/src/bin/ksh/ |
expand.h | 11 char *end, *beg; /* end, begin of string */ member in struct:XString 22 (xs).beg = alloc((xs).len + X_EXTRA, (xs).areap); \ 23 (xs).end = (xs).beg + (xs).len; \ 24 xp = (xs).beg; \ 42 #define Xfree(xs, xp) afree((void*) (xs).beg, (xs).areap) 45 #define Xclose(xs, xp) (char*) aresize((void*)(xs).beg, \ 46 (size_t)((xp) - (xs).beg), (xs).areap) 48 #define Xstring(xs, xp) ((xs).beg) 51 #define Xlength(xs, xp) ((xp) - (xs).beg) 52 #define Xsize(xs, xp) ((xs).end - (xs).beg) 64 void **beg, **end; \/* begin, end of vector *\/ member in struct:XPtrV [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_poisoning.cc | 114 ShadowSegmentEndpoint beg(beg_addr); local in function:__asan_poison_memory_region 116 if (beg.chunk == end.chunk) { 117 CHECK_LT(beg.offset, end.offset); 118 s8 value = beg.value; 123 if (beg.offset > 0) { 124 *beg.chunk = Min(value, beg.offset); 126 *beg.chunk = kAsanUserPoisonedMemoryMagic; 131 CHECK_LT(beg.chunk, end.chunk); 132 if (beg.offset > 0) 154 ShadowSegmentEndpoint beg(beg_addr); local in function:__asan_unpoison_memory_region 362 uptr beg = reinterpret_cast<uptr>(beg_p); local in function:__sanitizer_annotate_contiguous_container 410 uptr beg = reinterpret_cast<uptr>(beg_p); local in function:__sanitizer_contiguous_container_find_bad_address [all...] |
asan_interceptors_memintrinsics.h | 29 static inline bool QuickCheckForUnpoisonedRegion(uptr beg, uptr size) { 32 return !AddressIsPoisoned(beg) && 33 !AddressIsPoisoned(beg + size - 1) && 34 !AddressIsPoisoned(beg + size / 2); 36 return !AddressIsPoisoned(beg) && 37 !AddressIsPoisoned(beg + size / 4) && 38 !AddressIsPoisoned(beg + size - 1) && 39 !AddressIsPoisoned(beg + 3 * size / 4) && 40 !AddressIsPoisoned(beg + size / 2);
|
asan_shadow_setup.cc | 27 // Reserve memory range [beg, end]. 29 void ReserveShadowMemoryRange(uptr beg, uptr end, const char *name) { 30 CHECK_EQ((beg % GetMmapGranularity()), 0); 32 uptr size = end - beg + 1; 34 if (!MmapFixedNoReserve(beg, size, name)) { 41 if (common_flags()->no_huge_pages_for_shadow) NoHugePagesInRegion(beg, size); 42 if (common_flags()->use_madv_dontdump) DontDumpShadowMemory(beg, size);
|
asan_globals.cc | 61 FastPoisonShadow(g->beg, g->size_with_redzone, value); 66 FastPoisonShadow(g.beg + aligned_size, g.size_with_redzone - aligned_size, 70 g.beg + RoundDownTo(g.size, SHADOW_GRANULARITY), 80 if (addr <= g.beg - kMinimalDistanceFromAnotherGlobal) return false; 81 if (addr >= g.beg + g.size_with_redzone) return false; 87 "%s Global[%p]: beg=%p size=%zu/%zu name=%s module=%s dyn_init=%zu " 89 prefix, &g, (void *)g.beg, g.size, g.size_with_redzone, g.name, 161 if (__asan_region_is_poisoned(g->beg, g->size_with_redzone)) { 165 if (g->beg == l->g->beg & [all...] |
asan_descriptions.cc | 122 descr->chunk_begin = chunk.Beg(); 228 uptr var_end = var.beg + var.size; 231 // If the variable [var.beg, var_end) is the nearest variable to the 233 if (addr >= var.beg) { 242 if (addr_end > var.beg) 244 else if (addr >= prev_var_end && addr - prev_var_end >= var.beg - addr_end) 248 str.append(" [%zd, %zd)", var.beg, var_end); 283 if (addr < g.beg) { 285 g.beg - addr); 286 } else if (addr + access_size > g.beg + g.size) [all...] |
asan_fake_stack.cc | 118 uptr beg = reinterpret_cast<uptr>(GetFrame(stack_size_log, 0, 0)); local in function:__asan::FakeStack::AddrIsInFakeStack 120 if (ptr < beg || ptr >= end) return 0; 121 uptr class_id = (ptr - beg) >> stack_size_log; 122 uptr base = beg + (class_id << stack_size_log); 249 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, 259 if (beg) *beg = reinterpret_cast<void*>(frame_beg);
|
asan_debugging.cc | 37 if (offset <= vars[i].beg + vars[i].size) { 43 region_address = addr - (offset - vars[i].beg); 118 region_address = g.beg;
|
/src/lib/libc/compat/gen/ |
compat_timezone.c | 69 char *beg, local in function:timezone 72 if ((beg = getenv("TZNAME")) != NULL) { /* set in environment */ 73 if ((end = strchr(beg, ',')) != NULL) { /* "PST,PDT" */ 77 (void)strlcpy(czone, beg, sizeof(czone)); 81 return(beg);
|
/src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
msan_poisoning.cc | 48 uptr beg = d & ~3UL; local in function:__msan::CopyOrigin 50 if (beg < d) { 51 u32 o = GetOriginIfPoisoned((uptr)src, d - beg); 54 *(u32 *)MEM_TO_ORIGIN(beg) = o; 56 beg += 4; 61 if (end < beg) return; 72 if (beg < end) { 79 u32 *src_end = (u32 *)MEM_TO_ORIGIN(s + (end - beg)); 80 u32 *dst = (u32 *)MEM_TO_ORIGIN(beg); 92 REAL(memcpy)((void *)MEM_TO_ORIGIN(beg), (void *)MEM_TO_ORIGIN(s) 153 uptr beg = x & ~3UL; \/\/ align down. local in function:__msan::SetOrigin [all...] |
msan_linux.cc | 39 void ReportMapRange(const char *descr, uptr beg, uptr size) { 41 uptr end = beg + size - 1; 42 VPrintf(1, "%s : %p - %p\n", descr, beg, end); 46 static bool CheckMemoryRangeAvailability(uptr beg, uptr size) { 48 uptr end = beg + size - 1; 49 if (!MemoryRangeIsAvailable(beg, end)) { 50 Printf("FATAL: Memory range %p - %p is not available.\n", beg, end); 57 static bool ProtectMemoryRange(uptr beg, uptr size, const char *name) { 59 void *addr = MmapFixedNoAccess(beg, size, name); 60 if (beg == 0 && addr) [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_tls_get_addr.h | 38 // If beg == 0, the chunk is unused. 40 uptr beg, size; member in struct:__sanitizer::DTLS::DTV
|
sanitizer_interface_internal.h | 62 void __sanitizer_annotate_contiguous_container(const void *beg, 67 int __sanitizer_verify_contiguous_container(const void *beg, const void *mid, 71 const void *beg, const void *mid, const void *end);
|
sanitizer_libignore.cc | 85 ignored_code_ranges_[idx].begin = range.beg; 107 if (IsPcInstrumented(range.beg) && IsPcInstrumented(range.end - 1)) 110 range.beg, range.end, mod.full_name()); 114 instrumented_code_ranges_[idx].begin = range.beg;
|
sanitizer_allocator_secondary.h | 227 uptr beg = 0, end = n - 1; local in function:LargeMmapAllocator::GetBlockBeginFastLocked 230 while (end - beg >= 2) { 231 uptr mid = (beg + end) / 2; // Invariant: mid >= beg + 1 235 beg = mid; // chunks_[mid] may still be what we want. 238 if (beg < end) { 239 CHECK_EQ(beg + 1, end); 242 beg = end; 245 Header *h = chunks_[beg];
|
sanitizer_allocator_primary32.h | 138 void UnmapWithCallback(uptr beg, uptr size) { 139 MapUnmapCallback().OnUnmap(beg, size); 140 UnmapOrDie(reinterpret_cast<void *>(beg), size); 151 uptr beg = ComputeRegionBeg(mem); local in function:SizeClassAllocator32::GetMetaData 153 u32 offset = mem - beg; 155 uptr meta = (beg + kRegionSize) - (n + 1) * kMetadataSize; 197 uptr beg = ComputeRegionBeg(mem); local in function:SizeClassAllocator32::GetBlockBegin 199 u32 offset = mem - beg; 201 uptr res = beg + (n * (u32)size);
|
sanitizer_file.cc | 183 const char *beg = path; local in function:__sanitizer::FindPathToBinary 185 const char *end = internal_strchrnul(beg, kPathSeparator); 186 uptr prefix_len = end - beg; 188 internal_memcpy(buffer.data(), beg, prefix_len); 196 beg = end + 1;
|
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
tsan_platform_posix.cc | 124 static void ProtectRange(uptr beg, uptr end) { 125 CHECK_LE(beg, end); 126 if (beg == end) 128 if (beg != (uptr)MmapFixedNoAccess(beg, end - beg)) { 129 Printf("FATAL: ThreadSanitizer can not protect [%zx,%zx]\n", beg, end);
|
/src/sys/external/bsd/compiler_rt/dist/include/sanitizer/ |
common_interface_defs.h | 77 // [beg, end); the memory [beg, mid) is used to store the current elements 79 // beg <= mid <= end. For example, in "std::vector<> v" 80 // beg = &v[0]; 81 // end = beg + v.capacity() * sizeof(v[0]); 82 // mid = beg + v.size() * sizeof(v[0]); 93 // For AddressSanitizer, 'beg' should be 8-aligned and 'end' should 97 // char *beg = (char *)&x[0]; 98 // char *end = beg + 12; // Not 8 aligned, not the end of the buffer. 101 // char *beg = (char*)&x[0] [all...] |
asan_interface.h | 58 // If at least one byte in [beg, beg+size) is poisoned, return the address 60 void *__asan_region_is_poisoned(void *beg, size_t size); 139 // the fake frame and sets beg/end to the boundaries of this fake frame. 140 // Otherwise returns NULL and does not touch beg/end. 141 // If beg/end are NULL, they are not touched. 144 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_libc_test.cc | 47 for (size_t beg = 0; beg < size; beg++) { local in function:TEST 48 for (size_t end = beg; end < size; end++) { 49 // fprintf(stderr, "pos %zd beg %zd end %zd \n", pos, beg, end); 50 if (beg <= pos && pos < end) 51 EXPECT_FALSE(__sanitizer::mem_is_zero(x + beg, end - beg)); 53 EXPECT_TRUE(__sanitizer::mem_is_zero(x + beg, end - beg)) [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/ |
asan_interface_test.cc | 333 for (size_t beg = 0; beg < size + rz; beg++) { local in function:TEST 334 for (size_t end = beg; end < size + rz; end++) { 335 void *first_poisoned = __asan_region_is_poisoned(p + beg, end - beg); 336 if (beg == end) { 338 } else if (beg < size && end <= size) { 340 } else if (beg >= size) { 341 EXPECT_EQ(p + beg, first_poisoned) [all...] |
/src/sbin/scan_ffs/ |
scan_ffs.c | 397 show_status(uintmax_t beg, uintmax_t total) 401 const uintmax_t done = blk - beg; 420 scan_disk(int fd, daddr_t beg, daddr_t end, int fflags) 436 const daddr_t total = end - beg; 437 for (blk = beg; blk <= end; blk += SBPASS) { 439 show_status(beg, total); 494 daddr_t end = -1, beg = 0; local in function:main 519 beg = atoi(optarg); 571 return scan_disk(fd, beg, end, flags);
|
/src/sys/arch/hpcmips/dev/ |
plumvideo.c | 616 u_int32_t *rgb, int beg, int cnt) 620 for (i = 0, beg *= 4; i < cnt; i++, beg += 4) { 621 *rgb++ = bus_space_read_4(iot, ioh, beg) & 627 plumvideo_clut_get(struct plumvideo_softc *sc, u_int32_t *rgb, int beg, 631 KASSERT(LEGAL_CLUT_INDEX(beg)); 632 KASSERT(LEGAL_CLUT_INDEX(beg + cnt - 1)); 633 __plumvideo_clut_access(sc, rgb, beg, cnt, __plumvideo_clut_get); 639 u_int32_t *rgb, int beg, int cnt) 643 for (i = 0, beg *= 4; i < cnt; i++, beg +=4) [all...] |
/src/usr.bin/whatis/ |
whatis.c | 76 char *beg, *conffile, **p, *p_augment, *p_path; local in function:main 108 if ((beg = strrchr(*p, '/'))) 109 *p = beg + 1;
|