Searched refs:EXECUTE (Results 1 – 25 of 38) sorted by relevance
12
87 …EXECUTE ("x") permissions for a specific set of users. Each position can alternatively contain a "…88 indicate no READ/WRITE/EXECUTE access, depending on its position.90 …The first "rwx" triple indicates the READ, WRITE and EXECUTE permissions for the owner of the file…94 …he permissions string "rwx--xrw-" is interpreted to mean that users have READ/WRITE/EXECUTE access,95 the group has only EXECUTE, and the world has only READ and WRITE.111 *** When Are READ, WRITE or EXECUTE Access Required?121 | Create a new file | EXECUTE access to the directory and WRITE access to the directory |123 | Read a file | EXECUTE access to the directory and READ access to the file |125 | Write a file | EXECUTE access to the directory and WRITE access to the file |131 | Create a directory | WRITE and EXECUTE acccess to the parent directory |[all …]
158 MappedMemoryRegion::EXECUTE}, in TEST()161 MappedMemoryRegion::EXECUTE}, in TEST()169 MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, in TEST()172 MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, in TEST()221 EXPECT_FALSE(regions[i].permissions & MappedMemoryRegion::EXECUTE); in CheckProcMapsRegions()
23 EXECUTE = 1 << 2, enumerator
150 region.permissions |= MappedMemoryRegion::EXECUTE; in ParseProcMaps()
683 (region.permissions & MappedMemoryRegion::EXECUTE) == in OpenSymbolFiles()684 MappedMemoryRegion::EXECUTE) { in OpenSymbolFiles()
149 google_breakpad::MappedMemoryRegion::EXECUTE}, in TEST()153 | google_breakpad::MappedMemoryRegion::EXECUTE}, in TEST()163 google_breakpad::MappedMemoryRegion::EXECUTE in TEST()168 | google_breakpad::MappedMemoryRegion::EXECUTE in TEST()
87 region.permissions |= MappedMemoryRegion::EXECUTE; in ParseProcMaps()
17 # RUN: llvm-readobj --sections %t.code | FileCheck %s --check-prefixes=CHECK,CODE,EXECUTE,READ,WRITE35 …j --sections %t.alloc_code | FileCheck %s --check-prefixes=CHECK,CODE,UNINITDATA,EXECUTE,READ,WRITE48 …%t.upper | FileCheck %s --check-prefixes=CHECK,CODE,INITDATA,REMOVE,DISCARDABLE,EXECUTE,READ,SHARED52 …%t.mixed | FileCheck %s --check-prefixes=CHECK,CODE,INITDATA,REMOVE,DISCARDABLE,EXECUTE,READ,SHARED73 # EXECUTE-NEXT: IMAGE_SCN_MEM_EXECUTE
21 EXECUTE = 1 << 2, enumerator
21 "EXECUTE"
155 EXECUTE = 1 << 2,283 region.permissions |= MappedMemoryRegion::EXECUTE;
22 # EXEC-NEXT: MH_MAGIC_64 X86_64 ALL {{.*}} EXECUTE
41 using EXECUTE RELATIVE LONG.
169 EXECUTE="EXECUTE"