/third_party/ltp/testcases/kernel/mem/mmapstress/ |
H A D | mmapstress03.c | 75 if ((brk_start = sbrk(0)) == NEG1) { in main() 76 ERROR("initial sbrk failed"); in main() 80 if (sbrk(pagesize - ((u_long) brk_start % (u_long) pagesize)) in main() 88 if ((hole_addr = hole_start = sbrk(NUM_SEGS * 2 * pagesize)) == NEG1) { in main() 92 if ((brk_max_addr = sbrk(0)) == NEG1) { in main() 107 if (brk_max_addr != sbrk(0)) { in main() 114 if (sbrk(-NUM_SEGS * pagesize) == NEG1) { in main() 118 if ((brk_max_addr = sbrk(0)) == NEG1) { in main() 138 if (sbrk(pagesize) == NEG1 || sbrk( in main() [all...] |
H A D | mmapstress05.c | 121 if (sbrk(pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == (char *)-1) { in main() 125 if ((buf = sbrk(pagesize)) == (char *)-1) { in main() 129 if ((mmapaddr = (caddr_t) sbrk(0)) == (caddr_t) - 1) { in main()
|
H A D | mmapstress06.c | 79 if (sbrk(pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == (char *)-1) { in main() 83 if ((mmapaddr = sbrk(0)) == (char *)-1) { in main()
|
H A D | mmapstress08.c | 71 if (sbrk(pagesize - ((u_long) sbrk(0) % (u_long) pagesize)) == in main() 79 if ((munmap_begin = mmapaddr = (caddr_t) sbrk(0)) == (caddr_t) - 1) { in main()
|
H A D | mmapstress02.c | 111 if (sbrk(2 * pagesize - ((ulong) sbrk(0) & (pagesize - 1))) == in main() 116 if ((mmapaddr = sbrk(0)) == (caddr_t) - 1) { in main()
|
/third_party/ltp/testcases/kernel/mem/shmt/ |
H A D | shmt09.c | 28 * sbrk(2) shmctl(2) shmget(2) 82 if ((unsigned long)sbrk(16384) >= (-4095UL)) { in main() 83 perror("sbrk"); in main() 84 tst_brkm(TFAIL, NULL, "Error: sbrk failed, errno = %d", in main() 88 if ((unsigned long)sbrk(-4097) >= (-4095UL)) { in main() 89 perror("sbrk"); in main() 90 tst_brkm(TFAIL, NULL, "Error: sbrk failed, errno = %d", in main() 112 tst_resm(TPASS, "sbrk, sbrk, shmget, shmat"); in main() 116 if ((unsigned long)sbrk(3 in main() [all...] |
/third_party/ltp/testcases/kernel/syscalls/sbrk/ |
H A D | sbrk03.c | 21 * So the bug is in sbrk as well as the brk syscall. brk() should validate the 22 * address being passed and return an error. sbrk() should not result in a brk 49 tst_res(TINFO, "sbrk increm: %p", sbrk(0x10000000)); in sbrk_test() 50 ret1 = sbrk(0); in sbrk_test() 52 /* sbrk() returns -1 on s390, but still does overflowed brk() */ in sbrk_test() 53 tst_res(TINFO, "sbrk increm: %p", sbrk(0x70000000)); in sbrk_test() 54 ret2 = sbrk(0); in sbrk_test() 57 tst_res(TFAIL, "Bug! sbrk in sbrk_test() [all...] |
H A D | sbrk02.c | 11 * Verify that sbrk() on failure sets errno to ENOMEM. 22 TESTPTR(sbrk(increment)); in run() 25 tst_res(TFAIL, "sbrk(%ld) unexpectedly passed and returned %p, " in run() 32 tst_res(TPASS | TTERRNO, "sbrk(%ld) failed as expected", increment); in run() 34 tst_res(TFAIL | TTERRNO, "sbrk(%ld) failed but unexpected errno, " in run() 44 ret = sbrk(increment); in setup()
|
H A D | sbrk01.c | 11 * Verify that sbrk() successfully increments or decrements the program's 29 TESTPTR(sbrk(tc->increment)); in run() 32 tst_res(TFAIL | TTERRNO, "sbrk(%ld) failed", tc->increment); in run() 34 tst_res(TPASS, "sbrk(%ld) returned %p", tc->increment, TST_RET_PTR); in run()
|
/third_party/musl/libc-test/src/functionalext/supplement/linux/ |
H A D | sbrk.c | 29 int *p = sbrk(0); in sbrk_0100() 31 t_error("%s sbrk failed\n", __func__); in sbrk_0100() 46 int *p = sbrk(1); in sbrk_0200() 48 t_error("%s sbrk failed\n", __func__); in sbrk_0200()
|
H A D | brk.c | 22 return sbrk(0); in get_brk()
|
/third_party/ltp/testcases/kernel/syscalls/brk/ |
H A D | brk01.c | 25 cur_brk = (void *)sbrk(0); in verify_brk() 28 tst_brk(TCONF, "sbrk() not implemented"); in verify_brk() 55 cur_brk = sbrk(0); in verify_brk()
|
H A D | brk02.c | 28 brk_addr = (void *)sbrk(0); in brk_variants() 43 brk_addr = (void *)sbrk(0); in brk_down_vmas() 46 tst_brk(TCONF, "sbrk() not implemented"); in brk_down_vmas()
|
/third_party/ltp/testcases/kernel/mem/mtest05/ |
H A D | mmstress.c | 542 if (sbrk(BRKSZ) == (void *) - 1) { in test5() 543 perror("test5(): sbrk()"); in test5() 561 if (sbrk(-BRKSZ) == (void *) - 1) { in test5() 562 tst_resm(TINFO, "test5(): rollback sbrk failed"); in test5() 564 perror("test5(): sbrk()"); in test5() 593 if (sbrk(BRKSZ) == (void *) - 1) { in test6() 594 perror("test6(): sbrk()"); in test6() 621 if (sbrk(-BRKSZ) == (void *) - 1) { in test6() 622 tst_resm(TINFO, "test6(): rollback sbrk failed"); in test6() 624 perror("test6(): sbrk()"); in test6() [all...] |
/third_party/ltp/lib/ |
H A D | parse_opts.c | 77 static int STD_TP_sbrk = 0; /* do sbrk in TEST_PAUSE */ 78 static int STD_LP_sbrk = 0; /* do sbrk in TEST_LOOPING */ 79 static char *STD_start_break = 0; /* original sbrk size */ 458 STD_start_break = sbrk(0); /* get original sbreak size */ in usc_global_setup_hook() 461 sbrk(STD_TP_sbrk); in usc_global_setup_hook() 463 printf("after sbrk(%d)\n", STD_TP_sbrk); in usc_global_setup_hook() 544 printf("about to do sbrk(%d)\n", STD_LP_sbrk); in usc_test_looping() 545 sbrk(STD_LP_sbrk); in usc_test_looping()
|
/third_party/musl/src/linux/ |
H A D | sbrk.c | 7 void *sbrk(intptr_t inc) in sbrk() function
|
/third_party/ltp/testcases/kernel/syscalls/setgroups/ |
H A D | setgroups04.c | 108 TEST(SETGROUPS(cleanup, gidsetsize, sbrk(0))); in main()
|
/third_party/ltp/testcases/kernel/syscalls/ |
H A D | Makefile | 15 mincore mprotect nftw profil remap_file_pages sbrk
|
/third_party/ltp/testcases/kernel/mem/hugetlb/hugemmap/ |
H A D | hugemmap07.c | 76 brk0 = sbrk(0); in run_test()
|
/third_party/ltp/testcases/kernel/syscalls/modify_ldt/ |
H A D | modify_ldt01.c | 162 ptr = sbrk(0); in main()
|
/third_party/ltp/testcases/kernel/syscalls/msync/ |
H A D | msync03.c | 134 addr4 = sbrk(0) + (4 * page_sz); in setup()
|
/third_party/ltp/testcases/kernel/syscalls/mbind/ |
H A D | mbind01.c | 168 TEST(mbind(p, MEM_LENGTH, tc->policy, sbrk(0) + 64*1024*1024, in test_invalid_nodemask()
|
/third_party/musl/porting/liteos_a/user/include/ |
H A D | unistd.h | 183 void *sbrk(intptr_t);
|
/third_party/musl/porting/uniproton/kernel/include/ |
H A D | unistd.h | 158 void *sbrk(intptr_t);
|
/third_party/musl/porting/linux/user/include/ |
H A D | unistd.h | 185 void *sbrk(intptr_t);
|