Searched refs:Protect (Results 1 – 25 of 36) sorted by relevance
12
101 DWORD Protect = getWindowsProtectionFlags(Flags);105 MEM_RESERVE | MEM_COMMIT, Protect);143 DWORD Protect = getWindowsProtectionFlags(Flags);146 if (!VirtualProtect(M.Address, M.Size, Protect, &OldFlags))188 return info.Protect;
73 kern_return_t Protect();
73 kern_return_t ProtectedMemoryAllocator::Protect() { in Protect() function in ProtectedMemoryAllocator
544 gBreakpadAllocator->Protect(); in WaitForMessage()589 gBreakpadAllocator->Protect(); in WaitForMessage()626 gBreakpadAllocator->Protect(); in SignalHandler()
54 VirtualProtect (mbi.BaseAddress, mbi.RegionSize, PAGE_EXECUTE_READWRITE, &mbi.Protect); in __enable_execute_stack()
111 int Protect = getPosixProtectionFlags(PFlags);120 Protect, MMFlags, fd, 0);162 int Protect = getPosixProtectionFlags(Flags);164 …t((void*)((uintptr_t)M.Address & ~(PageSize-1)), PageSize*((M.Size+PageSize-1)/PageSize), Protect);
162 return mbi.Protect == PAGE_NOACCESS && in MemoryRangeIsAvailable()720 if (info.Protect == 0 || info.Protect == PAGE_NOACCESS || in IsAccessibleMemoryRange()721 info.Protect == PAGE_EXECUTE) in IsAccessibleMemoryRange()
27 if (!VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect)) in __enable_execute_stack()
66 if (!VirtualProtect(b.BaseAddress, b.RegionSize, PAGE_EXECUTE_READWRITE, &b.Protect)) in main()
11 PURPOSE = "Protect the security boundary enforced by filesystem permissions"
156 void MemoryAllocator::Protect(Address start, size_t size) { in Protect() function157 base::OS::Protect(start, size); in Protect()169 base::OS::Protect(chunks_[id].address(), chunks_[id].size()); in ProtectChunkFromPage()
115 allocator_->Protect();699 gBreakpadAllocator->Protect();823 gMasterAllocator->Protect();824 gKeyValueAllocator->Protect();825 gBreakpadAllocator->Protect();994 gBreakpadAllocator->Protect();
105 # Protect Windows?
105 # Help Protect (skip)
110 allocator_->Protect();642 gMasterAllocator->Protect();643 gKeyValueAllocator->Protect();644 gBreakpadAllocator->Protect();
343 template< typename Protect, typename Second >
443 IN ULONG Protect);
325 * i386_disasm.c: Protect ADD_CHAR and ADD_STRING macros. Adjust uses.
655 + 368114 Protect against non-Strings in System properties for Log732 + 368114 Protect against non-Strings in System properties for Log1209 + 341850 Protect QTP dump from bad stacks1588 + 312526 Protect shutdown thread initialization during shutdown1593 + 311554 Protect shutdown thread from Server#doStop1632 + 308925 Protect the test webapp from remote access1670 + 308925 Protect the test webapp from remote access2938 + Protect SslSelectChannelConnector from exceptions during close3198 + Protect context deployer from Errors4141 + Protect ThreadPool.run() from interrupted exceptions[all …]
616 - Protect against out-of-range lookup indices.
177 Protect against including AIX 5.x's <net/bpf.h> having been included.
144 - Protect for long name and extra fields in contrib/minizip [Vollant]496 - Protect against _FILE_OFFSET_BITS being defined when compiling zlib
431 a name verify the file by invalid_elf. Protect elf and fd against
2437 * desc.c: Protect #include <sys/epoll.h> with [HAVE_SYS_EPOLL_H].2438 (epollctls, epollevents): Protect each entry with #ifdef on its macro.