/external/chromium_org/third_party/yasm/source/patched-yasm/modules/listfmts/nasm/ |
H A D | nasm-listfmt.c | 113 yasm_intnum *addr; local 115 yasm_reloc_get(info->next_reloc, &addr, &sym); 116 info->next_reloc_addr = yasm_intnum_get_uint(addr); 187 yasm_intnum *addr; local 189 yasm_reloc_get(last_hist->next_reloc, &addr, &sym); 191 yasm_intnum_get_uint(addr);
|
/external/chromium_org/tools/android/heap_profiler/ |
H A D | heap_profiler.c | 15 // void heap_profiler_alloc(addr, size, stack_frames, depth, flags); 16 // void heap_profiler_free(addr, size); (size == 0 means free entire region). 20 // addr. Each entry tracks the start-end addresses and points to the stack 196 // Deletes all the allocs in the range [addr, addr+size[ dealing with partial 204 static uint32_t delete_allocs_in_range(void* addr, size_t size) { argument 205 uintptr_t del_start = (uintptr_t) addr; 215 // deletion range (i.e. addr == del_start). 330 void heap_profiler_free(void* addr, size_t size, uint32_t* old_flags) { argument 331 assert(size == 0 || ((uintptr_t) addr 341 heap_profiler_alloc(void* addr, size_t size, uintptr_t* frames, uint32_t depth, uint32_t flags) argument [all...] |
H A D | heap_profiler_hooks_android.c | 110 void* addr, size_t size, int prot, int flags, int fd, off_t offset) { 111 void* ret = real_mmap(addr, size, prot, flags, fd, offset); 118 void* addr, size_t size, int prot, int flags, int fd, off_t pgoffset) { 119 void* ret = real_mmap2(addr, size, prot, flags, fd, pgoffset); 126 void* addr, size_t size, int prot, int flags, int fd, off64_t offset) { 127 void* ret = real_mmap64(addr, size, prot, flags, fd, offset); 134 void* addr, size_t oldlen, size_t newlen, unsigned long flags) { 135 void* ret = real_mremap(addr, oldlen, newlen, flags); 138 if (addr) 139 discard_alloc(addr, oldle 109 mmap( void* addr, size_t size, int prot, int flags, int fd, off_t offset) argument 117 mmap2( void* addr, size_t size, int prot, int flags, int fd, off_t pgoffset) argument 125 mmap64( void* addr, size_t size, int prot, int flags, int fd, off64_t offset) argument 133 mremap( void* addr, size_t oldlen, size_t newlen, unsigned long flags) argument [all...] |
H A D | heap_profiler_integrationtest.cc | 93 int DoFree(void* addr, size_t /*size, ignored.*/) { argument 94 free(addr);
|
/external/chromium_org/v8/src/ |
H A D | disassembler.cc | 41 virtual const char* NameInCode(byte* addr) const; 70 const char* V8NameConverter::NameInCode(byte* addr) const { 73 return (code_ != NULL) ? reinterpret_cast<const char*>(addr) : ""; 254 Address addr = relocinfo.target_address(); local 256 addr, 260 addr, 264 addr,
|
H A D | heap-profiler.cc | 155 void HeapProfiler::AllocationEvent(Address addr, int size) { argument 158 allocation_tracker_->AllocationEvent(addr, size); 163 void HeapProfiler::UpdateObjectSizeEvent(Address addr, int size) { argument 164 ids_->UpdateObjectSize(addr, size);
|
/external/chromium_org/v8/src/heap/ |
H A D | spaces-inl.h | 150 bool PagedSpace::Contains(Address addr) { argument 151 Page* p = Page::FromAddress(addr); 169 MemoryChunk* MemoryChunk::FromAnyPointerAddress(Heap* heap, Address addr) { argument 171 OffsetFrom(addr) & ~Page::kPageAlignmentMask); 179 if (chunk->Contains(addr)) {
|
/external/clang/test/Analysis/ |
H A D | taint-generic.c | 112 char addr[128]; local 113 scanf("%s", addr); 114 system(addr); // expected-warning {{Untrusted data is passed to a system call}} 117 sprintf(buffer, "/bin/mail %s < /tmp/email", addr); 124 char addr[128]; local 125 scanf("%s", addr); 126 __builtin_snprintf(buffern, 10, "/bin/mail %s < /tmp/email", addr); 133 char addr[128]; local 134 scanf("%s %d", addr, &numt);
|
/external/clang/test/CXX/temp/temp.decls/temp.variadic/ |
H A D | example-tuple.cpp | 134 template<typename T> const T *addr(const T& ref) { return &ref; } function 139 const tuple<int, float&, const double&> *t3p = addr(make_tuple(i, ref(f), cref(d))); 140 const tuple<int&, float&, double&> *t3q = addr(tie(i, f, d));
|
/external/clang/test/CodeGen/ |
H A D | asm.c | 197 void *addr; local 201 __asm__ ("foobar" : "=a" (addr) : "0" (c)); 202 return addr;
|
/external/compiler-rt/lib/asan/ |
H A D | asan_fake_stack.cc | 241 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, argument 247 reinterpret_cast<uptr>(addr), &frame_beg, &frame_end));
|
H A D | asan_globals.cc | 80 bool DescribeAddressIfGlobal(uptr addr, uptr size) { argument 88 res |= DescribeAddressRelativeToGlobal(addr, size, g);
|
H A D | asan_poisoning.cc | 23 void PoisonShadow(uptr addr, uptr size, u8 value) { argument 25 CHECK(AddrIsAlignedByGranularity(addr)); 26 CHECK(AddrIsInMem(addr)); 27 CHECK(AddrIsAlignedByGranularity(addr + size)); 28 CHECK(AddrIsInMem(addr + size - SHADOW_GRANULARITY)); 30 FastPoisonShadow(addr, size, value); 33 void PoisonShadowPartialRightRedzone(uptr addr, argument 38 CHECK(AddrIsAlignedByGranularity(addr)); 39 CHECK(AddrIsInMem(addr)); 40 FastPoisonShadowPartialRightRedzone(addr, siz 79 __asan_poison_memory_region(void const volatile *addr, uptr size) argument 119 __asan_unpoison_memory_region(void const volatile *addr, uptr size) argument 149 __asan_address_is_poisoned(void const volatile *addr) argument 232 PoisonAlignedStackMemory(uptr addr, uptr size, bool do_poison) argument 255 __asan_poison_stack_memory(uptr addr, uptr size) argument 260 __asan_unpoison_stack_memory(uptr addr, uptr size) argument 350 WordIsPoisoned(uptr addr) argument [all...] |
H A D | asan_thread.h | 74 const char *GetFrameNameByAddr(uptr addr, uptr *offset, uptr *frame_pc); 76 bool AddrIsInStack(uptr addr) { argument 77 return addr >= stack_bottom_ && addr < stack_top_; 160 AsanThread *FindThreadByStackAddress(uptr addr);
|
/external/compiler-rt/lib/dfsan/ |
H A D | dfsan.cc | 171 void __dfsan_set_label(dfsan_label label, void *addr, uptr size) { argument 172 for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp) 177 void dfsan_set_label(dfsan_label label, void *addr, uptr size) { argument 178 __dfsan_set_label(label, addr, size); 182 void dfsan_add_label(dfsan_label label, void *addr, uptr size) { argument 183 for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp) 199 dfsan_read_label(const void *addr, uptr size) { argument 202 return __dfsan_union_load(shadow_for(addr), size);
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_allocator.cc | 138 uptr addr = reinterpret_cast<uptr>(p); local 143 if (addr < chunk) return 0; 148 if (addr < chunk + m->requested_size) 150 if (IsSpecialCaseOfOperatorNew0(chunk, m->requested_size, addr))
|
H A D | lsan_common.h | 95 uptr addr; member in struct:__lsan::LeakedObject 146 uptr addr) { 147 return chunk_size == sizeof(uptr) && chunk_beg + chunk_size == addr && 159 // Returns true if [addr, addr + sizeof(void *)) is poisoned. 160 bool WordIsPoisoned(uptr addr); 145 IsSpecialCaseOfOperatorNew0(uptr chunk_beg, uptr chunk_size, uptr addr) argument
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_addrhashmap.h | 31 // Map::Handle h(&m, addr); 38 // Map::Handle h(&m, addr, true); 47 atomic_uintptr_t addr; member in struct:__sanitizer::AddrHashMap::Cell 70 Handle(AddrHashMap<T, kSize> *map, uptr addr); 71 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove); 72 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove, bool create); 97 uptr calcHash(uptr addr); 101 AddrHashMap<T, kSize>::Handle::Handle(AddrHashMap<T, kSize> *map, uptr addr) { argument 103 addr_ = addr; 110 AddrHashMap<T, kSize>::Handle::Handle(AddrHashMap<T, kSize> *map, uptr addr, argument 120 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove, bool create) argument 156 uptr addr = h->addr_; local 334 calcHash(uptr addr) argument [all...] |
H A D | sanitizer_posix.cc | 127 void UnmapOrDie(void *addr, uptr size) { argument 128 if (!addr || !size) return; 129 uptr res = internal_munmap(addr, size); 132 SanitizerToolName, size, size, addr); 209 void *MapWritableFileToMemory(void *addr, uptr size, uptr fd, uptr offset) { argument 211 if (addr) flags |= MAP_FIXED; 212 uptr p = internal_mmap(addr, size, PROT_READ | PROT_WRITE, flags, fd, offset);
|
H A D | sanitizer_symbolizer.h | 56 void FillAddressAndModuleInfo(uptr addr, const char *mod_name, argument 58 address = addr;
|
H A D | sanitizer_symbolizer_libbacktrace.cc | 95 static int SymbolizeCodePCInfoCallback(void *vdata, uintptr_t addr, argument 102 info->FillAddressAndModuleInfo(addr, cdata->module_name, 114 static void SymbolizeCodeCallback(void *vdata, uintptr_t addr, argument 120 info->FillAddressAndModuleInfo(addr, cdata->module_name, 151 uptr LibbacktraceSymbolizer::SymbolizeCode(uptr addr, AddressInfo *frames, argument 161 backtrace_pcinfo((backtrace_state *)state_, addr, SymbolizeCodePCInfoCallback, 165 backtrace_syminfo((backtrace_state *)state_, addr, SymbolizeCodeCallback, 182 uptr LibbacktraceSymbolizer::SymbolizeCode(uptr addr, AddressInfo *frames,
|
/external/compiler-rt/lib/tsan/go/ |
H A D | tsan_go.cc | 27 bool IsExpectedReport(uptr addr, uptr size) { argument 38 ReportLocation *SymbolizeData(uptr addr) { argument 42 ReportStack *NewReportStackEntry(uptr addr) { argument 46 ent->pc = addr; 70 ReportStack *SymbolizeCode(uptr addr) { argument 74 s->pc = addr; 77 ctx.pc = addr; 116 void __tsan_map_shadow(uptr addr, uptr size) { argument 117 MapShadow(addr, size); 120 void __tsan_read(ThreadState *thr, void *addr, voi argument 124 __tsan_read_pc(ThreadState *thr, void *addr, uptr callpc, uptr pc) argument 132 __tsan_write(ThreadState *thr, void *addr, void *pc) argument 136 __tsan_write_pc(ThreadState *thr, void *addr, uptr callpc, uptr pc) argument 144 __tsan_read_range(ThreadState *thr, void *addr, uptr size, uptr pc) argument 148 __tsan_write_range(ThreadState *thr, void *addr, uptr size, uptr pc) argument 178 __tsan_acquire(ThreadState *thr, void *addr) argument 182 __tsan_release(ThreadState *thr, void *addr) argument 186 __tsan_release_merge(ThreadState *thr, void *addr) argument 194 __tsan_mutex_before_lock(ThreadState *thr, uptr addr, uptr write) argument 197 __tsan_mutex_after_lock(ThreadState *thr, uptr addr, uptr write) argument 204 __tsan_mutex_before_unlock(ThreadState *thr, uptr addr, uptr write) argument [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_fd.cc | 136 bool FdLocation(uptr addr, int *fd, int *tid, u32 *stack) { argument 141 if (addr >= (uptr)tab && addr < (uptr)(tab + kTableSizeL2)) { 142 int l2 = (addr - (uptr)tab) / sizeof(FdDesc); 287 static u64 addr; local 288 return (uptr)&addr; 293 static u64 addr; local 294 return (uptr)&addr;
|
H A D | tsan_report.h | 55 uptr addr; member in struct:__tsan::ReportMop 75 uptr addr; member in struct:__tsan::ReportLocation 99 uptr addr; member in struct:__tsan::ReportMutex
|
H A D | tsan_rtl_mutex.cc | 54 uptr addr, u64 mid) { 65 rep.AddLocation(addr, 1); 69 void MutexCreate(ThreadState *thr, uptr pc, uptr addr, argument 71 DPrintf("#%d: MutexCreate %zx\n", thr->tid, addr); 73 if (!linker_init && IsAppMem(addr)) { 76 MemoryWrite(thr, pc, addr, kSizeLog1); 79 SyncVar *s = ctx->metamap.GetOrCreateAndLock(thr, pc, addr, true); 88 void MutexDestroy(ThreadState *thr, uptr pc, uptr addr) { argument 89 DPrintf("#%d: MutexDestroy %zx\n", thr->tid, addr); 94 if (IsGlobalVar(addr)) 53 ReportMutexMisuse(ThreadState *thr, uptr pc, ReportType typ, uptr addr, u64 mid) argument 147 MutexLock(ThreadState *thr, uptr pc, uptr addr, int rec, bool try_lock) argument 192 MutexUnlock(ThreadState *thr, uptr pc, uptr addr, bool all) argument 234 MutexReadLock(ThreadState *thr, uptr pc, uptr addr, bool trylock) argument 269 MutexReadUnlock(ThreadState *thr, uptr pc, uptr addr) argument 301 MutexReadOrWriteUnlock(ThreadState *thr, uptr pc, uptr addr) argument 348 MutexRepair(ThreadState *thr, uptr pc, uptr addr) argument 356 Acquire(ThreadState *thr, uptr pc, uptr addr) argument 383 Release(ThreadState *thr, uptr pc, uptr addr) argument 395 ReleaseStore(ThreadState *thr, uptr pc, uptr addr) argument [all...] |