/bionic/tests/ |
D | buffer_tests.cpp | 363 uint8_t* memory; in RunSingleBufferOverreadTest() local 364 ASSERT_TRUE(posix_memalign(reinterpret_cast<void**>(&memory), pagesize, in RunSingleBufferOverreadTest() 366 memset(memory, 0x23, 2*pagesize); in RunSingleBufferOverreadTest() 369 ASSERT_TRUE(MprotectHeap(&memory[pagesize], pagesize, PROT_NONE) == 0); in RunSingleBufferOverreadTest() 372 uint8_t* buf = &memory[pagesize-i]; in RunSingleBufferOverreadTest() 376 ASSERT_TRUE(MprotectHeap(&memory[pagesize], pagesize, PROT_READ | PROT_WRITE) == 0); in RunSingleBufferOverreadTest() 377 free(memory); in RunSingleBufferOverreadTest() 384 uint8_t* memory; in RunSrcDstBufferOverreadTest() local 385 ASSERT_TRUE(posix_memalign(reinterpret_cast<void**>(&memory), pagesize, in RunSrcDstBufferOverreadTest() 387 memset(memory, 0x23, 2*pagesize); in RunSrcDstBufferOverreadTest() [all …]
|
D | malloc_test.cpp | 1279 void* memory = malloc(10 * 1024 * 1024); in TEST() local 1280 ASSERT_TRUE(memory != nullptr); in TEST() 1283 memory = realloc(memory, 20 * 1024 * 1024); in TEST() 1284 ASSERT_TRUE(memory != nullptr); in TEST() 1285 memory = realloc(memory, 40 * 1024 * 1024); in TEST() 1286 ASSERT_TRUE(memory != nullptr); in TEST() 1287 memory = realloc(memory, 60 * 1024 * 1024); in TEST() 1288 ASSERT_TRUE(memory != nullptr); in TEST() 1289 memory = realloc(memory, 80 * 1024 * 1024); in TEST() 1290 ASSERT_TRUE(memory != nullptr); in TEST() [all …]
|
/bionic/libc/malloc_debug/ |
D | PointerData.cpp | 294 uint8_t* memory = reinterpret_cast<uint8_t*>(pointer); in LogFreeError() local 295 error_log("+++ ALLOCATION %p USED AFTER FREE", memory); in LogFreeError() 298 if (memory[i] != fill_free_value) { in LogFreeError() 299 error_log(" allocation[%zu] = 0x%02x (expected 0x%02x)", i, memory[i], fill_free_value); in LogFreeError() 342 const uint8_t* memory = reinterpret_cast<const uint8_t*>(pointer); in VerifyFreedPointer() local 345 if (memcmp(memory, g_cmp_mem.data(), bytes_to_cmp) != 0) { in VerifyFreedPointer() 349 memory = &memory[bytes_to_cmp]; in VerifyFreedPointer()
|
D | README_marshmallow_and_earlier.md | 4 Malloc debug is a method of debugging native memory problems. It can help 5 detect memory corruption, memory leaks, and use after free issues. 87 When a pointer is freed, do not free the memory right away, but add it to
|
D | README.md | 4 Malloc debug is a method of debugging native memory problems. It can help 5 detect memory corruption, memory leaks, and use after free issues. 49 to find memory corruption occuring to a region before the original allocation. 75 to find memory corruption occuring to a region after the original allocation. 173 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 186 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 195 as [libmemunreachable](https://android.googlesource.com/platform/system/memory/libmemunreachable/+/… 218 As of Android U, this option will trigger a check for unreachable memory 223 Run: 'kill -48 <PID>' to check for unreachable memory. 267 When a pointer is freed, do not free the memory right away, but add it to [all …]
|
D | README_api.md | 18 the point of the function call. This does not include the memory allocated
|
/bionic/docs/ |
D | native_allocator.md | 2 This document describes how to verify the native memory allocator on Android. 7 [Memory Replay Benchmarks](#memory-replay-benchmarks) and 12 called the svelte config, which is designed to run on memory constrained 29 These are functions that are used to implement a memory leak detector 56 allocator will attempt to purge and release any unused memory back to the 78 any unused memory immediately. The argument for this call is ignored. If 79 possible, this call should clear thread cached memory if it exists. The 80 idea is that this can be called to purge memory that has not been 83 application wants to purge that memory before waiting for the next connection. 135 been allocator bugs that cause memory failures when too much virtual [all …]
|
D | elf-tls.md | 30 Ulrich Drepper's ELF TLS document specifies two ways of organizing memory pointed at by the 106 A simple approach is to allocate memory lazily: 112 memory. 116 musl, on the other, preallocates TLS memory in `pthread_create` and in `dlopen`, and each can report 117 out-of-memory. 212 memory in the static TLS block. glibc reserves a kilobyte or two (`TLS_STATIC_SURPLUS`) with the 218 Neither musl nor the Bionic TLS prototype currently allocate any surplus TLS memory. 220 In general, supporting surplus TLS memory probably requires maintaining a thread list so that 221 `dlopen` can initialize the new static TLS memory in all existing threads. A thread list could be 222 omitted if the loader only allowed zero-initialized TLS segments and didn't reclaim memory on [all …]
|
D | fdsan.md | 12 …fter-close* and *double-close*. These errors are direct analogues of the memory allocation *use-af… 47 …ptor mismanagement by enforcing file descriptor ownership. Like how most memory allocations can ha…
|
/bionic/libc/kernel/uapi/video/ |
D | sisfb.h | 55 __u32 memory; member
|
/bionic/libc/malloc_hooks/ |
D | README.md | 54 called, then the allocated memory is set to zero.
|
/bionic/libc/kernel/uapi/linux/ |
D | videodev2.h | 552 __u32 memory; member 586 __u32 memory; member 1431 __u32 memory; member
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 245 libTextRel.so: (memory/data?) [0x15E0E2] in (optimized out: previous simd_broken_op1) [0x15E0E0] 246 libTextRel.so: (memory/data?) [0x15E3B2] in (optimized out: previous simd_broken_op2) [0x15E3B0] 270 wastefully increase the number of dirty pages in memory. The dynamic 371 memory. For security, data shouldn't be executable and code shouldn't be
|
D | README.md | 41 into memory and resolving references to symbols (so that when your code tries to
|
/bionic/libc/ |
D | Android.bp | 1783 "//system/memory/libmemunreachable:__subpackages__",
|
D | NOTICE | 5185 memcpy - copy memory area
|