/external/valgrind/none/tests/linux/ |
brk-overflow1.stderr.exp | 2 brk segment overflow in thread #1: can't grow to 0x........
|
brk-overflow2.stderr.exp | 2 brk segment overflow in thread #1: can't grow to 0x........ 3 brk segment overflow in thread #1: can't grow to 0x........ 4 brk segment overflow in thread #1: can't grow to 0x........
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/arc/ |
brk.s | 0 # brk test 6 brk
|
brk.d | 10 4: 00 fe ff 1f 1ffffe00 brk
|
arc.exp | 25 run_dump_test brk
|
/external/valgrind/memcheck/tests/solaris/ |
brk.stderr.exp | 2 at 0x........: test_begin (brk.c:19) 3 by 0x........: main (brk.c:78) 4 Address 0x........ is 0 bytes after the brk data segment limit 0x........ 7 at 0x........: test_begin (brk.c:32) 8 by 0x........: main (brk.c:78) 9 Address 0x........ is 0 bytes after the brk data segment limit 0x........ 11 brk segment overflow in thread #1: can't grow to 0x........
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/rx/ |
brk.d | 9 0: 00 brk
|
/external/valgrind/memcheck/tests/linux/ |
brk.stderr.exp | 2 brk segment overflow in thread #1: can't grow to 0x........ 3 brk segment overflow in thread #1: can't grow to 0x........
|
brk.c | 7 // kernel brk() and libc brk() act quite differently... 33 assert( 0 == brk(orig_ds) ); // libc brk() 36 res = (void*)(long)brk(vals[i]);
|
/system/connectivity/shill/shims/ |
nfqueue-seccomp-amd64.policy | 29 brk: 1
|
nfqueue-seccomp-mips.policy | 26 brk: 1
|
nfqueue-seccomp-x86.policy | 27 brk: 1
|
nfqueue-seccomp-arm.policy | 32 brk: 1
|
/external/valgrind/massif/tests/ |
pages_as_heap.c | 16 if (0) printf("initial brk value for inc_dec %d delta %d: %p\n", 19 brk_stat = (intptr_t)brk(sbrk(0) + inc_dec * delta); 21 printf("brk value at failure: %p\n", sbrk(0)); 22 perror ("brk() failed!\n"); 26 if (0) printf("resulting brk value for inc_dec %d delta %d: %p\n",
|
/external/icu/icu4c/source/test/perf/strsrchperf/ |
strsrchperf.cpp | 28 UBreakIterator* brk = ubrk_open(UBRK_WORD, locale, src, srcLen, &status); 33 start = ubrk_preceding(brk, 1000); 34 end = ubrk_following(brk, start); 41 ubrk_close(brk);
|
/system/tpm/attestation/server/ |
attestationd-seccomp-amd64.policy | 71 brk: 1
|
/system/tpm/tpm_manager/server/ |
tpm_manager-seccomp-amd64.policy | 73 brk: 1
|
/system/tpm/trunks/ |
trunksd-seccomp-arm.policy | 57 brk: 1
|
trunksd-seccomp-arm64.policy | 57 brk: 1
|
trunksd-seccomp-x86.policy | 63 brk: 1
|
trunksd-seccomp-x86_64.policy | 62 brk: 1
|
/external/icu/icu4c/source/test/cintltst/ |
cbiapts.c | 376 UBreakIterator * brk; local 422 if (NULL == (brk = ubrk_safeClone(someIterators[i], buffer[i], NULL, &status)) || U_FAILURE(status)) 426 ubrk_close(brk); 442 if (NULL == (brk = ubrk_safeClone(someIterators[i], buffer[i], &bufferSize, &status)) || U_FAILURE(status)) 446 if (brk) 447 ubrk_close(brk); 452 if (NULL == (brk = ubrk_safeClone(someIterators[i], NULL, &bufferSize, &status)) || status != U_SAFECLONE_ALLOCATED_WARNING) 456 if (brk) 457 ubrk_close(brk); 462 if (NULL == (brk = ubrk_safeClone(someIterators[i], NULL, &bufferSize, &status)) || status != U_SAFECLONE_ALLOCATED (…) 903 int32_t brk; local [all...] |
/art/runtime/arch/arm64/ |
asm_support_arm64.S | 54 brk 0
|
/bionic/libc/bionic/ |
brk.cpp | 38 int brk(void* end_data) { function
|
/external/valgrind/memcheck/tests/ |
dw4.stderr.exp | 33 Address 0x........ is 0 bytes after the brk data segment limit 0x........ 38 Address 0x........ is in the brk data segment 0x........-0x........ 43 Address 0x........ is in the brk data segment 0x........-0x........ 48 Address 0x........ is 1024 bytes after the brk data segment limit 0x........
|