/external/ltp/testcases/open_posix_testsuite/conformance/definitions/sys/mman_h/ |
2-4-buildonly.c | 10 * Test that the header defines the PROT_NONE protection option. 19 #ifndef PROT_NONE 20 #error PROT_NONE not defined
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
leak_check_segv.cc | 14 mprotect((void*)(((unsigned long)p + 4095) & ~4095), 16 * 1024, PROT_NONE); 15 mprotect((void*)(((unsigned long)data + 4095) & ~4095), 16 * 1024, PROT_NONE);
|
/external/strace/xlat/ |
mmap_prot.h | 11 #if defined(PROT_NONE) || (defined(HAVE_DECL_PROT_NONE) && HAVE_DECL_PROT_NONE) 12 XLAT(PROT_NONE),
|
/external/compiler-rt/test/tsan/ |
large_malloc_meta.cc | 21 mmap(0, kSize * sizeof(*p) + kPageSize, PROT_NONE, MAP_PRIVATE | MAP_ANON,
|
signal_longjmp.cc | 62 void *mem = mmap(0, 4096, PROT_NONE, MAP_PRIVATE | MAP_ANON,
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
signal_segv_handler.cc | 38 guard = mmap(0, 3 * page_size, PROT_NONE, MAP_ANON | MAP_PRIVATE, -1, 0); 41 mprotect(guard, page_size, PROT_NONE);
|
/external/compiler-rt/test/lsan/TestCases/ |
register_root_region.cc | 22 assert(0 == mprotect((char *)p + size / 2, size / 2, PROT_NONE));
|
/external/ltp/testcases/kernel/syscalls/madvise/ |
madvise05.c | 40 TEST(mprotect(p, ALLOC_SIZE, PROT_NONE));
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/ |
mman-common.h | 13 #define PROT_NONE 0x0 /* page can not be accessed */
|
/external/perfetto/src/base/ |
page_allocator.cc | 41 int res = mprotect(ptr, kGuardSize, PROT_NONE); 42 res |= mprotect(usable_region + size, kGuardSize, PROT_NONE);
|
/external/strace/tests/ |
remap_file_pages.c | 79 prot = (kernel_ulong_t) 0xdefaced00000000ULL | PROT_NONE; 88 prot == PROT_NONE ? "PROT_NONE" :
|
/external/strace/tests-m32/ |
remap_file_pages.c | 79 prot = (kernel_ulong_t) 0xdefaced00000000ULL | PROT_NONE; 88 prot == PROT_NONE ? "PROT_NONE" :
|
/external/strace/tests-mx32/ |
remap_file_pages.c | 79 prot = (kernel_ulong_t) 0xdefaced00000000ULL | PROT_NONE; 88 prot == PROT_NONE ? "PROT_NONE" :
|
/external/valgrind/memcheck/tests/ |
pointer-trace.c | 54 map = mmap(0, stepsize * 2, PROT_NONE, MAP_PRIVATE|MAP_NORESERVE|MAP_ANONYMOUS, -1, 0); 72 map = mmap(0, 256*1024, PROT_NONE, MAP_PRIVATE|MAP_NORESERVE|MAP_ANONYMOUS, -1, 0);
|
/external/valgrind/none/tests/linux/ |
clonev.c | 36 if (-1 == mprotect((char *)child_stack, page_size, PROT_NONE)) { 42 page_size, PROT_NONE)) {
|
mremap2.c | 23 void* r = mmap(start, length, PROT_NONE, 48 workingarea = mmap(0, 200*PAGE, PROT_NONE, 79 r = mprotect( workingarea + i * PAGE, PAGE, PROT_NONE );
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/ |
5-1.c | 9 * The prot shall be either PROT_NONE or the bitwise-inclusive OR of 15 * PROT_NONE Data cannot be accessed. 42 {.flags = MAP_SHARED,.prot = PROT_NONE}, 51 {.flags = MAP_PRIVATE,.prot = PROT_NONE}, 65 if (t->prot == PROT_NONE) 66 printf("PROT_NONE ");
|
/bionic/libc/kernel/uapi/asm-generic/ |
mman-common.h | 25 #define PROT_NONE 0x0
|
/cts/tests/tests/jni/libjnitest/ |
android_jni_cts_BasicLoaderTest.cpp | 54 if (mprotect(reinterpret_cast<void*>(page_start), PAGE_SIZE, PROT_NONE) == 0) {
|
/external/compiler-rt/test/cfi/cross-dso/ |
target_out_of_bounds.cpp | 28 void *vtable = mmap(nullptr, 4096, PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
|
/external/fio/os/windows/posix/include/sys/ |
mman.h | 6 #define PROT_NONE 0x1
|
/external/kernel-headers/original/uapi/asm-generic/ |
mman-common.h | 14 #define PROT_NONE 0x0 /* page can not be accessed */
|
/external/libchrome/base/trace_event/ |
heap_profiler_allocation_register_posix.cc | 41 // (PROT_NONE). The read/write accessible space is still at least |min_size| 45 int result = mprotect(guard_addr, GetGuardSize(), PROT_NONE);
|
/external/ltp/testcases/kernel/syscalls/write/ |
write03.c | 71 bad_addr = SAFE_MMAP(0, 1, PROT_NONE,
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/ |
20-3.c | 57 ptr = mmap(NULL, BUF_SIZE, PROT_NONE, MAP_SHARED, fd, 0);
|