Searched refs:__asan_region_is_poisoned (Results 1 - 10 of 10) sorted by relevance
/external/compiler-rt/test/asan/TestCases/Posix/ |
H A D | start-deactivated.cc | 24 char *q = (char *)__asan_region_is_poisoned(p + 95, 8);
|
/external/compiler-rt/include/sanitizer/ |
H A D | asan_interface.h | 60 void *__asan_region_is_poisoned(void *beg, size_t size);
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
H A D | open_memstream.cc | 21 assert(__asan_region_is_poisoned(p, s) == 0);
|
/external/compiler-rt/lib/asan/tests/ |
H A D | asan_noinst_test.cc | 220 // Check that __asan_region_is_poisoned works for shadow regions. 222 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100)); 224 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100)); 226 EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100));
|
H A D | asan_interface_test.cc | 337 void *first_poisoned = __asan_region_is_poisoned(p + beg, end - beg);
|
/external/compiler-rt/lib/asan/ |
H A D | asan_interface_internal.h | 82 uptr __asan_region_is_poisoned(uptr beg, uptr size);
|
H A D | asan_poisoning.cc | 153 uptr __asan_region_is_poisoned(uptr beg, uptr size) { function 188 uptr __bad = __asan_region_is_poisoned(__p, __size); \ 351 return (__asan_region_is_poisoned(addr, sizeof(uptr)) != 0);
|
H A D | asan_rtl.cc | 422 if (__asan_region_is_poisoned(addr, size)) { 430 if (__asan_region_is_poisoned(addr, size)) { 476 case 34: __asan_region_is_poisoned(0, 0); break;
|
H A D | asan_globals.cc | 117 if (__asan_region_is_poisoned(g->beg, g->size_with_redzone)) {
|
H A D | asan_interceptors.cc | 51 (__bad = __asan_region_is_poisoned(__offset, __size))) { \
|
Completed in 2531 milliseconds