/prebuilts/go/darwin-x86/src/runtime/testdata/testprogcgo/ |
sigstack.go | 51 mprotect(base, SIGSTKSZ, PROT_NONE);
|
/prebuilts/go/linux-x86/src/runtime/testdata/testprogcgo/ |
sigstack.go | 51 mprotect(base, SIGSTKSZ, PROT_NONE);
|
/toolchain/binutils/binutils-2.27/bfd/ |
bfdwin.c | 94 mprotect (i->data, i->size, PROT_READ | PROT_WRITE); 250 mprotect (i->data, i->size, PROT_READ);
|
configure.com | 289 /* Define if you have the mprotect function. */
|
/system/core/libunwindstack/tests/ |
MemoryRemoteTest.cpp | 116 ASSERT_EQ(0, mprotect(mapping + getpagesize(), getpagesize(), PROT_NONE)); 241 ASSERT_EQ(0, mprotect(static_cast<char*>(mapping) + page_size, page_size, PROT_NONE)); 310 ASSERT_EQ(0, mprotect(static_cast<char*>(mapping), page_size, PROT_NONE)); 325 // We know that process_vm_readv of a mprotect'd PROT_NONE region will fail.
|
/build/kati/ |
strutil_test.cc | 174 if (mprotect(buffer_str, pagesize, PROT_NONE) != 0) { 175 perror("mprotect failed");
|
/cts/hostsidetests/security/securityPatch/CVE-2016-8429/ |
poc.c | 142 mprotect(data, 0x1000, PROT_READ); 143 printf("[*] mprotect, error = %d\n", errno);
|
/device/google/cuttlefish_common/guest/hals/gralloc/legacy/ |
region_registry.cpp | 132 if (mprotect((void*)addr, PAGE_SIZE, PROT_NONE) == -1) { 133 ALOGE("mprotect base=%p, pg=%p failed (%s)", (void*)base, (void*)addr,
|
/external/libunwind/tests/ |
Gtest-dyn1.c | 187 mprotect ((void *) ((long) mem & ~(getpagesize () - 1)),
|
ia64-test-dyn1.c | 28 if (mprotect ((void *) (((long) addr) & -getpagesize ()), len, 31 perror ("mprotect");
|
/external/mksh/src/ |
lalloc.c | 69 if (mprotect(((char *)lp) + 4096, 4096, PROT_NONE)) 70 err(1, "remalloc: mprotect");
|
/external/v8/src/base/platform/ |
platform-posix.cc | 131 mprotect(address, size, PROT_READ | PROT_EXEC); 142 mprotect(address, size, PROT_NONE); 152 mprotect(address, size, PROT_READ | PROT_WRITE);
|
/external/ltp/testcases/kernel/syscalls/memfd_create/ |
memfd_create_common.c | 236 if (mprotect(addr, length, prot) < 0) { 238 "mprotect(%p, %zu, %d) failed", addr, length, prot); 241 tst_res_(file, lineno, TPASS, "mprotect(%p, %zu, %d) succeeded", addr, 356 * mprotect(PROT_WRITE) allows writing 399 /* Verify PROT_READ with MAP_SHARED with a following mprotect is not 404 if (mprotect(p, MFD_DEF_SIZE, PROT_READ | PROT_WRITE) >= 0) { 406 "mmap()+mprotect() succeeded unexpectedly");
|
/art/runtime/ |
thread_pool.cc | 53 CheckedCall(mprotect, 54 "mprotect bottom page of thread pool worker stack",
|
/external/harfbuzz_ng/src/ |
hb-blob.cc | 412 "calling mprotect on [%p..%p] (%lu bytes)", 414 if (-1 == mprotect ((void *) addr, length, PROT_READ | PROT_WRITE)) { 415 DEBUG_MSG_FUNC (BLOB, blob, "mprotect failed: %s", strerror (errno));
|
/external/ltp/testcases/misc/crash/ |
crash01.c | 348 if (mprotect(((int)data / PAGSIZ) * PAGSIZ, (n / PAGSIZ + 1) * PAGSIZ, 350 perror("mprotect");
|
/external/strace/ |
mem.c | 205 SYS_FUNC(mprotect)
|
sys_func.h | 133 extern SYS_FUNC(mprotect);
|
/external/valgrind/memcheck/tests/ |
leak-segv-jmp.c | 256 mprotect_result = mprotect(addr, 292 // to mprotect the pages : as this syscall will not be seen 300 fprintf(stderr, "mprotect result %d\n", mprotect_result); 309 fprintf(stderr, "full mprotect result %d\n", mprotect_result); 311 fprintf(stderr, "expecting a leak again after full mprotect\n"); 331 fprintf(stderr, "mprotect result %d\n", mprotect_result); 333 fprintf(stderr, "expecting heuristic not to crash after full mprotect\n");
|
/art/runtime/gc/space/ |
region_space.cc | 262 CheckedCall(mprotect, __FUNCTION__, begin, end - begin, PROT_NONE); 633 CheckedCall(mprotect, __FUNCTION__, Begin(), kRegionSize, PROT_READ | PROT_WRITE);
|
/external/google-breakpad/src/client/mac/handler/ |
exception_handler.cc | 651 mprotect(gProtectedData.protected_buffer, PAGE_SIZE, PROT_READ); 695 mprotect(gProtectedData.protected_buffer, PAGE_SIZE,
|
/external/linux-kselftest/tools/testing/selftests/memfd/ |
memfd_test.c | 336 * mprotect(PROT_WRITE) allows writing */ 348 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); 350 printf("mprotect() failed: %m\n"); 405 /* Verify PROT_READ with MAP_SHARED with a following mprotect is not 414 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); 416 printf("mmap()+mprotect() didn't fail as expected\n");
|
/cts/tests/tests/security/jni/ |
android_security_cts_NativeCodeTest.cpp | 125 /* mprotect should return an error if not vulnerable */ 126 result = (mprotect(b, 0x1000, PROT_READ | PROT_WRITE) == -1);
|
/external/harfbuzz_ng/test/api/ |
test-blob.c | 180 mprotect ((char *) data, pagesize, PROT_READ);
|
/external/ltp/utils/benchmark/ebizzy-0.3/ |
ebizzy.c | 323 mprotect((void *)mem[i], chunk_size, PROT_READ);
|