/external/fio/os/windows/ |
H A D | posix.c | 297 void *mmap(void *addr, size_t len, int prot, int flags, argument 307 if (prot & PROT_NONE) 310 if ((prot & PROT_READ) && !(prot & PROT_WRITE)) { 315 if (prot & PROT_WRITE) {
|
/external/python/cpython2/Lib/test/ |
H A D | test_mmap.py | 236 # Try incompatible flags, prot and access parameters. 240 prot=mmap.PROT_READ, access=mmap.ACCESS_WRITE) 244 prot = mmap.PROT_READ | getattr(mmap, 'PROT_EXEC', 0) 246 m = mmap.mmap(f.fileno(), mapsize, prot=prot) 543 m = mmap.mmap(f.fileno(), mapsize, prot=mmap.PROT_READ)
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_common.cc | 278 uptr begin, end, prot; local 281 /*filename_size*/ 0, &prot)) { 285 bool is_readable = prot & MemoryMappingLayout::kProtectionRead;
|
/external/ppp/pppd/ |
H A D | lcp.c | 561 u_short prot; local 569 GETSHORT(prot, inp); 580 pname = protocol_name(prot); 586 if (protp->protocol == prot && protp->enabled_flag) { 588 dbglog("Protocol-Reject for 0x%x received", prot); 591 prot); 597 warn("Protocol-Reject for unsupported protocol 0x%x", prot); 600 prot);
|
H A D | auth.c | 1014 const char *prot = ""; local 1019 prot = "CHAP"; 1038 prot = "PAP"; 1042 prot = "EAP"; 1049 notice("%s authentication succeeded", prot);
|
/external/v4l2_codec2/vda/ |
H A D | v4l2_device.cc | 176 int prot, 180 return mmap(addr, len, prot, flags, device_fd_.get(), offset); 174 Mmap(void* addr, unsigned int len, int prot, int flags, unsigned int offset) argument
|
/external/valgrind/coregrind/m_syswrap/ |
H A D | priv_syswrap-generic.h | 84 ML_(notify_core_and_tool_of_mmap) ( Addr a, SizeT len, UInt prot, 89 ML_(notify_core_and_tool_of_mprotect) ( Addr a, SizeT len, Int prot );
|
H A D | syswrap-solaris.c | 1935 UInt prot = (seg->hasR ? VKI_PROT_READ : 0) local 1949 SysRes sres = VG_(am_mmap_anon_fixed_client)(anon_start, anon_size, prot); 2184 UInt prot = (seg->hasR ? VKI_PROT_READ : 0) local 2189 sres = VG_(am_mmap_anon_fixed_client)(anon_start, anon_size, prot); 5734 /* void *mmap(void *addr, size_t len, int prot, int flags, 5746 int, prot, int, flags, int, fd, vki_off_t, offset); 5820 "prot=%#lx memsz=%#lx filesz=%#lx file " 5979 UInt prot = 0; local 5981 prot |= VKI_PROT_READ; 5983 prot | 6657 UInt prot; local 9551 UInt prot, flags; local 9649 UInt prot = VKI_PROT_READ | VKI_PROT_WRITE; local [all...] |
H A D | syswrap-ppc32-linux.c | 254 unsigned long, prot, unsigned long, flags, 273 unsigned long, prot, unsigned long, flags,
|
/external/curl/packages/vms/ |
H A D | compare_curl_source.com | 139 $ create/dir/prot=o:rwed src_root1:[curl] 155 $ create/dir/prot=o:rwed vms_root1:[curl]
|
/external/iproute2/misc/ |
H A D | ss.c | 727 uint16_t prot; member in struct:sockstat 2906 s->local.data[0] = s->prot; 2913 if (s->prot == 3) 2916 addr = ll_proto_n2a(htons(s->prot), ll_name, sizeof(ll_name)); 2976 stat.prot = r->pdiag_num; 3096 int type, prot, iface, state, rq, uid, ino; local 3100 &type, &prot, &iface, &state, 3109 stat.prot = prot; 3146 int prot, in 3145 netlink_show_one(struct filter *f, int prot, int pid, unsigned groups, int state, int dst_pid, unsigned dst_group, int rq, int wq, unsigned long long sk, unsigned long long cb) argument 3297 int prot, pid; local [all...] |
/external/llvm/tools/llvm-readobj/ |
H A D | MachODumper.cpp | 292 static std::string getMask(uint32_t prot) argument 294 // TODO (davide): This always assumes prot is valid. 298 Prot += (prot & MachO::VM_PROT_READ) ? "r" : "-"; 299 Prot += (prot & MachO::VM_PROT_WRITE) ? "w" : "-"; 300 Prot += (prot & MachO::VM_PROT_EXECUTE) ? "x" : "-";
|
/external/selinux/python/sepolicy/sepolicy/ |
H A D | manpage.py | 725 for prot in ("tcp", "udp"): 726 if (p, prot) in self.portrecs: 734 .EE""" % (prot, ",".join(self.portrecs[(p, prot)])))
|
/external/v8/src/base/platform/ |
H A D | platform-win32.cc | 786 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local 790 prot); 1287 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; local 1288 if (NULL == VirtualAlloc(base, size, MEM_COMMIT, prot)) {
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_linux.cc | 120 uptr internal_mmap(void *addr, uptr length, int prot, int flags, int fd, argument 123 return internal_syscall(SYSCALL(mmap), (uptr)addr, length, prot, flags, fd, 128 return internal_syscall(SYSCALL(mmap2), addr, length, prot, flags, fd, 138 int internal_mprotect(void *addr, uptr length, int prot) { argument 139 return internal_syscall(SYSCALL(mprotect), (uptr)addr, length, prot);
|
/external/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 610 #define __sanitizer_syscall_pre_mprotect(start, len, prot) \ 612 (long)(prot)) 613 #define __sanitizer_syscall_post_mprotect(res, start, len, prot) \ 615 (long)(prot)) 626 #define __sanitizer_syscall_pre_remap_file_pages(start, size, prot, pgoff, \ 629 (long)(start), (long)(size), (long)(prot), (long)(pgoff), (long)(flags)) 630 #define __sanitizer_syscall_post_remap_file_pages(res, start, size, prot, \ 633 (long)(size), (long)(prot), \ 1777 #define __sanitizer_syscall_pre_mmap_pgoff(addr, len, prot, flags, fd, pgoff) \ 1779 (long)(prot), (lon [all...] |
/external/tcpdump/ |
H A D | print-icmp6.c | 879 u_int prot; local 933 if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot)) 938 switch (prot) { 1163 get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot) argument 1191 *prot = nh; 1228 *prot = nh; /* meaningless, but set here anyway */
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_capa.c | 86 unsigned int prot = 0; local 89 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 91 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 97 return prot;
|
/external/toybox/lib/ |
H A D | xwrap.c | 61 void *xmmap(void *addr, size_t length, int prot, int flags, int fd, off_t off) argument 63 void *ret = mmap(addr, length, prot, flags, fd, off);
|
/external/mdnsresponder/mDNSWindows/DLLX/ |
H A D | DNSSD.cpp | 397 DNSServiceProtocol prot = 0;
local 418 prot = ( addressFamily | protocol );
420 err = DNSServiceNATPortMappingCreate( &sref, flags, ifIndex, prot, internalPort, externalPort, ttl, ( DNSServiceNATPortMappingReply ) &NATPortMappingReply, object );
|
H A D | DNSSDService.cpp | 1192 DNSServiceProtocol prot = 0; local 1234 prot = ( addressFamily | protocol ); 1240 err = DNSServiceNATPortMappingCreate( &subord, flags | kDNSServiceFlagsShareConnection, ifIndex, prot, htons( internalPort ), htons( externalPort ), ttl, ( DNSServiceNATPortMappingReply ) &NATPortMappingReply, object );
|
/external/compiler-rt/lib/msan/ |
H A D | msan_interceptors.cc | 955 INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags, argument 958 return REAL(mmap)(addr, length, prot, flags, fd, offset); 968 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset); 975 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, argument 986 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
|
/external/syslinux/core/lwip/src/netif/ppp/ |
H A D | lcp.c | 450 u_short prot; local 457 GETSHORT(prot, inp); 459 LCPDEBUG(LOG_INFO, ("lcp_rprotrej: Rcvd Protocol-Reject packet for %x!\n", prot)); 474 if (protp->protocol == prot && protp->enabled_flag) { 480 LCPDEBUG(LOG_WARNING, ("Protocol-Reject for unsupported protocol 0x%x\n", prot));
|