HomeSort by relevance Sort by last modified time
    Searched refs:mmap64 (Results 1 - 16 of 16) sorted by null

  /bionic/libc/arch-arm64/syscalls/
mmap.S 16 .globl mmap64
17 .equ mmap64, mmap
  /bionic/libc/arch-x86_64/syscalls/
mmap.S 18 .globl mmap64
19 .equ mmap64, mmap
  /external/compiler-rt/lib/dfsan/
dfsan_interceptors.cc 27 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags,
29 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
41 INTERCEPT_FUNCTION(mmap64);
  /bionic/libc/arch-mips64/syscalls/
mmap.S 27 .globl mmap64
28 .equ mmap64, mmap
  /bionic/libc/bionic/
mmap.cpp 42 void* mmap64(void* addr, size_t size, int prot, int flags, int fd, off64_t offset) { function
63 return mmap64(addr, size, prot, flags, fd, static_cast<off64_t>(offset));
  /bionic/libc/include/sys/
mman.h 47 extern void* mmap64(void*, size_t, int, int, int, off64_t);
  /development/ndk/platforms/android-L/include/sys/
mman.h 47 extern void* mmap64(void*, size_t, int, int, int, off64_t);
  /bionic/tests/
sys_mman_test.cpp 32 void* map = mmap64(NULL, 4096, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0);
47 void* map = mmap64(NULL, 100, PROT_READ, MAP_SHARED, tf.fd, 1);
  /bootable/recovery/minzip/
SysUtil.c 119 reserve = mmap64(NULL, blocks * blksize, PROT_NONE, MAP_PRIVATE | MAP_ANON, -1, 0);
142 void* addr = mmap64(next, (end-start)*blksize, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, ((off64_t)start)*blksize);
  /external/chromium_org/third_party/tcmalloc/chromium/src/
malloc_hook_mmap_linux.h 33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap
35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't
151 // calls right into mmap and mmap64, so that the stack frames in the caller's
163 void* mmap64(void *start, size_t length, int prot, int flags,
180 extern "C" void* mmap64(void *start, size_t length, int prot, int flags,
  /external/chromium_org/third_party/tcmalloc/vendor/src/
malloc_hook_mmap_linux.h 33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap
35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't
127 // calls right into mmap and mmap64, so that the stack frames in the caller's
139 void* mmap64(void *start, size_t length, int prot, int flags,
154 extern "C" void* mmap64(void *start, size_t length, int prot, int flags,
  /external/elfutils/0.153/src/
strings.c 490 mem = mmap64 (NULL, map_size, PROT_READ, MAP_PRIVATE | MAP_POPULATE,
613 if (mmap64 (elfmap, elfmap_size, PROT_READ,
677 if (mmap64 (remap_base, read_now, PROT_READ,
  /external/chromium_org/tools/android/heap_profiler/
heap_profiler_hooks_android.c 55 real_mmap64 = (mmap64_t) dlsym(RTLD_NEXT, "mmap64");
125 HEAP_PROFILER_EXPORT void* mmap64( function
  /bionic/linker/
linker_phdr.cpp 229 void* mmap_result = mmap64(nullptr, phdr_size_, PROT_READ, MAP_PRIVATE, fd_, file_offset_ + page_min);
360 void* seg_addr = mmap64(reinterpret_cast<void*>(seg_page_start),
  /external/compiler-rt/lib/msan/
msan_interceptors.cc 870 INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags,
881 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_interceptors.cc 715 TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot,
717 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off);
720 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off);
    [all...]

Completed in 649 milliseconds