/third_party/ltp/testcases/kernel/syscalls/pkeys/ |
H A D | pkey01.c | 86 {PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, -1}, 87 {PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, -1}, 88 {PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1}, 89 {PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED | MAP_HUGETLB, -1}, 90 {PROT_EXEC, MAP_PRIVATE, 0}, 91 {PROT_EXEC, MAP_SHARED, 0}, 100 {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, -1}, 101 {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, -1}, 102 {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1}, 103 {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOU [all...] |
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/ |
H A D | 5-1.c | 14 * PROT_EXEC Data can be executed. 46 {.flags = MAP_SHARED,.prot = PROT_EXEC}, 48 {.flags = MAP_SHARED,.prot = PROT_READ | PROT_EXEC}, 49 {.flags = MAP_SHARED,.prot = PROT_EXEC | PROT_WRITE}, 50 {.flags = MAP_SHARED,.prot = PROT_READ | PROT_WRITE | PROT_EXEC}, 55 {.flags = MAP_PRIVATE,.prot = PROT_EXEC}, 57 {.flags = MAP_PRIVATE,.prot = PROT_READ | PROT_EXEC}, 58 {.flags = MAP_PRIVATE,.prot = PROT_EXEC | PROT_WRITE}, 59 {.flags = MAP_PRIVATE,.prot = PROT_READ | PROT_WRITE | PROT_EXEC}, 75 if (t->prot & PROT_EXEC) in print_error() [all...] |
/third_party/pcre2/pcre2/src/sljit/ |
H A D | sljitWXExecAllocator.c | 62 #define SLJIT_PROT_WX PROT_MPROTECT(PROT_EXEC) 75 if (SLJIT_LIKELY(!mprotect(ptr, size, PROT_EXEC))) in generic_se_protected() 106 prot |= PROT_MAX(PROT_READ | PROT_WRITE | PROT_EXEC); in sljit_malloc_exec() 144 int prot = PROT_READ | (enable_exec ? PROT_EXEC : PROT_WRITE); in sljit_update_wx_flags()
|
H A D | sljitExecAllocator.c | 128 ptr = mmap(NULL, page_size, PROT_WRITE | PROT_EXEC, in get_map_jit_flag() 174 int prot = PROT_READ | PROT_WRITE | PROT_EXEC; in alloc_chunk() 197 if (mprotect(retval, size, PROT_READ | PROT_WRITE | PROT_EXEC) < 0) { in alloc_chunk()
|
H A D | sljitProtExecAllocator.c | 209 retval->executable = mmap(NULL, size, PROT_READ | PROT_EXEC, MAP_SHARED, fd, 0); in alloc_chunk() 230 PROT_READ | PROT_WRITE | PROT_MPROTECT(PROT_EXEC), in alloc_chunk() 242 if (mprotect(retval->executable, size, PROT_READ | PROT_EXEC) == -1) { in alloc_chunk()
|
/third_party/node/src/large_pages/ |
H A D | node_large_page.cc | 371 // (PROT_READ, PROT_EXEC, MAP_PRIVATE) in MoveTextRegionToLargePages() 375 PROT_READ | PROT_WRITE | PROT_EXEC, in MoveTextRegionToLargePages() 382 PROT_READ | PROT_WRITE | PROT_EXEC, in MoveTextRegionToLargePages() 394 PROT_READ | PROT_WRITE | PROT_EXEC, in MoveTextRegionToLargePages() 399 if (mprotect(start, size, PROT_READ | PROT_WRITE | PROT_EXEC) == -1) in MoveTextRegionToLargePages() 404 if (mprotect(start, size, PROT_READ | PROT_EXEC) == -1) goto fail; in MoveTextRegionToLargePages()
|
/third_party/ltp/testcases/kernel/syscalls/sendfile/ |
H A D | sendfile04.c | 35 {PROT_EXEC, 0, "pass_mapped_buffer"}, 36 {PROT_EXEC | PROT_READ, 0, "pass_mapped_buffer"},
|
/third_party/mesa3d/include/android_stub/backtrace/ |
H A D | BacktraceMap.h | 27 #define PROT_EXEC 0x4 macro 137 bool IsExecutable(uint64_t pc) { return GetFlags(pc) & PROT_EXEC; } in IsExecutable()
|
/third_party/ltp/testcases/kernel/mem/hugetlb/hugemmap/ |
H A D | hugemmap15.c | 172 p = SAFE_MMAP(NULL, 2*hpage_size, PROT_READ|PROT_WRITE|PROT_EXEC, in test_once() 182 p = SAFE_MMAP(p, hpage_size, PROT_READ|PROT_WRITE|PROT_EXEC, in test_once()
|
/third_party/ltp/testcases/kernel/syscalls/mprotect/ |
H A D | mprotect04.c | 24 * 'prot' is set to PROT_EXEC. 208 TEST(mprotect(page_to_copy, page_sz, PROT_READ | PROT_EXEC)); in get_func() 211 "mprotect(PROT_READ|PROT_EXEC) failed"); in get_func() 255 /* Change the protection to PROT_EXEC. */ in testfunc_protexec() 256 TEST(mprotect(p, page_sz, PROT_EXEC)); in testfunc_protexec() 266 tst_resm(TFAIL, "test PROT_EXEC for mprotect failed"); in testfunc_protexec() 269 tst_resm(TPASS, "test PROT_EXEC for mprotect success"); in testfunc_protexec()
|
H A D | mprotect05.c | 36 if (mprotect(addr + pagesize, pagesize, PROT_EXEC)) in run()
|
/third_party/rust/crates/rustix/src/backend/linux_raw/mm/ |
H A D | types.rs | 15 /// `PROT_EXEC` 16 const EXEC = linux_raw_sys::general::PROT_EXEC; 31 /// `PROT_EXEC` 32 const EXEC = linux_raw_sys::general::PROT_EXEC;
|
/third_party/ltp/testcases/kernel/syscalls/init_module/ |
H A D | init_module01.c | 33 buf = SAFE_MMAP(0, sb.st_size, PROT_READ|PROT_EXEC, MAP_PRIVATE, fd, 0); in setup()
|
H A D | init_module02.c | 61 buf = SAFE_MMAP(0, size, PROT_READ|PROT_EXEC, MAP_PRIVATE, fd, 0); in setup()
|
/third_party/musl/libc-test/src/functionalext/supplement/mman/mman_gtest/ |
H A D | mman_mprotect_test.cpp | 29 protectResult = mprotect(memoryBuffer, pageSize, PROT_READ | PROT_WRITE | PROT_EXEC); in HWTEST_F()
|
/third_party/mesa3d/src/mapi/ |
H A D | u_execmem.c | 80 exec_mem = mmap(NULL, EXEC_MAP_SIZE, PROT_EXEC | PROT_READ | PROT_WRITE, in init_map()
|
/third_party/mesa3d/src/gallium/auxiliary/rtasm/ |
H A D | rtasm_execmem.c | 80 PROT_EXEC | PROT_READ | PROT_WRITE, in init_heap()
|
/third_party/musl/libc-test/src/functionalext/supplement/mman/ |
H A D | mprotect.c | 51 * @tc.desc : The port parameter is PROT_EXEC,which can set the protection attribute of memory area. 58 int ret = mprotect(buffer, getpagesize(), PROT_EXEC); in mprotect_0300()
|
/third_party/vixl/examples/aarch32/ |
H A D | examples.h | 51 PROT_READ | PROT_WRITE | PROT_EXEC, in ExecutableMemory()
|
/third_party/vixl/examples/aarch64/ |
H A D | executable-memory.h | 60 int res = mprotect(buffer_, size_, PROT_READ | PROT_EXEC); in ExecutableMemory()
|
/third_party/ltp/testcases/kernel/syscalls/mincore/ |
H A D | mincore02.c | 86 addr = mmap(NULL, size, PROT_READ | PROT_WRITE | PROT_EXEC, in setup()
|
/third_party/musl/libc-test/src/api/ |
H A D | sys_mman.c | 12 C(PROT_EXEC) in f()
|
/third_party/python/Modules/_ctypes/ |
H A D | malloc_closure.c | 70 PROT_READ | PROT_WRITE | PROT_EXEC, in more_core()
|
/third_party/rust/crates/rustix/src/backend/libc/mm/ |
H A D | types.rs | 15 /// `PROT_EXEC` 16 const EXEC = c::PROT_EXEC; 31 /// `PROT_EXEC` 32 const EXEC = c::PROT_EXEC;
|
/third_party/node/deps/v8/src/wasm/ |
H A D | memory-protection-key.cc | 154 return PROT_READ | PROT_WRITE | PROT_EXEC; in GetProtectionFromMemoryPermission()
|