Lines Matching refs:sbrk
21 * So the bug is in sbrk as well as the brk syscall. brk() should validate the
22 * address being passed and return an error. sbrk() should not result in a brk
49 tst_res(TINFO, "sbrk increm: %p", sbrk(0x10000000));
50 ret1 = sbrk(0);
52 /* sbrk() returns -1 on s390, but still does overflowed brk() */
53 tst_res(TINFO, "sbrk increm: %p", sbrk(0x70000000));
54 ret2 = sbrk(0);
57 tst_res(TFAIL, "Bug! sbrk: %p", ret2);
61 tst_res(TPASS, "sbrk verify: %p", ret2);