Displaying 4 results from an estimated 4 matches for "sys_mmap".
Did you mean:
sys_map
2010 Nov 16
7
[Bug 31644] New: Nouveau driver with "Gigabyte nVidia 9600GT" - black screen
https://bugs.freedesktop.org/show_bug.cgi?id=31644
Summary: Nouveau driver with "Gigabyte nVidia 9600GT" - black
screen
Product: xorg
Version: unspecified
Platform: x86-64 (AMD64)
OS/Version: Linux (All)
Status: NEW
Severity: normal
Priority: medium
Component: Driver/nouveau
2017 Apr 28
0
Wine release 2.7
...2: Remove ARB_texture_cube_map extension ifdef since it's not defined in wgl.h.
ntdll: Also store dynamic loader information in the PEB on Linux.
dbghelp: Use the main module load address from the PEB.
preloader: Add a debug option to dump memory maps.
preloader: Use the SYS_mmap2 system call instead of the old SYS_mmap one.
preloader: Fix symbol lookup for dynamic libraries.
configure: Re-enable the preloader on Android.
configure: Add a separate variable for wineloader-specific flags.
Alistair Leslie-Hughes (4):
oleaut32: Remove redundant call to...
2011 Jun 22
3
sandbox pre-auth privsep child
...string.h>
+#include <unistd.h>
+
+#include "atomicio.h"
+#include "log.h"
+#include "sandbox.h"
+#include "xmalloc.h"
+
+static const int preauth_policy[] = {
+ SYS___sysctl,
+ SYS_close,
+ SYS_exit,
+ SYS_getpid,
+ SYS_gettimeofday,
+ SYS_madvise,
+ SYS_mmap,
+ SYS_mprotect,
+ SYS_poll,
+ SYS_munmap,
+ SYS_read,
+ SYS_select,
+ SYS_sigprocmask,
+ SYS_write,
+ -1
+};
+
+struct ssh_sandbox {
+ int child_sock;
+ int parent_sock;
+ int systrace_fd;
+ pid_t child_pid;
+ struct systrace_policy policy;
+};
+
+struct ssh_sandbox *
+ssh_sandbox_init(void)
+{
+...
2014 Nov 03
8
[LLVMdev] [PATCH] Protection against stack-based memory corruption errors using SafeStack
..._stack_size = (value)
+
+# define __GET_UNSAFE_STACK_GUARD() unsafe_stack_guard
+# define __SET_UNSAFE_STACK_GUARD(value) unsafe_stack_guard = (value)
+
+#endif
+
+static inline void *unsafe_stack_alloc(size_t size, size_t guard) {
+ void *addr =
+#if defined(__linux__)
+ (void*) syscall(SYS_mmap,
+#else
+ mmap(
+#endif
+ NULL, size + guard, PROT_WRITE | PROT_READ,
+ MAP_PRIVATE | MAP_ANON
+#if defined(__linux__)
+ | MAP_STACK | MAP_GROWSDOWN
+#endif
+ , -1, 0);
+ mprotect(addr, guard, PROT_NONE);
+ return (char*) addr + guard;
+}
+...