| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
| tsan_external.cc | 61 void ExternalAccess(void *addr, void *caller_pc, void *tag, AccessFunc access) { 64 if (caller_pc) FuncEntry(thr, (uptr)caller_pc); 67 if (!caller_pc || !libignore()->IsIgnored((uptr)caller_pc, &in_ignored_lib)) { 71 if (caller_pc) FuncExit(thr); 113 void __tsan_external_read(void *addr, void *caller_pc, void *tag) { 114 ExternalAccess(addr, caller_pc, tag, MemoryRead); 118 void __tsan_external_write(void *addr, void *caller_pc, void *tag) { 119 ExternalAccess(addr, caller_pc, tag, MemoryWrite) [all...] |
| tsan_interceptors.h | 28 const uptr caller_pc = GET_CALLER_PC(); \ 29 ScopedInterceptor si(thr, #func, caller_pc); \
|
| tsan_interface_java.cc | 63 const uptr caller_pc = GET_CALLER_PC(); \ 66 ScopedJavaFunc scoped(thr, caller_pc); \ 247 Acquire(thr, caller_pc, addr); 257 Release(thr, caller_pc, addr); 267 ReleaseStore(thr, caller_pc, addr);
|
| tsan_interface.h | 89 void __tsan_external_read(void *addr, void *caller_pc, void *tag); 91 void __tsan_external_write(void *addr, void *caller_pc, void *tag);
|
| tsan_interface_ann.cc | 52 const uptr caller_pc = (uptr)__builtin_return_address(0); \ 55 ScopedAnnotation sa(thr, __func__, caller_pc); \
|
| tsan_interceptors.cc | 2195 const uptr caller_pc; member in struct:TsanInterceptorContext 2246 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 2252 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \
|
| /src/sys/external/bsd/compiler_rt/dist/include/sanitizer/ |
| tsan_interface.h | 128 // and writes of the object at the specified address. 'caller_pc' should 137 void __tsan_external_read(void *addr, void *caller_pc, void *tag); 138 void __tsan_external_write(void *addr, void *caller_pc, void *tag);
|
| dfsan_interface.h | 100 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 103 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
| /src/sys/external/bsd/compiler_rt/dist/lib/fuzzer/ |
| FuzzerTracePC.cpp | 413 void TracePC::AddValueForMemcmp(void *caller_pc, const void *s1, const void *s2, 434 size_t PC = reinterpret_cast<size_t>(caller_pc); 653 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, 658 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/false); 662 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, 671 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/true); 675 void __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, 681 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, N, /*StopAtZero*/true);
|
| FuzzerTracePC.h | 117 void AddValueForMemcmp(void *caller_pc, const void *s1, const void *s2,
|
| /src/sys/external/bsd/compiler_rt/dist/lib/lsan/ |
| lsan_common.cc | 403 uptr caller_pc = 0; local in function:__lsan::MarkInvalidPCCb 405 caller_pc = GetCallerPC(stack_id, param->stack_depot_reverse_map); 406 // If caller_pc is unknown, this chunk may be allocated in a coroutine. Mark 408 if (caller_pc == 0 || (param->skip_linker_allocations && 409 GetLinker()->containsAddress(caller_pc))) {
|