Home
last modified time | relevance | path

Searched refs:protection (Results 1 – 25 of 200) sorted by relevance

12345678

/openbsd/gnu/llvm/lldb/tools/debugserver/source/MacOSX/
H A DMachVMRegion.cpp95 if (m_curr_protection != m_data.protection && m_protection_size > 0) { in RestoreProtections()
97 m_data.protection); in RestoreProtections()
102 (uint64_t)m_protection_size, 0, m_data.protection); in RestoreProtections()
106 m_curr_protection = m_data.protection; in RestoreProtections()
156 m_data.protection, m_data.max_protection, m_data.inheritance, in GetRegionForAddress()
162 m_curr_protection = m_data.protection; in GetRegionForAddress()
177 if ((m_data.protection & VM_PROT_READ) == VM_PROT_READ) in GetDNBPermissions()
179 if ((m_data.protection & VM_PROT_WRITE) == VM_PROT_WRITE) in GetDNBPermissions()
181 if ((m_data.protection & VM_PROT_EXECUTE) == VM_PROT_EXECUTE) in GetDNBPermissions()
189 if (m_data.protection == VM_PROT_NONE) { in GetMemoryTypes()
[all …]
/openbsd/gnu/usr.bin/binutils/gdb/
H A Dfbsd-nat.c58 char *protection) in fbsd_read_mapping() argument
72 &resident, &privateresident, &obj, protection); in fbsd_read_mapping()
90 char protection[4]; in fbsd_find_memory_regions() local
103 while (fbsd_read_mapping (mapfile, &start, &end, &protection[0])) in fbsd_find_memory_regions()
107 read = (strchr (protection, 'r') != 0); in fbsd_find_memory_regions()
108 write = (strchr (protection, 'w') != 0); in fbsd_find_memory_regions()
109 exec = (strchr (protection, 'x') != 0); in fbsd_find_memory_regions()
H A Dgnu-nat.c2277 vm_prot_t protection; member
2328 vm_prot_t protection; in gnu_write_inferior() local
2340 &protection, in gnu_write_inferior()
2372 region_element->protection = protection; in gnu_write_inferior()
2390 if (!(scan->protection & VM_PROT_WRITE)) in gnu_write_inferior()
2396 scan->protection | VM_PROT_WRITE); in gnu_write_inferior()
2410 if (!(scan->protection & VM_PROT_WRITE)) in gnu_write_inferior()
2416 scan->protection); in gnu_write_inferior()
2491 vm_prot_t protection; in gnu_find_memory_regions() local
2503 &protection, in gnu_find_memory_regions()
[all …]
/openbsd/gnu/llvm/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_procmaps.h45 bool IsReadable() const { return protection & kProtectionRead; } in IsReadable()
46 bool IsWritable() const { return protection & kProtectionWrite; } in IsWritable()
47 bool IsExecutable() const { return protection & kProtectionExecute; } in IsExecutable()
48 bool IsShared() const { return protection & kProtectionShared; } in IsShared()
57 uptr protection; variable
H A Dsanitizer_procmaps_solaris.cpp54 segment->protection = 0; in Next()
56 segment->protection |= kProtectionRead; in Next()
58 segment->protection |= kProtectionWrite; in Next()
60 segment->protection |= kProtectionExecute; in Next()
62 segment->protection |= kProtectionShared; in Next()
H A Dsanitizer_procmaps_linux.cpp46 segment->protection = 0; in Next()
47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; in Next()
49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; in Next()
51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; in Next()
53 if (*data_.current++ == 's') segment->protection |= kProtectionShared; in Next()
H A Dsanitizer_procmaps_bsd.cpp103 segment->protection = 0; in Next()
105 segment->protection |= kProtectionRead; in Next()
107 segment->protection |= kProtectionWrite; in Next()
109 segment->protection |= kProtectionExecute; in Next()
H A Dsanitizer_procmaps_fuchsia.cpp63 segment->protection = in Next()
H A Dsanitizer_procmaps_mac.cpp164 if (size >= sizeof(mach_header) && info.protection & kProtectionRead) { in GetDyldImageHeaderViaVMRegion()
288 segment->protection = sc->initprot; in NextSegmentLoad()
/openbsd/gnu/llvm/compiler-rt/lib/interception/
H A Dinterception_win.cpp713 DWORD protection = 0; in OverrideFunctionWithDetour() local
714 if (!ChangeMemoryProtection(header, patch_length, &protection)) in OverrideFunctionWithDetour()
724 if (!RestoreMemoryProtection(header, patch_length, protection)) in OverrideFunctionWithDetour()
755 DWORD protection = 0; in OverrideFunctionWithRedirectJump() local
756 if (!ChangeMemoryProtection(old_func, kJumpInstructionLength, &protection)) in OverrideFunctionWithRedirectJump()
804 DWORD protection = 0; in OverrideFunctionWithHotPatch() local
805 if (!ChangeMemoryProtection(header, patch_length, &protection)) in OverrideFunctionWithHotPatch()
813 if (!RestoreMemoryProtection(header, patch_length, protection)) in OverrideFunctionWithHotPatch()
861 DWORD protection = 0; in OverrideFunctionWithTrampoline() local
862 if (!ChangeMemoryProtection(patch_address, patch_length, &protection)) in OverrideFunctionWithTrampoline()
[all …]
/openbsd/usr.sbin/procmap/
H A Dprocmap.c725 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry()
727 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry()
752 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry()
754 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry()
777 vme->protection, vme->max_protection, in dump_vm_map_entry()
792 if (vme->protection & PROT_READ) in dump_vm_map_entry()
794 if (vme->protection & PROT_WRITE) in dump_vm_map_entry()
796 if (vme->protection & PROT_EXEC) in dump_vm_map_entry()
820 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry()
822 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry()
[all …]
/openbsd/distrib/special/
H A DMakefile.inc7 COPTS+=-fcf-protection=none -fno-ret-clean
10 COPTS+=-mbranch-protection=none
/openbsd/regress/sys/btcfi/
H A DMakefile9 NOBTCFI_CFLAGS= -mbranch-protection=none
11 NOBTCFI_CFLAGS= -fcf-protection=none
/openbsd/sys/uvm/
H A Duvm_unix.c176 prot = entry->protection; in uvm_coredump_walk_amap()
224 if (!(entry->protection & PROT_WRITE) && in uvm_should_coredump()
237 if (!(entry->protection & PROT_READ) && in uvm_should_coredump()
355 error = (*walk)(entry->start, end, end, entry->protection, in uvm_coredump_walkmap()
H A Duvm_map.c869 entry->protection = prot; in uvm_mapanon()
1138 entry->protection = prot; in uvm_map()
1231 if (e1->protection != e2->protection || in uvm_mapent_isjoinable()
2146 iter->protection); in uvm_map_pageable_wire()
3105 old_prot = iter->protection; in uvm_map_protect()
3146 old_prot = iter->protection; in uvm_map_protect()
3168 iter->protection = new_prot; in uvm_map_protect()
3585 new_entry->protection = prot; in uvm_mapent_clone()
3777 new_entry->protection & in uvm_mapent_forkcopy()
4021 vm_prot_t protection) in uvm_map_checkprot() argument
[all …]
/openbsd/gnu/llvm/clang/docs/
H A DSafeStack.rst84 A complete protection against control-flow hijack attacks requires combining
90 checks. Clang has control-flow integrity protection scheme for :doc:`C++ virtual
96 In its current implementation, SafeStack provides precise protection against
97 stack-based buffer overflows, but protection against arbitrary memory write
110 stronger safe stack protection mechanisms, that rely on software fault
/openbsd/gnu/llvm/llvm/include/llvm/IR/
H A DAttributes.td224 /// Safe Stack protection.
227 /// Shadow Call Stack protection.
240 /// Stack protection.
243 /// Stack protection required.
246 /// Strong Stack protection.
/openbsd/gnu/llvm/compiler-rt/lib/tsan/rtl/
H A Dtsan_platform_posix.cpp104 if (segment.protection == 0) // Zero page or mprotected. in CheckAndProtect()
/openbsd/gnu/llvm/llvm/lib/Support/Windows/
H A DMemory.inc24 // Contrary to what you might expect, the Windows page protection flags
41 llvm_unreachable("Illegal memory protection flag specified!");
/openbsd/gnu/llvm/compiler-rt/lib/crt/
H A DCMakeLists.txt53 append_list_if(COMPILER_RT_ENABLE_CET -fcf-protection=full CRT_CFLAGS)
/openbsd/gnu/llvm/llvm/docs/
H A DCFIVerify.rst11 This document provides an overview of an external tool to verify the protection
18 framework, where modifications to the compiler ensure that CFI protection
/openbsd/sys/arch/arm64/conf/
H A DMakefile.arm6470 CMACHFLAGS+= -mbranch-protection=none
72 CMACHFLAGS+= -mbranch-protection=bti
/openbsd/gnu/llvm/llvm/include/llvm/Config/
H A Dabi-breaking.h.cmake25 // ABI_BREAKING_CHECKS protection: provides link-time failure when clients build
/openbsd/sys/arch/amd64/conf/
H A DMakefile.amd6472 CMACHFLAGS+= -mno-retpoline -fcf-protection=none
75 CMACHFLAGS+= -mretpoline-external-thunk -fcf-protection=branch
178 ${CC} -c ${CFLAGS} ${CPPFLAGS} -fcf-protection=none gapdummy.c -o $@
/openbsd/sbin/isakmpd/
H A DQUESTIONS25 like an identity protection exchange to me. Must I really get rid of

12345678