HomeSort by: relevance | last modified time | path
    Searched defs:executable (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/external/bsd/nsd/dist/compat/
setproctitle.c 23 static char *executable(void) function
59 /* prepend executable name if fmt does not start with '-' */
63 if ((exe = executable()) != NULL) {
  /src/sys/external/bsd/sljit/dist/sljit_src/
sljitProtExecAllocator.c 28 This file contains a simple executable memory allocator
30 It is assumed, that executable code blocks are usually medium (or sometimes
72 void *executable; member in struct:chunk_header
78 * allocate executable system memory chunks
189 retval->executable = mmap(NULL, size, PROT_READ | PROT_EXEC, MAP_SHARED, fd, 0);
191 if (retval->executable == MAP_FAILED) {
206 munmap(header->executable, size);
315 executable_offset = (sljit_sw)((sljit_u8*)chunk_header->executable - (sljit_u8*)chunk_header);
  /src/external/apache2/llvm/dist/clang/tools/clang-format/
clang-format.el 39 (defcustom clang-format-executable
40 (or (executable-find "clang-format")
42 "Location of the clang-format executable.
44 A string containing the name or the full path of the executable."
166 nil nil clang-format-executable
  /src/external/bsd/file/dist/src/
ascmagic.c 134 int executable = 0; local
240 switch (file_replace(ms, " text executable$",
249 executable = 1;
271 if (executable)
272 if (file_printf(ms, " executable") == -1)
  /src/external/gpl3/binutils.old/dist/bfd/
elf-nacl.c 45 headers. It must be read-only and non-executable.
65 The first non-executable PT_LOAD segment appears first in the file
100 bool executable = segment_executable (seg); local
102 if (executable
110 /* This is an executable segment that starts on a page
177 the first non-executable PT_LOAD with a nonempty p_filesz. */
elf.c 1 /* ELF executable support for BFD.
2777 /* If this is an alloc section in an executable or shared
5070 bool executable;
5189 executable = false;
5209 thus not executable, and the first section is
5210 executable then put the file and program headers in
5322 && executable != ((hdr->flags & SEC_CODE) != 0))
5353 executable = true;
5376 executable = false;
5378 executable = true
5068 bool executable; local
    [all...]
  /src/external/gpl3/gdb/dist/bfd/
elf-nacl.c 45 headers. It must be read-only and non-executable.
65 The first non-executable PT_LOAD segment appears first in the file
100 bool executable = segment_executable (seg); local
102 if (executable
110 /* This is an executable segment that starts on a page
177 the first non-executable PT_LOAD with a nonempty p_filesz. */
elf.c 1 /* ELF executable support for BFD.
2751 /* If this is an alloc section in an executable or shared
5030 bool executable;
5139 executable = false;
5163 thus not executable, and the first section is
5164 executable then put the file and program headers in
5276 && executable != ((hdr->flags & SEC_CODE) != 0))
5307 executable = true;
5330 executable = false;
5332 executable = true
5028 bool executable; local
    [all...]
  /src/external/gpl3/gdb.old/dist/bfd/
elf-nacl.c 45 headers. It must be read-only and non-executable.
65 The first non-executable PT_LOAD segment appears first in the file
100 bool executable = segment_executable (seg); local
102 if (executable
110 /* This is an executable segment that starts on a page
177 the first non-executable PT_LOAD with a nonempty p_filesz. */
  /src/bin/csh/
exec.c 106 static int executable(Char *, Char *, int);
533 if (executable(NULL, name, 0)) {
539 if (executable(*pv, sav, 0)) {
558 * is the executable() routine below and changes to iscommand().
563 * executable() examines the pathname obtained by concatenating dir and name
564 * (dir may be NULL), and returns 1 either if it is executable by us, or
569 executable(Char *dir, Char *name, int dir_ok) function
  /src/usr.sbin/autofs/
common.c 724 * Entries for executable maps are slightly different, as they
748 * In case of executable map, the key is always
981 * Note that it is different from executable maps, in that
983 * (as opposed to executable maps that only output a single
1021 bool executable; local
1059 executable = file_is_executable(path);
1061 if (executable) {
1062 log_debugx("map \"%s\" is executable", map);
1082 parse_map_yyin(parent, map, executable ? key : NULL);
1084 if (executable) {
    [all...]
  /src/external/bsd/atf/dist/tools/
test_program_test.cpp 764 const tools::fs::path executable = get_helper(*this, "bad_metadata_helper"); local
766 impl::get_metadata(executable, vars_map()));
772 const tools::fs::path executable = get_helper(*this, "zero_tcs_helper"); local
774 impl::get_metadata(executable, vars_map()));
780 const tools::fs::path executable = get_helper(*this, "several_tcs_helper"); local
781 const impl::metadata md = impl::get_metadata(executable, vars_map());
test-program.cpp 134 const tools::fs::path& executable; member in struct:__anon6397::get_metadata_params
139 executable(p_executable),
146 const tools::fs::path& executable; member in struct:__anon6397::test_case_params
161 executable(p_executable),
213 exec_or_exit(const tools::fs::path& executable,
220 ::execv(executable.c_str(), native_argv);
222 const std::string message = "Failed to execute '" + executable.str() +
291 argv.push_back(params->executable.leaf_name());
293 argv.push_back("-s" + params->executable.branch_path().str());
296 exec_or_exit(params->executable, argv)
    [all...]
  /src/external/gpl3/gcc/dist/gcc/config/gcn/
gcn-run.cc 55 hsa_executable_t executable = { 0 }; variable
105 hsa_status_t (*hsa_executable_destroy_fn) (hsa_executable_t executable);
108 const char *options, hsa_executable_t *executable);
110 (hsa_executable_t executable, const char *variable_name, void *address);
112 (hsa_executable_t executable, hsa_agent_t agent,
114 hsa_status_t (*hsa_executable_freeze_fn) (hsa_executable_t executable,
129 (hsa_executable_t executable, const char *module_name,
409 /* An "executable" consists of one or more code objects. */
412 &executable),
413 "Initialize GCN executable");
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_linux_libcdep.cc 566 bool executable = phdr->p_flags & PF_X; local
568 cur_module.addAddressRange(cur_beg, cur_end, executable,
sanitizer_common.h 693 // executable or a shared object).
709 void addAddressRange(uptr beg, uptr end, bool executable, bool writable,
724 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange
728 AddressRange(uptr beg, uptr end, bool executable, bool writable,
733 executable(executable),
  /src/external/gpl3/gcc/dist/libsanitizer/sanitizer_common/
sanitizer_linux_libcdep.cpp 367 // 11.4, and Illumos. The tlsmodid of the executable was changed to 1 in
651 bool executable = phdr->p_flags & PF_X; local
653 cur_module.addAddressRange(cur_beg, cur_end, executable,
sanitizer_common.h 816 // executable or a shared object).
834 void addAddressRange(uptr beg, uptr end, bool executable, bool writable,
850 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange
854 AddressRange(uptr beg, uptr end, bool executable, bool writable,
859 executable(executable),
  /src/external/gpl3/gcc.old/dist/gcc/config/gcn/
gcn-run.cc 54 hsa_executable_t executable = { 0 }; variable
104 hsa_status_t (*hsa_executable_destroy_fn) (hsa_executable_t executable);
107 const char *options, hsa_executable_t *executable);
109 (hsa_executable_t executable, const char *variable_name, void *address);
111 (hsa_executable_t executable, hsa_agent_t agent,
113 hsa_status_t (*hsa_executable_freeze_fn) (hsa_executable_t executable,
128 (hsa_executable_t executable, const char *module_name,
408 /* An "executable" consists of one or more code objects. */
411 &executable),
412 "Initialize GCN executable");
    [all...]
  /src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/
sanitizer_linux_libcdep.cpp 615 bool executable = phdr->p_flags & PF_X; local
617 cur_module.addAddressRange(cur_beg, cur_end, executable,
sanitizer_common.h 781 // executable or a shared object).
797 void addAddressRange(uptr beg, uptr end, bool executable, bool writable,
812 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange
816 AddressRange(uptr beg, uptr end, bool executable, bool writable,
821 executable(executable),
  /src/sys/arch/aarch64/aarch64/
pmap.c 994 /* executable for kernel or user? first set never exec both */
996 /* and either to executable */
1304 bool executable; local
1360 executable = l3pte_executable(pte, user);
1365 if (!executable && (prot & VM_PROT_EXECUTE)) {
  /src/external/gpl3/gcc/dist/libgomp/plugin/
plugin-gcn.c 148 hsa_status_t (*hsa_executable_destroy_fn) (hsa_executable_t executable);
151 const char *options, hsa_executable_t *executable);
153 (hsa_executable_t executable, const char *variable_name, void *address);
155 (hsa_executable_t executable, hsa_agent_t agent,
157 hsa_status_t (*hsa_executable_freeze_fn)(hsa_executable_t executable,
171 (hsa_executable_t executable, const char *module_name,
178 (hsa_executable_t executable,
179 hsa_status_t (*callback)(hsa_executable_t executable,
453 /* HSA executable - the finalized program that is used to locate kernels. */
454 hsa_executable_t executable; member in struct:agent_info
    [all...]
  /src/external/gpl3/gcc.old/dist/libgomp/plugin/
plugin-gcn.c 147 hsa_status_t (*hsa_executable_destroy_fn) (hsa_executable_t executable);
150 const char *options, hsa_executable_t *executable);
152 (hsa_executable_t executable, const char *variable_name, void *address);
154 (hsa_executable_t executable, hsa_agent_t agent,
156 hsa_status_t (*hsa_executable_freeze_fn)(hsa_executable_t executable,
170 (hsa_executable_t executable, const char *module_name,
177 (hsa_executable_t executable,
178 hsa_status_t (*callback)(hsa_executable_t executable,
461 /* HSA executable - the finalized program that is used to locate kernels. */
462 hsa_executable_t executable; member in struct:agent_info
    [all...]
  /src/external/gpl3/binutils/dist/bfd/
elf.c 1 /* ELF executable support for BFD.
2841 /* If this is an alloc section in an executable or shared
5135 bool executable;
5254 executable = false;
5274 thus not executable, and the first section is
5275 executable then put the file and program headers in
5387 && executable != ((hdr->flags & SEC_CODE) != 0))
5418 executable = true;
5441 executable = false;
5443 executable = true
5133 bool executable; local
    [all...]

Completed in 58 milliseconds

1 2