/external/compiler-rt/lib/esan/ |
working_set_posix.cpp | 34 VPrintf(2, "%s: %d\n", __FUNCTION__, SigNum); 45 VPrintf(2, "%s: %d\n", __FUNCTION__, SigNum); 59 VPrintf(2, "%s\n", __FUNCTION__); 66 VPrintf(1, "%s: removing SIGSEGV from the blocked set\n", __FUNCTION__); 79 VPrintf(1, "Unregistered for %d handler\n", SigNum); 90 VPrintf(3, "Shadow fault @%p\n", Addr); 130 VPrintf(1, "Registered for SIGSEGV handler\n");
|
esan.cpp | 66 VPrintf(3, "in esan::%s %p: %c %p %d\n", __FUNCTION__, PC, 100 VPrintf(3, "App #%d: [%zx-%zx) (%zuGB)\n", i, AppStart, AppEnd, 107 VPrintf(3, "\nChecking scale %d\n", Scale); 110 VPrintf(3, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, 114 VPrintf(3, "Shadow(Shadow) #%d: [%zx-%zx)\n", i, 151 VPrintf(1, "Shadow scale=%d offset=%p\n", Mapping.Scale, Mapping.Offset); 155 VPrintf(1, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, ShadowEnd, 199 VPrintf(1, "in esan::%s\n", __FUNCTION__); 222 VPrintf(1, "in esan::%s\n", __FUNCTION__); 232 VPrintf(1, "in esan::%s\n", __FUNCTION__) [all...] |
cache_frag.cpp | 136 VPrintf(2, " Register %s: %u fields\n", Struct->StructName, 141 VPrintf(2, " Duplicated %s: %u fields\n", Struct->StructName, 154 VPrintf(2, " Unregister %s: %u fields\n", Struct->StructName, 161 VPrintf(2, " Duplicated %s: %u fields\n", Struct->StructName, 176 VPrintf(2, "in esan::%s: %s with %u class(es)/struct(s)\n", __FUNCTION__, 183 VPrintf(2, "in esan::%s: %s with %u class(es)/struct(s)\n", __FUNCTION__, 189 VPrintf(2, "in esan::%s\n", __FUNCTION__); 198 VPrintf(2, "in esan::%s\n", __FUNCTION__); 203 VPrintf(2, "in esan::%s\n", __FUNCTION__);
|
esan_sideline_linux.cpp | 44 VPrintf(3, "Sideline signal %d\n", SigNum); 64 VPrintf(1, "Sideline thread starting\n"); 95 VPrintf(1, "Failed to disable timer\n"); 97 VPrintf(1, "Sideline thread exiting\n"); 134 VPrintf(1, "Joining sideline thread\n"); 144 VPrintf(1, "Failed to join sideline thread (errno %d)\n", ErrCode);
|
esan_linux.cpp | 55 VPrintf(1, "mmap conflict: [%p-%p) is not in an app region\n",
|
working_set.cpp | 166 VPrintf(4, "%s: considering %p-%p app=%d shadow=%d prot=%u\n", 170 VPrintf(3, "%s: walking %p-%p\n", __FUNCTION__, Start, End);
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_tls_get_addr.cc | 48 VPrintf(2, "__tls_get_addr: DTLS_Deallocate %p %zd\n", dtv, size); 61 VPrintf(2, "__tls_get_addr: DTLS_Resize %p %zd\n", &dtls, num_live_dtls); 75 VPrintf(2, "__tls_get_addr: DTLS_Destroy %p %zd\n", &dtls, dtls.dtv_size); 100 VPrintf(2, "__tls_get_addr: %p {%p,%p} => %p; tls_beg: %p; sp: %p " 106 VPrintf(2, "__tls_get_addr: glibc <=2.18 suspected; tls={%p,%p}\n", 111 VPrintf(2, "__tls_get_addr: static tls: %p\n", tls_beg); 118 VPrintf(2, "__tls_get_addr: glibc >=2.19 suspected; tls={%p %p}\n", 121 VPrintf(2, "__tls_get_addr: Can't guess glibc version\n"); 132 VPrintf(2, "DTLS_on_libc_memalign: %p %p\n", ptr, size);
|
sanitizer_deadlock_detector2.cc | 154 VPrintf(2, "#%llu: DD::MutexInit(%p)\n", cb->lt->ctx, m); 190 VPrintf(3, "#%llu: DD::allocateId assign id %d\n", cb->lt->ctx, id); 195 VPrintf(2, "#%llu: DD::MutexBeforeLock(%p, wlock=%d) nlocked=%d\n", 202 VPrintf(3, "#%llu: DD::MutexBeforeLock recursive\n", 218 VPrintf(3, "#%llu: DD::MutexBeforeLock first mutex\n", 244 VPrintf(3, "#%llu: DD::MutexBeforeLock added %d->%d link\n", 259 VPrintf(3, "#%llu: DD::MutexBeforeLock added %d->%d link\n", 265 VPrintf(3, "#%llu: DD::MutexBeforeLock don't check\n", 275 VPrintf(2, "#%llu: DD::MutexAfterLock(%p, wlock=%d, try=%d) nlocked=%d\n", 281 VPrintf(3, "#%llu: DD::MutexAfterLock recursive\n", cb->lt->ctx) [all...] |
sanitizer_suppressions.cc | 63 VPrintf(1, "%s: reading suppressions file at %s\n",
|
sanitizer_posix_libcdep.cc | 320 VPrintf(1, "Sanitizer: increasing stacksize %zu->%zu\n", stacksize,
|
sanitizer_common.h | 184 #define VPrintf(level, ...) \
|
/external/compiler-rt/lib/asan/ |
asan_malloc_win.cc | 209 VPrintf(2, "Failed to override function %s\n", fname); 241 VPrintf(2, "Failed to intercept ucrtbase.dll import %s\n", #func);
|
asan_poisoning.cc | 115 VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr, 155 VPrintf(3, "Trying to unpoison memory region [%p, %p)\n", (void *)beg_addr, 332 VPrintf(2, "contiguous_container: %p %p %p %p\n", beg_p, end_p, old_mid_p,
|
/external/compiler-rt/lib/tsan/rtl/ |
tsan_suppressions.cc | 106 VPrintf(2, "ThreadSanitizer: matched suppression '%s'\n", (*sp)->templ); 144 VPrintf(2, "ThreadSanitizer: matched suppression '%s'\n", s->templ);
|
tsan_rtl.cc | 183 VPrintf(1, "ThreadSanitizer: periodic memory flush\n"); 192 VPrintf(1, "ThreadSanitizer: memory flush check" 196 VPrintf(1, "ThreadSanitizer: flushing memory due to RSS\n"); 199 VPrintf(1, "ThreadSanitizer: memory flushed RSS=%llu\n", (u64)rss>>20); 270 VPrintf(2, "mapped meta shadow for (%p-%p) at (%p-%p)\n", 290 VPrintf(3, "checking shadow region %p-%p\n", beg, end); 298 VPrintf(3, " checking pointer %p: shadow=%p meta=%p\n", p, s, m); 361 VPrintf(1, "***** Running under ThreadSanitizer v2 (pid %d) *****\n", 454 VPrintf(1, "ThreadSanitizer: forked new process with pid %d,"
|
tsan_rtl_report.cc | 447 VPrintf(2, 460 VPrintf(2, "ThreadSanitizer: suppressing report as doubled (addr)\n");
|
tsan_interceptors.cc | 909 VPrintf(1, "ThreadSanitizer: starting new threads after multi-threaded " [all...] |
/external/compiler-rt/lib/msan/ |
msan_linux.cc | 41 VPrintf(1, "%s : %p - %p\n", descr, beg, end); 109 VPrintf(1, "__msan_init %p\n", &__msan_init); 111 VPrintf(1, "%s: %zx - %zx\n", kMemoryLayout[i].name, kMemoryLayout[i].start,
|
msan.cc | 179 VPrintf(1, "MSAN_OPTIONS: %s\n", msan_options ? msan_options : "<empty>"); 391 VPrintf(1, "Unlimited stack, doing reexec\n"); 400 VPrintf(1, "msan_track_origins\n"); 427 VPrintf(1, "MemorySanitizer init done\n");
|
msan_report.cc | 62 VPrintf(1, " raw origin id: %d\n", id);
|
/external/compiler-rt/lib/tsan/dd/ |
dd_interceptors.cc | 289 VPrintf(1, "guessed data_start=%p data_end=%p\n", g_data_start, g_data_end);
|