Home | History | Annotate | Download | only in sanitizer

Lines Matching refs:addr

22   // Marks memory region [addr, addr+size) as unaddressable.
26 // the whole region - it may poison only subregion of [addr, addr+size) due
30 void __asan_poison_memory_region(void const volatile *addr, size_t size);
31 // Marks memory region [addr, addr+size) as addressable.
34 // This function may unpoison a superregion of [addr, addr+size) due to
38 void __asan_unpoison_memory_region(void const volatile *addr, size_t size);
42 #define ASAN_POISON_MEMORY_REGION(addr, size) \
43 __asan_poison_memory_region((addr), (size))
44 #define ASAN_UNPOISON_MEMORY_REGION(addr, size) \
45 __asan_unpoison_memory_region((addr), (size))
47 #define ASAN_POISON_MEMORY_REGION(addr, size) \
48 ((void)(addr), (void)(size))
49 #define ASAN_UNPOISON_MEMORY_REGION(addr, size) \
50 ((void)(addr), (void)(size))
53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this
56 int __asan_address_is_poisoned(void const volatile *addr);
62 // Print the description of addr (useful when debugging in gdb).
63 void __asan_describe_address(void *addr);
88 const char *__asan_locate_address(void *addr, char *name, size_t name_size,
94 size_t __asan_get_alloc_stack(void *addr, void **trace, size_t size,
100 size_t __asan_get_free_stack(void *addr, void **trace, size_t size,
111 void *addr, int is_write, size_t access_size);
137 // If fake_stack is non-NULL and addr belongs to a fake frame in
144 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,