/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_mac.cc | 86 extern "C" void *__mmap(void *addr, size_t len, int prot, int flags, int fildes, 91 uptr internal_mmap(void *addr, size_t length, int prot, int flags, argument 94 return (uptr)__mmap(addr, length, prot, flags, fd, offset); 101 int internal_mprotect(void *addr, uptr length, int prot) { argument 102 return mprotect(addr, length, prot);
|
H A D | sanitizer_linux.cc | 120 uptr internal_mmap(void *addr, uptr length, int prot, int flags, int fd, argument 123 return internal_syscall(SYSCALL(mmap), (uptr)addr, length, prot, flags, fd, 128 return internal_syscall(SYSCALL(mmap2), addr, length, prot, flags, fd, 138 int internal_mprotect(void *addr, uptr length, int prot) { argument 139 return internal_syscall(SYSCALL(mprotect), (uptr)addr, length, prot);
|
/external/dnsmasq/src/ |
H A D | cache.c | 495 struct crec *cache_find_by_name(struct crec *crecp, char *name, time_t now, unsigned short prot) argument 515 (crecp->flags & prot) && 572 (ans->flags & prot) && 580 time_t now, unsigned short prot) 584 int addrlen = (prot == F_IPV6) ? IN6ADDRSZ : INADDRSZ; 606 if ((crecp->flags & prot) && 637 (ans->flags & prot) && 579 cache_find_by_addr(struct crec *crecp, struct all_addr *addr, time_t now, unsigned short prot) argument
|
/external/iproute2/ip/ |
H A D | iproute.c | 1093 __u32 prot; local 1095 if (rtnl_rtprot_a2n(&prot, *argv)) 1097 req.r.rtm_protocol = prot; 1374 __u32 prot = 0; local 1377 if (rtnl_rtprot_a2n(&prot, *argv)) { 1380 prot = 0; 1383 filter.protocol = prot;
|
/external/llvm/tools/llvm-readobj/ |
H A D | MachODumper.cpp | 292 static std::string getMask(uint32_t prot) argument 294 // TODO (davide): This always assumes prot is valid. 298 Prot += (prot & MachO::VM_PROT_READ) ? "r" : "-"; 299 Prot += (prot & MachO::VM_PROT_WRITE) ? "w" : "-"; 300 Prot += (prot & MachO::VM_PROT_EXECUTE) ? "x" : "-";
|
/external/ppp/pppd/ |
H A D | lcp.c | 561 u_short prot; local 569 GETSHORT(prot, inp); 580 pname = protocol_name(prot); 586 if (protp->protocol == prot && protp->enabled_flag) { 588 dbglog("Protocol-Reject for 0x%x received", prot); 591 prot); 597 warn("Protocol-Reject for unsupported protocol 0x%x", prot); 600 prot);
|
H A D | auth.c | 1014 const char *prot = ""; local 1019 prot = "CHAP"; 1038 prot = "PAP"; 1042 prot = "EAP"; 1049 notice("%s authentication succeeded", prot);
|
/external/python/cpython2/Modules/ |
H A D | mmapmodule.c | 1031 Unix: mmap(fileno, length[, flags[, prot[, access[, offset]]]])\n\ 1105 int fd, flags = MAP_SHARED, prot = PROT_WRITE | PROT_READ; local 1109 "flags", "prot", 1113 &fd, &map_size, &flags, &prot, 1128 ((flags != MAP_SHARED) || (prot != (PROT_WRITE | PROT_READ)))) 1130 "mmap can't specify both access and flags, prot."); 1134 prot = PROT_READ; 1138 prot = PROT_READ | PROT_WRITE; 1142 prot = PROT_READ | PROT_WRITE; 1145 /* map prot t [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
H A D | lcp.c | 450 u_short prot; local 457 GETSHORT(prot, inp); 459 LCPDEBUG(LOG_INFO, ("lcp_rprotrej: Rcvd Protocol-Reject packet for %x!\n", prot)); 474 if (protp->protocol == prot && protp->enabled_flag) { 480 LCPDEBUG(LOG_WARNING, ("Protocol-Reject for unsupported protocol 0x%x\n", prot));
|
/external/toybox/lib/ |
H A D | xwrap.c | 61 void *xmmap(void *addr, size_t length, int prot, int flags, int fd, off_t off) argument 63 void *ret = mmap(addr, length, prot, flags, fd, off);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | gas_serv.c | 1229 struct anqp_query_info *qi, int prot, 1274 di->prot = prot; 1289 if (prot) 1305 const u8 *data, size_t len, int prot, 1356 if (prot) 1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot, 1423 const u8 *data, size_t len, int prot, 1498 if (prot) 1518 int prot, std_addr local 1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument 1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument 1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | gas_serv.c | 1229 struct anqp_query_info *qi, int prot, 1274 di->prot = prot; 1289 if (prot) 1305 const u8 *data, size_t len, int prot, 1356 if (prot) 1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot, 1423 const u8 *data, size_t len, int prot, 1498 if (prot) 1518 int prot, std_addr local 1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument 1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument 1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | gas_serv.c | 1229 struct anqp_query_info *qi, int prot, 1274 di->prot = prot; 1289 if (prot) 1305 const u8 *data, size_t len, int prot, 1356 if (prot) 1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot, 1423 const u8 *data, size_t len, int prot, 1498 if (prot) 1518 int prot, std_addr local 1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument 1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument 1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument [all...] |
/external/compiler-rt/lib/msan/ |
H A D | msan_interceptors.cc | 955 INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags, argument 958 return REAL(mmap)(addr, length, prot, flags, fd, offset); 968 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset); 975 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, argument 986 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
|
/external/doclava/src/com/google/doclava/ |
H A D | Doclava.java | 148 public static boolean checkLevel(boolean pub, boolean prot, boolean pkgp, boolean priv, argument 156 if (prot && checkLevel(SHOW_PROTECTED)) {
|
/external/fio/os/windows/ |
H A D | posix.c | 297 void *mmap(void *addr, size_t len, int prot, int flags, argument 307 if (prot & PROT_NONE) 310 if ((prot & PROT_READ) && !(prot & PROT_WRITE)) { 315 if (prot & PROT_WRITE) {
|
/external/linux-kselftest/tools/testing/selftests/x86/ |
H A D | protection_keys.c | 549 dprintf2("%s(0x%p, %zx, prot=%lx, pkey=%lx)\n", __func__, 556 dprintf2("SYS_mprotect_key prot: 0x%lx\n", orig_prot); 668 dprintf1("sys_mprotect_pkey(%p, %zx, prot=0x%lx, pkey=%ld) ret: %d\n", 682 dprintf1("mprotect_pkey(%p, %zx, prot=0x%lx, pkey=%ld) ret: %d\n", 759 void *malloc_pkey_with_mprotect(long size, int prot, u16 pkey) argument 765 dprintf1("doing %s(size=%ld, prot=0x%x, pkey=%d)\n", __func__, 766 size, prot, pkey); 768 ptr = mmap(NULL, size, prot, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); 770 ret = mprotect_pkey((void *)ptr, PAGE_SIZE, prot, pkey); 779 void *malloc_pkey_anon_huge(long size, int prot, u1 argument 851 malloc_pkey_hugetlb(long size, int prot, u16 pkey) argument 872 malloc_pkey_mmap_dax(long size, int prot, u16 pkey) argument 906 malloc_pkey(long size, int prot, u16 pkey) argument 1330 int prot = PROT_READ|PROT_WRITE; local [all...] |
/external/mdnsresponder/Clients/ |
H A D | dns-sd.c | 1232 DNSServiceProtocol prot = GetProtocol(argv[opi+0]); // Must specify TCP or UDP local 1238 err = DNSServiceNATPortMappingCreate(&client, 0, 0, prot, intp.NotAnInteger, extp.NotAnInteger, ttl, port_mapping_create_reply, NULL);
|
/external/v8/src/base/platform/ |
H A D | platform-win32.cc | 786 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local 790 prot); 1287 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local 1288 if (NULL == VirtualAlloc(base, size, MEM_COMMIT, prot)) {
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/blktrace/ |
H A D | blktrace.c | 709 static void *my_mmap(void *addr, size_t length, int prot, int flags, int fd, argument 715 new = mmap(addr, length, prot, flags, fd, offset);
|
/external/clang/test/SemaCXX/ |
H A D | type-traits.cpp | 82 class HasProt { protected: int prot; }; member in class:HasProt
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_interceptors.cc | 690 TSAN_INTERCEPTOR(void *, mmap, void *addr, SIZE_T sz, int prot, int flags, argument 692 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 695 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 709 TSAN_INTERCEPTOR(void *, mmap64, void *addr, SIZE_T sz, int prot, int flags, argument 711 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 714 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off);
|