy(void *to, const void *from, uptr size);
101 uptr strlen(const char *s);
102 char* strncat(char *to, const char* from, uptr size);
103 int strncmp(const char *s1, const char* s2, uptr size);
104 char* strncpy(char *to, const char* from, uptr size)
    [all...]
asan_stats.cc 29 uptr (&array)[kNumberOfSizeClasses]) {
31 for (uptr i = 0; i < kNumberOfSizeClasses; i++) {
75 static uptr max_malloced_memory;
80 uptr *dst = (uptr*)&accumulated_stats;
81 uptr *src = (uptr*)stats;
82 uptr num_fields = sizeof(*stats) / sizeof(uptr);
83 for (uptr i = 0; i < num_fields; i++)
    [all...]
asan_mapping.h 61 extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale;
62 extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset;
137 extern uptr AsanMappingProfile[];
143 static uptr kHighMemEnd = 0x7fffffffffffULL;
144 static uptr kMidMemBeg = 0x3000000000ULL;
145 static uptr kMidMemEnd = 0x4fffffffffULL;
148 extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init.
151 static inline bool AddrIsInLowMem(uptr a) {
156 static inline bool AddrIsInLowShadow(uptr a) {
161 static inline bool AddrIsInHighMem(uptr a)
    [all...]
asan_interceptors.h 20 DECLARE_REAL(int, memcmp, const void *a1, const void *a2, uptr size)
21 DECLARE_REAL(void*, memcpy, void *to, const void *from, uptr size)
22 DECLARE_REAL(void*, memset, void *block, int c, uptr size)
24 DECLARE_REAL(uptr, strlen, const char *s)
25 DECLARE_REAL(char*, strncpy, char *to, const char *from, uptr size)
26 DECLARE_REAL(uptr, strnlen, const char *s, uptr maxlen)
  /external/compiler-rt/lib/lsan/
lsan_interceptors.cc 40 uptr stack_top = 0, stack_bottom = 0; \
60 INTERCEPTOR(void*, malloc, uptr size) {
71 INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) {
79 INTERCEPTOR(void*, realloc, void *q, uptr size) {
85 INTERCEPTOR(void*, memalign, uptr alignment, uptr size) {
91 INTERCEPTOR(int, posix_memalign, void **memptr, uptr alignment, uptr size) {
99 INTERCEPTOR(void*, valloc, uptr size)
    [all...]
lsan_thread.cc 34 static const uptr kMaxThreads = 1 << 13;
35 static const uptr kThreadQuarantineSize = 64;
61 uptr stack_begin, stack_end,
80 u32 ThreadCreate(u32 parent_tid, uptr user_id, bool detached) {
85 void ThreadStart(u32 tid, uptr os_id) {
87 uptr stack_size = 0;
88 uptr tls_size = 0;
110 uptr uid = (uptr)arg;
117 u32 ThreadTid(uptr uid)
    [all...]
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_stackdepot.h 23 u32 StackDepotPut(const uptr *stack, uptr size);
25 const uptr *StackDepotGet(u32 id, uptr *size);
28 uptr n_uniq_ids;
29 uptr mapped;
sanitizer_linux.cc 77 uptr internal_mmap(void *addr, uptr length, int prot, int flags,
86 uptr internal_munmap(void *addr, uptr length) {
90 uptr internal_close(fd_t fd) {
94 uptr internal_open(const char *filename, int flags) {
98 uptr internal_open(const char *filename, int flags, u32 mode) {
102 uptr OpenFile(const char *filename, bool write) {
107 uptr internal_read(fd_t fd, void *buf, uptr count)
    [all...]
sanitizer_allocator.cc 23 extern "C" void *__libc_malloc(uptr size);
33 static void *RawInternalAlloc(uptr size, InternalAllocatorCache *cache) {
70 static void *RawInternalAlloc(uptr size, InternalAllocatorCache *cache) {
91 void *InternalAlloc(uptr size, InternalAllocatorCache *cache) {
113 void *LowLevelAllocator::Allocate(uptr size) {
117 uptr size_to_allocate = Max(size, GetPageSizeCached());
122 low_level_alloc_callback((uptr)allocated_current_,
136 bool CallocShouldReturnNullDueToOverflow(uptr size, uptr n) {
138 uptr max = (uptr)-1L
    [all...]
sanitizer_posix_libcdep.cc 36 uptr GetThreadSelf() {
37 return (uptr)pthread_self();
40 void FlushUnneededShadowMemory(uptr addr, uptr size) {
54 return (rlim.rlim_cur == (uptr)-1);
57 void SetStackSizeLimitInBytes(uptr limit) {
93 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
94 uptr stack_top, uptr stack_bottom, bool fast)
    [all...]
sanitizer_quarantine.h 29 static const uptr kSize = 1024;
31 uptr size;
32 uptr count;
38 // void *cb.Allocate(uptr size);
49 void Init(uptr size, uptr cache_size) {
55 void Put(Cache *c, Callback cb, Node *ptr, uptr size) {
73 uptr max_size_;
74 uptr min_size_;
75 uptr max_cache_size_
    [all...]
sanitizer_stoptheworld.h 29 SuspendedThreadID GetThreadID(uptr index) const {
33 int GetRegistersAndSP(uptr index, uptr *buffer, uptr *sp) const;
35 static uptr RegisterCount();
36 uptr thread_count() const { return thread_ids_.size(); }
38 for (uptr i = 0; i < thread_ids_.size(); i++) {
sanitizer_symbolizer_libcdep.cc 29 LoadedModule::LoadedModule(const char *module_name, uptr base_address) {
35 void LoadedModule::addAddressRange(uptr beg, uptr end) {
42 bool LoadedModule::containsAddress(uptr address) const {
43 for (uptr i = 0; i < n_ranges_; i++) {
57 uptr prefix_len = internal_strcspn(str, delims);
79 uptr *result) {
83 *result = (uptr)internal_atoll(buff);
113 char *SendCommand(bool is_data, const char *module_name, uptr module_offset) {
136 bool readFromSymbolizer(char *buffer, uptr max_length)
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_sync.cc 20 SyncVar::SyncVar(uptr addr, u64 uid)
51 SyncVar* SyncTab::GetOrCreateAndLock(ThreadState *thr, uptr pc,
52 uptr addr, bool write_lock) {
56 SyncVar* SyncTab::GetIfExistsAndLock(uptr addr, bool write_lock) {
60 SyncVar* SyncTab::Create(ThreadState *thr, uptr pc, uptr addr) {
71 SyncVar* SyncTab::GetAndLock(ThreadState *thr, uptr pc,
72 uptr addr, bool write_lock, bool create) {
141 SyncVar* SyncTab::GetAndRemove(ThreadState *thr, uptr pc, uptr addr)
    [all...]
tsan_rtl_report.cc 40 file, line, cond, (uptr)v1, (uptr)v2);
60 uptr prefix_len = internal_strlen(prefix);
62 uptr path_prefix_len = internal_strlen(path_prefix);
108 for (uptr si = 0; si < trace.Size(); si++) {
109 const uptr pc = trace.Get(si);
113 const uptr pc1 = __sanitizer::StackTrace::GetPreviousInstructionPc(pc);
116 uptr pc1 = pc;
156 void ScopedReport::AddMemoryAccess(uptr addr, Shadow s,
167 for (uptr i = 0; i < mset->Size(); i++)
    [all...]
tsan_rtl.cc 82 uptr stk_addr, uptr stk_size,
83 uptr tls_addr, uptr tls_size)
102 uptr n_threads;
103 uptr n_running_threads;
123 uptr openrv = OpenFile(filename.data(), true);
165 void DontNeedShadowFor(uptr addr, uptr size) {
166 uptr shadow_beg = MemToShadow(addr)
    [all...]
tsan_report.h 34 uptr offset;
35 uptr pc;
49 uptr addr;
69 uptr addr;
70 uptr size;
72 uptr offset;
83 uptr pid;
tsan_vector.h 47 uptr Size() const {
51 T &operator[](uptr i) {
56 const T &operator[](uptr i) const {
72 void Resize(uptr size) {
73 uptr old_size = Size();
76 for (uptr i = old_size; i < size; i++)
87 void EnsureSize(uptr size) {
90 if (size <= (uptr)(last_ - begin_)) {
94 uptr cap0 = last_ - begin_;
95 uptr cap = 2 * cap0
    [all...]
  /external/compiler-rt/lib/interception/
interception_win.h 26 bool GetRealFunctionAddress(const char *func_name, uptr *func_addr);
29 bool OverrideFunction(uptr old_func, uptr new_func, uptr *orig_old_func);
35 #func, (::__interception::uptr*)&REAL(func))
39 (::__interception::uptr)func, \
40 (::__interception::uptr)WRAP(func), \
41 (::__interception::uptr*)&REAL(func))
  /external/compiler-rt/lib/sanitizer_common/tests/
sanitizer_stacktrace_test.cc 24 uptr fake_stack[10];
25 uptr start_pc;
26 uptr fake_top;
27 uptr fake_bottom;
31 static uptr PC(uptr idx) {
38 for (uptr i = 0; i+1 < ARRAY_SIZE(fake_stack); i += 2) {
39 fake_stack[i] = (uptr)&fake_stack[i+2]; // fp
46 fake_top = (uptr)&fake_stack[ARRAY_SIZE(fake_stack) + 2];
48 fake_bottom = (uptr)&fake_stack[-1]
    [all...]
  /external/compiler-rt/lib/msan/
msan_linux.cc 36 static const uptr kMemBeg = 0x600000000000;
37 static const uptr kMemEnd = 0x7fffffffffff;
38 static const uptr kShadowBeg = MEM_TO_SHADOW(kMemBeg);
39 static const uptr kShadowEnd = MEM_TO_SHADOW(kMemEnd);
40 static const uptr kBad1Beg = 0x100000000; // 4G
41 static const uptr kBad1End = kShadowBeg - 1;
42 static const uptr kBad2Beg = kShadowEnd + 1;
43 static const uptr kBad2End = kMemBeg - 1;
44 static const uptr kOriginsBeg = kBad2Beg;
45 static const uptr kOriginsEnd = kBad2End
    [all...]
msan.cc 58 uptr stack_top, stack_bottom;
115 static const uptr kNumStackOriginDescrs = 1024 * 1024;
162 static void GetCurrentStackBounds(uptr *stack_top, uptr *stack_bottom) {
175 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
183 uptr stack_top, stack_bottom;
191 void PrintWarning(uptr pc, uptr bp)
    [all...]

Completed in 364 milliseconds

1 23 4 5 6 7 8