Searched defs:addr (Results 701 - 725 of 1909) sorted by relevance

<<21222324252627282930>>

/external/chromium_org/third_party/yasm/source/patched-yasm/modules/listfmts/nasm/
H A Dnasm-listfmt.c113 yasm_intnum *addr; local
115 yasm_reloc_get(info->next_reloc, &addr, &sym);
116 info->next_reloc_addr = yasm_intnum_get_uint(addr);
187 yasm_intnum *addr; local
189 yasm_reloc_get(last_hist->next_reloc, &addr, &sym);
191 yasm_intnum_get_uint(addr);
/external/chromium_org/tools/android/heap_profiler/
H A Dheap_profiler.c15 // void heap_profiler_alloc(addr, size, stack_frames, depth, flags);
16 // void heap_profiler_free(addr, size); (size == 0 means free entire region).
20 // addr. Each entry tracks the start-end addresses and points to the stack
196 // Deletes all the allocs in the range [addr, addr+size[ dealing with partial
204 static uint32_t delete_allocs_in_range(void* addr, size_t size) { argument
205 uintptr_t del_start = (uintptr_t) addr;
215 // deletion range (i.e. addr == del_start).
330 void heap_profiler_free(void* addr, size_t size, uint32_t* old_flags) { argument
331 assert(size == 0 || ((uintptr_t) addr
341 heap_profiler_alloc(void* addr, size_t size, uintptr_t* frames, uint32_t depth, uint32_t flags) argument
[all...]
H A Dheap_profiler_hooks_android.c110 void* addr, size_t size, int prot, int flags, int fd, off_t offset) {
111 void* ret = real_mmap(addr, size, prot, flags, fd, offset);
118 void* addr, size_t size, int prot, int flags, int fd, off_t pgoffset) {
119 void* ret = real_mmap2(addr, size, prot, flags, fd, pgoffset);
126 void* addr, size_t size, int prot, int flags, int fd, off64_t offset) {
127 void* ret = real_mmap64(addr, size, prot, flags, fd, offset);
134 void* addr, size_t oldlen, size_t newlen, unsigned long flags) {
135 void* ret = real_mremap(addr, oldlen, newlen, flags);
138 if (addr)
139 discard_alloc(addr, oldle
109 mmap( void* addr, size_t size, int prot, int flags, int fd, off_t offset) argument
117 mmap2( void* addr, size_t size, int prot, int flags, int fd, off_t pgoffset) argument
125 mmap64( void* addr, size_t size, int prot, int flags, int fd, off64_t offset) argument
133 mremap( void* addr, size_t oldlen, size_t newlen, unsigned long flags) argument
[all...]
H A Dheap_profiler_integrationtest.cc93 int DoFree(void* addr, size_t /*size, ignored.*/) { argument
94 free(addr);
/external/chromium_org/v8/src/
H A Ddisassembler.cc41 virtual const char* NameInCode(byte* addr) const;
70 const char* V8NameConverter::NameInCode(byte* addr) const {
73 return (code_ != NULL) ? reinterpret_cast<const char*>(addr) : "";
254 Address addr = relocinfo.target_address(); local
256 addr,
260 addr,
264 addr,
H A Dheap-profiler.cc155 void HeapProfiler::AllocationEvent(Address addr, int size) { argument
158 allocation_tracker_->AllocationEvent(addr, size);
163 void HeapProfiler::UpdateObjectSizeEvent(Address addr, int size) { argument
164 ids_->UpdateObjectSize(addr, size);
/external/chromium_org/v8/src/heap/
H A Dspaces-inl.h150 bool PagedSpace::Contains(Address addr) { argument
151 Page* p = Page::FromAddress(addr);
169 MemoryChunk* MemoryChunk::FromAnyPointerAddress(Heap* heap, Address addr) { argument
171 OffsetFrom(addr) & ~Page::kPageAlignmentMask);
179 if (chunk->Contains(addr)) {
/external/clang/test/Analysis/
H A Dtaint-generic.c112 char addr[128]; local
113 scanf("%s", addr);
114 system(addr); // expected-warning {{Untrusted data is passed to a system call}}
117 sprintf(buffer, "/bin/mail %s < /tmp/email", addr);
124 char addr[128]; local
125 scanf("%s", addr);
126 __builtin_snprintf(buffern, 10, "/bin/mail %s < /tmp/email", addr);
133 char addr[128]; local
134 scanf("%s %d", addr, &numt);
/external/clang/test/CXX/temp/temp.decls/temp.variadic/
H A Dexample-tuple.cpp134 template<typename T> const T *addr(const T& ref) { return &ref; } function
139 const tuple<int, float&, const double&> *t3p = addr(make_tuple(i, ref(f), cref(d)));
140 const tuple<int&, float&, double&> *t3q = addr(tie(i, f, d));
/external/clang/test/CodeGen/
H A Dasm.c197 void *addr; local
201 __asm__ ("foobar" : "=a" (addr) : "0" (c));
202 return addr;
/external/compiler-rt/lib/asan/
H A Dasan_fake_stack.cc241 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, argument
247 reinterpret_cast<uptr>(addr), &frame_beg, &frame_end));
H A Dasan_globals.cc80 bool DescribeAddressIfGlobal(uptr addr, uptr size) { argument
88 res |= DescribeAddressRelativeToGlobal(addr, size, g);
H A Dasan_poisoning.cc23 void PoisonShadow(uptr addr, uptr size, u8 value) { argument
25 CHECK(AddrIsAlignedByGranularity(addr));
26 CHECK(AddrIsInMem(addr));
27 CHECK(AddrIsAlignedByGranularity(addr + size));
28 CHECK(AddrIsInMem(addr + size - SHADOW_GRANULARITY));
30 FastPoisonShadow(addr, size, value);
33 void PoisonShadowPartialRightRedzone(uptr addr, argument
38 CHECK(AddrIsAlignedByGranularity(addr));
39 CHECK(AddrIsInMem(addr));
40 FastPoisonShadowPartialRightRedzone(addr, siz
79 __asan_poison_memory_region(void const volatile *addr, uptr size) argument
119 __asan_unpoison_memory_region(void const volatile *addr, uptr size) argument
149 __asan_address_is_poisoned(void const volatile *addr) argument
232 PoisonAlignedStackMemory(uptr addr, uptr size, bool do_poison) argument
255 __asan_poison_stack_memory(uptr addr, uptr size) argument
260 __asan_unpoison_stack_memory(uptr addr, uptr size) argument
350 WordIsPoisoned(uptr addr) argument
[all...]
H A Dasan_thread.h74 const char *GetFrameNameByAddr(uptr addr, uptr *offset, uptr *frame_pc);
76 bool AddrIsInStack(uptr addr) { argument
77 return addr >= stack_bottom_ && addr < stack_top_;
160 AsanThread *FindThreadByStackAddress(uptr addr);
/external/compiler-rt/lib/dfsan/
H A Ddfsan.cc171 void __dfsan_set_label(dfsan_label label, void *addr, uptr size) { argument
172 for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp)
177 void dfsan_set_label(dfsan_label label, void *addr, uptr size) { argument
178 __dfsan_set_label(label, addr, size);
182 void dfsan_add_label(dfsan_label label, void *addr, uptr size) { argument
183 for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp)
199 dfsan_read_label(const void *addr, uptr size) { argument
202 return __dfsan_union_load(shadow_for(addr), size);
/external/compiler-rt/lib/lsan/
H A Dlsan_allocator.cc138 uptr addr = reinterpret_cast<uptr>(p); local
143 if (addr < chunk) return 0;
148 if (addr < chunk + m->requested_size)
150 if (IsSpecialCaseOfOperatorNew0(chunk, m->requested_size, addr))
H A Dlsan_common.h95 uptr addr; member in struct:__lsan::LeakedObject
146 uptr addr) {
147 return chunk_size == sizeof(uptr) && chunk_beg + chunk_size == addr &&
159 // Returns true if [addr, addr + sizeof(void *)) is poisoned.
160 bool WordIsPoisoned(uptr addr);
145 IsSpecialCaseOfOperatorNew0(uptr chunk_beg, uptr chunk_size, uptr addr) argument
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_addrhashmap.h31 // Map::Handle h(&m, addr);
38 // Map::Handle h(&m, addr, true);
47 atomic_uintptr_t addr; member in struct:__sanitizer::AddrHashMap::Cell
70 Handle(AddrHashMap<T, kSize> *map, uptr addr);
71 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove);
72 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove, bool create);
97 uptr calcHash(uptr addr);
101 AddrHashMap<T, kSize>::Handle::Handle(AddrHashMap<T, kSize> *map, uptr addr) { argument
103 addr_ = addr;
110 AddrHashMap<T, kSize>::Handle::Handle(AddrHashMap<T, kSize> *map, uptr addr, argument
120 Handle(AddrHashMap<T, kSize> *map, uptr addr, bool remove, bool create) argument
156 uptr addr = h->addr_; local
334 calcHash(uptr addr) argument
[all...]
H A Dsanitizer_posix.cc127 void UnmapOrDie(void *addr, uptr size) { argument
128 if (!addr || !size) return;
129 uptr res = internal_munmap(addr, size);
132 SanitizerToolName, size, size, addr);
209 void *MapWritableFileToMemory(void *addr, uptr size, uptr fd, uptr offset) { argument
211 if (addr) flags |= MAP_FIXED;
212 uptr p = internal_mmap(addr, size, PROT_READ | PROT_WRITE, flags, fd, offset);
H A Dsanitizer_symbolizer.h56 void FillAddressAndModuleInfo(uptr addr, const char *mod_name, argument
58 address = addr;
H A Dsanitizer_symbolizer_libbacktrace.cc95 static int SymbolizeCodePCInfoCallback(void *vdata, uintptr_t addr, argument
102 info->FillAddressAndModuleInfo(addr, cdata->module_name,
114 static void SymbolizeCodeCallback(void *vdata, uintptr_t addr, argument
120 info->FillAddressAndModuleInfo(addr, cdata->module_name,
151 uptr LibbacktraceSymbolizer::SymbolizeCode(uptr addr, AddressInfo *frames, argument
161 backtrace_pcinfo((backtrace_state *)state_, addr, SymbolizeCodePCInfoCallback,
165 backtrace_syminfo((backtrace_state *)state_, addr, SymbolizeCodeCallback,
182 uptr LibbacktraceSymbolizer::SymbolizeCode(uptr addr, AddressInfo *frames,
/external/compiler-rt/lib/tsan/go/
H A Dtsan_go.cc27 bool IsExpectedReport(uptr addr, uptr size) { argument
38 ReportLocation *SymbolizeData(uptr addr) { argument
42 ReportStack *NewReportStackEntry(uptr addr) { argument
46 ent->pc = addr;
70 ReportStack *SymbolizeCode(uptr addr) { argument
74 s->pc = addr;
77 ctx.pc = addr;
116 void __tsan_map_shadow(uptr addr, uptr size) { argument
117 MapShadow(addr, size);
120 void __tsan_read(ThreadState *thr, void *addr, voi argument
124 __tsan_read_pc(ThreadState *thr, void *addr, uptr callpc, uptr pc) argument
132 __tsan_write(ThreadState *thr, void *addr, void *pc) argument
136 __tsan_write_pc(ThreadState *thr, void *addr, uptr callpc, uptr pc) argument
144 __tsan_read_range(ThreadState *thr, void *addr, uptr size, uptr pc) argument
148 __tsan_write_range(ThreadState *thr, void *addr, uptr size, uptr pc) argument
178 __tsan_acquire(ThreadState *thr, void *addr) argument
182 __tsan_release(ThreadState *thr, void *addr) argument
186 __tsan_release_merge(ThreadState *thr, void *addr) argument
194 __tsan_mutex_before_lock(ThreadState *thr, uptr addr, uptr write) argument
197 __tsan_mutex_after_lock(ThreadState *thr, uptr addr, uptr write) argument
204 __tsan_mutex_before_unlock(ThreadState *thr, uptr addr, uptr write) argument
[all...]
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_fd.cc136 bool FdLocation(uptr addr, int *fd, int *tid, u32 *stack) { argument
141 if (addr >= (uptr)tab && addr < (uptr)(tab + kTableSizeL2)) {
142 int l2 = (addr - (uptr)tab) / sizeof(FdDesc);
287 static u64 addr; local
288 return (uptr)&addr;
293 static u64 addr; local
294 return (uptr)&addr;
H A Dtsan_report.h55 uptr addr; member in struct:__tsan::ReportMop
75 uptr addr; member in struct:__tsan::ReportLocation
99 uptr addr; member in struct:__tsan::ReportMutex
H A Dtsan_rtl_mutex.cc54 uptr addr, u64 mid) {
65 rep.AddLocation(addr, 1);
69 void MutexCreate(ThreadState *thr, uptr pc, uptr addr, argument
71 DPrintf("#%d: MutexCreate %zx\n", thr->tid, addr);
73 if (!linker_init && IsAppMem(addr)) {
76 MemoryWrite(thr, pc, addr, kSizeLog1);
79 SyncVar *s = ctx->metamap.GetOrCreateAndLock(thr, pc, addr, true);
88 void MutexDestroy(ThreadState *thr, uptr pc, uptr addr) { argument
89 DPrintf("#%d: MutexDestroy %zx\n", thr->tid, addr);
94 if (IsGlobalVar(addr))
53 ReportMutexMisuse(ThreadState *thr, uptr pc, ReportType typ, uptr addr, u64 mid) argument
147 MutexLock(ThreadState *thr, uptr pc, uptr addr, int rec, bool try_lock) argument
192 MutexUnlock(ThreadState *thr, uptr pc, uptr addr, bool all) argument
234 MutexReadLock(ThreadState *thr, uptr pc, uptr addr, bool trylock) argument
269 MutexReadUnlock(ThreadState *thr, uptr pc, uptr addr) argument
301 MutexReadOrWriteUnlock(ThreadState *thr, uptr pc, uptr addr) argument
348 MutexRepair(ThreadState *thr, uptr pc, uptr addr) argument
356 Acquire(ThreadState *thr, uptr pc, uptr addr) argument
383 Release(ThreadState *thr, uptr pc, uptr addr) argument
395 ReleaseStore(ThreadState *thr, uptr pc, uptr addr) argument
[all...]

Completed in 729 milliseconds

<<21222324252627282930>>