/Zephyr-latest/kernel/paging/ |
D | statistics.c | 148 memcpy(z_paging_histogram_eviction.bounds, in z_paging_histogram_init() 150 sizeof(z_paging_histogram_eviction.bounds)); in z_paging_histogram_init() 154 memcpy(z_paging_histogram_backing_store_page_in.bounds, in z_paging_histogram_init() 156 sizeof(z_paging_histogram_backing_store_page_in.bounds)); in z_paging_histogram_init() 160 memcpy(z_paging_histogram_backing_store_page_out.bounds, in z_paging_histogram_init() 162 sizeof(z_paging_histogram_backing_store_page_out.bounds)); in z_paging_histogram_init() 179 if (cycles <= hist->bounds[idx]) { in z_paging_histogram_inc()
|
/Zephyr-latest/kernel/ |
D | mempool.c | 97 size_t bounds; in k_calloc() local 101 if (size_mul_overflow(nmemb, size, &bounds)) { in k_calloc() 107 ret = k_malloc(bounds); in k_calloc() 109 (void)memset(ret, 0, bounds); in k_calloc()
|
D | kheap.c | 125 size_t bounds = 0U; in k_heap_calloc() local 127 if (!size_mul_overflow(num, size, &bounds)) { in k_heap_calloc() 128 ret = k_heap_alloc(heap, bounds, timeout); in k_heap_calloc() 131 (void)memset(ret, 0, bounds); in k_heap_calloc()
|
D | poll.c | 354 uint32_t bounds; in z_vrfy_k_poll() local 365 &bounds), in z_vrfy_k_poll() 370 events_copy = z_thread_malloc(bounds); in z_vrfy_k_poll() 377 if (K_SYSCALL_MEMORY_WRITE(events, bounds)) { in z_vrfy_k_poll() 381 (void)memcpy(events_copy, events, bounds); in z_vrfy_k_poll() 418 (void)memcpy((void *)events, events_copy, bounds); in z_vrfy_k_poll()
|
D | Kconfig.vm | 34 2. The underlying architecture may impose constraints on the bounds of 81 RAM size larger than the defined bounds of the virtual address space. 206 the upper bounds for each bin. See kernel/statistics.c for
|
/Zephyr-latest/doc/releases/ |
D | release-notes-2.6.rst | 1097 * :github:`35631` - [Coverity CID: 205610] Out-of-bounds read in /zephyr/include/generated/syscalls… 1098 * :github:`35630` - [Coverity CID: 205657] Out-of-bounds read in /zephyr/include/generated/syscalls… 1099 * :github:`35629` - [Coverity CID: 207968] Out-of-bounds read in /zephyr/include/generated/syscalls… 1100 * :github:`35628` - [Coverity CID: 207976] Out-of-bounds read in /zephyr/include/generated/syscalls… 1101 * :github:`35627` - [Coverity CID: 208195] Out-of-bounds read in /zephyr/include/generated/syscalls… 1102 * :github:`35626` - [Coverity CID: 210588] Out-of-bounds read in /zephyr/include/generated/syscalls… 1103 * :github:`35625` - [Coverity CID: 211042] Out-of-bounds read in /zephyr/include/generated/syscalls… 1104 * :github:`35624` - [Coverity CID: 214226] Out-of-bounds read in /zephyr/include/generated/syscalls… 1105 * :github:`35623` - [Coverity CID: 215223] Out-of-bounds read in /zephyr/include/generated/syscalls… 1106 * :github:`35622` - [Coverity CID: 215238] Out-of-bounds read in /zephyr/include/generated/syscalls… [all …]
|
D | release-notes-2.4.rst | 788 * Fixed out-of-bounds access and add flash_img_init return value check. 898 * :github:`28659` - [Coverity CID :214346] Out-of-bounds access in subsys/net/ip/tcp2.c 934 * :github:`28397` - gcc 10.x compile warning/error for array subscript is outside the bounds in cms… 940 * :github:`28375` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in t… 941 * :github:`28371` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in s… 1005 * :github:`28165` - [Coverity CID :214215] Out-of-bounds access in subsys/mgmt/mcumgr/smp_shell.c 1083 * :github:`27837` - [Coverity CID :212956] Out-of-bounds access in tests/kernel/mem_protect/mem_map… 1087 * :github:`27833` - [Coverity CID :212958] Out-of-bounds access in arch/x86/core/x86_mmu.c 1088 * :github:`27832` - [Coverity CID :212957] Out-of-bounds access in arch/x86/core/x86_mmu.c 1120 * :github:`27639` - [Coverity CID :212425] Out-of-bounds access in drivers/ethernet/eth_mcux.c [all …]
|
D | release-notes-3.0.rst | 299 * Fixed out-of-bounds error when large number of IRQs are enabled and ignore 1075 * :github:`41017` - USB string descriptors can be re-ordered causing corruption and out-of-bounds-w… 1208 * :github:`39852` - [Coverity CID: 240241] Out-of-bounds access in subsys/bluetooth/host/adv.c 1212 * :github:`39843` - [Coverity CID: 240659] Out-of-bounds read in /zephyr/include/generated/syscalls… 1215 * :github:`39839` - [Coverity CID: 240663] Out-of-bounds access in tests/benchmarks/mbedtls/src/ben… 1217 * :github:`39833` - [Coverity CID: 240670] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1218 * :github:`39832` - [Coverity CID: 240671] Out-of-bounds access in drivers/flash/flash_mcux_flexspi… 1219 * :github:`39830` - [Coverity CID: 240673] Out-of-bounds read in /zephyr/include/generated/syscalls… 1220 * :github:`39827` - [Coverity CID: 240676] Out-of-bounds access in drivers/ieee802154/ieee802154_dw… 1222 * :github:`39824` - [Coverity CID: 240679] Out-of-bounds access in samples/subsys/usb/cdc_acm_compo… [all …]
|
D | release-notes-2.5.rst | 613 * Fixed bounds checking in timeout. 1049 * :github:`31677` - [Coverity CID :216792] Out-of-bounds access in tests/net/lib/dns_addremove/src/… 1058 * :github:`31667` - [Coverity CID :215395] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1059 * :github:`31666` - [Coverity CID :215394] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1062 * :github:`31663` - [Coverity CID :215389] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1064 * :github:`31661` - [Coverity CID :215387] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1065 * :github:`31660` - [Coverity CID :215385] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1066 * :github:`31659` - [Coverity CID :215384] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1069 * :github:`31656` - [Coverity CID :215380] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c 1071 * :github:`31654` - [Coverity CID :215377] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c [all …]
|
/Zephyr-latest/subsys/net/pkt_filter/ |
D | base.c | 265 struct npf_test_size_bounds *bounds = in npf_size_inbounds() local 269 return pkt_size >= bounds->min && pkt_size <= bounds->max; in npf_size_inbounds()
|
/Zephyr-latest/modules/nrf_wifi/os/ |
D | shim.c | 59 size_t bounds; in zep_shim_mem_zalloc() local 63 if (size_mul_overflow(size_aligned, sizeof(char), &bounds)) { in zep_shim_mem_zalloc() 67 ret = zep_shim_mem_alloc(bounds); in zep_shim_mem_zalloc() 69 (void)memset(ret, 0, bounds); in zep_shim_mem_zalloc() 78 size_t bounds; in zep_shim_data_mem_zalloc() local 82 if (size_mul_overflow(size_aligned, sizeof(char), &bounds)) { in zep_shim_data_mem_zalloc() 86 ret = zep_shim_data_mem_alloc(bounds); in zep_shim_data_mem_zalloc() 88 (void)memset(ret, 0, bounds); in zep_shim_data_mem_zalloc()
|
/Zephyr-latest/modules/liblc3/ |
D | CMakeLists.txt | 4 -O3 -std=c11 -ffast-math -Wno-array-bounds -Wall -Wextra -Wdouble-promotion -Wvla -pedantic
|
/Zephyr-latest/include/zephyr/kernel/mm/ |
D | demand_paging.h | 76 unsigned long bounds[CONFIG_DEMAND_PAGING_TIMING_HISTOGRAM_NUM_BINS]; member
|
/Zephyr-latest/tests/kernel/mem_protect/demand_paging/mem_map/src/ |
D | main.c | 416 time_ns = timing_cycles_to_ns(hist->bounds[idx]); in print_histogram() 418 time_ns = k_cyc_to_ns_ceil64(hist->bounds[idx]); in print_histogram() 421 hist->bounds[idx], hist->counts[idx]); in print_histogram()
|
/Zephyr-latest/cmake/compiler/gcc/ |
D | compiler_flags.cmake | 192 # _FORTIFY_SOURCE=1 : Loose checking (use wide bounds checks) 193 # _FORTIFY_SOURCE=2 : Tight checking (use narrow bounds checks) 194 # GCC always does compile-time bounds checking for string/mem functions, so 253 set_compiler_property(PROPERTY warning_no_array_bounds -Wno-array-bounds)
|
/Zephyr-latest/tests/drivers/disk/disk_access/ |
D | README.txt | 26 writes that would be outside the bounds of the disk), then performs multiple
|
/Zephyr-latest/arch/x86/core/ |
D | Kconfig.intel64 | 82 bounds of the current process stack are overflowed. This is done
|
D | Kconfig.ia32 | 73 bounds of the current process stack are overflowed. This is done
|
/Zephyr-latest/doc/develop/sca/ |
D | polyspace.rst | 11 the absence of run-time errors like array out of bounds access, overflows,
|
/Zephyr-latest/samples/sensor/veml6031/ |
D | README.rst | 17 returned to indicate the out of bounds situation to the user program.
|
/Zephyr-latest/doc/security/ |
D | vulnerabilities.rst | 112 Out-of-bounds write in USB Mass Storage with unaligned sizes 114 Out-of-bounds Write in the USB Mass Storage memoryWrite handler with 554 In the Zephyr Project MQTT code, improper bounds checking can result 668 Possible read out of bounds in dns read 1497 Out of bounds issue in remove_rx_filter in multiple can drivers. 1812 outside of the bounds of the buffer. 1844 Out of bounds read when calling crc16_ansi and strlen in dns_validate_msg 1846 A malicious or malformed DNS packet without a payload can cause an out-of-bounds 1866 Out of bounds read when unpacking DNS answers 1868 A lack of input validation allows for out of bounds reads caused by malicious or [all …]
|
/Zephyr-latest/cmake/compiler/ |
D | compiler_flags_template.cmake | 146 # Compiler flag for disabling warning about array bounds
|
/Zephyr-latest/doc/kernel/usermode/ |
D | overview.rst | 75 - Using parameters outside of proper bounds or with nonsensical values. 163 the object, check the validity of other parameters through bounds checking or
|
/Zephyr-latest/lib/heap/ |
D | Kconfig | 38 The sys_heap allocator bounds the number of tries from the
|
/Zephyr-latest/cmake/compiler/arcmwdt/ |
D | compiler_flags.cmake | 212 # Update after testing that -Wshadow and -Wno-array-bounds works
|