Lines Matching +defs:string +defs:to +defs:number
370 INTERCEPTOR(char *, gcvt, double number, SIZE_T ndigit, char *buf) {
372 char *res = REAL(gcvt)(number, ndigit, buf);
406 // Hack: always pass nptr and endptr as part of __VA_ARGS_ to avoid having to
415 // which needs to be unpoisoned. We make the implicit pointer explicit.
744 INTERCEPTOR(int, putenv, char *string) {
746 int res = REAL(putenv)(string);
1077 // Application has attempted to map more memory than is supported by
1109 // Access to sigactions[] is gone with relaxed atomics to avoid data race with
1310 // NetBSD does not preserve the 2nd argument if dso is equal to 0
1325 // NetBSD ships with openpty(3) in -lutil, that needs to be prebuilt explicitly
1344 // NetBSD ships with forkpty(3) in -lutil, that needs to be prebuilt explicitly
1368 // FIXME: ask frontend whether we need to return failure.
1385 VReport(1, "MemorySanitizer: failed to intercept '%s'\n", #name); \
1391 VReport(1, "MemorySanitizer: failed to intercept '%s@@%s'\n", #name, \
1397 VReport(1, "MemorySanitizer: failed to intercept '%s@@%s' or '%s'\n", \
1465 #define COMMON_INTERCEPTOR_MEMMOVE_IMPL(ctx, to, from, size) \
1468 return __msan_memmove(to, from, size); \
1470 #define COMMON_INTERCEPTOR_MEMCPY_IMPL(ctx, to, from, size) \
1473 return __msan_memcpy(to, from, size); \
1476 #define COMMON_INTERCEPTOR_COPY_STRING(ctx, to, from, size) \
1479 CopyShadowAndOrigin(to, from, size, &stack); \
1480 __msan_unpoison(to + size, 1); \