/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_libignore.cc | 61 if (!range.executable) 105 if (!range.executable)
|
sanitizer_common.cc | 161 void LoadedModule::addAddressRange(uptr beg, uptr end, bool executable, 165 new(mem) AddressRange(beg, end, executable, writable, name); 167 if (executable && end > max_executable_address_)
|
sanitizer_common.h | 693 // executable or a shared object). 709 void addAddressRange(uptr beg, uptr end, bool executable, bool writable, 724 bool executable; member in struct:__sanitizer::LoadedModule::AddressRange 728 AddressRange(uptr beg, uptr end, bool executable, bool writable, 733 executable(executable),
|
sanitizer_linux_libcdep.cc | 566 bool executable = phdr->p_flags & PF_X; local in function:__sanitizer::dl_iterate_phdr_cb 568 cur_module.addAddressRange(cur_beg, cur_end, executable,
|
/src/sys/external/bsd/sljit/dist/sljit_src/ |
sljitProtExecAllocator.c | 28 This file contains a simple executable memory allocator 30 It is assumed, that executable code blocks are usually medium (or sometimes 72 void *executable; member in struct:chunk_header 78 * allocate executable system memory chunks 189 retval->executable = mmap(NULL, size, PROT_READ | PROT_EXEC, MAP_SHARED, fd, 0); 191 if (retval->executable == MAP_FAILED) { 206 munmap(header->executable, size); 315 executable_offset = (sljit_sw)((sljit_u8*)chunk_header->executable - (sljit_u8*)chunk_header);
|
/src/bin/csh/ |
exec.c | 106 static int executable(Char *, Char *, int); 533 if (executable(NULL, name, 0)) { 539 if (executable(*pv, sav, 0)) { 558 * is the executable() routine below and changes to iscommand(). 563 * executable() examines the pathname obtained by concatenating dir and name 564 * (dir may be NULL), and returns 1 either if it is executable by us, or 569 executable(Char *dir, Char *name, int dir_ok) function in typeref:typename:int
|
/src/sys/external/bsd/compiler_rt/dist/lib/lsan/ |
lsan_common_mac.cc | 134 // Sections storing global variables are writable and non-executable 135 if (range.executable || !range.writable) continue;
|
/src/usr.sbin/autofs/ |
common.c | 724 * Entries for executable maps are slightly different, as they 748 * In case of executable map, the key is always 981 * Note that it is different from executable maps, in that 983 * (as opposed to executable maps that only output a single 1021 bool executable; local in function:parse_map 1059 executable = file_is_executable(path); 1061 if (executable) { 1062 log_debugx("map \"%s\" is executable", map); 1082 parse_map_yyin(parent, map, executable ? key : NULL); 1084 if (executable) { [all...] |
/src/common/dist/zlib/contrib/ada/ |
zlib.ads | 21 -- unit, or you link this unit with other files to produce an executable, -- 22 -- this unit does not by itself cause the resulting executable to be -- 24 -- however invalidate any other reasons why the executable file might be --
|
/src/sys/arch/x68k/stand/common/ |
start.S | 36 #ifndef SUPPORT_R_EXEC /* support ".r" relocatable executable */ 205 | and ensure the bss/stack (for .r executable) and argument areas valid
|
/src/sys/arch/aarch64/aarch64/ |
pmap.c | 994 /* executable for kernel or user? first set never exec both */ 996 /* and either to executable */ 1304 bool executable; local in function:pmap_protect 1360 executable = l3pte_executable(pte, user); 1365 if (!executable && (prot & VM_PROT_EXECUTE)) {
|
/src/sys/external/isc/libsodium/dist/m4/ |
libtool.m4 | 178 _LT_DECL([], [exeext], [0], [Executable file suffix (normally "")])dnl 588 # file executable. If COMMENT is supplied, it is inserted after the 1144 # Links a minimal program and checks the executable 2199 [How to hardcode a shared library path into an executable]) 2445 # soname into executable. Probably we can add versioning support to 2493 # When compiling the executable, add -use-dynld -Lsobjs: to the compileline. 2630 # FIXME: first we should search . and the directory the executable is in 2996 # ldd complains unless libraries are executable 3558 lt_cv_deplibs_check_method='file_magic ELF [[0-9]][[0-9]]*-bit [[ML]]SB (executable|dynamic lib)' 5494 # empty executable [all...] |
/src/sys/external/isc/libsodium/dist/build-aux/ |
ltmain.sh | 170 # Check that FILE is an executable regular file. 2056 link create a library or an executable 2544 # True iff FILE is a libtool wrapper executable 2569 # True iff FILE is a libtool wrapper script or wrapper executable 3674 If any of the ARGS are libtool executable wrappers, then they are translated 3715 create an executable program. 3737 -no-install link a not-installable executable 3775 is created, otherwise an executable program is created." 4967 *executable*) # but shell scripts are "executable" too.. [all...] |
/src/sys/external/isc/libsodium/dist/ |
ltmain.sh | 58 # link create a library or an executable 1271 # True iff FILE is a libtool wrapper executable 1296 # True iff FILE is a libtool wrapper script or wrapper executable 2358 If any of the ARGS are libtool executable wrappers, then they are translated 2399 create an executable program. 2421 -no-install link a not-installable executable 2458 is created, otherwise an executable program is created." 3574 *executable*) # but shell scripts are "executable" too... 3827 # wrapper executable. Must ONLY be called from withi [all...] |
/src/sys/lib/libkern/arch/hppa/ |
milli.S | 325 ; For an incomplete executable (program bound to shared libraries),
|
/src/sys/arch/sparc64/sparc64/ |
locore.s | 2676 /* Check if it's an executable mapping. */
|