Searched defs:prot (Results 76 - 100 of 115) sorted by relevance

12345

/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_mac.cc86 extern "C" void *__mmap(void *addr, size_t len, int prot, int flags, int fildes,
91 uptr internal_mmap(void *addr, size_t length, int prot, int flags, argument
94 return (uptr)__mmap(addr, length, prot, flags, fd, offset);
101 int internal_mprotect(void *addr, uptr length, int prot) { argument
102 return mprotect(addr, length, prot);
H A Dsanitizer_linux.cc120 uptr internal_mmap(void *addr, uptr length, int prot, int flags, int fd, argument
123 return internal_syscall(SYSCALL(mmap), (uptr)addr, length, prot, flags, fd,
128 return internal_syscall(SYSCALL(mmap2), addr, length, prot, flags, fd,
138 int internal_mprotect(void *addr, uptr length, int prot) { argument
139 return internal_syscall(SYSCALL(mprotect), (uptr)addr, length, prot);
/external/dnsmasq/src/
H A Dcache.c495 struct crec *cache_find_by_name(struct crec *crecp, char *name, time_t now, unsigned short prot) argument
515 (crecp->flags & prot) &&
572 (ans->flags & prot) &&
580 time_t now, unsigned short prot)
584 int addrlen = (prot == F_IPV6) ? IN6ADDRSZ : INADDRSZ;
606 if ((crecp->flags & prot) &&
637 (ans->flags & prot) &&
579 cache_find_by_addr(struct crec *crecp, struct all_addr *addr, time_t now, unsigned short prot) argument
/external/iproute2/ip/
H A Diproute.c1093 __u32 prot; local
1095 if (rtnl_rtprot_a2n(&prot, *argv))
1097 req.r.rtm_protocol = prot;
1374 __u32 prot = 0; local
1377 if (rtnl_rtprot_a2n(&prot, *argv)) {
1380 prot = 0;
1383 filter.protocol = prot;
/external/llvm/tools/llvm-readobj/
H A DMachODumper.cpp292 static std::string getMask(uint32_t prot) argument
294 // TODO (davide): This always assumes prot is valid.
298 Prot += (prot & MachO::VM_PROT_READ) ? "r" : "-";
299 Prot += (prot & MachO::VM_PROT_WRITE) ? "w" : "-";
300 Prot += (prot & MachO::VM_PROT_EXECUTE) ? "x" : "-";
/external/ppp/pppd/
H A Dlcp.c561 u_short prot; local
569 GETSHORT(prot, inp);
580 pname = protocol_name(prot);
586 if (protp->protocol == prot && protp->enabled_flag) {
588 dbglog("Protocol-Reject for 0x%x received", prot);
591 prot);
597 warn("Protocol-Reject for unsupported protocol 0x%x", prot);
600 prot);
H A Dauth.c1014 const char *prot = ""; local
1019 prot = "CHAP";
1038 prot = "PAP";
1042 prot = "EAP";
1049 notice("%s authentication succeeded", prot);
/external/python/cpython2/Modules/
H A Dmmapmodule.c1031 Unix: mmap(fileno, length[, flags[, prot[, access[, offset]]]])\n\
1105 int fd, flags = MAP_SHARED, prot = PROT_WRITE | PROT_READ; local
1109 "flags", "prot",
1113 &fd, &map_size, &flags, &prot,
1128 ((flags != MAP_SHARED) || (prot != (PROT_WRITE | PROT_READ))))
1130 "mmap can't specify both access and flags, prot.");
1134 prot = PROT_READ;
1138 prot = PROT_READ | PROT_WRITE;
1142 prot = PROT_READ | PROT_WRITE;
1145 /* map prot t
[all...]
/external/syslinux/core/lwip/src/netif/ppp/
H A Dlcp.c450 u_short prot; local
457 GETSHORT(prot, inp);
459 LCPDEBUG(LOG_INFO, ("lcp_rprotrej: Rcvd Protocol-Reject packet for %x!\n", prot));
474 if (protp->protocol == prot && protp->enabled_flag) {
480 LCPDEBUG(LOG_WARNING, ("Protocol-Reject for unsupported protocol 0x%x\n", prot));
/external/toybox/lib/
H A Dxwrap.c61 void *xmmap(void *addr, size_t length, int prot, int flags, int fd, off_t off) argument
63 void *ret = mmap(addr, length, prot, flags, fd, off);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dgas_serv.c1229 struct anqp_query_info *qi, int prot,
1274 di->prot = prot;
1289 if (prot)
1305 const u8 *data, size_t len, int prot,
1356 if (prot)
1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot,
1423 const u8 *data, size_t len, int prot,
1498 if (prot)
1518 int prot, std_addr local
1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument
1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dgas_serv.c1229 struct anqp_query_info *qi, int prot,
1274 di->prot = prot;
1289 if (prot)
1305 const u8 *data, size_t len, int prot,
1356 if (prot)
1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot,
1423 const u8 *data, size_t len, int prot,
1498 if (prot)
1518 int prot, std_addr local
1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument
1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dgas_serv.c1229 struct anqp_query_info *qi, int prot,
1274 di->prot = prot;
1289 if (prot)
1305 const u8 *data, size_t len, int prot,
1356 if (prot)
1416 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot,
1423 const u8 *data, size_t len, int prot,
1498 if (prot)
1518 int prot, std_addr local
1227 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot, int std_addr3) argument
1303 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
1421 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot, int std_addr3) argument
[all...]
/external/compiler-rt/lib/msan/
H A Dmsan_interceptors.cc955 INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags, argument
958 return REAL(mmap)(addr, length, prot, flags, fd, offset);
968 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset);
975 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, argument
986 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
/external/doclava/src/com/google/doclava/
H A DDoclava.java148 public static boolean checkLevel(boolean pub, boolean prot, boolean pkgp, boolean priv, argument
156 if (prot && checkLevel(SHOW_PROTECTED)) {
/external/fio/os/windows/
H A Dposix.c297 void *mmap(void *addr, size_t len, int prot, int flags, argument
307 if (prot & PROT_NONE)
310 if ((prot & PROT_READ) && !(prot & PROT_WRITE)) {
315 if (prot & PROT_WRITE) {
/external/linux-kselftest/tools/testing/selftests/x86/
H A Dprotection_keys.c549 dprintf2("%s(0x%p, %zx, prot=%lx, pkey=%lx)\n", __func__,
556 dprintf2("SYS_mprotect_key prot: 0x%lx\n", orig_prot);
668 dprintf1("sys_mprotect_pkey(%p, %zx, prot=0x%lx, pkey=%ld) ret: %d\n",
682 dprintf1("mprotect_pkey(%p, %zx, prot=0x%lx, pkey=%ld) ret: %d\n",
759 void *malloc_pkey_with_mprotect(long size, int prot, u16 pkey) argument
765 dprintf1("doing %s(size=%ld, prot=0x%x, pkey=%d)\n", __func__,
766 size, prot, pkey);
768 ptr = mmap(NULL, size, prot, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
770 ret = mprotect_pkey((void *)ptr, PAGE_SIZE, prot, pkey);
779 void *malloc_pkey_anon_huge(long size, int prot, u1 argument
851 malloc_pkey_hugetlb(long size, int prot, u16 pkey) argument
872 malloc_pkey_mmap_dax(long size, int prot, u16 pkey) argument
906 malloc_pkey(long size, int prot, u16 pkey) argument
1330 int prot = PROT_READ|PROT_WRITE; local
[all...]
/external/mdnsresponder/Clients/
H A Ddns-sd.c1232 DNSServiceProtocol prot = GetProtocol(argv[opi+0]); // Must specify TCP or UDP local
1238 err = DNSServiceNATPortMappingCreate(&client, 0, 0, prot, intp.NotAnInteger, extp.NotAnInteger, ttl, port_mapping_create_reply, NULL);
/external/v8/src/base/platform/
H A Dplatform-win32.cc786 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local
790 prot);
1287 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local
1288 if (NULL == VirtualAlloc(base, size, MEM_COMMIT, prot)) {
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/blktrace/
H A Dblktrace.c709 static void *my_mmap(void *addr, size_t length, int prot, int flags, int fd, argument
715 new = mmap(addr, length, prot, flags, fd, offset);
/external/clang/test/SemaCXX/
H A Dtype-traits.cpp82 class HasProt { protected: int prot; }; member in class:HasProt
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_interceptors.cc690 TSAN_INTERCEPTOR(void *, mmap, void *addr, SIZE_T sz, int prot, int flags, argument
692 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off);
695 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off);
709 TSAN_INTERCEPTOR(void *, mmap64, void *addr, SIZE_T sz, int prot, int flags, argument
711 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off);
714 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off);

Completed in 8170 milliseconds

12345