search for: sys_mmap

Displaying 4 results from an estimated 4 matches for "sys_mmap".

Did you mean: sys_map
2010 Nov 16
7
[Bug 31644] New: Nouveau driver with "Gigabyte nVidia 9600GT" - black screen
https://bugs.freedesktop.org/show_bug.cgi?id=31644 Summary: Nouveau driver with "Gigabyte nVidia 9600GT" - black screen Product: xorg Version: unspecified Platform: x86-64 (AMD64) OS/Version: Linux (All) Status: NEW Severity: normal Priority: medium Component: Driver/nouveau
2017 Apr 28
0
Wine release 2.7
...2: Remove ARB_texture_cube_map extension ifdef since it's not defined in wgl.h. ntdll: Also store dynamic loader information in the PEB on Linux. dbghelp: Use the main module load address from the PEB. preloader: Add a debug option to dump memory maps. preloader: Use the SYS_mmap2 system call instead of the old SYS_mmap one. preloader: Fix symbol lookup for dynamic libraries. configure: Re-enable the preloader on Android. configure: Add a separate variable for wineloader-specific flags. Alistair Leslie-Hughes (4): oleaut32: Remove redundant call to...
2011 Jun 22
3
sandbox pre-auth privsep child
...string.h> +#include <unistd.h> + +#include "atomicio.h" +#include "log.h" +#include "sandbox.h" +#include "xmalloc.h" + +static const int preauth_policy[] = { + SYS___sysctl, + SYS_close, + SYS_exit, + SYS_getpid, + SYS_gettimeofday, + SYS_madvise, + SYS_mmap, + SYS_mprotect, + SYS_poll, + SYS_munmap, + SYS_read, + SYS_select, + SYS_sigprocmask, + SYS_write, + -1 +}; + +struct ssh_sandbox { + int child_sock; + int parent_sock; + int systrace_fd; + pid_t child_pid; + struct systrace_policy policy; +}; + +struct ssh_sandbox * +ssh_sandbox_init(void) +{ +...
2014 Nov 03
8
[LLVMdev] [PATCH] Protection against stack-based memory corruption errors using SafeStack
..._stack_size = (value) + +# define __GET_UNSAFE_STACK_GUARD() unsafe_stack_guard +# define __SET_UNSAFE_STACK_GUARD(value) unsafe_stack_guard = (value) + +#endif + +static inline void *unsafe_stack_alloc(size_t size, size_t guard) { + void *addr = +#if defined(__linux__) + (void*) syscall(SYS_mmap, +#else + mmap( +#endif + NULL, size + guard, PROT_WRITE | PROT_READ, + MAP_PRIVATE | MAP_ANON +#if defined(__linux__) + | MAP_STACK | MAP_GROWSDOWN +#endif + , -1, 0); + mprotect(addr, guard, PROT_NONE); + return (char*) addr + guard; +} +...