/openbsd/gnu/llvm/lldb/tools/debugserver/source/MacOSX/ |
H A D | MachVMRegion.cpp | 95 if (m_curr_protection != m_data.protection && m_protection_size > 0) { in RestoreProtections() 97 m_data.protection); in RestoreProtections() 102 (uint64_t)m_protection_size, 0, m_data.protection); in RestoreProtections() 106 m_curr_protection = m_data.protection; in RestoreProtections() 156 m_data.protection, m_data.max_protection, m_data.inheritance, in GetRegionForAddress() 162 m_curr_protection = m_data.protection; in GetRegionForAddress() 177 if ((m_data.protection & VM_PROT_READ) == VM_PROT_READ) in GetDNBPermissions() 179 if ((m_data.protection & VM_PROT_WRITE) == VM_PROT_WRITE) in GetDNBPermissions() 181 if ((m_data.protection & VM_PROT_EXECUTE) == VM_PROT_EXECUTE) in GetDNBPermissions() 189 if (m_data.protection == VM_PROT_NONE) { in GetMemoryTypes() [all …]
|
/openbsd/gnu/usr.bin/binutils/gdb/ |
H A D | fbsd-nat.c | 58 char *protection) in fbsd_read_mapping() argument 72 &resident, &privateresident, &obj, protection); in fbsd_read_mapping() 90 char protection[4]; in fbsd_find_memory_regions() local 103 while (fbsd_read_mapping (mapfile, &start, &end, &protection[0])) in fbsd_find_memory_regions() 107 read = (strchr (protection, 'r') != 0); in fbsd_find_memory_regions() 108 write = (strchr (protection, 'w') != 0); in fbsd_find_memory_regions() 109 exec = (strchr (protection, 'x') != 0); in fbsd_find_memory_regions()
|
H A D | gnu-nat.c | 2277 vm_prot_t protection; member 2328 vm_prot_t protection; in gnu_write_inferior() local 2340 &protection, in gnu_write_inferior() 2372 region_element->protection = protection; in gnu_write_inferior() 2390 if (!(scan->protection & VM_PROT_WRITE)) in gnu_write_inferior() 2396 scan->protection | VM_PROT_WRITE); in gnu_write_inferior() 2410 if (!(scan->protection & VM_PROT_WRITE)) in gnu_write_inferior() 2416 scan->protection); in gnu_write_inferior() 2491 vm_prot_t protection; in gnu_find_memory_regions() local 2503 &protection, in gnu_find_memory_regions() [all …]
|
/openbsd/gnu/llvm/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_procmaps.h | 45 bool IsReadable() const { return protection & kProtectionRead; } in IsReadable() 46 bool IsWritable() const { return protection & kProtectionWrite; } in IsWritable() 47 bool IsExecutable() const { return protection & kProtectionExecute; } in IsExecutable() 48 bool IsShared() const { return protection & kProtectionShared; } in IsShared() 57 uptr protection; variable
|
H A D | sanitizer_procmaps_solaris.cpp | 54 segment->protection = 0; in Next() 56 segment->protection |= kProtectionRead; in Next() 58 segment->protection |= kProtectionWrite; in Next() 60 segment->protection |= kProtectionExecute; in Next() 62 segment->protection |= kProtectionShared; in Next()
|
H A D | sanitizer_procmaps_linux.cpp | 46 segment->protection = 0; in Next() 47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; in Next() 49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; in Next() 51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; in Next() 53 if (*data_.current++ == 's') segment->protection |= kProtectionShared; in Next()
|
H A D | sanitizer_procmaps_bsd.cpp | 103 segment->protection = 0; in Next() 105 segment->protection |= kProtectionRead; in Next() 107 segment->protection |= kProtectionWrite; in Next() 109 segment->protection |= kProtectionExecute; in Next()
|
H A D | sanitizer_procmaps_fuchsia.cpp | 63 segment->protection = in Next()
|
H A D | sanitizer_procmaps_mac.cpp | 164 if (size >= sizeof(mach_header) && info.protection & kProtectionRead) { in GetDyldImageHeaderViaVMRegion() 288 segment->protection = sc->initprot; in NextSegmentLoad()
|
/openbsd/gnu/llvm/compiler-rt/lib/interception/ |
H A D | interception_win.cpp | 713 DWORD protection = 0; in OverrideFunctionWithDetour() local 714 if (!ChangeMemoryProtection(header, patch_length, &protection)) in OverrideFunctionWithDetour() 724 if (!RestoreMemoryProtection(header, patch_length, protection)) in OverrideFunctionWithDetour() 755 DWORD protection = 0; in OverrideFunctionWithRedirectJump() local 756 if (!ChangeMemoryProtection(old_func, kJumpInstructionLength, &protection)) in OverrideFunctionWithRedirectJump() 804 DWORD protection = 0; in OverrideFunctionWithHotPatch() local 805 if (!ChangeMemoryProtection(header, patch_length, &protection)) in OverrideFunctionWithHotPatch() 813 if (!RestoreMemoryProtection(header, patch_length, protection)) in OverrideFunctionWithHotPatch() 861 DWORD protection = 0; in OverrideFunctionWithTrampoline() local 862 if (!ChangeMemoryProtection(patch_address, patch_length, &protection)) in OverrideFunctionWithTrampoline() [all …]
|
/openbsd/usr.sbin/procmap/ |
H A D | procmap.c | 731 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry() 733 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry() 758 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry() 760 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry() 783 vme->protection, vme->max_protection, in dump_vm_map_entry() 798 if (vme->protection & PROT_READ) in dump_vm_map_entry() 800 if (vme->protection & PROT_WRITE) in dump_vm_map_entry() 802 if (vme->protection & PROT_EXEC) in dump_vm_map_entry() 826 (vme->protection & PROT_READ) ? 'r' : '-', in dump_vm_map_entry() 828 (vme->protection & PROT_EXEC) ? 'x' : '-', in dump_vm_map_entry() [all …]
|
/openbsd/distrib/special/ |
H A D | Makefile.inc | 7 COPTS+=-fcf-protection=none -fno-ret-clean 10 COPTS+=-mbranch-protection=none
|
/openbsd/regress/sys/btcfi/ |
H A D | Makefile | 9 NOBTCFI_CFLAGS= -mbranch-protection=none 11 NOBTCFI_CFLAGS= -fcf-protection=none
|
/openbsd/sys/uvm/ |
H A D | uvm_unix.c | 176 prot = entry->protection; in uvm_coredump_walk_amap() 224 if (!(entry->protection & PROT_WRITE) && in uvm_should_coredump() 237 if (!(entry->protection & PROT_READ) && in uvm_should_coredump() 355 error = (*walk)(entry->start, end, end, entry->protection, in uvm_coredump_walkmap()
|
H A D | uvm_map.c | 417 entry->start, entry->end, entry->protection, NULL); in uvm_mapent_addr_insert() 440 entry->start, entry->end, entry->protection, NULL); in uvm_mapent_addr_remove() 773 /* Check protection. */ in uvm_mapanon() 869 entry->protection = prot; in uvm_mapanon() 998 /* Check protection. */ in uvm_map() 1138 entry->protection = prot; in uvm_map() 1231 if (e1->protection != e2->protection || in uvm_mapent_isjoinable() 1579 if (entry->protection == PROT_NONE) in uvm_map_inentry_sp() 1694 if (iter->protection ! in uvm_map_is_stack_remappable() 3994 uvm_map_checkprot(struct vm_map * map,vaddr_t start,vaddr_t end,vm_prot_t protection) uvm_map_checkprot() argument [all...] |
/openbsd/gnu/llvm/clang/docs/ |
H A D | SafeStack.rst | 84 A complete protection against control-flow hijack attacks requires combining 90 checks. Clang has control-flow integrity protection scheme for :doc:`C++ virtual 96 In its current implementation, SafeStack provides precise protection against 97 stack-based buffer overflows, but protection against arbitrary memory write 110 stronger safe stack protection mechanisms, that rely on software fault
|
/openbsd/gnu/llvm/llvm/include/llvm/IR/ |
H A D | Attributes.td | 224 /// Safe Stack protection. 227 /// Shadow Call Stack protection. 240 /// Stack protection. 243 /// Stack protection required. 246 /// Strong Stack protection.
|
/openbsd/gnu/llvm/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_platform_posix.cpp | 104 if (segment.protection == 0) // Zero page or mprotected. in CheckAndProtect()
|
/openbsd/gnu/llvm/llvm/lib/Support/Windows/ |
H A D | Memory.inc | 24 // Contrary to what you might expect, the Windows page protection flags 41 llvm_unreachable("Illegal memory protection flag specified!");
|
/openbsd/gnu/llvm/compiler-rt/lib/crt/ |
H A D | CMakeLists.txt | 53 append_list_if(COMPILER_RT_ENABLE_CET -fcf-protection=full CRT_CFLAGS)
|
/openbsd/gnu/llvm/llvm/docs/ |
H A D | CFIVerify.rst | 11 This document provides an overview of an external tool to verify the protection 18 framework, where modifications to the compiler ensure that CFI protection
|
/openbsd/sys/arch/arm64/conf/ |
H A D | Makefile.arm64 | 71 CMACHFLAGS+= -mbranch-protection=none 73 CMACHFLAGS+= -mbranch-protection=bti
|
/openbsd/gnu/llvm/llvm/include/llvm/Config/ |
H A D | abi-breaking.h.cmake | 25 // ABI_BREAKING_CHECKS protection: provides link-time failure when clients build
|
/openbsd/sys/arch/amd64/conf/ |
H A D | Makefile.amd64 | 72 CMACHFLAGS+= -mno-retpoline -fcf-protection=none 75 CMACHFLAGS+= -mretpoline-external-thunk -fcf-protection=branch 178 ${CC} -c ${CFLAGS} ${CPPFLAGS} -fcf-protection=none gapdummy.c -o $@
|
/openbsd/sbin/isakmpd/ |
H A D | QUESTIONS | 25 like an identity protection exchange to me. Must I really get rid of
|