/bionic/libc/arch-arm64/syscalls/ |
mmap.S | 16 .globl mmap64 17 .equ mmap64, mmap
|
/bionic/libc/arch-x86_64/syscalls/ |
mmap.S | 18 .globl mmap64 19 .equ mmap64, mmap
|
/external/compiler-rt/lib/dfsan/ |
dfsan_interceptors.cc | 27 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, 29 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset); 41 INTERCEPT_FUNCTION(mmap64);
|
/bionic/libc/arch-mips64/syscalls/ |
mmap.S | 27 .globl mmap64 28 .equ mmap64, mmap
|
/bionic/libc/bionic/ |
mmap.cpp | 42 void* mmap64(void* addr, size_t size, int prot, int flags, int fd, off64_t offset) { function 63 return mmap64(addr, size, prot, flags, fd, static_cast<off64_t>(offset));
|
/bionic/libc/include/sys/ |
mman.h | 47 extern void* mmap64(void*, size_t, int, int, int, off64_t);
|
/development/ndk/platforms/android-L/include/sys/ |
mman.h | 47 extern void* mmap64(void*, size_t, int, int, int, off64_t);
|
/bionic/tests/ |
sys_mman_test.cpp | 32 void* map = mmap64(NULL, 4096, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0); 47 void* map = mmap64(NULL, 100, PROT_READ, MAP_SHARED, tf.fd, 1);
|
/bootable/recovery/minzip/ |
SysUtil.c | 119 reserve = mmap64(NULL, blocks * blksize, PROT_NONE, MAP_PRIVATE | MAP_ANON, -1, 0); 142 void* addr = mmap64(next, (end-start)*blksize, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, ((off64_t)start)*blksize);
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
malloc_hook_mmap_linux.h | 33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap 35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't 151 // calls right into mmap and mmap64, so that the stack frames in the caller's 163 void* mmap64(void *start, size_t length, int prot, int flags, 180 extern "C" void* mmap64(void *start, size_t length, int prot, int flags,
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
malloc_hook_mmap_linux.h | 33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap 35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't 127 // calls right into mmap and mmap64, so that the stack frames in the caller's 139 void* mmap64(void *start, size_t length, int prot, int flags, 154 extern "C" void* mmap64(void *start, size_t length, int prot, int flags,
|
/external/elfutils/0.153/src/ |
strings.c | 490 mem = mmap64 (NULL, map_size, PROT_READ, MAP_PRIVATE | MAP_POPULATE, 613 if (mmap64 (elfmap, elfmap_size, PROT_READ, 677 if (mmap64 (remap_base, read_now, PROT_READ,
|
/external/chromium_org/tools/android/heap_profiler/ |
heap_profiler_hooks_android.c | 55 real_mmap64 = (mmap64_t) dlsym(RTLD_NEXT, "mmap64"); 125 HEAP_PROFILER_EXPORT void* mmap64( function
|
/bionic/linker/ |
linker_phdr.cpp | 229 void* mmap_result = mmap64(nullptr, phdr_size_, PROT_READ, MAP_PRIVATE, fd_, file_offset_ + page_min); 360 void* seg_addr = mmap64(reinterpret_cast<void*>(seg_page_start),
|
/external/compiler-rt/lib/msan/ |
msan_interceptors.cc | 870 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags, 881 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset); [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_interceptors.cc | 715 TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 717 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 720 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); [all...] |