Lines Matching +defs:from +defs:end

144 #  define COMMON_INTERCEPTOR_GET_TLS_RANGE(begin, end) \
147 *end = t->tls_end(); \
149 *begin = *end = 0; \
174 // Protect from unmapping the shadow.
510 // argument irrespective of the |from| length.
511 INTERCEPTOR(char *, strcat, char *to, const char *from) {
516 uptr from_length = internal_strlen(from);
517 ASAN_READ_RANGE(ctx, from, from_length + 1);
521 // If the copying actually happens, the |from| string should not overlap
525 CHECK_RANGES_OVERLAP("strcat", to, from_length + to_length + 1, from,
529 return REAL(strcat)(to, from);
532 INTERCEPTOR(char*, strncat, char *to, const char *from, usize size) {
537 uptr from_length = MaybeRealStrnlen(from, size);
539 ASAN_READ_RANGE(ctx, from, copy_length);
545 from, copy_length);
548 return REAL(strncat)(to, from, size);
551 INTERCEPTOR(char *, strcpy, char *to, const char *from) {
555 // strcpy is called from malloc_default_purgeable_zone()
558 return REAL(strcpy)(to, from);
561 return REAL(strcpy)(to, from);
565 uptr from_size = internal_strlen(from) + 1;
566 CHECK_RANGES_OVERLAP("strcpy", to, from_size, from, from_size);
567 ASAN_READ_RANGE(ctx, from, from_size);
570 return REAL(strcpy)(to, from);
623 INTERCEPTOR(char*, strncpy, char *to, const char *from, usize size) {
628 uptr from_size = Min<uptr>(size, MaybeRealStrnlen(from, size) + 1);
629 CHECK_RANGES_OVERLAP("strncpy", to, from_size, from, from_size);
630 ASAN_READ_RANGE(ctx, from, from_size);
633 return REAL(strncpy)(to, from, size);
702 // different from int). So, we just imitate this behavior.