/external/skia/third_party/lua/src/ |
D | lvm.c | 511 #define Protect(x) { {x;}; base = ci->u.l.base; } macro 514 Protect( luaC_condGC(L,{L->top = (c); /* limit of live values */ \ 527 else { Protect(luaV_arith(L, ra, rb, rc, tm)); } } 550 Protect(traceexec(L)); in luaV_execute() 586 Protect(luaV_gettable(L, cl->upvals[b]->v, RKC(i), ra)); in luaV_execute() 589 Protect(luaV_gettable(L, RB(i), RKC(i), ra)); in luaV_execute() 593 Protect(luaV_settable(L, cl->upvals[a]->v, RKB(i), RKC(i))); in luaV_execute() 601 Protect(luaV_settable(L, ra, RKB(i), RKC(i))); in luaV_execute() 615 Protect(luaV_gettable(L, rb, RKC(i), ra)); in luaV_execute() 642 Protect(luaV_arith(L, ra, rb, rb, TM_UNM)); in luaV_execute() [all …]
|
/external/syslinux/com32/lua/src/ |
D | lvm.c | 534 #define Protect(x) { {x;}; base = ci->u.l.base; } macro 537 Protect( luaC_condGC(L,{L->top = (c); /* limit of live values */ \ 550 else { Protect(luaV_arith(L, ra, rb, rc, tm)); } } 573 Protect(traceexec(L)); in luaV_execute() 609 Protect(luaV_gettable(L, cl->upvals[b]->v, RKC(i), ra)); in luaV_execute() 612 Protect(luaV_gettable(L, RB(i), RKC(i), ra)); in luaV_execute() 616 Protect(luaV_settable(L, cl->upvals[a]->v, RKB(i), RKC(i))); in luaV_execute() 624 Protect(luaV_settable(L, ra, RKB(i), RKC(i))); in luaV_execute() 638 Protect(luaV_gettable(L, rb, RKC(i), ra)); in luaV_execute() 665 Protect(luaV_arith(L, ra, rb, rb, TM_UNM)); in luaV_execute() [all …]
|
/external/llvm/lib/Support/Windows/ |
D | Memory.inc | 101 DWORD Protect = getWindowsProtectionFlags(Flags); 105 MEM_RESERVE | MEM_COMMIT, Protect); 143 DWORD Protect = getWindowsProtectionFlags(Flags); 146 if (!VirtualProtect(M.Address, M.Size, Protect, &OldFlags)) 188 return info.Protect;
|
/external/google-breakpad/src/client/mac/handler/ |
D | protected_memory_allocator.h | 73 kern_return_t Protect();
|
D | protected_memory_allocator.cc | 73 kern_return_t ProtectedMemoryAllocator::Protect() { in Protect() function in ProtectedMemoryAllocator
|
D | exception_handler.cc | 544 gBreakpadAllocator->Protect(); in WaitForMessage() 589 gBreakpadAllocator->Protect(); in WaitForMessage() 626 gBreakpadAllocator->Protect(); in SignalHandler()
|
/external/compiler-rt/lib/builtins/ |
D | enable_execute_stack.c | 54 VirtualProtect (mbi.BaseAddress, mbi.RegionSize, PAGE_EXECUTE_READWRITE, &mbi.Protect); in __enable_execute_stack()
|
/external/compiler-rt/test/builtins/Unit/ |
D | enable_execute_stack_test.c | 27 if (!VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect)) in __enable_execute_stack()
|
D | clear_cache_test.c | 66 if (!VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect)) in main()
|
/external/swiftshader/third_party/llvm-subzero/lib/Support/Unix/ |
D | Memory.inc | 103 int Protect = getPosixProtectionFlags(PFlags); 112 Protect, MMFlags, fd, 0); 154 int Protect = getPosixProtectionFlags(Flags); 158 int Result = ::mprotect((void *)Start, End - Start, Protect);
|
/external/llvm/lib/Support/Unix/ |
D | Memory.inc | 111 int Protect = getPosixProtectionFlags(PFlags); 120 Protect, MMFlags, fd, 0); 162 int Protect = getPosixProtectionFlags(Flags); 164 …t((void*)((uintptr_t)M.Address & ~(PageSize-1)), PageSize*((M.Size+PageSize-1)/PageSize), Protect);
|
/external/autotest/client/site_tests/security_ProfilePermissions/ |
D | control | 11 PURPOSE = "Protect the security boundary enforced by filesystem permissions"
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_win.cc | 249 return mbi.Protect == PAGE_NOACCESS && in MemoryRangeIsAvailable() 801 if (info.Protect == 0 || info.Protect == PAGE_NOACCESS || in IsAccessibleMemoryRange() 802 info.Protect == PAGE_EXECUTE) in IsAccessibleMemoryRange()
|
/external/v8/src/heap/ |
D | spaces-inl.h | 101 void MemoryAllocator::Protect(Address start, size_t size) { in Protect() function 102 base::OS::Protect(start, size); in Protect() 114 base::OS::Protect(chunks_[id].address(), chunks_[id].size()); in ProtectChunkFromPage()
|
/external/kmod/ |
D | TODO | 10 * Protect index against OOM
|
D | NEWS | 243 - Protect against NULL being passed around to index
|
/external/google-breakpad/src/client/mac/Framework/ |
D | Breakpad.mm | 115 allocator_->Protect(); 699 gBreakpadAllocator->Protect(); 823 gMasterAllocator->Protect(); 824 gKeyValueAllocator->Protect(); 825 gBreakpadAllocator->Protect(); 994 gBreakpadAllocator->Protect();
|
/external/swiftshader/third_party/LLVM/lib/Support/Windows/ |
D | Memory.inc | 65 return info.Protect;
|
/external/python/cpython2/Doc/library/ |
D | bastion.rst | 39 Protect the object *object*, returning a bastion for the object. Any attempt to
|
/external/google-breakpad/src/client/ios/ |
D | Breakpad.mm | 110 allocator_->Protect(); 642 gMasterAllocator->Protect(); 643 gKeyValueAllocator->Protect(); 644 gBreakpadAllocator->Protect();
|
/external/clang/test/SemaTemplate/ |
D | temp_class_spec.cpp | 343 template< typename Protect, typename Second >
|
/external/libchrome/sandbox/win/src/ |
D | nt_internals.h | 491 IN ULONG Protect);
|
/external/elfutils/libcpu/ |
D | ChangeLog | 325 * i386_disasm.c: Protect ADD_CHAR and ADD_STRING macros. Adjust uses.
|
/external/harfbuzz_ng/ |
D | NEWS | 766 - Protect against out-of-range lookup indices.
|
/external/libpcap/ |
D | CHANGES | 223 Protect against including AIX 5.x's <net/bpf.h> having been included.
|