summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorotto <>2017-03-29 17:38:37 +0000
committerotto <>2017-03-29 17:38:37 +0000
commitedbc98f3d5629f6851b8036e9a88c53019b5b205 (patch)
tree95339312050c9da966ae468e104feae5b2e59ee2 /src
parent450e0dcf5721f1e74efa759b69fb90cdf33270f5 (diff)
downloadopenbsd-edbc98f3d5629f6851b8036e9a88c53019b5b205.tar.gz
openbsd-edbc98f3d5629f6851b8036e9a88c53019b5b205.tar.bz2
openbsd-edbc98f3d5629f6851b8036e9a88c53019b5b205.zip
rephrase more enumerations of functions
Diffstat (limited to 'src')
-rw-r--r--src/lib/libc/stdlib/malloc.323
1 files changed, 10 insertions, 13 deletions
diff --git a/src/lib/libc/stdlib/malloc.3 b/src/lib/libc/stdlib/malloc.3
index 09b901e359..42cf9ba9a9 100644
--- a/src/lib/libc/stdlib/malloc.3
+++ b/src/lib/libc/stdlib/malloc.3
@@ -30,9 +30,9 @@
30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31.\" SUCH DAMAGE. 31.\" SUCH DAMAGE.
32.\" 32.\"
33.\" $OpenBSD: malloc.3,v 1.107 2017/03/26 09:21:33 otto Exp $ 33.\" $OpenBSD: malloc.3,v 1.108 2017/03/29 17:38:37 otto Exp $
34.\" 34.\"
35.Dd $Mdocdate: March 26 2017 $ 35.Dd $Mdocdate: March 29 2017 $
36.Dt MALLOC 3 36.Dt MALLOC 3
37.Os 37.Os
38.Sh NAME 38.Sh NAME
@@ -165,7 +165,7 @@ If
165.Fa ptr 165.Fa ptr
166was previously freed by 166was previously freed by
167.Fn free 167.Fn free
168or an allocation function, 168or a reallocation function,
169the behavior is undefined and the double free is a security concern. 169the behavior is undefined and the double free is a security concern.
170.Sh RETURN VALUES 170.Sh RETURN VALUES
171Upon successful completion, the allocation functions 171Upon successful completion, the allocation functions
@@ -406,22 +406,17 @@ This is a rather weird condition that is most likely to indicate a
406seriously overloaded system or a ulimit restriction. 406seriously overloaded system or a ulimit restriction.
407.It Dq bogus pointer (double free?) 407.It Dq bogus pointer (double free?)
408An attempt to 408An attempt to
409.Fn free , 409.Fn free
410.Fn realloc ,
411or 410or
412.Fn reallocarray 411reallocate an unallocated pointer was made.
413an unallocated pointer was made.
414.It Dq chunk is already free 412.It Dq chunk is already free
415There was an attempt to free a chunk that had already been freed. 413There was an attempt to free a chunk that had already been freed.
416.It Dq use after free 414.It Dq use after free
417A chunk has been modified after it was freed. 415A chunk has been modified after it was freed.
418.It Dq modified chunk-pointer 416.It Dq modified chunk-pointer
419The pointer passed to 417The pointer passed to
420.Fn free , 418.Fn free
421.Fn realloc , 419or a reallocation function has been modified.
422or
423.Fn reallocarray
424has been modified.
425.It Dq chunk canary corrupted address offset@length 420.It Dq chunk canary corrupted address offset@length
426A byte after the requested size has been overwritten, 421A byte after the requested size has been overwritten,
427indicating a heap overflow. 422indicating a heap overflow.
@@ -431,7 +426,9 @@ and the requested length of the allocation after the @.
431.Fn recallocarray 426.Fn recallocarray
432has detected that the given old size does not equal the recorded size in its 427has detected that the given old size does not equal the recorded size in its
433meta data. 428meta data.
434Enabling option C allows 429Enabling option
430.Cm C
431allows
435.Fn recallocarray 432.Fn recallocarray
436to catch more of these cases. 433to catch more of these cases.
437.It Dq recursive call 434.It Dq recursive call