/src/sys/external/bsd/compiler_rt/dist/lib/xray/tests/unit/ |
allocator_test.cc | 28 TEST(AllocatorTest, Allocate) { 30 auto B = A.Allocate(); 36 auto B1 = A.Allocate(); 38 auto B2 = A.Allocate(); 54 for (auto B = A.Allocate(); B.Data != nullptr; B = A.Allocate(), ++C) 73 for (auto B = A.Allocate(); B.Data != nullptr; B = A.Allocate(), ++C)
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_allocator_combined.h | 19 // PrimaryAllocator is efficient, but may not allocate some sizes (alignments). 22 // SecondaryAllocator can allocate anything, but is not efficient. 48 void *Allocate(AllocatorCache *cache, uptr size, uptr alignment) { 73 res = cache->Allocate(&primary_, primary_.ClassID(size)); 75 res = secondary_.Allocate(&stats_, original_size, alignment); 104 return Allocate(cache, new_size, alignment); 112 void *new_p = Allocate(cache, new_size, alignment);
|
sanitizer_flag_parser.cc | 53 char *s2 = (char*)Alloc.Allocate(len + 1); 168 flags_ = (Flag *)Alloc.Allocate(sizeof(Flag) * kMaxFlags);
|
sanitizer_allocator.cc | 114 return internal_allocator()->Allocate(&internal_allocator_cache, size, 117 return internal_allocator()->Allocate(cache, size, alignment); 145 Report("FATAL: %s: internal allocator is out of memory trying to allocate " 201 void *LowLevelAllocator::Allocate(uptr size) {
|
sanitizer_allocator_local_cache.h | 41 void *Allocate(SizeClassAllocator *allocator, uptr class_id) { 143 return (TransferBatch*)Allocate(allocator, batch_class_id); 160 void *Allocate(SizeClassAllocator *allocator, uptr class_id) { 261 // Failure to allocate a batch while releasing memory is non recoverable. 264 Report("FATAL: Internal error: %s's allocator failed to allocate a "
|
sanitizer_allocator_secondary.h | 67 // This class can (de)allocate only large chunks of memory using mmap/unmap. 86 void *Allocate(AllocatorStats *stat, uptr size, uptr alignment) {
|
sanitizer_quarantine.h | 74 // void *cb.Allocate(uptr size); 224 QuarantineBatch *b = (QuarantineBatch *)cb.Allocate(sizeof(*b));
|
sanitizer_common.h | 105 // Disallow access to a memory range. Use MmapFixedNoAccess to allocate an 161 void *Allocate(uptr size); 960 return alloc.Allocate(size);
|
sanitizer_mac.cc | 804 new_env = (char*)allocator_for_env.Allocate(old_env_len + fname_len + 2); 857 // Allocate memory to hold the previous env var name, its value, the '=' 859 char *new_env = (char*)allocator_for_env.Allocate(
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_allocator_testlib.cc | 107 void *p = allocator.Allocate(&cache, size, 8); 123 void *p = allocator.Allocate(&cache, size, 8, false); 146 void *p = allocator.Allocate(&cache, size, alignment); 155 *memptr = allocator.Allocate(&cache, size, alignment); 165 void *p = allocator.Allocate(&cache, size, GetPageSizeCached());
|
sanitizer_allocator_test.cc | 210 // Allocate a bunch of chunks. 219 char *x = (char*)cache.Allocate(a, class_id0); 330 void *x = cache.Allocate(a, 1 + i % (Allocator::kNumClasses - 1)); 384 void *x = cache.Allocate(a, max_size_class); 512 void *x = a.Allocate(&stats, 1 << 20, 1); 554 // Allocate some. 556 allocated[i] = (char *)a.Allocate(&stats, size, 1); 569 // Allocate some more, also add metadata. 571 char *x = (char *)a.Allocate(&stats, size, 1); 602 char *p = allocated[i] = (char *)a.Allocate(&stats, size, alignment) [all...] |
sanitizer_quarantine_test.cc | 23 void *Allocate(uptr size) {
|
/src/sys/external/bsd/compiler_rt/dist/lib/lsan/ |
lsan_allocator.cc | 73 Report("WARNING: LeakSanitizer failed to allocate 0x%zx bytes\n", size); 79 void *Allocate(const StackTrace &stack, uptr size, uptr alignment, 85 void *p = allocator.Allocate(GetAllocatorCache(), size, alignment); 108 return Allocate(stack, size, 1, true); 148 void *ptr = Allocate(stack, size, alignment, kAlwaysClearMemory); 150 // OOM error is already taken care of by Allocate. 164 return SetErrnoOnNull(Allocate(stack, size, alignment, kAlwaysClearMemory)); 174 return SetErrnoOnNull(Allocate(stack, size, alignment, kAlwaysClearMemory)); 178 return SetErrnoOnNull(Allocate(stack, size, 1, kAlwaysClearMemory)); 195 Allocate(stack, size, GetPageSizeCached(), kAlwaysClearMemory)) [all...] |
lsan_allocator.h | 25 void *Allocate(const StackTrace &stack, uptr size, uptr alignment,
|
/src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/ |
asan_fake_stack_test.cc | 106 TEST(FakeStack, Allocate) { 116 FakeFrame *ff = fs->Allocate(stack_size_log, cid, 0); 124 // We are out of fake stack, so Allocate should return 0. 125 EXPECT_EQ(0UL, fs->Allocate(stack_size_log, cid, 0)); 137 FakeFrame *ff = fs->Allocate(fs->stack_size_log(), class_id, 0);
|
/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_allocator.cc | 168 void *Allocate(uptr size) { 169 void *res = get_allocator().Allocate(cache_, size, 1); 399 void *Allocate(uptr size, uptr alignment, BufferedStackTrace *stack, 441 Report("WARNING: AddressSanitizer failed to allocate 0x%zx bytes\n", 453 allocated = allocator.Allocate(cache, needed_size, 8); 457 allocated = allocator.Allocate(cache, needed_size, 8); 618 // On Windows, uninstrumented DLLs may allocate memory before ASan hooks 661 void *new_ptr = Allocate(new_size, 8, stack, FROM_MALLOC, true); 682 void *ptr = Allocate(nmemb * size, 8, stack, FROM_MALLOC, false); 876 return SetErrnoOnNull(instance.Allocate(size, 8, stack, FROM_MALLOC, true)) [all...] |
asan_fake_stack.h | 44 // stack_size bytes and thus can allocate 52 // Allocate() flips the appropriate allocation flag atomically, thus achieving 54 // This allocator does not have quarantine per se, but it tries to allocate the 121 // Allocate the fake frame. 122 FakeFrame *Allocate(uptr stack_size_log, uptr class_id, uptr real_stack);
|
asan_fake_stack.cc | 88 FakeFrame *FakeStack::Allocate(uptr stack_size_log, uptr class_id, 207 FakeFrame *ff = fs->Allocate(fs->stack_size_log(), class_id, real_stack);
|
/src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
msan_allocator.cc | 148 Report("WARNING: MemorySanitizer failed to allocate 0x%zx bytes\n", size); 157 allocated = allocator.Allocate(cache, size, alignment); 161 allocated = allocator.Allocate(cache, size, alignment); 285 // pvalloc(0) should allocate one page.
|
/src/sys/external/bsd/compiler_rt/dist/lib/xray/ |
xray_allocator.h | 40 template <class T> T *allocate() XRAY_NEVER_INSTRUMENT { function in namespace:__xray 70 "XRay Profiling: Failed to allocate memory of size %d; Error = %d.\n", 119 "XRay Profiling: Failed to allocate memory of size %d; Error = %d.\n", 187 Report("XRay Profiling: Failed to allocate memory for allocator.\n"); 278 Block Allocate() XRAY_NEVER_INSTRUMENT { return {Alloc()}; }
|
xray_segmented_array.h | 208 // the Freelist, to see whether we need to actually allocate new blocks or 253 auto SegmentBlock = Alloc->Allocate();
|
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
tsan_mman.cc | 164 void *p = allocator()->Allocate(&thr->proc()->alloc_cache, sz, align); 292 // pvalloc(0) should allocate one page.
|
/src/sys/external/isc/libsodium/dist/build-aux/ |
ltmain.sh | 6359 /* Allocate new argument vector. */
|
/src/sys/external/isc/libsodium/dist/ |
ltmain.sh | 4981 /* Allocate new argument vector. */
|
/src/sys/arch/sparc64/sparc64/ |
locore.s | 1324 * The trap handling code needs to allocate a trap frame on the kernel, or 1344 * When we allocate our trap windows we must give up our globals because 1395 * they will allocate a trapframe at the bottom of the kernel stack, 1443 add %g6, %g5, %g6; /* Allocate a stack frame */ \ 1450 add %g6, %g5, %g6; /* Allocate a stack frame */ \ 1528 1: add %g6, %g5, %g5; /* Allocate a stack frame */ \ 1637 add %g6, %g5, %g6; /* Allocate a stack frame */ \ 2071 * will allocate a trap frame, save the out registers, and 2390 add %g6, -CCFSZ, %g6 ! Allocate a stack frame 3967 save %sp, -CCFSZ-TF_SIZE, %sp ! allocate a trap fram [all...] |