/external/valgrind/main/memcheck/tests/ |
clo_redzone_128.vgtest | 1 vgopts: --leak-check=no -q --redzone-size=128
|
clo_redzone.c | 11 // with the default redzone-size, but having 12 // an error with a bigger redzone-size.
|
custom_alloc.c | 30 // has a redzone 59 /* check that accessing the redzone of a MALLOCLIKE block
|
mempool2.c | 162 // test that redzone are still protected even if the user forgets
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/ |
_unixos.h | 161 ** Make a redzone at both ends of the stack segment. Disallow access 164 ** redzone. 174 #define _MD_INIT_STACK(ts,REDZONE) \ 176 (void) mprotect((void*)ts->seg->vaddr, REDZONE, PROT_NONE); \ 177 (void) mprotect((void*) ((char*)ts->seg->vaddr + REDZONE + ts->stackSize),\ 178 REDZONE, PROT_NONE); \ 186 memset(ts->allocBase + REDZONE, 0xf7, ts->stackSize); \ 190 #define _MD_INIT_STACK(ts,REDZONE) \ 192 (void) mprotect((void*)ts->seg->vaddr, REDZONE, PROT_NONE); \ 193 (void) mprotect((void*) ((char*)ts->seg->vaddr + REDZONE + ts->stackSize), [all...] |
/external/compiler-rt/lib/asan/lit_tests/TestCases/ |
deep_stack_uaf.cc | 4 // RUN: ASAN_OPTIONS=malloc_context_size=120:redzone=512 not %t 2>&1 | FileCheck %s
|
/external/compiler-rt/lib/asan/ |
asan_allocator2.cc | 112 // Valid redzone sizes are 16, 32, 64, ... 2048, so we encode them in 3 bits. 137 return Max(rz_log, RZSize2Log(flags()->redzone)); 142 // L -- left redzone words (0 or more bytes) 143 // H -- ChunkHeader (16 bytes), which is also a part of the left redzone. 145 // R -- right redzone (0 or more bytes) 149 // If the left redzone is greater than the ChunkHeader size we store a magic 339 // automatic right redzone, so add the right redzone manually. 597 // The address is in the chunk's left redzone, so maybe it is actually 790 // just return "size". We don't want to expose our redzone sizes, etc here [all...] |
asan_flags.h | 38 // Requirement: redzone >= 32, is a power of two. 39 int redzone; member in struct:__asan::Flags
|
asan_report.cc | 131 PrintShadowByte(" Heap left redzone: ", kAsanHeapLeftRedzoneMagic); 132 PrintShadowByte(" Heap right redzone: ", kAsanHeapRightRedzoneMagic); 134 PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic); 135 PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic); 136 PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic); 137 PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic); 140 PrintShadowByte(" Global redzone: ", kAsanGlobalRedzoneMagic); 685 // If we are in the partial right redzone, look at the next shadow byte.
|
asan_rtl.cc | 93 ParseFlag(str, &f->redzone, "redzone"); 94 CHECK_GE(f->redzone, 16); 95 CHECK(IsPowerOfTwo(f->redzone)); 145 f->redzone = 16; 377 Printf("red_zone=%zu\n", (uptr)flags()->redzone);
|
asan_interface_internal.h | 40 uptr size_with_redzone; // The size with the redzone.
|
/external/valgrind/main/include/ |
pub_tool_mallocfree.h | 51 // the effective client redzone as derived from the default 53 // redzone required by m_mallocfree.c.
|
pub_tool_machine.h | 71 # define VG_STACK_REDZONE_SZB 0 // s390 has no redzone
|
/external/valgrind/main/coregrind/m_sigframe/ |
sigframe-amd64-darwin.c | 81 // stack redzone, at least on archs which have one 94 overlaps the previous frame's redzone. */ 96 amd64-linux version, this doesn't appear to handle the redzone
|
sigframe-x86-darwin.c | 84 // stack redzone, at least on archs which have one 97 overlaps the previous frame's redzone. */ 99 amd64-linux version, this doesn't appear to handle the redzone
|
/external/llvm/test/Instrumentation/AddressSanitizer/ |
adaptive_global_redzones.ll | 5 ; Here we check that the global redzone sizes grow with the object size.
|
/external/valgrind/main/drd/tests/ |
custom_alloc.c | 24 // has a redzone
|
/external/valgrind/main/massif/tests/ |
custom_alloc.c | 24 // has a redzone
|
/external/libffi/src/x86/ |
darwin64.S | 77 /* Deallocate stack arg area; local stack frame in redzone. */ 158 leaq -20(%rsp), %rsi /* Scratch area in redzone. */ 225 /* Deallocate stack frame early; return value is now in redzone. */
|
unix64.S | 77 /* Deallocate stack arg area; local stack frame in redzone. */ 162 leaq -20(%rsp), %rsi /* Scratch area in redzone. */ 232 /* Deallocate stack frame early; return value is now in redzone. */
|
/external/valgrind/main/none/tests/ |
cmdline2.stdout.exp | 54 --redzone-size=<number> set minimum size of redzones added before/after 113 --core-redzone=<number> set minimum size of redzones added before/after
|
/external/valgrind/main/coregrind/ |
m_mallocfree.c | 503 This then ensures that the arena redzone size is properly 508 // Initialise an arena. rz_szB is the (default) minimum redzone size; 521 /* Override the default redzone size if a clo value was given. 539 // redzone size if necessary to achieve this. 544 // Here we have established the effective redzone size. 613 client arena's redzone size. 630 Nb: redzone sizes are *minimums*; they could be made bigger to ensure 640 // redzone size with VG_(needs_malloc_replacement)() after this module 647 // Check and set the client arena redzone size 652 " specified redzone size is too big (%llu)\n", [all...] |
pub_core_mallocfree.h | 47 malloc() et al -- redzone size is chosen by the tool.
|
/external/llvm/lib/Transforms/Instrumentation/ |
AddressSanitizer.cpp | 261 // Redzone used for stack and globals is at least 32 bytes. 262 // For scales 6 and 7, the redzone has to be 64 and 128 bytes respectively. [all...] |
/external/valgrind/main/memcheck/ |
mc_include.h | 45 /* By default, we want at least a 16B redzone on client heap blocks 47 The default can be modified by --redzone-size. */ 49 // effective redzone, as (possibly) modified by --redzone-size:
|