Home
last modified time | relevance | path

Searched refs:sbrk (Results 1 - 25 of 37) sorted by relevance

12

/third_party/ltp/testcases/kernel/mem/mmapstress/
H A Dmmapstress03.c75 if ((brk_start = sbrk(0)) == NEG1) { in main()
76 ERROR("initial sbrk failed"); in main()
80 if (sbrk(pagesize - ((u_long) brk_start % (u_long) pagesize)) in main()
88 if ((hole_addr = hole_start = sbrk(NUM_SEGS * 2 * pagesize)) == NEG1) { in main()
92 if ((brk_max_addr = sbrk(0)) == NEG1) { in main()
107 if (brk_max_addr != sbrk(0)) { in main()
114 if (sbrk(-NUM_SEGS * pagesize) == NEG1) { in main()
118 if ((brk_max_addr = sbrk(0)) == NEG1) { in main()
138 if (sbrk(pagesize) == NEG1 || sbrk( in main()
[all...]
H A Dmmapstress05.c121 if (sbrk(pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == (char *)-1) { in main()
125 if ((buf = sbrk(pagesize)) == (char *)-1) { in main()
129 if ((mmapaddr = (caddr_t) sbrk(0)) == (caddr_t) - 1) { in main()
H A Dmmapstress06.c79 if (sbrk(pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == (char *)-1) { in main()
83 if ((mmapaddr = sbrk(0)) == (char *)-1) { in main()
H A Dmmapstress08.c71 if (sbrk(pagesize - ((u_long) sbrk(0) % (u_long) pagesize)) == in main()
79 if ((munmap_begin = mmapaddr = (caddr_t) sbrk(0)) == (caddr_t) - 1) { in main()
H A Dmmapstress02.c111 if (sbrk(2 * pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == in main()
116 if ((mmapaddr = sbrk(0)) == (caddr_t) - 1) { in main()
/third_party/ltp/testcases/kernel/mem/shmt/
H A Dshmt09.c28 * sbrk(2) shmctl(2) shmget(2)
82 if ((unsigned long)sbrk(16384) >= (-4095UL)) { in main()
83 perror("sbrk"); in main()
84 tst_brkm(TFAIL, NULL, "Error: sbrk failed, errno = %d", in main()
88 if ((unsigned long)sbrk(-4097) >= (-4095UL)) { in main()
89 perror("sbrk"); in main()
90 tst_brkm(TFAIL, NULL, "Error: sbrk failed, errno = %d", in main()
112 tst_resm(TPASS, "sbrk, sbrk, shmget, shmat"); in main()
116 if ((unsigned long)sbrk(3 in main()
[all...]
/third_party/ltp/testcases/kernel/syscalls/sbrk/
H A Dsbrk03.c21 * So the bug is in sbrk as well as the brk syscall. brk() should validate the
22 * address being passed and return an error. sbrk() should not result in a brk
49 tst_res(TINFO, "sbrk increm: %p", sbrk(0x10000000)); in sbrk_test()
50 ret1 = sbrk(0); in sbrk_test()
52 /* sbrk() returns -1 on s390, but still does overflowed brk() */ in sbrk_test()
53 tst_res(TINFO, "sbrk increm: %p", sbrk(0x70000000)); in sbrk_test()
54 ret2 = sbrk(0); in sbrk_test()
57 tst_res(TFAIL, "Bug! sbrk in sbrk_test()
[all...]
H A Dsbrk02.c11 * Verify that sbrk() on failure sets errno to ENOMEM.
22 TESTPTR(sbrk(increment)); in run()
25 tst_res(TFAIL, "sbrk(%ld) unexpectedly passed and returned %p, " in run()
32 tst_res(TPASS | TTERRNO, "sbrk(%ld) failed as expected", increment); in run()
34 tst_res(TFAIL | TTERRNO, "sbrk(%ld) failed but unexpected errno, " in run()
44 ret = sbrk(increment); in setup()
H A Dsbrk01.c11 * Verify that sbrk() successfully increments or decrements the program's
29 TESTPTR(sbrk(tc->increment)); in run()
32 tst_res(TFAIL | TTERRNO, "sbrk(%ld) failed", tc->increment); in run()
34 tst_res(TPASS, "sbrk(%ld) returned %p", tc->increment, TST_RET_PTR); in run()
/third_party/musl/libc-test/src/functionalext/supplement/linux/
H A Dsbrk.c29 int *p = sbrk(0); in sbrk_0100()
31 t_error("%s sbrk failed\n", __func__); in sbrk_0100()
46 int *p = sbrk(1); in sbrk_0200()
48 t_error("%s sbrk failed\n", __func__); in sbrk_0200()
H A Dbrk.c22 return sbrk(0); in get_brk()
/third_party/ltp/testcases/kernel/syscalls/brk/
H A Dbrk01.c25 cur_brk = (void *)sbrk(0); in verify_brk()
28 tst_brk(TCONF, "sbrk() not implemented"); in verify_brk()
55 cur_brk = sbrk(0); in verify_brk()
H A Dbrk02.c28 brk_addr = (void *)sbrk(0); in brk_variants()
43 brk_addr = (void *)sbrk(0); in brk_down_vmas()
46 tst_brk(TCONF, "sbrk() not implemented"); in brk_down_vmas()
/third_party/ltp/testcases/kernel/mem/mtest05/
H A Dmmstress.c542 if (sbrk(BRKSZ) == (void *) - 1) { in test5()
543 perror("test5(): sbrk()"); in test5()
561 if (sbrk(-BRKSZ) == (void *) - 1) { in test5()
562 tst_resm(TINFO, "test5(): rollback sbrk failed"); in test5()
564 perror("test5(): sbrk()"); in test5()
593 if (sbrk(BRKSZ) == (void *) - 1) { in test6()
594 perror("test6(): sbrk()"); in test6()
621 if (sbrk(-BRKSZ) == (void *) - 1) { in test6()
622 tst_resm(TINFO, "test6(): rollback sbrk failed"); in test6()
624 perror("test6(): sbrk()"); in test6()
[all...]
/third_party/ltp/lib/
H A Dparse_opts.c77 static int STD_TP_sbrk = 0; /* do sbrk in TEST_PAUSE */
78 static int STD_LP_sbrk = 0; /* do sbrk in TEST_LOOPING */
79 static char *STD_start_break = 0; /* original sbrk size */
458 STD_start_break = sbrk(0); /* get original sbreak size */ in usc_global_setup_hook()
461 sbrk(STD_TP_sbrk); in usc_global_setup_hook()
463 printf("after sbrk(%d)\n", STD_TP_sbrk); in usc_global_setup_hook()
544 printf("about to do sbrk(%d)\n", STD_LP_sbrk); in usc_test_looping()
545 sbrk(STD_LP_sbrk); in usc_test_looping()
/third_party/musl/src/linux/
H A Dsbrk.c7 void *sbrk(intptr_t inc) in sbrk() function
/third_party/ltp/testcases/kernel/syscalls/setgroups/
H A Dsetgroups04.c108 TEST(SETGROUPS(cleanup, gidsetsize, sbrk(0))); in main()
/third_party/ltp/testcases/kernel/syscalls/
H A DMakefile15 mincore mprotect nftw profil remap_file_pages sbrk
/third_party/ltp/testcases/kernel/mem/hugetlb/hugemmap/
H A Dhugemmap07.c76 brk0 = sbrk(0); in run_test()
/third_party/ltp/testcases/kernel/syscalls/modify_ldt/
H A Dmodify_ldt01.c162 ptr = sbrk(0); in main()
/third_party/ltp/testcases/kernel/syscalls/msync/
H A Dmsync03.c134 addr4 = sbrk(0) + (4 * page_sz); in setup()
/third_party/ltp/testcases/kernel/syscalls/mbind/
H A Dmbind01.c168 TEST(mbind(p, MEM_LENGTH, tc->policy, sbrk(0) + 64*1024*1024, in test_invalid_nodemask()
/third_party/musl/porting/liteos_a/user/include/
H A Dunistd.h183 void *sbrk(intptr_t);
/third_party/musl/porting/uniproton/kernel/include/
H A Dunistd.h158 void *sbrk(intptr_t);
/third_party/musl/porting/linux/user/include/
H A Dunistd.h185 void *sbrk(intptr_t);

Completed in 10 milliseconds

12