HomeSort by: relevance | last modified time | path
    Searched refs:executable (Results 1 - 16 of 16) sorted by relevancy

  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_libignore.cc 61 if (!range.executable)
105 if (!range.executable)
sanitizer_common.cc 161 void LoadedModule::addAddressRange(uptr beg, uptr end, bool executable,
165 new(mem) AddressRange(beg, end, executable, writable, name);
167 if (executable && end > max_executable_address_)
sanitizer_common.h 693 // executable or a shared object).
709 void addAddressRange(uptr beg, uptr end, bool executable, bool writable,
724 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange
728 AddressRange(uptr beg, uptr end, bool executable, bool writable,
733 executable(executable),
sanitizer_linux_libcdep.cc 566 bool executable = phdr->p_flags & PF_X; local in function:__sanitizer::dl_iterate_phdr_cb
568 cur_module.addAddressRange(cur_beg, cur_end, executable,
  /src/sys/external/bsd/sljit/dist/sljit_src/
sljitProtExecAllocator.c 28 This file contains a simple executable memory allocator
30 It is assumed, that executable code blocks are usually medium (or sometimes
72 void *executable; member in struct:chunk_header
78 * allocate executable system memory chunks
189 retval->executable = mmap(NULL, size, PROT_READ | PROT_EXEC, MAP_SHARED, fd, 0);
191 if (retval->executable == MAP_FAILED) {
206 munmap(header->executable, size);
315 executable_offset = (sljit_sw)((sljit_u8*)chunk_header->executable - (sljit_u8*)chunk_header);
  /src/bin/csh/
exec.c 106 static int executable(Char *, Char *, int);
533 if (executable(NULL, name, 0)) {
539 if (executable(*pv, sav, 0)) {
558 * is the executable() routine below and changes to iscommand().
563 * executable() examines the pathname obtained by concatenating dir and name
564 * (dir may be NULL), and returns 1 either if it is executable by us, or
569 executable(Char *dir, Char *name, int dir_ok) function in typeref:typename:int
  /src/sys/external/bsd/compiler_rt/dist/lib/lsan/
lsan_common_mac.cc 134 // Sections storing global variables are writable and non-executable
135 if (range.executable || !range.writable) continue;
  /src/usr.sbin/autofs/
common.c 724 * Entries for executable maps are slightly different, as they
748 * In case of executable map, the key is always
981 * Note that it is different from executable maps, in that
983 * (as opposed to executable maps that only output a single
1021 bool executable; local in function:parse_map
1059 executable = file_is_executable(path);
1061 if (executable) {
1062 log_debugx("map \"%s\" is executable", map);
1082 parse_map_yyin(parent, map, executable ? key : NULL);
1084 if (executable) {
    [all...]
  /src/common/dist/zlib/contrib/ada/
zlib.ads 21 -- unit, or you link this unit with other files to produce an executable, --
22 -- this unit does not by itself cause the resulting executable to be --
24 -- however invalidate any other reasons why the executable file might be --
  /src/sys/arch/x68k/stand/common/
start.S 36 #ifndef SUPPORT_R_EXEC /* support ".r" relocatable executable */
205 | and ensure the bss/stack (for .r executable) and argument areas valid
  /src/sys/arch/aarch64/aarch64/
pmap.c 994 /* executable for kernel or user? first set never exec both */
996 /* and either to executable */
1304 bool executable; local in function:pmap_protect
1360 executable = l3pte_executable(pte, user);
1365 if (!executable && (prot & VM_PROT_EXECUTE)) {
  /src/sys/external/isc/libsodium/dist/m4/
libtool.m4 178 _LT_DECL([], [exeext], [0], [Executable file suffix (normally "")])dnl
588 # file executable. If COMMENT is supplied, it is inserted after the
1144 # Links a minimal program and checks the executable
2199 [How to hardcode a shared library path into an executable])
2445 # soname into executable. Probably we can add versioning support to
2493 # When compiling the executable, add -use-dynld -Lsobjs: to the compileline.
2630 # FIXME: first we should search . and the directory the executable is in
2996 # ldd complains unless libraries are executable
3558 lt_cv_deplibs_check_method='file_magic ELF [[0-9]][[0-9]]*-bit [[ML]]SB (executable|dynamic lib)'
5494 # empty executable
    [all...]
  /src/sys/external/isc/libsodium/dist/build-aux/
ltmain.sh 170 # Check that FILE is an executable regular file.
2056 link create a library or an executable
2544 # True iff FILE is a libtool wrapper executable
2569 # True iff FILE is a libtool wrapper script or wrapper executable
3674 If any of the ARGS are libtool executable wrappers, then they are translated
3715 create an executable program.
3737 -no-install link a not-installable executable
3775 is created, otherwise an executable program is created."
4967 *executable*) # but shell scripts are "executable" too..
    [all...]
  /src/sys/external/isc/libsodium/dist/
ltmain.sh 58 # link create a library or an executable
1271 # True iff FILE is a libtool wrapper executable
1296 # True iff FILE is a libtool wrapper script or wrapper executable
2358 If any of the ARGS are libtool executable wrappers, then they are translated
2399 create an executable program.
2421 -no-install link a not-installable executable
2458 is created, otherwise an executable program is created."
3574 *executable*) # but shell scripts are "executable" too...
3827 # wrapper executable. Must ONLY be called from withi
    [all...]
  /src/sys/lib/libkern/arch/hppa/
milli.S 325 ; For an incomplete executable (program bound to shared libraries),
  /src/sys/arch/sparc64/sparc64/
locore.s 2676 /* Check if it's an executable mapping. */

Completed in 80 milliseconds