| /src/sys/external/bsd/acpica/dist/compiler/ |
| aslsupport.y | 64 unsigned int Size) 70 "\nAslLocalAllocate: Expanding Stack to %u\n\n", Size); 72 Mem = ACPI_ALLOCATE_ZEROED (Size);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
| sanitizer_vector_test.cc | 20 EXPECT_EQ(v.Size(), 0u); 22 EXPECT_EQ(v.Size(), 1u); 25 EXPECT_EQ(v.Size(), 2u); 34 EXPECT_EQ(v.Size(), i + 1u); 46 EXPECT_EQ(v.Size(), 2u); 48 EXPECT_EQ(v.Size(), 1u);
|
| sanitizer_quarantine_test.cc | 23 void *Allocate(uptr size) { 24 return malloc(size); 55 ASSERT_EQ(into.size, 12UL + sizeof(QuarantineBatch)); 59 ASSERT_EQ(from.size, sizeof(QuarantineBatch)); 82 ASSERT_EQ(to_deallocate.Size(), 0UL); 89 ASSERT_EQ(kBlockSize + sizeof(QuarantineBatch), cache.Size()); 95 ASSERT_EQ(kBlockSize + sizeof(QuarantineBatch), cache.Size()); 97 ASSERT_EQ(to_deallocate.Size(), 0UL); 111 ASSERT_EQ(kBlockSize * 2 + sizeof(QuarantineBatch) * 2, cache.Size()); 117 ASSERT_EQ(kBlockSize * 2 + sizeof(QuarantineBatch), cache.Size()); [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_procmaps_bsd.cc | 70 uptr Size = 0; 71 int Err = internal_sysctl(Mib, ARRAY_SIZE(Mib), NULL, &Size, NULL, 0); 73 CHECK_GT(Size, 0); 76 size_t MmapedSize = Size * 4 / 3; 78 Size = MmapedSize; 79 Err = internal_sysctl(Mib, ARRAY_SIZE(Mib), VmMap, &Size, NULL, 0); 84 size_t MmapedSize = Size; 87 Size = 2 * Size + 10 * sizeof(struct kinfo_vmentry); 88 if (Size > 0x10000 [all...] |
| sanitizer_vector.h | 46 uptr Size() const { 61 EnsureSize(Size() + 1); 68 EnsureSize(Size() + 1); 79 void Resize(uptr size) { 80 if (size == 0) { 84 uptr old_size = Size(); 85 if (size <= old_size) { 86 end_ = begin_ + size; 89 EnsureSize(size); 90 if (old_size < size) { [all...] |
| sanitizer_allocator_size_class_map.h | 17 // SizeClassMap maps allocation sizes into size classes and back. 18 // Class 0 always corresponds to size 0. 25 // E.g. with kNumBits==3 all size classes after 2^kMidSizeLog 30 // Classes 1 - 16 correspond to sizes 16 to 256 (size = class_id * 16). 37 // This structure of the size class map gives us: 38 // - Efficient table-free class-to-size and size-to-class functions. 39 // - Difference between two consequent size classes is between 14% and 25% 43 // - kMaxNumCachedHint is a hint for maximal number of chunks per size class. 45 // - (1 << kMaxBytesCachedLog) is the maximal number of bytes per size class [all...] |
| /src/sys/external/bsd/compiler_rt/dist/test/profile/ |
| instrprof-without-libc.c | 28 uint64_t Size = __llvm_profile_get_size_for_buffer(); 29 if (Size > MaxSize) 44 if (fwrite(Buffer, 1, Size, File) != Size)
|
| /src/sys/external/bsd/compiler_rt/dist/lib/fuzzer/ |
| FuzzerDictionary.h | 32 Size = S; 36 return Size == w.Size && 0 == memcmp(Data, w.Data, Size); 41 uint8_t size() const { return Size; } function in class:fuzzer::FixedWord 44 uint8_t Size = 0; 68 PrintASCII(W.data(), W.size()); 91 const DictionaryEntry *end() const { return begin() + Size; } 93 assert(Idx < Size); [all...] |
| FuzzerMutate.cpp | 24 PrintASCII(W.data(), W.size(), PrintAfter); 69 size_t MutationDispatcher::Mutate_Custom(uint8_t *Data, size_t Size, 71 return EF->LLVMFuzzerCustomMutator(Data, Size, MaxSize, Rand.Rand()); 74 size_t MutationDispatcher::Mutate_CustomCrossOver(uint8_t *Data, size_t Size, 76 if (!Corpus || Corpus->size() < 2 || Size == 0) 78 size_t Idx = Rand(Corpus->size()); 85 Data, Size, Other.data(), Other.size(), U.data(), U.size(), Rand.Rand()) [all...] |
| FuzzerMutate.h | 33 size_t Mutate_Custom(uint8_t *Data, size_t Size, size_t MaxSize); 35 size_t Mutate_CustomCrossOver(uint8_t *Data, size_t Size, size_t MaxSize); 37 size_t Mutate_ShuffleBytes(uint8_t *Data, size_t Size, size_t MaxSize); 39 size_t Mutate_EraseBytes(uint8_t *Data, size_t Size, size_t MaxSize); 41 size_t Mutate_InsertByte(uint8_t *Data, size_t Size, size_t MaxSize); 43 size_t Mutate_InsertRepeatedBytes(uint8_t *Data, size_t Size, size_t MaxSize); 45 size_t Mutate_ChangeByte(uint8_t *Data, size_t Size, size_t MaxSize); 47 size_t Mutate_ChangeBit(uint8_t *Data, size_t Size, size_t MaxSize); 49 size_t Mutate_CopyPart(uint8_t *Data, size_t Size, size_t MaxSize); 52 size_t Mutate_AddWordFromManualDictionary(uint8_t *Data, size_t Size, [all...] |
| FuzzerMain.cpp | 16 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size);
|
| FuzzerInterface.h | 15 // extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size); 30 // Executes the code under test with [Data, Data+Size) as the input. 34 LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size); 44 // Mutates raw data in [Data, Data+Size) inplace. 45 // Returns the new size, which is not greater than MaxSize. 48 LLVMFuzzerCustomMutator(uint8_t *Data, size_t Size, size_t MaxSize, 53 // Returns the new size, which is not greater than MaxOutSize. 62 // Mutates raw data in [Data, Data+Size) inplace. 63 // Returns the new size, which is not greater than MaxSize. 65 LLVMFuzzerMutate(uint8_t *Data, size_t Size, size_t MaxSize) [all...] |
| FuzzerUtil.h | 22 void PrintHexArray(const uint8_t *Data, size_t Size, 25 void PrintASCII(const uint8_t *Data, size_t Size, const char *PrintAfter = ""); 31 bool ToASCII(uint8_t *Data, size_t Size); 35 bool IsASCII(const uint8_t *Data, size_t Size); 85 size_t SimpleFastHash(const uint8_t *Data, size_t Size);
|
| FuzzerLoop.cpp | 101 void MallocHook(const volatile void *ptr, size_t size) { 103 F->HandleMalloc(size); 108 Printf("MALLOC[%zd] %p %zd\n", N, ptr, size); 128 void Fuzzer::HandleMalloc(size_t Size) { 129 if (!Options.MallocLimitMb || (Size >> 20) < (size_t)Options.MallocLimitMb) 132 Size); 229 Printf("==%lu== ERROR: libFuzzer: file size exceeded\n", GetPid()); 422 Printf("Reload: read %zd new units.\n", AdditionalCorpus.size()); 425 if (U.size() > MaxSize) 428 if (RunOne(U.data(), U.size())) { [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/unit/ |
| tsan_mutexset_test.cc | 29 EXPECT_EQ(mset.Size(), (uptr)0); 32 EXPECT_EQ(mset.Size(), (uptr)1); 35 EXPECT_EQ(mset.Size(), (uptr)0); 39 EXPECT_EQ(mset.Size(), (uptr)2); 43 EXPECT_EQ(mset.Size(), (uptr)1); 45 EXPECT_EQ(mset.Size(), (uptr)0); 51 EXPECT_EQ(mset.Size(), (uptr)1); 55 EXPECT_EQ(mset.Size(), (uptr)1); 59 EXPECT_EQ(mset.Size(), (uptr)1); 63 EXPECT_EQ(mset.Size(), (uptr)0) [all...] |
| /src/lib/libedit/TEST/ |
| fuzz1.c | 18 int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { 19 if (!Size) 33 if (i == Size || Data[i] == '\n') { 58 if (i == Size)
|
| /src/sys/external/bsd/compiler_rt/dist/lib/xray/ |
| xray_segmented_array.h | 12 // Defines the implementation of a segmented array, with fixed-size segments 29 /// not shrink in size. Once constructed, elements can be appended but cannot be 54 // We then compute the size of the segment to follow this logic: 57 // kCacheLineSize-multiple segments, minus the size of two pointers. 85 uint64_t Size = 0; 91 Size(S) {} 100 if (++Offset % ElementsPerSegment || Offset == Size) 106 DCHECK_NE(Offset, Size); 119 if (PreviousOffset != Size && PreviousOffset % ElementsPerSegment == 0) { 172 uint64_t Size; [all...] |
| /src/sys/external/bsd/gnu-efi/dist/lib/runtime/ |
| rtstr.c | 74 UINTN Size = RtStrnLen(Src, Len); 75 if (Size != Len) 76 RtSetMem(Dest + Size, (Len - Size) * sizeof(CHAR16), '\0'); 77 RtCopyMem(Dest, Src, Size * sizeof(CHAR16)); 110 UINTN Size = RtStrnLen(Src, Len); 111 if (Size != Len) 112 RtSetMem(Dest + Size, (Len - Size) * sizeof(CHAR16), '\0'); 113 RtCopyMem(Dest, Src, Size * sizeof(CHAR16)) [all...] |
| /src/sys/external/bsd/acpica/dist/utilities/ |
| uttrack.c | 73 ACPI_SIZE Size, 92 * ObjectSize - Size of each cached object 128 * PARAMETERS: Size - Size of the allocation 141 ACPI_SIZE Size, 150 /* Check for an inadvertent size of zero bytes */ 152 if (!Size) 156 Size = 1; 159 Allocation = AcpiOsAllocate (Size + sizeof (ACPI_DEBUG_MEM_HEADER)); 165 "Could not allocate size %u", (UINT32) Size)) [all...] |
| /src/common/dist/zlib/contrib/dotzlib/DotZLib/ |
| CircularBuffer.cs | 37 public int Size { get { return _size; } }
42 int trueCount = Math.Min(count, _capacity - Size);
53 if (Size == _capacity) // no room
63 int trueCount = Math.Min(count,Size);
74 if (Size == 0)
|
| /src/sys/external/bsd/acpica/dist/include/platform/ |
| aclinuxex.h | 88 ACPI_SIZE Size) 90 return kmalloc (Size, irqs_disabled () ? GFP_ATOMIC : GFP_KERNEL); 95 ACPI_SIZE Size) 97 return kzalloc (Size, irqs_disabled () ? GFP_ATOMIC : GFP_KERNEL);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
| tsan_ignoreset.h | 28 uptr Size() const;
|
| /src/sys/external/bsd/gnu-efi/dist/inc/ |
| romload.h | 16 UINT16 Size; 27 UINT16 Size;
|
| /src/usr.sbin/sysinst/arch/cats/ |
| msg.md.en | 51 {We now have your NetBSD partitions on %s as follows (Size and Offset in %s):
|
| /src/usr.sbin/sysinst/arch/zaurus/ |
| msg.md.en | 51 {We now have your NetBSD partitions on %s as follows (Size and Offset in %s):
|