HomeSort by relevance Sort by last modified time
    Searched full:redzone (Results 1 - 25 of 52) sorted by null

1 2 3

  /external/valgrind/main/memcheck/tests/
clo_redzone_128.vgtest 1 vgopts: --leak-check=no -q --redzone-size=128
clo_redzone.c 11 // with the default redzone-size, but having
12 // an error with a bigger redzone-size.
custom_alloc.c 30 // has a redzone
59 /* check that accessing the redzone of a MALLOCLIKE block
mempool2.c 162 // test that redzone are still protected even if the user forgets
  /external/chromium_org/third_party/npapi/npspy/extern/nspr/md/
_unixos.h 161 ** Make a redzone at both ends of the stack segment. Disallow access
164 ** redzone.
174 #define _MD_INIT_STACK(ts,REDZONE) \
176 (void) mprotect((void*)ts->seg->vaddr, REDZONE, PROT_NONE); \
177 (void) mprotect((void*) ((char*)ts->seg->vaddr + REDZONE + ts->stackSize),\
178 REDZONE, PROT_NONE); \
186 memset(ts->allocBase + REDZONE, 0xf7, ts->stackSize); \
190 #define _MD_INIT_STACK(ts,REDZONE) \
192 (void) mprotect((void*)ts->seg->vaddr, REDZONE, PROT_NONE); \
193 (void) mprotect((void*) ((char*)ts->seg->vaddr + REDZONE + ts->stackSize),
    [all...]
  /external/compiler-rt/lib/asan/lit_tests/TestCases/
deep_stack_uaf.cc 4 // RUN: ASAN_OPTIONS=malloc_context_size=120:redzone=512 not %t 2>&1 | FileCheck %s
  /external/compiler-rt/lib/asan/
asan_allocator2.cc 112 // Valid redzone sizes are 16, 32, 64, ... 2048, so we encode them in 3 bits.
137 return Max(rz_log, RZSize2Log(flags()->redzone));
142 // L -- left redzone words (0 or more bytes)
143 // H -- ChunkHeader (16 bytes), which is also a part of the left redzone.
145 // R -- right redzone (0 or more bytes)
149 // If the left redzone is greater than the ChunkHeader size we store a magic
339 // automatic right redzone, so add the right redzone manually.
597 // The address is in the chunk's left redzone, so maybe it is actually
790 // just return "size". We don't want to expose our redzone sizes, etc here
    [all...]
asan_flags.h 38 // Requirement: redzone >= 32, is a power of two.
39 int redzone; member in struct:__asan::Flags
asan_report.cc 131 PrintShadowByte(" Heap left redzone: ", kAsanHeapLeftRedzoneMagic);
132 PrintShadowByte(" Heap right redzone: ", kAsanHeapRightRedzoneMagic);
134 PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic);
135 PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic);
136 PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic);
137 PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic);
140 PrintShadowByte(" Global redzone: ", kAsanGlobalRedzoneMagic);
685 // If we are in the partial right redzone, look at the next shadow byte.
asan_rtl.cc 93 ParseFlag(str, &f->redzone, "redzone");
94 CHECK_GE(f->redzone, 16);
95 CHECK(IsPowerOfTwo(f->redzone));
145 f->redzone = 16;
377 Printf("red_zone=%zu\n", (uptr)flags()->redzone);
asan_interface_internal.h 40 uptr size_with_redzone; // The size with the redzone.
  /external/valgrind/main/include/
pub_tool_mallocfree.h 51 // the effective client redzone as derived from the default
53 // redzone required by m_mallocfree.c.
pub_tool_machine.h 71 # define VG_STACK_REDZONE_SZB 0 // s390 has no redzone
  /external/valgrind/main/coregrind/m_sigframe/
sigframe-amd64-darwin.c 81 // stack redzone, at least on archs which have one
94 overlaps the previous frame's redzone. */
96 amd64-linux version, this doesn't appear to handle the redzone
sigframe-x86-darwin.c 84 // stack redzone, at least on archs which have one
97 overlaps the previous frame's redzone. */
99 amd64-linux version, this doesn't appear to handle the redzone
  /external/llvm/test/Instrumentation/AddressSanitizer/
adaptive_global_redzones.ll 5 ; Here we check that the global redzone sizes grow with the object size.
  /external/valgrind/main/drd/tests/
custom_alloc.c 24 // has a redzone
  /external/valgrind/main/massif/tests/
custom_alloc.c 24 // has a redzone
  /external/libffi/src/x86/
darwin64.S 77 /* Deallocate stack arg area; local stack frame in redzone. */
158 leaq -20(%rsp), %rsi /* Scratch area in redzone. */
225 /* Deallocate stack frame early; return value is now in redzone. */
unix64.S 77 /* Deallocate stack arg area; local stack frame in redzone. */
162 leaq -20(%rsp), %rsi /* Scratch area in redzone. */
232 /* Deallocate stack frame early; return value is now in redzone. */
  /external/valgrind/main/none/tests/
cmdline2.stdout.exp 54 --redzone-size=<number> set minimum size of redzones added before/after
113 --core-redzone=<number> set minimum size of redzones added before/after
  /external/valgrind/main/coregrind/
m_mallocfree.c 503 This then ensures that the arena redzone size is properly
508 // Initialise an arena. rz_szB is the (default) minimum redzone size;
521 /* Override the default redzone size if a clo value was given.
539 // redzone size if necessary to achieve this.
544 // Here we have established the effective redzone size.
613 client arena's redzone size.
630 Nb: redzone sizes are *minimums*; they could be made bigger to ensure
640 // redzone size with VG_(needs_malloc_replacement)() after this module
647 // Check and set the client arena redzone size
652 " specified redzone size is too big (%llu)\n",
    [all...]
pub_core_mallocfree.h 47 malloc() et al -- redzone size is chosen by the tool.
  /external/llvm/lib/Transforms/Instrumentation/
AddressSanitizer.cpp 261 // Redzone used for stack and globals is at least 32 bytes.
262 // For scales 6 and 7, the redzone has to be 64 and 128 bytes respectively.
    [all...]
  /external/valgrind/main/memcheck/
mc_include.h 45 /* By default, we want at least a 16B redzone on client heap blocks
47 The default can be modified by --redzone-size. */
49 // effective redzone, as (possibly) modified by --redzone-size:

Completed in 1403 milliseconds

1 2 3