/bionic/libc/malloc_debug/ |
D | GuardData.cpp | 49 void GuardData::LogFailure(const Header* header, const void* pointer, const void* data) { in LogFailure() argument 51 error_log("+++ ALLOCATION %p SIZE %zu HAS A CORRUPTED %s GUARD", pointer, header->size, in LogFailure() 82 bool FrontGuardData::Valid(const Header* header) { in Valid() argument 83 return GuardData::Valid(debug_->GetFrontGuard(header)); in Valid() 86 void FrontGuardData::LogFailure(const Header* header) { in LogFailure() argument 87 GuardData::LogFailure(header, debug_->GetPointer(header), debug_->GetFrontGuard(header)); in LogFailure() 93 bool RearGuardData::Valid(const Header* header) { in Valid() argument 94 return GuardData::Valid(debug_->GetRearGuard(header)); in Valid() 97 void RearGuardData::LogFailure(const Header* header) { in LogFailure() argument 98 GuardData::LogFailure(header, debug_->GetPointer(header), debug_->GetRearGuard(header)); in LogFailure()
|
D | malloc_debug.cpp | 233 Header* header = g_debug->GetHeader(pointer); in VerifyPointer() local 234 if (header->tag != DEBUG_TAG) { in VerifyPointer() 236 if (header->tag == DEBUG_FREE_TAG) { in VerifyPointer() 239 error_str = android::base::StringPrintf("HAS INVALID TAG %" PRIx32 " (%s)", header->tag, in VerifyPointer() 265 static void* InitHeader(Header* header, void* orig_pointer, size_t size) { in InitHeader() argument 266 header->tag = DEBUG_TAG; in InitHeader() 267 header->orig_pointer = orig_pointer; in InitHeader() 268 header->size = size; in InitHeader() 269 header->usable_size = g_dispatch->malloc_usable_size(orig_pointer); in InitHeader() 270 if (header->usable_size == 0) { in InitHeader() [all …]
|
D | DebugData.h | 53 inline void* GetPointer(const Header* header) { in GetPointer() argument 54 uintptr_t value = reinterpret_cast<uintptr_t>(header); in GetPointer() 63 uint8_t* GetFrontGuard(const Header* header) { in GetFrontGuard() argument 64 uintptr_t value = reinterpret_cast<uintptr_t>(header); in GetFrontGuard() 68 uint8_t* GetRearGuard(const Header* header) { in GetRearGuard() argument 69 uintptr_t value = reinterpret_cast<uintptr_t>(GetPointer(header)); in GetRearGuard() 70 return reinterpret_cast<uint8_t*>(value + header->size); in GetRearGuard()
|
D | GuardData.h | 52 void LogFailure(const Header* header, const void* pointer, const void* data); 67 bool Valid(const Header* header); 69 void LogFailure(const Header* header); 86 bool Valid(const Header* header); 88 void LogFailure(const Header* header);
|
D | README.md | 64 This option adds a special header to all allocations that contains the guard 84 This option adds a special header to all allocations that contains 112 Before P, this option adds a special header to all allocations that contains 114 option will not add a special header. 139 Before P, this option adds a special header to all allocations that contains 141 option will not add a special header. 214 Before P, this option adds a special header to all allocations that contains 216 option will not add a special header. 230 an allocation has a special header applied, and the header is corrupted 252 Before P, this option adds a special header to all allocations that contains [all …]
|
D | README_marshmallow_and_earlier.md | 45 When enabled, this value creates a special header to all allocations 63 When enabled, this value does not create a special header. It only modifies 72 When enabled, this value creates a special header to all allocations
|
D | PointerData.cpp | 300 Header* header = g_debug->GetHeader(reinterpret_cast<const void*>(info.pointer)); in VerifyFreedPointer() local 301 if (header->tag != DEBUG_FREE_TAG) { in VerifyFreedPointer() 304 info.pointer, header->tag); in VerifyFreedPointer() 314 usable_size = header->usable_size; in VerifyFreedPointer()
|
/bionic/libc/tzcode/ |
D | bionic.cpp | 122 bionic_tzdata_header_t header = {}; in __bionic_open_tzdata_path() local 123 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, &header, sizeof(header))); in __bionic_open_tzdata_path() 124 if (bytes_read != sizeof(header)) { in __bionic_open_tzdata_path() 131 if (strncmp(header.tzdata_version, "tzdata", 6) != 0 || header.tzdata_version[11] != 0) { in __bionic_open_tzdata_path() 132 … fprintf(stderr, "%s: bad magic in \"%s\": \"%.6s\"\n", __FUNCTION__, path, header.tzdata_version); in __bionic_open_tzdata_path() 137 if (TEMP_FAILURE_RETRY(lseek(fd, ntohl(header.index_offset), SEEK_SET)) == -1) { in __bionic_open_tzdata_path() 143 if (ntohl(header.index_offset) > ntohl(header.data_offset)) { in __bionic_open_tzdata_path() 145 __FUNCTION__, path, ntohl(header.data_offset), ntohl(header.index_offset)); in __bionic_open_tzdata_path() 149 const size_t index_size = ntohl(header.data_offset) - ntohl(header.index_offset); in __bionic_open_tzdata_path() 179 specific_zone_offset = ntohl(entry->start) + ntohl(header.data_offset); in __bionic_open_tzdata_path()
|
/bionic/libc/kernel/tools/ |
D | kernel.py | 85 header = m.group(1) 96 header = "%s%s" % (_prefix, header) 98 if not header in self.headers: 99 self.headers[header] = set() 103 print "=== %s uses %s" % (from_file, header) 104 self.headers[header].add(from_file) 150 def getHeaderUsers(self,header): argument 152 return set(self.headers.get(header)) 224 def pathFromHeader(self,header): argument 225 path = header [all …]
|
D | generate_uapi_headers.sh | 99 header=$(basename ${file}) 100 if [[ -f "${check_dir}/${header}" ]]; then
|
/bionic/libc/kernel/uapi/asm-x86/asm/ |
D | kvm_para.h | 81 struct kvm_mmu_op_header header; member 86 struct kvm_mmu_op_header header; member 89 struct kvm_mmu_op_header header; member
|
/bionic/libc/kernel/uapi/linux/ |
D | vfio.h | 89 struct vfio_info_cap_header header; member 96 struct vfio_info_cap_header header; member 124 struct vfio_info_cap_header header; member 129 struct vfio_info_cap_header header; member 272 struct vfio_info_cap_header header; member
|
D | pci_regs.h | 588 #define PCI_EXT_CAP_ID(header) (header & 0x0000ffff) argument 589 #define PCI_EXT_CAP_VER(header) ((header >> 16) & 0xf) argument 590 #define PCI_EXT_CAP_NEXT(header) ((header >> 20) & 0xffc) argument
|
D | virtio_crypto.h | 177 struct virtio_crypto_ctrl_header header; member 260 struct virtio_crypto_op_header header; member
|
D | firewire-cdev.h | 82 __u32 header[0]; member 210 __u32 header[0]; member
|
/bionic/libc/kernel/ |
D | README.md | 16 They can be also included before or after any Bionic C library header. 22 also includes the header files that are generated by building the kernel 36 Checks out the android kernel and generates all uapi header files. 40 Prints the clean version of a given kernel header. With the -u option, 41 this will also update the corresponding clean header file if its
|
/bionic/ |
D | README.md | 51 publicly-exported header file. 82 # The public header files on everyone's include path. These are a mixture of 86 # The kernel uapi header files. These are scrubbed copies of the originals 94 # These are private header files meant for use within bionic itself. 111 # header/source files needed by the BSD implementation. 163 2. Add constants (and perhaps types) to the appropriate header file. 165 kernel uapi header files, in which case you just need to make sure that 166 the appropriate POSIX header file in libc/include/ includes the 168 3. Add function declarations to the appropriate header file. Don't forget 173 and have the right declaration in the header file, and that you correctly [all …]
|
/bionic/libc/kernel/uapi/scsi/ |
D | scsi_bsg_ufs.h | 45 struct utp_upiu_header header; member
|
/bionic/libc/kernel/uapi/linux/raid/ |
D | md_p.h | 197 struct r5l_payload_header header; member 208 struct r5l_payload_header header; member
|
/bionic/tools/versioner/src/ |
D | versioner.cpp | 143 auto new_end = std::remove_if(headers.begin(), headers.end(), [&arch](llvm::StringRef header) { in collectRequirements() argument 149 if (header.endswith("/" + it.first)) { in collectRequirements() 212 for (const std::string& header : req.headers) { in compileHeaders() local 213 jobs.emplace_back(type, header); in compileHeaders()
|
/bionic/libc/kernel/android/ |
D | README.md | 1 The files under the uapi directory are android kernel uapi header files that
|
/bionic/libc/tools/ |
D | genseccomp.py | 202 header = textwrap.dedent("""\ 219 return header + "\n".join(bpf) + footer
|
/bionic/libc/kernel/uapi/misc/ |
D | cxl.h | 115 struct cxl_event_header header; member
|
/bionic/tests/ |
D | unistd_test.cpp | 1319 __user_cap_header_struct header; in TEST() local 1320 memset(&header, 0, sizeof(header)); in TEST() 1321 header.version = _LINUX_CAPABILITY_VERSION_3; in TEST() 1324 ASSERT_EQ(0, capget(&header, &old_caps[0])); in TEST() 1334 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges"; in TEST() 1342 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges"; in TEST()
|
/bionic/libc/kernel/uapi/drm/ |
D | nouveau_drm.h | 128 __u64 header; member
|