Searched refs:prot (Results 101 - 125 of 163) sorted by relevance

1234567

/external/fio/os/windows/
H A Dposix.c297 void *mmap(void *addr, size_t len, int prot, int flags, argument
307 if (prot & PROT_NONE)
310 if ((prot & PROT_READ) && !(prot & PROT_WRITE)) {
315 if (prot & PROT_WRITE) {
/external/python/cpython2/Lib/test/
H A Dtest_mmap.py236 # Try incompatible flags, prot and access parameters.
240 prot=mmap.PROT_READ, access=mmap.ACCESS_WRITE)
244 prot = mmap.PROT_READ | getattr(mmap, 'PROT_EXEC', 0)
246 m = mmap.mmap(f.fileno(), mapsize, prot=prot)
543 m = mmap.mmap(f.fileno(), mapsize, prot=mmap.PROT_READ)
/external/compiler-rt/lib/lsan/
H A Dlsan_common.cc278 uptr begin, end, prot; local
281 /*filename_size*/ 0, &prot)) {
285 bool is_readable = prot & MemoryMappingLayout::kProtectionRead;
/external/ppp/pppd/
H A Dlcp.c561 u_short prot; local
569 GETSHORT(prot, inp);
580 pname = protocol_name(prot);
586 if (protp->protocol == prot && protp->enabled_flag) {
588 dbglog("Protocol-Reject for 0x%x received", prot);
591 prot);
597 warn("Protocol-Reject for unsupported protocol 0x%x", prot);
600 prot);
H A Dauth.c1014 const char *prot = ""; local
1019 prot = "CHAP";
1038 prot = "PAP";
1042 prot = "EAP";
1049 notice("%s authentication succeeded", prot);
/external/v4l2_codec2/vda/
H A Dv4l2_device.cc176 int prot,
180 return mmap(addr, len, prot, flags, device_fd_.get(), offset);
174 Mmap(void* addr, unsigned int len, int prot, int flags, unsigned int offset) argument
/external/valgrind/coregrind/m_syswrap/
H A Dpriv_syswrap-generic.h84 ML_(notify_core_and_tool_of_mmap) ( Addr a, SizeT len, UInt prot,
89 ML_(notify_core_and_tool_of_mprotect) ( Addr a, SizeT len, Int prot );
H A Dsyswrap-solaris.c1935 UInt prot = (seg->hasR ? VKI_PROT_READ : 0) local
1949 SysRes sres = VG_(am_mmap_anon_fixed_client)(anon_start, anon_size, prot);
2184 UInt prot = (seg->hasR ? VKI_PROT_READ : 0) local
2189 sres = VG_(am_mmap_anon_fixed_client)(anon_start, anon_size, prot);
5734 /* void *mmap(void *addr, size_t len, int prot, int flags,
5746 int, prot, int, flags, int, fd, vki_off_t, offset);
5820 "prot=%#lx memsz=%#lx filesz=%#lx file "
5979 UInt prot = 0; local
5981 prot |= VKI_PROT_READ;
5983 prot |
6657 UInt prot; local
9551 UInt prot, flags; local
9649 UInt prot = VKI_PROT_READ | VKI_PROT_WRITE; local
[all...]
H A Dsyswrap-ppc32-linux.c254 unsigned long, prot, unsigned long, flags,
273 unsigned long, prot, unsigned long, flags,
/external/curl/packages/vms/
H A Dcompare_curl_source.com139 $ create/dir/prot=o:rwed src_root1:[curl]
155 $ create/dir/prot=o:rwed vms_root1:[curl]
/external/iproute2/misc/
H A Dss.c727 uint16_t prot; member in struct:sockstat
2906 s->local.data[0] = s->prot;
2913 if (s->prot == 3)
2916 addr = ll_proto_n2a(htons(s->prot), ll_name, sizeof(ll_name));
2976 stat.prot = r->pdiag_num;
3096 int type, prot, iface, state, rq, uid, ino; local
3100 &type, &prot, &iface, &state,
3109 stat.prot = prot;
3146 int prot, in
3145 netlink_show_one(struct filter *f, int prot, int pid, unsigned groups, int state, int dst_pid, unsigned dst_group, int rq, int wq, unsigned long long sk, unsigned long long cb) argument
3297 int prot, pid; local
[all...]
/external/llvm/tools/llvm-readobj/
H A DMachODumper.cpp292 static std::string getMask(uint32_t prot) argument
294 // TODO (davide): This always assumes prot is valid.
298 Prot += (prot & MachO::VM_PROT_READ) ? "r" : "-";
299 Prot += (prot & MachO::VM_PROT_WRITE) ? "w" : "-";
300 Prot += (prot & MachO::VM_PROT_EXECUTE) ? "x" : "-";
/external/selinux/python/sepolicy/sepolicy/
H A Dmanpage.py725 for prot in ("tcp", "udp"):
726 if (p, prot) in self.portrecs:
734 .EE""" % (prot, ",".join(self.portrecs[(p, prot)])))
/external/v8/src/base/platform/
H A Dplatform-win32.cc786 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local
790 prot);
1287 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local
1288 if (NULL == VirtualAlloc(base, size, MEM_COMMIT, prot)) {
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_linux.cc120 uptr internal_mmap(void *addr, uptr length, int prot, int flags, int fd, argument
123 return internal_syscall(SYSCALL(mmap), (uptr)addr, length, prot, flags, fd,
128 return internal_syscall(SYSCALL(mmap2), addr, length, prot, flags, fd,
138 int internal_mprotect(void *addr, uptr length, int prot) { argument
139 return internal_syscall(SYSCALL(mprotect), (uptr)addr, length, prot);
/external/compiler-rt/include/sanitizer/
H A Dlinux_syscall_hooks.h610 #define __sanitizer_syscall_pre_mprotect(start, len, prot) \
612 (long)(prot))
613 #define __sanitizer_syscall_post_mprotect(res, start, len, prot) \
615 (long)(prot))
626 #define __sanitizer_syscall_pre_remap_file_pages(start, size, prot, pgoff, \
629 (long)(start), (long)(size), (long)(prot), (long)(pgoff), (long)(flags))
630 #define __sanitizer_syscall_post_remap_file_pages(res, start, size, prot, \
633 (long)(size), (long)(prot), \
1777 #define __sanitizer_syscall_pre_mmap_pgoff(addr, len, prot, flags, fd, pgoff) \
1779 (long)(prot), (lon
[all...]
/external/tcpdump/
H A Dprint-icmp6.c879 u_int prot; local
933 if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot))
938 switch (prot) {
1163 get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot) argument
1191 *prot = nh;
1228 *prot = nh; /* meaningless, but set here anyway */
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211_capa.c86 unsigned int prot = 0; local
89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
97 return prot;
/external/toybox/lib/
H A Dxwrap.c61 void *xmmap(void *addr, size_t length, int prot, int flags, int fd, off_t off) argument
63 void *ret = mmap(addr, length, prot, flags, fd, off);
/external/mdnsresponder/mDNSWindows/DLLX/
H A DDNSSD.cpp397 DNSServiceProtocol prot = 0; local
418 prot = ( addressFamily | protocol );
420 err = DNSServiceNATPortMappingCreate( &sref, flags, ifIndex, prot, internalPort, externalPort, ttl, ( DNSServiceNATPortMappingReply ) &NATPortMappingReply, object );
H A DDNSSDService.cpp1192 DNSServiceProtocol prot = 0; local
1234 prot = ( addressFamily | protocol );
1240 err = DNSServiceNATPortMappingCreate( &subord, flags | kDNSServiceFlagsShareConnection, ifIndex, prot, htons( internalPort ), htons( externalPort ), ttl, ( DNSServiceNATPortMappingReply ) &NATPortMappingReply, object );
/external/compiler-rt/lib/msan/
H A Dmsan_interceptors.cc955 INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags, argument
958 return REAL(mmap)(addr, length, prot, flags, fd, offset);
968 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset);
975 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, argument
986 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
/external/syslinux/core/lwip/src/netif/ppp/
H A Dlcp.c450 u_short prot; local
457 GETSHORT(prot, inp);
459 LCPDEBUG(LOG_INFO, ("lcp_rprotrej: Rcvd Protocol-Reject packet for %x!\n", prot));
474 if (protp->protocol == prot && protp->enabled_flag) {
480 LCPDEBUG(LOG_WARNING, ("Protocol-Reject for unsupported protocol 0x%x\n", prot));

Completed in 2836 milliseconds

1234567