/external/ltp/testcases/open_posix_testsuite/conformance/definitions/sys/mman_h/ |
2-3-buildonly.c | 10 * Test that the header defines the PROT_EXEC protection option. 19 #ifndef PROT_EXEC 20 #error PROT_EXEC not defined
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/ |
5-1.c | 14 * PROT_EXEC Data can be executed. 45 {.flags = MAP_SHARED,.prot = PROT_EXEC}, 47 {.flags = MAP_SHARED,.prot = PROT_READ | PROT_EXEC}, 48 {.flags = MAP_SHARED,.prot = PROT_EXEC | PROT_WRITE}, 49 {.flags = MAP_SHARED,.prot = PROT_READ | PROT_WRITE | PROT_EXEC}, 54 {.flags = MAP_PRIVATE,.prot = PROT_EXEC}, 56 {.flags = MAP_PRIVATE,.prot = PROT_READ | PROT_EXEC}, 57 {.flags = MAP_PRIVATE,.prot = PROT_EXEC | PROT_WRITE}, 58 {.flags = MAP_PRIVATE,.prot = PROT_READ | PROT_WRITE | PROT_EXEC}, 74 if (t->prot & PROT_EXEC) [all...] |
/external/strace/xlat/ |
mmap_prot.h | 20 #if defined(PROT_EXEC) || (defined(HAVE_DECL_PROT_EXEC) && HAVE_DECL_PROT_EXEC) 21 XLAT(PROT_EXEC),
|
/external/valgrind/none/tests/ |
munmap_exe.c | 6 /* Point of this is that the fd of an PROT_EXEC segment is -1, so Valgrind 14 m = mmap(NULL, 100, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
|
/external/compiler-rt/lib/profile/ |
WindowsMMap.c | 34 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC)) 44 if (prot & PROT_EXEC) 48 } else if (prot & PROT_EXEC) { 51 else if (prot & PROT_EXEC) 71 if (prot & PROT_EXEC)
|
WindowsMMap.h | 24 #define PROT_EXEC 0x0
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/ |
mman-common.h | 11 #define PROT_EXEC 0x4 /* page can be executed */
|
/external/autotest/client/site_tests/security_mprotect/src/ |
prot_exec.c | 41 /* Make sure mmap with PROT_EXEC fails. */ 43 PROT_READ | PROT_EXEC, MAP_SHARED, 45 err_quit("areaex mmap allowed PROT_EXEC"); 51 if (mprotect(areaex, sizeof(int), PROT_READ | PROT_EXEC))
|
/external/valgrind/memcheck/tests/ |
mempool.c | 37 p = (pool *)mmap(0, sizeof(pool), PROT_READ|PROT_WRITE|PROT_EXEC, 40 PROT_READ|PROT_WRITE|PROT_EXEC, 59 PROT_READ|PROT_WRITE|PROT_EXEC,
|
sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC,
|
mempool2.c | 40 p = (pool *)mmap(0, sizeof(pool), PROT_READ|PROT_WRITE|PROT_EXEC, 43 PROT_READ|PROT_WRITE|PROT_EXEC, 62 PROT_READ|PROT_WRITE|PROT_EXEC,
|
/bionic/libc/kernel/uapi/asm-generic/ |
mman-common.h | 23 #define PROT_EXEC 0x4
|
/external/compiler-rt/lib/builtins/ |
enable_execute_stack.c | 70 (void) mprotect((void *)startPage, length, PROT_READ | PROT_WRITE | PROT_EXEC);
|
/external/kernel-headers/original/uapi/asm-generic/ |
mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */
|
/external/libchrome/base/memory/ |
shared_memory_android.cc | 36 PROT_READ | PROT_WRITE | PROT_EXEC);
|
/external/valgrind/drd/tests/ |
custom_alloc.c | 16 void* p = mmap( 0, SUPERBLOCK_SIZE, PROT_READ|PROT_WRITE|PROT_EXEC,
|
/external/valgrind/massif/tests/ |
custom_alloc.c | 16 void* p = mmap( 0, SUPERBLOCK_SIZE, PROT_READ|PROT_WRITE|PROT_EXEC,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/bits/ |
mman.h | 30 implementation does not necessarily support PROT_EXEC or PROT_WRITE 36 #define PROT_EXEC 0x4 /* Page can be executed. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/bits/ |
mman.h | 30 implementation does not necessarily support PROT_EXEC or PROT_WRITE 36 #define PROT_EXEC 0x4 /* Page can be executed. */
|
/system/core/debuggerd/libdebuggerd/test/ |
tombstone_test.cpp | 220 map.flags = PROT_EXEC; 227 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; 274 map.flags = PROT_EXEC; 281 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; 326 map.flags = PROT_EXEC; 333 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; 378 map.flags = PROT_EXEC; 385 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; 428 map.flags = PROT_EXEC; 435 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; [all...] |
/external/libunwind/src/ |
os-linux.c | 81 && (flags & (PROT_EXEC | PROT_READ)) == (PROT_EXEC | PROT_READ)
|
/bionic/libc/kernel/uapi/asm-mips/asm/ |
mman.h | 24 #define PROT_EXEC 0x04
|
/bionic/tests/headers/posix/ |
sys_mman_h.c | 34 MACRO(PROT_EXEC);
|
/cts/tests/tests/security/jni/ |
android_security_cts_MMapExecutableTest.cpp | 61 PROT_EXEC | PROT_READ, MAP_PRIVATE, fd, kOffset);
|
/external/compiler-rt/test/builtins/Unit/ |
clear_cache_test.c | 68 if (mprotect(start, end-start, PROT_READ|PROT_WRITE|PROT_EXEC) != 0)
|