/external/clang/test/CodeGen/ |
H A D | 2003-11-18-CondExprLValue.c | 5 void split_large_page(unsigned long addr, pgprot_t prot) argument 7 (addr ? prot : ((pgprot_t) { 0x001 } )).pgprot;
|
/external/valgrind/main/helgrind/tests/ |
H A D | tc06_two_races.c | 9 int unprot1 = 0, unprot2 = 0, prot = 0; variable 16 prot ++; 33 prot ++;
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/os/ |
H A D | os_mman.h | 64 static INLINE void *os_mmap(void *addr, size_t length, int prot, int flags, int fd, loff_t offset) argument 72 return __mmap2(addr, length, prot, flags, fd, (size_t) (offset >> 12)); 77 # define os_mmap(addr, length, prot, flags, fd, offset) mmap(addr, length, prot, flags, fd, offset)
|
/external/mesa3d/src/gallium/auxiliary/os/ |
H A D | os_mman.h | 64 static INLINE void *os_mmap(void *addr, size_t length, int prot, int flags, int fd, loff_t offset) argument 72 return __mmap2(addr, length, prot, flags, fd, (size_t) (offset >> 12)); 77 # define os_mmap(addr, length, prot, flags, fd, offset) mmap(addr, length, prot, flags, fd, offset)
|
/external/chromium_org/third_party/skia/src/utils/android/ |
H A D | ashmem.cpp | 62 int ashmem_set_prot_region(int fd, int prot) argument 64 return ioctl(fd, ASHMEM_SET_PROT_MASK, prot);
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
H A D | malloc_hook_mmap_freebsd.h | 59 void* mmap(void *start, size_t length,int prot, int flags, 69 int prot, int flags, 72 start, length, prot, flags, fd, offset); 116 extern "C" void* mmap(void *start, size_t length, int prot, int flags, 118 MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset); 121 start, length, prot, flags, fd, offset, &result)) { 122 result = do_mmap(start, length, prot, flags, fd, 125 MallocHook::InvokeMmapHook(result, start, length, prot, flags, fd, offset); 146 /*static*/void* MallocHook::UnhookedMMap(void *start, size_t length, int prot, argument 150 start, length, prot, flag [all...] |
H A D | malloc_hook_mmap_linux.h | 81 int prot, int flags, 85 return (void *)syscall(SYS_mmap, start, length, prot, flags, fd, offset); 94 int prot, int flags, 112 start, length, prot, flags, fd, 132 int32 args[6] = { (int32) start, (int32) length, prot, flags, fd, 165 void* mmap64(void *start, size_t length, int prot, int flags, 168 void* mmap(void *start, size_t length,int prot, int flags, 182 extern "C" void* mmap64(void *start, size_t length, int prot, int flags, 184 MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset); 187 start, length, prot, flag 250 UnhookedMMap(void *start, size_t length, int prot, int flags, int fd, off_t offset) argument [all...] |
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
H A D | malloc_hook_mmap_freebsd.h | 59 void* mmap(void *start, size_t length,int prot, int flags, 69 int prot, int flags, 72 start, length, prot, flags, fd, offset); 116 extern "C" void* mmap(void *start, size_t length, int prot, int flags, 118 MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset); 121 start, length, prot, flags, fd, offset, &result)) { 122 result = do_mmap(start, length, prot, flags, fd, 125 MallocHook::InvokeMmapHook(result, start, length, prot, flags, fd, offset); 146 /*static*/void* MallocHook::UnhookedMMap(void *start, size_t length, int prot, argument 150 start, length, prot, flag [all...] |
H A D | malloc_hook_mmap_linux.h | 57 int prot, int flags, 59 return sys_mmap(start, length, prot, flags, fd, offset); 68 int prot, int flags, 86 start, length, prot, flags, fd, 106 int32 args[6] = { (int32) start, (int32) length, prot, flags, fd, 139 void* mmap64(void *start, size_t length, int prot, int flags, 142 void* mmap(void *start, size_t length,int prot, int flags, 154 extern "C" void* mmap64(void *start, size_t length, int prot, int flags, 156 MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset); 159 start, length, prot, flag 214 UnhookedMMap(void *start, size_t length, int prot, int flags, int fd, off_t offset) argument [all...] |
/external/clang/test/CXX/class.access/class.access.base/ |
H A D | p1.cpp | 12 protected: int prot; static int sprot; // expected-note 4 {{declared protected here}} member in class:test0::Base 20 prot++; 27 Base::prot++; member in class:test0::Test::Base 37 t->prot++; // expected-error {{protected member}} 44 t->Base::prot++; // expected-error {{protected member}} 61 protected: int prot; static int sprot; // expected-note 4 {{declared protected here}} member in class:test1::Base 69 prot++; 76 Base::prot++; member in class:test1::Test::Base 86 t->prot++; // expected-error {{protected member}} expected-error {{protected base class}} 94 t->Base::prot 112 int prot; // expected-note {{declared protected here}} \\ member in class:test2::Base 133 Base::prot++; member in class:test2::Test::Base [all...] |
/external/skia/src/utils/android/ |
H A D | ashmem.cpp | 62 int ashmem_set_prot_region(int fd, int prot) argument 64 return ioctl(fd, ASHMEM_SET_PROT_MASK, prot);
|
/external/valgrind/main/coregrind/ |
H A D | pub_core_aspacemgr.h | 79 client with at least the permissions 'prot' ? To find out 81 VKI_PROT_NONE as 'prot'. Will return False if any part of the 86 // ( Addr start, SizeT len, UInt prot ); 93 ( Addr start, SizeT len, UInt prot ); 170 ( Addr a, SizeT len, UInt prot, UInt flags, Int fd, Off64T offset ); 176 extern Bool VG_(am_notify_client_shmat)( Addr a, SizeT len, UInt prot ); 187 extern Bool VG_(am_notify_mprotect)( Addr start, SizeT len, UInt prot ); 203 ( Addr start, SizeT length, UInt prot, UInt flags, Int fd, Off64T offset); 217 ( Addr start, SizeT length, UInt prot, Int fd, Off64T offset ); 219 ( Addr start, SizeT length, UInt prot, In 384 UInt prot; // Not used for removed segs. member in struct:__anon28310 [all...] |
/external/oprofile/module/x86/ |
H A D | op_fixmap.c | 43 pgprot_t prot; local 51 prot = PAGE_KERNEL; 53 pgprot_val(prot) |= _PAGE_PCD; 55 pgprot_val(prot) |= _PAGE_GLOBAL; 56 set_pte(pte, mk_pte_phys(phys, prot));
|
/external/valgrind/main/memcheck/tests/ |
H A D | addressable.c | 15 static char *mm(char *addr, int size, int prot) argument 23 ret = mmap(addr, size, prot, flags, -1, 0);
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/ |
H A D | Sasl2Test.java | 518 public SaslServer createSaslServer(String mech, String prot, argument 533 public SaslServer createSaslServer(String mech, String prot, argument 535 if (prot == null) { 551 public SaslClient createSaslClient(String[] mech, String prot, String auth, argument 566 public SaslClient createSaslClient(String[] mech, String prot, String auth, argument
|
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
H A D | kernel_wrap_dummy.cc | 38 int _real_mmap(void** addr, size_t length, int prot, int flags, int fd, argument
|
H A D | mount_passthrough.cc | 95 int prot, 100 int err = _real_mmap(out_addr, length, prot, flags, real_fd_, offset); 93 MMap(void* addr, size_t length, int prot, int flags, size_t offset, void** out_addr) argument
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | SecurityAgreeHeader.java | 74 * Set Protocol (prot paramater) 75 * @param prot - protocol value 78 public void setProtocol(String prot) throws ParseException; argument 145 * @return prot parameter value
|
/external/qemu/android/utils/ |
H A D | mapfile.c | 154 int prot, 192 if (prot != PROT_NONE) { 193 if ((prot & (PROT_WRITE | PROT_EXEC)) == 0) { 196 } else if ((prot & (PROT_WRITE | PROT_EXEC)) == 200 } else if ((prot & PROT_WRITE) == PROT_WRITE) { 203 } else if ((prot & PROT_EXEC) == PROT_EXEC) { 151 mapfile_map(MapFile* handle, size_t offset, size_t size, int prot, void** mapped_offset, size_t* mapped_size) argument
|
/external/tcpdump/ |
H A D | print-gre.c | 122 u_int16_t flags, prot; local 134 prot = EXTRACT_16BITS(bp); 197 tok2str(ethertype_values,"unknown",prot), 198 prot); 207 switch (prot) { 229 printf("gre-proto-0x%x", prot); 241 u_int16_t flags, prot; local 253 prot = EXTRACT_16BITS(bp); 290 tok2str(ethertype_values,"unknown",prot), 291 prot); [all...] |
/external/valgrind/main/coregrind/m_ume/ |
H A D | elf.c | 186 unsigned prot = 0; local 191 if (ph->p_flags & PF_X) prot |= VKI_PROT_EXEC; 192 if (ph->p_flags & PF_W) prot |= VKI_PROT_WRITE; 193 if (ph->p_flags & PF_R) prot |= VKI_PROT_READ; 213 prot, /*VKI_MAP_FIXED|VKI_MAP_PRIVATE, */ 230 prot 238 // The 'prot' condition allows for a read-only bss 239 if ((prot & VKI_PROT_WRITE) && (bytes > 0)) {
|
/external/chromium_org/v8/src/ |
H A D | platform-macos.cc | 82 int prot = PROT_READ | PROT_WRITE | (is_executable ? PROT_EXEC : 0); local 85 prot, 303 int prot = PROT_READ | PROT_WRITE | (is_executable ? PROT_EXEC : 0); local 306 prot,
|
/external/clang/test/CXX/class.access/ |
H A D | p6.cpp | 48 Protected prot = a; // expected-error {{'operator Protected' is a protected member}} local 51 A aprot = prot; // expected-error {{protected constructor}}
|
/external/grub/stage2/ |
H A D | vstafs.h | 58 struct prot struct 73 struct prot pprot;
|
/external/kernel-headers/original/asm-mips/ |
H A D | pgtable-32.h | 98 pfn_pte(unsigned long pfn, pgprot_t prot) argument 101 pte.pte_high = (pfn << 6) | (pgprot_val(prot) & 0x3f); 102 pte.pte_low = pgprot_val(prot); 112 #define pfn_pte(pfn, prot) __pte(((pfn) << (PAGE_SHIFT + 2)) | pgprot_val(prot)) 115 #define pfn_pte(pfn, prot) __pte(((unsigned long long)(pfn) << _PFN_SHIFT) | pgprot_val(prot))
|