OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:poison
(Results
1 - 5
of
5
) sorted by relevancy
/src/tests/usr.bin/c++/
t_asan_poison.sh
55
asan_test_case
poison
'Use after
Poison
example' use-after-
poison
59
asan_add_test_cases
poison
t_msan_poison.sh
42
atf_test_case
poison
168
atf_add_test_case
poison
/src/tests/usr.bin/cc/
t_asan_poison.sh
55
asan_test_case
poison
'Use after
Poison
example' use-after-
poison
59
asan_add_test_cases
poison
t_msan_poison.sh
42
atf_test_case
poison
168
atf_add_test_case
poison
/src/sys/external/bsd/compiler_rt/dist/lib/asan/
asan_poisoning.cc
72
void AsanPoisonOrUnpoisonIntraObjectRedzone(uptr ptr, uptr size, bool
poison
) {
76
poison
? "" : "un", ptr, end, size);
85
poison
? static_cast<u8>(ptr % SHADOW_GRANULARITY) : 0;
90
*(u8*)MemToShadow(ptr) =
poison
? kAsanIntraObjectRedzone : 0;
104
// * if user asks to
poison
region [left, right), the program poisons
112
VPrintf(3, "Trying to
poison
memory region [%p, %p)\n", (void *)beg_addr,
120
// We can only
poison
memory if the byte in end.offset is unaddressable.
121
// No need to re-
poison
memory if it is poisoned already.
142
//
Poison
if byte in end.offset is unaddressable.
Completed in 13 milliseconds
Indexes created Wed Oct 22 13:09:56 GMT 2025