/bionic/tests/ |
D | buffer_tests.cpp | 363 uint8_t* memory; in RunSingleBufferOverreadTest() local 364 ASSERT_TRUE(posix_memalign(reinterpret_cast<void**>(&memory), pagesize, in RunSingleBufferOverreadTest() 366 memset(memory, 0x23, 2*pagesize); in RunSingleBufferOverreadTest() 369 ASSERT_TRUE(MprotectHeap(&memory[pagesize], pagesize, PROT_NONE) == 0); in RunSingleBufferOverreadTest() 372 uint8_t* buf = &memory[pagesize-i]; in RunSingleBufferOverreadTest() 376 ASSERT_TRUE(MprotectHeap(&memory[pagesize], pagesize, PROT_READ | PROT_WRITE) == 0); in RunSingleBufferOverreadTest() 377 free(memory); in RunSingleBufferOverreadTest() 384 uint8_t* memory; in RunSrcDstBufferOverreadTest() local 385 ASSERT_TRUE(posix_memalign(reinterpret_cast<void**>(&memory), pagesize, in RunSrcDstBufferOverreadTest() 387 memset(memory, 0x23, 2*pagesize); in RunSrcDstBufferOverreadTest() [all …]
|
D | malloc_test.cpp | 1109 void* memory = malloc(10 * 1024 * 1024); in TEST() local 1110 ASSERT_TRUE(memory != nullptr); in TEST() 1113 memory = realloc(memory, 20 * 1024 * 1024); in TEST() 1114 ASSERT_TRUE(memory != nullptr); in TEST() 1115 memory = realloc(memory, 40 * 1024 * 1024); in TEST() 1116 ASSERT_TRUE(memory != nullptr); in TEST() 1117 memory = realloc(memory, 60 * 1024 * 1024); in TEST() 1118 ASSERT_TRUE(memory != nullptr); in TEST() 1119 memory = realloc(memory, 80 * 1024 * 1024); in TEST() 1120 ASSERT_TRUE(memory != nullptr); in TEST() [all …]
|
/bionic/libc/malloc_debug/ |
D | PointerData.cpp | 276 uint8_t* memory = reinterpret_cast<uint8_t*>(info.pointer); in LogFreeError() local 277 error_log("+++ ALLOCATION %p USED AFTER FREE", memory); in LogFreeError() 280 if (memory[i] != fill_free_value) { in LogFreeError() 281 error_log(" allocation[%zu] = 0x%02x (expected 0x%02x)", i, memory[i], fill_free_value); in LogFreeError() 323 const uint8_t* memory = reinterpret_cast<const uint8_t*>(info.pointer); in VerifyFreedPointer() local 326 if (memcmp(memory, g_cmp_mem.data(), bytes_to_cmp) != 0) { in VerifyFreedPointer() 330 memory = &memory[bytes_to_cmp]; in VerifyFreedPointer()
|
D | README_marshmallow_and_earlier.md | 4 Malloc debug is a method of debugging native memory problems. It can help 5 detect memory corruption, memory leaks, and use after free issues. 87 When a pointer is freed, do not free the memory right away, but add it to
|
D | README.md | 4 Malloc debug is a method of debugging native memory problems. It can help 5 detect memory corruption, memory leaks, and use after free issues. 49 to find memory corruption occuring to a region before the original allocation. 75 to find memory corruption occuring to a region after the original allocation. 195 When a pointer is freed, do not free the memory right away, but add it to 456 a pointer that is either not allocated memory, or that the memory of 472 Total memory: XXXX 476 Total memory is the total of all of the currently live allocations. 686 you whether it can detect leaked memory, not where those leaks are 689 where the memory was allocated.
|
D | README_api.md | 18 the point of the function call. This does not include the memory allocated
|
/bionic/docs/ |
D | native_allocator.md | 2 This document describes how to verify the native memory allocator on Android. 7 [Memory Replay Benchmarks](#memory-replay-benchmarks) and 12 called the svelte config, which is designed to run on memory constrained 29 These are functions that are used to implement a memory leak detector 56 allocator will attempt to purge and release any unused memory back to the 78 any unused memory immediately. The argument for this call is ignored. If 79 possible, this call should clear thread cached memory if it exists. The 80 idea is that this can be called to purge memory that has not been 83 application wants to purge that memory before waiting for the next connection. 135 been allocator bugs that cause memory failures when too much virtual [all …]
|
D | elf-tls.md | 30 Ulrich Drepper's ELF TLS document specifies two ways of organizing memory pointed at by the 106 simple approach is to allocate memory lazily: 112 memory. 116 musl, on the other, preallocates TLS memory in `pthread_create` and in `dlopen`, and each can report 117 out-of-memory. 212 memory in the static TLS block. glibc reserves a kilobyte or two (`TLS_STATIC_SURPLUS`) with the 218 Neither musl nor the Bionic TLS prototype currently allocate any surplus TLS memory. 220 In general, supporting surplus TLS memory probably requires maintaining a thread list so that 221 `dlopen` can initialize the new static TLS memory in all existing threads. A thread list could be 222 omitted if the loader only allowed zero-initialized TLS segments and didn't reclaim memory on [all …]
|
D | fdsan.md | 8 …fter-close* and *double-close*. These errors are direct analogues of the memory allocation *use-af… 43 …ptor mismanagement by enforcing file descriptor ownership. Like how most memory allocations can ha…
|
/bionic/libc/kernel/uapi/video/ |
D | sisfb.h | 67 __u32 memory; member
|
/bionic/libc/malloc_hooks/ |
D | README.md | 54 called, then the allocated memory is set to zero.
|
/bionic/libc/kernel/uapi/linux/ |
D | videodev2.h | 514 __u32 memory; member 544 __u32 memory; member 1337 __u32 memory; member
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 248 libTextRel.so: (memory/data?) [0x15E0E2] in (optimized out: previous simd_broken_op1) [0x15E0E0] 249 libTextRel.so: (memory/data?) [0x15E3B2] in (optimized out: previous simd_broken_op2) [0x15E3B0] 273 wastefully increase the number of dirty pages in memory. The dynamic 373 memory. For security, data shouldn't be executable and code shouldn't be
|
D | README.md | 45 into memory and resolving references to symbols (so that when your code tries to
|
/bionic/libc/ |
D | Android.bp | 1769 "//system/memory/libmemunreachable:__subpackages__",
|