| /src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/ |
| sanitizer_procmaps_solaris.cpp | 33 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 41 segment->start = (uptr)xmapentry->pr_vaddr; 42 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size); 43 segment->offset = (uptr)xmapentry->pr_offset; 45 segment->protection = 0; 47 segment->protection |= kProtectionRead; 49 segment->protection |= kProtectionWrite; 51 segment->protection |= kProtectionExecute; 53 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_linux.cpp | 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 41 segment->start = ParseHex(&data_.current); 43 segment->end = ParseHex(&data_.current); 46 segment->protection = 0; 47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; 49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; 51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; 53 if (*data_.current++ == 's') segment->protection |= kProtectionShared; 55 segment->offset = ParseHex(&data_.current); 68 if (segment->filename) [all...] |
| sanitizer_procmaps_bsd.cpp | 75 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 83 segment->start = (uptr)VmEntry->kve_start; 84 segment->end = (uptr)VmEntry->kve_end; 85 segment->offset = (uptr)VmEntry->kve_offset; 87 segment->protection = 0; 89 segment->protection |= kProtectionRead; 91 segment->protection |= kProtectionWrite; 93 segment->protection |= kProtectionExecute; 95 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_freebsd.cc | 67 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 72 segment->start = (uptr)VmEntry->kve_start; 73 segment->end = (uptr)VmEntry->kve_end; 74 segment->offset = (uptr)VmEntry->kve_offset; 76 segment->protection = 0; 78 segment->protection |= kProtectionRead; 80 segment->protection |= kProtectionWrite; 82 segment->protection |= kProtectionExecute; 84 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_fuchsia.cpp | 55 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 59 segment->start = entry.base; 60 segment->end = entry.base + entry.size; 61 segment->offset = entry.u.mapping.vmo_offset; 63 segment->protection = 67 if (segment->filename && segment->filename_size > 0) { 68 uptr len = Min(sizeof(entry.name), segment->filename_size) - 1; 69 internal_strncpy(segment->filename, entry.name, len); 70 segment->filename[len] = 0 [all...] |
| sanitizer_procmaps_mac.cpp | 62 // data pointer, when there are no sections, or when the segment 99 // command size in bytes. We're interested only in segment load commands 104 // file offset of the current memory segment. 178 // NextSegmentLoad scans the current image for the next segment load command 180 // segment. 181 // Note that the segment addresses are not necessarily sorted. 183 static bool NextSegmentLoad(MemoryMappedSegment *segment, 196 // isn't actually the absolute segment address, but the offset portion 206 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr; 207 segment->end = segment->start + sc->vmsize [all...] |
| /src/external/gpl3/gcc/dist/libsanitizer/sanitizer_common/ |
| sanitizer_procmaps_solaris.cpp | 42 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 50 segment->start = (uptr)xmapentry->pr_vaddr; 51 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size); 52 segment->offset = (uptr)xmapentry->pr_offset; 54 segment->protection = 0; 56 segment->protection |= kProtectionRead; 58 segment->protection |= kProtectionWrite; 60 segment->protection |= kProtectionExecute; 62 segment->protection |= kProtectionShared; 64 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_linux.cpp | 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 41 segment->start = ParseHex(&data_.current); 43 segment->end = ParseHex(&data_.current); 46 segment->protection = 0; 47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; 49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; 51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; 53 if (*data_.current++ == 's') segment->protection |= kProtectionShared; 55 segment->offset = ParseHex(&data_.current); 68 if (segment->filename) [all...] |
| sanitizer_procmaps_fuchsia.cpp | 55 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 59 segment->start = entry.base; 60 segment->end = entry.base + entry.size; 61 segment->offset = entry.u.mapping.vmo_offset; 63 segment->protection = 67 if (segment->filename && segment->filename_size > 0) { 68 uptr len = Min(sizeof(entry.name), segment->filename_size) - 1; 69 internal_strncpy(segment->filename, entry.name, len); 70 segment->filename[len] = 0 [all...] |
| sanitizer_procmaps_bsd.cpp | 91 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 99 segment->start = (uptr)VmEntry->kve_start; 100 segment->end = (uptr)VmEntry->kve_end; 101 segment->offset = (uptr)VmEntry->kve_offset; 103 segment->protection = 0; 105 segment->protection |= kProtectionRead; 107 segment->protection |= kProtectionWrite; 109 segment->protection |= kProtectionExecute; 111 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_mac.cpp | 62 // data pointer, when there are no sections, or when the segment 99 // command size in bytes. We're interested only in segment load commands 104 // file offset of the current memory segment. 202 // NextSegmentLoad scans the current image for the next segment load command 204 // segment. 205 // Note that the segment addresses are not necessarily sorted. 207 static bool NextSegmentLoad(MemoryMappedSegment *segment, 222 // isn't actually the absolute segment address, but the offset portion 232 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr; 233 segment->end = segment->start + sc->vmsize [all...] |
| /src/external/bsd/elftosb/dist/common/ |
| DataTarget.cpp | 15 DataTarget::AddressRange ConstantDataTarget::getRangeForSegment(DataSource & source, DataSource::Segment & segment) 17 // can't handle multi-segment data sources 20 throw semantic_error("constant targets only support single-segment sources"); 23 // always relocate the segment to our begin address 29 // we have an end address. trim the result range to the segment size 30 // or let the end address crop the segment. 31 range.m_end = std::min<uint32_t>(m_end, m_begin + segment.getLength()); 35 // we have no end address, so the segment size determines it. 36 range.m_end = m_begin + segment.getLength() [all...] |
| DataSourceImager.cpp | 54 //! \param segment The segment to add. May be any type of data segment, including 55 //! a pattern segment. 56 void DataSourceImager::addDataSegment(DataSource::Segment * segment) 58 DataSource::PatternSegment * patternSegment = dynamic_cast<DataSource::PatternSegment*>(segment); 60 unsigned segmentLength = segment->getLength(); 61 bool segmentHasLocation = segment->hasNaturalLocation(); 62 uint32_t segmentAddress = segment->getBaseAddress() [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_procmaps_solaris.cc | 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 39 segment->start = (uptr)xmapentry->pr_vaddr; 40 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size); 41 segment->offset = (uptr)xmapentry->pr_offset; 43 segment->protection = 0; 45 segment->protection |= kProtectionRead; 47 segment->protection |= kProtectionWrite; 49 segment->protection |= kProtectionExecute; 51 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_linux.cc | 33 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 42 segment->start = ParseHex(&data_.current); 44 segment->end = ParseHex(&data_.current); 47 segment->protection = 0; 48 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; 50 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; 52 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; 54 if (*data_.current++ == 's') segment->protection |= kProtectionShared; 56 segment->offset = ParseHex(&data_.current); 69 if (segment->filename) [all...] |
| sanitizer_procmaps_bsd.cc | 101 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 109 segment->start = (uptr)VmEntry->kve_start; 110 segment->end = (uptr)VmEntry->kve_end; 111 segment->offset = (uptr)VmEntry->kve_offset; 113 segment->protection = 0; 115 segment->protection |= kProtectionRead; 117 segment->protection |= kProtectionWrite; 119 segment->protection |= kProtectionExecute; 122 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
| sanitizer_procmaps_mac.cc | 63 // data pointer, when there are no sections, or when the segment 96 // command size in bytes. We're interested only in segment load commands 101 // file offset of the current memory segment. 175 // NextSegmentLoad scans the current image for the next segment load command 177 // segment. 178 // Note that the segment addresses are not necessarily sorted. 180 static bool NextSegmentLoad(MemoryMappedSegment *segment, 192 // isn't actually the absolute segment address, but the offset portion 202 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr; 203 segment->end = segment->start + sc->vmsize [all...] |
| /src/sbin/fsck_lfs/ |
| segwrite.h | 31 * Determine if it's OK to start a partial in this segment, or if we need 32 * to go on to a new segment. 43 void lfs_writefile(struct lfs *, struct segment *, struct uvnode *); 44 int lfs_writeinode(struct lfs *, struct segment *, struct inode *); 45 int lfs_gatherblock(struct segment *, struct ubuf *); 46 int lfs_gather(struct lfs *, struct segment *, struct uvnode *, 48 void lfs_updatemeta(struct segment *); 51 int lfs_writeseg(struct lfs *, struct segment *); 64 int lfs_writevnodes(struct lfs *, struct segment *, int);
|
| /src/external/gpl3/binutils/dist/include/elf/ |
| internal.h | 87 unsigned long p_type; /* Identifies program segment type. */ 88 unsigned long p_flags; /* Segment flags. */ 89 bfd_vma p_offset; /* Segment file offset in octets. */ 90 bfd_vma p_vaddr; /* Segment virtual address in octets. */ 91 bfd_vma p_paddr; /* Segment physical address in octets. */ 92 bfd_vma p_filesz; /* Segment size in file in octets. */ 93 bfd_vma p_memsz; /* Segment size in memory in octets. */ 94 bfd_vma p_align; /* Segment alignment in bytes, file 264 /* Next program segment. */ 266 /* Program segment type. * [all...] |
| /src/external/gpl3/binutils.old/dist/include/elf/ |
| internal.h | 87 unsigned long p_type; /* Identifies program segment type. */ 88 unsigned long p_flags; /* Segment flags. */ 89 bfd_vma p_offset; /* Segment file offset in octets. */ 90 bfd_vma p_vaddr; /* Segment virtual address in octets. */ 91 bfd_vma p_paddr; /* Segment physical address in octets. */ 92 bfd_vma p_filesz; /* Segment size in file in octets. */ 93 bfd_vma p_memsz; /* Segment size in memory in octets. */ 94 bfd_vma p_align; /* Segment alignment in bytes, file 264 /* Next program segment. */ 266 /* Program segment type. * [all...] |
| /src/external/gpl3/gdb/dist/include/elf/ |
| internal.h | 87 unsigned long p_type; /* Identifies program segment type. */ 88 unsigned long p_flags; /* Segment flags. */ 89 bfd_vma p_offset; /* Segment file offset in octets. */ 90 bfd_vma p_vaddr; /* Segment virtual address in octets. */ 91 bfd_vma p_paddr; /* Segment physical address in octets. */ 92 bfd_vma p_filesz; /* Segment size in file in octets. */ 93 bfd_vma p_memsz; /* Segment size in memory in octets. */ 94 bfd_vma p_align; /* Segment alignment in bytes, file 264 /* Next program segment. */ 266 /* Program segment type. * [all...] |
| /src/external/gpl3/gdb.old/dist/include/elf/ |
| internal.h | 87 unsigned long p_type; /* Identifies program segment type. */ 88 unsigned long p_flags; /* Segment flags. */ 89 bfd_vma p_offset; /* Segment file offset in octets. */ 90 bfd_vma p_vaddr; /* Segment virtual address in octets. */ 91 bfd_vma p_paddr; /* Segment physical address in octets. */ 92 bfd_vma p_filesz; /* Segment size in file in octets. */ 93 bfd_vma p_memsz; /* Segment size in memory in octets. */ 94 bfd_vma p_align; /* Segment alignment in bytes, file 264 /* Next program segment. */ 266 /* Program segment type. * [all...] |
| /src/external/gpl3/gcc/dist/libsanitizer/tsan/ |
| tsan_platform_posix.cpp | 100 MemoryMappedSegment segment; local 101 while (proc_maps.Next(&segment)) { 102 if (IsAppMem(segment.start)) continue; 103 if (segment.start >= HeapMemEnd() && segment.start < HeapEnd()) continue; 104 if (segment.protection == 0) // Zero page or mprotected. 106 if (segment.start >= VdsoBeg()) // vdso 109 segment.start, segment.end);
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/tsan/ |
| tsan_platform_posix.cpp | 100 MemoryMappedSegment segment; local 101 while (proc_maps.Next(&segment)) { 102 if (IsAppMem(segment.start)) continue; 103 if (segment.start >= HeapMemEnd() && segment.start < HeapEnd()) continue; 104 if (segment.protection == 0) // Zero page or mprotected. 106 if (segment.start >= VdsoBeg()) // vdso 109 segment.start, segment.end);
|
| /src/external/gpl3/gcc/dist/libgcc/ |
| generic-morestack.c | 207 /* When we allocate a stack segment we put this header at the 212 /* The previous stack segment--when a function running on this stack 213 segment returns, it will run on the previous one. */ 215 /* The next stack segment, if it has been allocated--when a function 216 is running on this stack segment, the next one is not being 219 /* The total size of this stack segment. */ 282 /* The first stack segment allocated for this thread. */ 287 /* The stack segment that we think we are currently using. This will 289 unwinds into a different stack segment or if longjmp jumps to a 290 different stack segment. * 911 struct stack_segment *segment; local 1099 struct stack_segment *segment; local 1126 struct stack_segment *segment; local 1199 struct stack_segment *segment; local [all...] |