HomeSort by: relevance | last modified time | path
    Searched refs:segment (Results 1 - 25 of 379) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/
sanitizer_procmaps_solaris.cpp 33 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
41 segment->start = (uptr)xmapentry->pr_vaddr;
42 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size);
43 segment->offset = (uptr)xmapentry->pr_offset;
45 segment->protection = 0;
47 segment->protection |= kProtectionRead;
49 segment->protection |= kProtectionWrite;
51 segment->protection |= kProtectionExecute;
53 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_linux.cpp 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
41 segment->start = ParseHex(&data_.current);
43 segment->end = ParseHex(&data_.current);
46 segment->protection = 0;
47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead;
49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite;
51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute;
53 if (*data_.current++ == 's') segment->protection |= kProtectionShared;
55 segment->offset = ParseHex(&data_.current);
68 if (segment->filename)
    [all...]
sanitizer_procmaps_bsd.cpp 75 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
83 segment->start = (uptr)VmEntry->kve_start;
84 segment->end = (uptr)VmEntry->kve_end;
85 segment->offset = (uptr)VmEntry->kve_offset;
87 segment->protection = 0;
89 segment->protection |= kProtectionRead;
91 segment->protection |= kProtectionWrite;
93 segment->protection |= kProtectionExecute;
95 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_freebsd.cc 67 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
72 segment->start = (uptr)VmEntry->kve_start;
73 segment->end = (uptr)VmEntry->kve_end;
74 segment->offset = (uptr)VmEntry->kve_offset;
76 segment->protection = 0;
78 segment->protection |= kProtectionRead;
80 segment->protection |= kProtectionWrite;
82 segment->protection |= kProtectionExecute;
84 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_fuchsia.cpp 55 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
59 segment->start = entry.base;
60 segment->end = entry.base + entry.size;
61 segment->offset = entry.u.mapping.vmo_offset;
63 segment->protection =
67 if (segment->filename && segment->filename_size > 0) {
68 uptr len = Min(sizeof(entry.name), segment->filename_size) - 1;
69 internal_strncpy(segment->filename, entry.name, len);
70 segment->filename[len] = 0
    [all...]
sanitizer_procmaps_mac.cpp 62 // data pointer, when there are no sections, or when the segment
99 // command size in bytes. We're interested only in segment load commands
104 // file offset of the current memory segment.
178 // NextSegmentLoad scans the current image for the next segment load command
180 // segment.
181 // Note that the segment addresses are not necessarily sorted.
183 static bool NextSegmentLoad(MemoryMappedSegment *segment,
196 // isn't actually the absolute segment address, but the offset portion
206 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr;
207 segment->end = segment->start + sc->vmsize
    [all...]
  /src/external/gpl3/gcc/dist/libsanitizer/sanitizer_common/
sanitizer_procmaps_solaris.cpp 42 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
50 segment->start = (uptr)xmapentry->pr_vaddr;
51 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size);
52 segment->offset = (uptr)xmapentry->pr_offset;
54 segment->protection = 0;
56 segment->protection |= kProtectionRead;
58 segment->protection |= kProtectionWrite;
60 segment->protection |= kProtectionExecute;
62 segment->protection |= kProtectionShared;
64 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_linux.cpp 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
41 segment->start = ParseHex(&data_.current);
43 segment->end = ParseHex(&data_.current);
46 segment->protection = 0;
47 if (*data_.current++ == 'r') segment->protection |= kProtectionRead;
49 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite;
51 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute;
53 if (*data_.current++ == 's') segment->protection |= kProtectionShared;
55 segment->offset = ParseHex(&data_.current);
68 if (segment->filename)
    [all...]
sanitizer_procmaps_fuchsia.cpp 55 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
59 segment->start = entry.base;
60 segment->end = entry.base + entry.size;
61 segment->offset = entry.u.mapping.vmo_offset;
63 segment->protection =
67 if (segment->filename && segment->filename_size > 0) {
68 uptr len = Min(sizeof(entry.name), segment->filename_size) - 1;
69 internal_strncpy(segment->filename, entry.name, len);
70 segment->filename[len] = 0
    [all...]
sanitizer_procmaps_bsd.cpp 91 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
99 segment->start = (uptr)VmEntry->kve_start;
100 segment->end = (uptr)VmEntry->kve_end;
101 segment->offset = (uptr)VmEntry->kve_offset;
103 segment->protection = 0;
105 segment->protection |= kProtectionRead;
107 segment->protection |= kProtectionWrite;
109 segment->protection |= kProtectionExecute;
111 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_mac.cpp 62 // data pointer, when there are no sections, or when the segment
99 // command size in bytes. We're interested only in segment load commands
104 // file offset of the current memory segment.
202 // NextSegmentLoad scans the current image for the next segment load command
204 // segment.
205 // Note that the segment addresses are not necessarily sorted.
207 static bool NextSegmentLoad(MemoryMappedSegment *segment,
222 // isn't actually the absolute segment address, but the offset portion
232 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr;
233 segment->end = segment->start + sc->vmsize
    [all...]
  /src/external/bsd/elftosb/dist/common/
DataTarget.cpp 15 DataTarget::AddressRange ConstantDataTarget::getRangeForSegment(DataSource & source, DataSource::Segment & segment)
17 // can't handle multi-segment data sources
20 throw semantic_error("constant targets only support single-segment sources");
23 // always relocate the segment to our begin address
29 // we have an end address. trim the result range to the segment size
30 // or let the end address crop the segment.
31 range.m_end = std::min<uint32_t>(m_end, m_begin + segment.getLength());
35 // we have no end address, so the segment size determines it.
36 range.m_end = m_begin + segment.getLength()
    [all...]
DataSourceImager.cpp 54 //! \param segment The segment to add. May be any type of data segment, including
55 //! a pattern segment.
56 void DataSourceImager::addDataSegment(DataSource::Segment * segment)
58 DataSource::PatternSegment * patternSegment = dynamic_cast<DataSource::PatternSegment*>(segment);
60 unsigned segmentLength = segment->getLength();
61 bool segmentHasLocation = segment->hasNaturalLocation();
62 uint32_t segmentAddress = segment->getBaseAddress()
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_procmaps_solaris.cc 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
39 segment->start = (uptr)xmapentry->pr_vaddr;
40 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size);
41 segment->offset = (uptr)xmapentry->pr_offset;
43 segment->protection = 0;
45 segment->protection |= kProtectionRead;
47 segment->protection |= kProtectionWrite;
49 segment->protection |= kProtectionExecute;
51 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_linux.cc 33 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
42 segment->start = ParseHex(&data_.current);
44 segment->end = ParseHex(&data_.current);
47 segment->protection = 0;
48 if (*data_.current++ == 'r') segment->protection |= kProtectionRead;
50 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite;
52 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute;
54 if (*data_.current++ == 's') segment->protection |= kProtectionShared;
56 segment->offset = ParseHex(&data_.current);
69 if (segment->filename)
    [all...]
sanitizer_procmaps_bsd.cc 101 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) {
109 segment->start = (uptr)VmEntry->kve_start;
110 segment->end = (uptr)VmEntry->kve_end;
111 segment->offset = (uptr)VmEntry->kve_offset;
113 segment->protection = 0;
115 segment->protection |= kProtectionRead;
117 segment->protection |= kProtectionWrite;
119 segment->protection |= kProtectionExecute;
122 if (segment->filename != NULL && segment->filename_size > 0)
    [all...]
sanitizer_procmaps_mac.cc 63 // data pointer, when there are no sections, or when the segment
96 // command size in bytes. We're interested only in segment load commands
101 // file offset of the current memory segment.
175 // NextSegmentLoad scans the current image for the next segment load command
177 // segment.
178 // Note that the segment addresses are not necessarily sorted.
180 static bool NextSegmentLoad(MemoryMappedSegment *segment,
192 // isn't actually the absolute segment address, but the offset portion
202 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr;
203 segment->end = segment->start + sc->vmsize
    [all...]
  /src/sbin/fsck_lfs/
segwrite.h 31 * Determine if it's OK to start a partial in this segment, or if we need
32 * to go on to a new segment.
43 void lfs_writefile(struct lfs *, struct segment *, struct uvnode *);
44 int lfs_writeinode(struct lfs *, struct segment *, struct inode *);
45 int lfs_gatherblock(struct segment *, struct ubuf *);
46 int lfs_gather(struct lfs *, struct segment *, struct uvnode *,
48 void lfs_updatemeta(struct segment *);
51 int lfs_writeseg(struct lfs *, struct segment *);
64 int lfs_writevnodes(struct lfs *, struct segment *, int);
  /src/external/gpl3/binutils/dist/include/elf/
internal.h 87 unsigned long p_type; /* Identifies program segment type. */
88 unsigned long p_flags; /* Segment flags. */
89 bfd_vma p_offset; /* Segment file offset in octets. */
90 bfd_vma p_vaddr; /* Segment virtual address in octets. */
91 bfd_vma p_paddr; /* Segment physical address in octets. */
92 bfd_vma p_filesz; /* Segment size in file in octets. */
93 bfd_vma p_memsz; /* Segment size in memory in octets. */
94 bfd_vma p_align; /* Segment alignment in bytes, file
264 /* Next program segment. */
266 /* Program segment type. *
    [all...]
  /src/external/gpl3/binutils.old/dist/include/elf/
internal.h 87 unsigned long p_type; /* Identifies program segment type. */
88 unsigned long p_flags; /* Segment flags. */
89 bfd_vma p_offset; /* Segment file offset in octets. */
90 bfd_vma p_vaddr; /* Segment virtual address in octets. */
91 bfd_vma p_paddr; /* Segment physical address in octets. */
92 bfd_vma p_filesz; /* Segment size in file in octets. */
93 bfd_vma p_memsz; /* Segment size in memory in octets. */
94 bfd_vma p_align; /* Segment alignment in bytes, file
264 /* Next program segment. */
266 /* Program segment type. *
    [all...]
  /src/external/gpl3/gdb/dist/include/elf/
internal.h 87 unsigned long p_type; /* Identifies program segment type. */
88 unsigned long p_flags; /* Segment flags. */
89 bfd_vma p_offset; /* Segment file offset in octets. */
90 bfd_vma p_vaddr; /* Segment virtual address in octets. */
91 bfd_vma p_paddr; /* Segment physical address in octets. */
92 bfd_vma p_filesz; /* Segment size in file in octets. */
93 bfd_vma p_memsz; /* Segment size in memory in octets. */
94 bfd_vma p_align; /* Segment alignment in bytes, file
264 /* Next program segment. */
266 /* Program segment type. *
    [all...]
  /src/external/gpl3/gdb.old/dist/include/elf/
internal.h 87 unsigned long p_type; /* Identifies program segment type. */
88 unsigned long p_flags; /* Segment flags. */
89 bfd_vma p_offset; /* Segment file offset in octets. */
90 bfd_vma p_vaddr; /* Segment virtual address in octets. */
91 bfd_vma p_paddr; /* Segment physical address in octets. */
92 bfd_vma p_filesz; /* Segment size in file in octets. */
93 bfd_vma p_memsz; /* Segment size in memory in octets. */
94 bfd_vma p_align; /* Segment alignment in bytes, file
264 /* Next program segment. */
266 /* Program segment type. *
    [all...]
  /src/external/gpl3/gcc/dist/libsanitizer/tsan/
tsan_platform_posix.cpp 100 MemoryMappedSegment segment; local
101 while (proc_maps.Next(&segment)) {
102 if (IsAppMem(segment.start)) continue;
103 if (segment.start >= HeapMemEnd() && segment.start < HeapEnd()) continue;
104 if (segment.protection == 0) // Zero page or mprotected.
106 if (segment.start >= VdsoBeg()) // vdso
109 segment.start, segment.end);
  /src/external/gpl3/gcc.old/dist/libsanitizer/tsan/
tsan_platform_posix.cpp 100 MemoryMappedSegment segment; local
101 while (proc_maps.Next(&segment)) {
102 if (IsAppMem(segment.start)) continue;
103 if (segment.start >= HeapMemEnd() && segment.start < HeapEnd()) continue;
104 if (segment.protection == 0) // Zero page or mprotected.
106 if (segment.start >= VdsoBeg()) // vdso
109 segment.start, segment.end);
  /src/external/gpl3/gcc/dist/libgcc/
generic-morestack.c 207 /* When we allocate a stack segment we put this header at the
212 /* The previous stack segment--when a function running on this stack
213 segment returns, it will run on the previous one. */
215 /* The next stack segment, if it has been allocated--when a function
216 is running on this stack segment, the next one is not being
219 /* The total size of this stack segment. */
282 /* The first stack segment allocated for this thread. */
287 /* The stack segment that we think we are currently using. This will
289 unwinds into a different stack segment or if longjmp jumps to a
290 different stack segment. *
911 struct stack_segment *segment; local
1099 struct stack_segment *segment; local
1126 struct stack_segment *segment; local
1199 struct stack_segment *segment; local
    [all...]

Completed in 37 milliseconds

1 2 3 4 5 6 7 8 91011>>