Searched refs:__asan_region_is_poisoned (Results 1 – 15 of 15) sorted by relevance
/external/compiler-rt/lib/asan/ |
D | asan_rtl.cc | 206 if (__asan_region_is_poisoned(addr, size)) { 215 if (__asan_region_is_poisoned(addr, size)) { in __asan_exp_loadN() 224 if (__asan_region_is_poisoned(addr, size)) { in __asan_loadN_noabort() 233 if (__asan_region_is_poisoned(addr, size)) { in __asan_storeN() 242 if (__asan_region_is_poisoned(addr, size)) { in __asan_exp_storeN() 251 if (__asan_region_is_poisoned(addr, size)) { in __asan_storeN_noabort() 303 case 38: __asan_region_is_poisoned(0, 0); break; in force_interface_symbols()
|
D | asan_poisoning.cc | 185 uptr __asan_region_is_poisoned(uptr beg, uptr size) { in __asan_region_is_poisoned() function 220 uptr __bad = __asan_region_is_poisoned(__p, __size); \ 431 return (__asan_region_is_poisoned(addr, sizeof(uptr)) != 0); in WordIsPoisoned()
|
D | asan_interface_internal.h | 104 uptr __asan_region_is_poisoned(uptr beg, uptr size);
|
D | asan_win_dll_thunk.cc | 275 INTERFACE_FUNCTION(__asan_region_is_poisoned)
|
D | asan_globals.cc | 167 if (__asan_region_is_poisoned(g->beg, g->size_with_redzone)) { in CheckODRViolationViaPoisoning()
|
D | asan_interceptors.cc | 67 (__bad = __asan_region_is_poisoned(__offset, __size))) { \
|
/external/compiler-rt/test/asan/TestCases/ |
D | alloca_vla_interact.cc | 29 if (i) assert(!__asan_region_is_poisoned(bot, 96)); in foo() 38 void *q = __asan_region_is_poisoned(bot, (char *)top - (char *)bot + 1); in foo()
|
D | alloca_instruments_all_paddings.cc | 12 char *q = (char *)__asan_region_is_poisoned((char *)str, 64); in foo()
|
D | alloca_loop_unpoisoning.cc | 35 void *q = __asan_region_is_poisoned(bot, (char *)top - (char *)bot); in main()
|
/external/compiler-rt/lib/asan/tests/ |
D | asan_noinst_test.cc | 215 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100)); in TEST() 217 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100)); in TEST() 219 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100)); in TEST()
|
D | asan_interface_test.cc | 327 void *first_poisoned = __asan_region_is_poisoned(p + beg, end - beg); in TEST()
|
/external/compiler-rt/test/asan/TestCases/Darwin/ |
D | linked-only.cc | 16 char *q = (char *)__asan_region_is_poisoned(p, size); in test_shadow()
|
/external/compiler-rt/test/asan/TestCases/Posix/ |
D | start-deactivated.cc | 37 char *q = (char *)__asan_region_is_poisoned(p + 95, 8); in test_malloc_shadow()
|
/external/compiler-rt/include/sanitizer/ |
D | asan_interface.h | 60 void *__asan_region_is_poisoned(void *beg, size_t size);
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
D | open_memstream.cc | 22 assert(__asan_region_is_poisoned(p, s) == 0); in check_mem_is_good()
|