/external/compiler-rt/lib/lsan/ |
lsan_common.cc | 97 uptr buffer_size; 112 uptr size; 142 static inline bool CanBeAHeapPointer(uptr p) { 145 const uptr kMinAddress = 4 * 4096; 161 void ScanRangeForPointers(uptr begin, uptr end, 164 const uptr alignment = flags()->pointer_alignment(); 166 uptr pp = begin; 171 if (!CanBeAHeapPointer(reinterpret_cast<uptr>(p))) continue; 172 uptr chunk = PointsIntoChunk(p) [all...] |
lsan_thread.cc | 34 static const uptr kMaxThreads = 1 << 13; 35 static const uptr kThreadQuarantineSize = 64; 61 uptr stack_begin, stack_end, 80 u32 ThreadCreate(u32 parent_tid, uptr user_id, bool detached) { 85 void ThreadStart(u32 tid, uptr os_id) { 87 uptr stack_size = 0; 88 uptr tls_size = 0; 110 uptr uid = (uptr)arg; 117 u32 ThreadTid(uptr uid) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_report.h | 39 uptr offset; 40 uptr pc; 55 uptr addr; 75 uptr addr; 76 uptr size; 78 uptr offset; 90 uptr pid; 99 uptr addr;
|
tsan_rtl_report.cc | 43 file, line, cond, (uptr)v1, (uptr)v2); 63 uptr prefix_len = internal_strlen(prefix); 65 uptr path_prefix_len = internal_strlen(path_prefix); 110 uptr ssz = 0; 111 const uptr *stack = StackDepotGet(stack_id, &ssz); 123 for (uptr si = 0; si < trace.Size(); si++) { 124 const uptr pc = trace.Get(si); 128 const uptr pc1 = __sanitizer::StackTrace::GetPreviousInstructionPc(pc); 131 uptr pc1 = pc [all...] |
tsan_rtl.cc | 97 uptr stk_addr, uptr stk_size, 98 uptr tls_addr, uptr tls_size) 121 uptr n_threads; 122 uptr n_running_threads; 149 uptr openrv = OpenFile(filename.data(), true); 161 uptr last_rss = 0; 180 uptr rss = GetRSS(); 181 uptr limit = uptr(flags()->memory_limit_mb) << 20 [all...] |
tsan_symbolize.cc | 39 ReportStack *NewReportStackEntry(uptr addr) { 63 uptr offset; 64 uptr pc; 73 const uptr kExternalPCBit = 1ULL << 60; 77 extern "C" bool __tsan_symbolize_external(uptr pc, 78 char *func_buf, uptr func_siz, 79 char *file_buf, uptr file_siz, 83 bool __tsan_symbolize_external(uptr pc, 84 char *func_buf, uptr func_siz, 85 char *file_buf, uptr file_siz [all...] |
tsan_vector.h | 47 uptr Size() const { 51 T &operator[](uptr i) { 56 const T &operator[](uptr i) const { 80 void Resize(uptr size) { 85 uptr old_size = Size(); 88 for (uptr i = old_size; i < size; i++) 99 void EnsureSize(uptr size) { 102 if (size <= (uptr)(last_ - begin_)) { 106 uptr cap0 = last_ - begin_; 107 uptr cap = cap0 * 5 / 4; // 25% growt [all...] |
tsan_platform_windows.cc | 24 uptr GetShadowMemoryConsumption() { 31 void WriteMemoryProfile(char *buf, uptr buf_size, uptr nthread, uptr nlive) { 34 uptr GetRSS() {
|
tsan_rtl_thread.cc | 50 uptr pc; 75 uptr stk_addr; 76 uptr stk_size; 77 uptr tls_addr; 78 uptr tls_size; 97 thr->shadow_stack = (uptr*)internal_alloc(MBlockShadowStack, 98 kInitStackSize * sizeof(uptr)); 112 const uptr trace = (epoch0 / kTracePartSize) % TraceParts(); 119 tid, (uptr)epoch0, args->stk_addr, args->stk_size, 157 for (uptr i = 0; i < leaks.Size(); i++) [all...] |
tsan_platform_linux.cc | 65 const uptr kPageSize = 4096; 79 void FillProfileCallback(uptr start, uptr rss, bool file, 80 uptr *mem, uptr stats_size) { 99 void WriteMemoryProfile(char *buf, uptr buf_size, uptr nthread, uptr nlive) { 100 uptr mem[MemCount] = {}; 111 uptr GetRSS() [all...] |
/external/compiler-rt/lib/asan/tests/ |
asan_fake_stack_test.cc | 36 // uptr alloc_size = FakeStack::RequiredSize(i); 47 for (uptr stack_size_log = 15; stack_size_log <= 20; stack_size_log++) { 48 uptr stack_size = 1UL << stack_size_log; 49 uptr offset = 0; 50 for (uptr class_id = 0; class_id < FakeStack::kNumberOfSizeClasses; 52 uptr frame_size = FakeStack::BytesInSizeClass(class_id); 53 uptr num_flags = stack_size / frame_size; 65 for (uptr stack_size_log = 20; stack_size_log <= 22; stack_size_log++) { 94 const uptr stack_size_log = 20; 95 const uptr stack_size = 1 << stack_size_log [all...] |
/external/compiler-rt/lib/asan/ |
asan_thread.h | 63 thread_return_t ThreadStart(uptr os_id); 65 uptr stack_top() { return stack_top_; } 66 uptr stack_bottom() { return stack_bottom_; } 67 uptr stack_size() { return stack_size_; } 68 uptr tls_begin() { return tls_begin_; } 69 uptr tls_end() { return tls_end_; } 74 const char *GetFrameNameByAddr(uptr addr, uptr *offset, uptr *frame_pc); 76 bool AddrIsInStack(uptr addr) [all...] |
asan_mapping.h | 171 extern uptr AsanMappingProfile[]; 177 static uptr kHighMemEnd = 0x7fffffffffffULL; 178 static uptr kMidMemBeg = 0x3000000000ULL; 179 static uptr kMidMemEnd = 0x4fffffffffULL; 181 extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init. 184 static inline bool AddrIsInLowMem(uptr a) { 189 static inline bool AddrIsInLowShadow(uptr a) { 194 static inline bool AddrIsInHighMem(uptr a) { 199 static inline bool AddrIsInMidMem(uptr a) { 204 static inline bool AddrIsInMem(uptr a) [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_quarantine.h | 29 static const uptr kSize = 1021; 31 uptr size; 32 uptr count; 40 // void *cb.Allocate(uptr size); 51 void Init(uptr size, uptr cache_size) { 57 void Put(Cache *c, Callback cb, Node *ptr, uptr size) { 75 uptr max_size_; 76 uptr min_size_; 77 uptr max_cache_size_ [all...] |
sanitizer_symbolizer.h | 29 uptr address; 32 uptr module_offset; 34 static const uptr kUnknown = ~(uptr)0; 36 uptr function_offset; 56 void FillAddressAndModuleInfo(uptr addr, const char *mod_name, 57 uptr mod_offset) { 65 uptr address; 67 uptr module_offset; 69 uptr start [all...] |
sanitizer_tls_get_addr.cc | 25 uptr dso_id; 26 uptr offset; 32 uptr size; 33 uptr start; 44 static const uptr kDestroyedThread = -1; 46 static inline void DTLS_Deallocate(DTLS::DTV *dtv, uptr size) { 53 static inline void DTLS_Resize(uptr new_size) { 59 uptr num_live_dtls = 63 uptr old_dtv_size = dtls.dtv_size; 76 uptr s = dtls.dtv_size [all...] |
sanitizer_procmaps_linux.cc | 108 static uptr ParseHex(char **str) { 109 uptr x = 0; 113 uptr v = 0; 142 static uptr ReadHex(const char *p) { 143 uptr v = 0; 153 static uptr ReadDecimal(const char *p) { 154 uptr v = 0; 160 bool MemoryMappingLayout::Next(uptr *start, uptr *end, uptr *offset [all...] |
sanitizer_atomic_msvc.h | 72 DCHECK(!((uptr)a % sizeof(*a))); 89 DCHECK(!((uptr)a % sizeof(*a))); 105 DCHECK(!((uptr)a % sizeof(*a))); 110 INLINE uptr atomic_fetch_add(volatile atomic_uintptr_t *a, 111 uptr v, memory_order mo) { 113 DCHECK(!((uptr)a % sizeof(*a))); 115 return (uptr)_InterlockedExchangeAdd64( 118 return (uptr)_InterlockedExchangeAdd( 126 DCHECK(!((uptr)a % sizeof(*a))); 131 INLINE uptr atomic_fetch_sub(volatile atomic_uintptr_t *a [all...] |
sanitizer_stoptheworld.h | 29 SuspendedThreadID GetThreadID(uptr index) const { 33 int GetRegistersAndSP(uptr index, uptr *buffer, uptr *sp) const; 35 static uptr RegisterCount(); 36 uptr thread_count() const { return thread_ids_.size(); } 38 for (uptr i = 0; i < thread_ids_.size(); i++) {
|
sanitizer_procmaps_mac.cc | 76 uptr *start, uptr *end, uptr *offset, 77 char filename[], uptr filename_size, uptr *protection) { 105 bool MemoryMappingLayout::Next(uptr *start, uptr *end, uptr *offset, 106 char filename[], uptr filename_size, 107 uptr *protection) [all...] |
sanitizer_thread_registry.h | 42 uptr os_id; // PID (used for reporting). 43 uptr user_id; // Some opaque user thread id (e.g. pthread_t). 57 void SetStarted(uptr _os_id, void *arg); 58 void SetCreated(uptr _user_id, u64 _unique_id, bool _detached, 81 void GetNumberOfThreads(uptr *total = 0, uptr *running = 0, uptr *alive = 0); 82 uptr GetMaxAliveThreads(); 94 u32 CreateThread(uptr user_id, bool detached, u32 parent_tid, void *arg); 109 ThreadContextBase *FindThreadContextByOsIDLocked(uptr os_id) [all...] |
sanitizer_syscall_linux_x86_64.inc | 16 static uptr internal_syscall(u64 nr) { 24 static uptr internal_syscall(u64 nr, T1 arg1) { 32 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2) { 40 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3) { 48 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4) { 58 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4, 71 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4, 84 bool internal_iserror(uptr retval, int *rverrno) { 85 if (retval >= (uptr)-4095) {
|
sanitizer_coverage_mapping_libcdep.cc | 23 // $pid.sancov.raw is a binary dump of PC values, sizeof(uptr) each. Again, not 38 static const uptr kMaxNumberOfModules = 1 << 14; 39 static const uptr kMaxTextSize = 64 * 1024; 43 bool NeedsUpdate(uptr pc) { 52 void SetModuleRange(uptr start, uptr end) { 58 uptr last_range_start, last_range_end; 65 void CovUpdateMapping(uptr caller_pc) { 81 text.append("%d\n", sizeof(uptr) * 8); 86 uptr start = modules[i].address_range_start(j) [all...] |
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_deadlock_detector_test.cc | 47 uptr path[10]; 51 set<uptr> s; 53 uptr node = d.newNode(0); 61 uptr node = d.newNode(0); 65 for (set<uptr>::iterator it = s.begin(); it != s.end(); ++it) 69 uptr node = d.newNode(0); 77 uptr n1 = d.newNode(1); 78 uptr n2 = d.newNode(2); 101 uptr n1 = d.newNode(1); 102 uptr n2 = d.newNode(2) [all...] |
/external/compiler-rt/lib/interception/ |
interception_linux.h | 26 bool GetRealFunctionAddress(const char *func_name, uptr *func_addr, 27 uptr real, uptr wrapper); 33 #func, (::__interception::uptr *)&__interception::PTR_TO_REAL(func), \ 34 (::__interception::uptr) & (func), \ 35 (::__interception::uptr) & WRAP(func))
|