/src/sys/external/bsd/sljit/dist/sljit_src/ |
sljitProtExecAllocator.c | 28 This file contains a simple executable memory allocator 30 It is assumed, that executable code blocks are usually medium (or sometimes 72 void *executable; member in struct:chunk_header 78 * allocate executable system memory chunks 189 retval->executable = mmap(NULL, size, PROT_READ | PROT_EXEC, MAP_SHARED, fd, 0); 191 if (retval->executable == MAP_FAILED) { 206 munmap(header->executable, size); 315 executable_offset = (sljit_sw)((sljit_u8*)chunk_header->executable - (sljit_u8*)chunk_header);
|
/src/bin/csh/ |
exec.c | 106 static int executable(Char *, Char *, int); 533 if (executable(NULL, name, 0)) { 539 if (executable(*pv, sav, 0)) { 558 * is the executable() routine below and changes to iscommand(). 563 * executable() examines the pathname obtained by concatenating dir and name 564 * (dir may be NULL), and returns 1 either if it is executable by us, or 569 executable(Char *dir, Char *name, int dir_ok) function in typeref:typename:int
|
/src/usr.sbin/autofs/ |
common.c | 724 * Entries for executable maps are slightly different, as they 748 * In case of executable map, the key is always 981 * Note that it is different from executable maps, in that 983 * (as opposed to executable maps that only output a single 1021 bool executable; local in function:parse_map 1059 executable = file_is_executable(path); 1061 if (executable) { 1062 log_debugx("map \"%s\" is executable", map); 1082 parse_map_yyin(parent, map, executable ? key : NULL); 1084 if (executable) { [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_linux_libcdep.cc | 566 bool executable = phdr->p_flags & PF_X; local in function:__sanitizer::dl_iterate_phdr_cb 568 cur_module.addAddressRange(cur_beg, cur_end, executable,
|
sanitizer_common.h | 693 // executable or a shared object). 709 void addAddressRange(uptr beg, uptr end, bool executable, bool writable, 724 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange 728 AddressRange(uptr beg, uptr end, bool executable, bool writable, 733 executable(executable),
|
/src/sys/arch/aarch64/aarch64/ |
pmap.c | 994 /* executable for kernel or user? first set never exec both */ 996 /* and either to executable */ 1304 bool executable; local in function:pmap_protect 1360 executable = l3pte_executable(pte, user); 1365 if (!executable && (prot & VM_PROT_EXECUTE)) {
|