HomeSort by: relevance | last modified time | path
    Searched refs:beg (Results 1 - 25 of 67) sorted by relevancy

1 2 3

  /src/bin/ksh/
expand.h 11 char *end, *beg; /* end, begin of string */ member in struct:XString
22 (xs).beg = alloc((xs).len + X_EXTRA, (xs).areap); \
23 (xs).end = (xs).beg + (xs).len; \
24 xp = (xs).beg; \
42 #define Xfree(xs, xp) afree((void*) (xs).beg, (xs).areap)
45 #define Xclose(xs, xp) (char*) aresize((void*)(xs).beg, \
46 (size_t)((xp) - (xs).beg), (xs).areap)
48 #define Xstring(xs, xp) ((xs).beg)
51 #define Xlength(xs, xp) ((xp) - (xs).beg)
52 #define Xsize(xs, xp) ((xs).end - (xs).beg)
64 void **beg, **end; \/* begin, end of vector *\/ member in struct:XPtrV
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/asan/
asan_poisoning.cc 114 ShadowSegmentEndpoint beg(beg_addr); local in function:__asan_poison_memory_region
116 if (beg.chunk == end.chunk) {
117 CHECK_LT(beg.offset, end.offset);
118 s8 value = beg.value;
123 if (beg.offset > 0) {
124 *beg.chunk = Min(value, beg.offset);
126 *beg.chunk = kAsanUserPoisonedMemoryMagic;
131 CHECK_LT(beg.chunk, end.chunk);
132 if (beg.offset > 0)
154 ShadowSegmentEndpoint beg(beg_addr); local in function:__asan_unpoison_memory_region
362 uptr beg = reinterpret_cast<uptr>(beg_p); local in function:__sanitizer_annotate_contiguous_container
410 uptr beg = reinterpret_cast<uptr>(beg_p); local in function:__sanitizer_contiguous_container_find_bad_address
    [all...]
asan_interceptors_memintrinsics.h 29 static inline bool QuickCheckForUnpoisonedRegion(uptr beg, uptr size) {
32 return !AddressIsPoisoned(beg) &&
33 !AddressIsPoisoned(beg + size - 1) &&
34 !AddressIsPoisoned(beg + size / 2);
36 return !AddressIsPoisoned(beg) &&
37 !AddressIsPoisoned(beg + size / 4) &&
38 !AddressIsPoisoned(beg + size - 1) &&
39 !AddressIsPoisoned(beg + 3 * size / 4) &&
40 !AddressIsPoisoned(beg + size / 2);
asan_shadow_setup.cc 27 // Reserve memory range [beg, end].
29 void ReserveShadowMemoryRange(uptr beg, uptr end, const char *name) {
30 CHECK_EQ((beg % GetMmapGranularity()), 0);
32 uptr size = end - beg + 1;
34 if (!MmapFixedNoReserve(beg, size, name)) {
41 if (common_flags()->no_huge_pages_for_shadow) NoHugePagesInRegion(beg, size);
42 if (common_flags()->use_madv_dontdump) DontDumpShadowMemory(beg, size);
asan_globals.cc 61 FastPoisonShadow(g->beg, g->size_with_redzone, value);
66 FastPoisonShadow(g.beg + aligned_size, g.size_with_redzone - aligned_size,
70 g.beg + RoundDownTo(g.size, SHADOW_GRANULARITY),
80 if (addr <= g.beg - kMinimalDistanceFromAnotherGlobal) return false;
81 if (addr >= g.beg + g.size_with_redzone) return false;
87 "%s Global[%p]: beg=%p size=%zu/%zu name=%s module=%s dyn_init=%zu "
89 prefix, &g, (void *)g.beg, g.size, g.size_with_redzone, g.name,
161 if (__asan_region_is_poisoned(g->beg, g->size_with_redzone)) {
165 if (g->beg == l->g->beg &
    [all...]
asan_descriptions.cc 122 descr->chunk_begin = chunk.Beg();
228 uptr var_end = var.beg + var.size;
231 // If the variable [var.beg, var_end) is the nearest variable to the
233 if (addr >= var.beg) {
242 if (addr_end > var.beg)
244 else if (addr >= prev_var_end && addr - prev_var_end >= var.beg - addr_end)
248 str.append(" [%zd, %zd)", var.beg, var_end);
283 if (addr < g.beg) {
285 g.beg - addr);
286 } else if (addr + access_size > g.beg + g.size)
    [all...]
asan_fake_stack.cc 118 uptr beg = reinterpret_cast<uptr>(GetFrame(stack_size_log, 0, 0)); local in function:__asan::FakeStack::AddrIsInFakeStack
120 if (ptr < beg || ptr >= end) return 0;
121 uptr class_id = (ptr - beg) >> stack_size_log;
122 uptr base = beg + (class_id << stack_size_log);
249 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,
259 if (beg) *beg = reinterpret_cast<void*>(frame_beg);
asan_debugging.cc 37 if (offset <= vars[i].beg + vars[i].size) {
43 region_address = addr - (offset - vars[i].beg);
118 region_address = g.beg;
  /src/lib/libc/compat/gen/
compat_timezone.c 69 char *beg, local in function:timezone
72 if ((beg = getenv("TZNAME")) != NULL) { /* set in environment */
73 if ((end = strchr(beg, ',')) != NULL) { /* "PST,PDT" */
77 (void)strlcpy(czone, beg, sizeof(czone));
81 return(beg);
  /src/sys/external/bsd/compiler_rt/dist/lib/msan/
msan_poisoning.cc 48 uptr beg = d & ~3UL; local in function:__msan::CopyOrigin
50 if (beg < d) {
51 u32 o = GetOriginIfPoisoned((uptr)src, d - beg);
54 *(u32 *)MEM_TO_ORIGIN(beg) = o;
56 beg += 4;
61 if (end < beg) return;
72 if (beg < end) {
79 u32 *src_end = (u32 *)MEM_TO_ORIGIN(s + (end - beg));
80 u32 *dst = (u32 *)MEM_TO_ORIGIN(beg);
92 REAL(memcpy)((void *)MEM_TO_ORIGIN(beg), (void *)MEM_TO_ORIGIN(s)
153 uptr beg = x & ~3UL; \/\/ align down. local in function:__msan::SetOrigin
    [all...]
msan_linux.cc 39 void ReportMapRange(const char *descr, uptr beg, uptr size) {
41 uptr end = beg + size - 1;
42 VPrintf(1, "%s : %p - %p\n", descr, beg, end);
46 static bool CheckMemoryRangeAvailability(uptr beg, uptr size) {
48 uptr end = beg + size - 1;
49 if (!MemoryRangeIsAvailable(beg, end)) {
50 Printf("FATAL: Memory range %p - %p is not available.\n", beg, end);
57 static bool ProtectMemoryRange(uptr beg, uptr size, const char *name) {
59 void *addr = MmapFixedNoAccess(beg, size, name);
60 if (beg == 0 && addr)
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_tls_get_addr.h 38 // If beg == 0, the chunk is unused.
40 uptr beg, size; member in struct:__sanitizer::DTLS::DTV
sanitizer_interface_internal.h 62 void __sanitizer_annotate_contiguous_container(const void *beg,
67 int __sanitizer_verify_contiguous_container(const void *beg, const void *mid,
71 const void *beg, const void *mid, const void *end);
sanitizer_libignore.cc 85 ignored_code_ranges_[idx].begin = range.beg;
107 if (IsPcInstrumented(range.beg) && IsPcInstrumented(range.end - 1))
110 range.beg, range.end, mod.full_name());
114 instrumented_code_ranges_[idx].begin = range.beg;
sanitizer_allocator_secondary.h 227 uptr beg = 0, end = n - 1; local in function:LargeMmapAllocator::GetBlockBeginFastLocked
230 while (end - beg >= 2) {
231 uptr mid = (beg + end) / 2; // Invariant: mid >= beg + 1
235 beg = mid; // chunks_[mid] may still be what we want.
238 if (beg < end) {
239 CHECK_EQ(beg + 1, end);
242 beg = end;
245 Header *h = chunks_[beg];
sanitizer_allocator_primary32.h 138 void UnmapWithCallback(uptr beg, uptr size) {
139 MapUnmapCallback().OnUnmap(beg, size);
140 UnmapOrDie(reinterpret_cast<void *>(beg), size);
151 uptr beg = ComputeRegionBeg(mem); local in function:SizeClassAllocator32::GetMetaData
153 u32 offset = mem - beg;
155 uptr meta = (beg + kRegionSize) - (n + 1) * kMetadataSize;
197 uptr beg = ComputeRegionBeg(mem); local in function:SizeClassAllocator32::GetBlockBegin
199 u32 offset = mem - beg;
201 uptr res = beg + (n * (u32)size);
sanitizer_file.cc 183 const char *beg = path; local in function:__sanitizer::FindPathToBinary
185 const char *end = internal_strchrnul(beg, kPathSeparator);
186 uptr prefix_len = end - beg;
188 internal_memcpy(buffer.data(), beg, prefix_len);
196 beg = end + 1;
  /src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/
tsan_platform_posix.cc 124 static void ProtectRange(uptr beg, uptr end) {
125 CHECK_LE(beg, end);
126 if (beg == end)
128 if (beg != (uptr)MmapFixedNoAccess(beg, end - beg)) {
129 Printf("FATAL: ThreadSanitizer can not protect [%zx,%zx]\n", beg, end);
  /src/sys/external/bsd/compiler_rt/dist/include/sanitizer/
common_interface_defs.h 77 // [beg, end); the memory [beg, mid) is used to store the current elements
79 // beg <= mid <= end. For example, in "std::vector<> v"
80 // beg = &v[0];
81 // end = beg + v.capacity() * sizeof(v[0]);
82 // mid = beg + v.size() * sizeof(v[0]);
93 // For AddressSanitizer, 'beg' should be 8-aligned and 'end' should
97 // char *beg = (char *)&x[0];
98 // char *end = beg + 12; // Not 8 aligned, not the end of the buffer.
101 // char *beg = (char*)&x[0]
    [all...]
asan_interface.h 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
60 void *__asan_region_is_poisoned(void *beg, size_t size);
139 // the fake frame and sets beg/end to the boundaries of this fake frame.
140 // Otherwise returns NULL and does not touch beg/end.
141 // If beg/end are NULL, they are not touched.
144 void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/
sanitizer_libc_test.cc 47 for (size_t beg = 0; beg < size; beg++) { local in function:TEST
48 for (size_t end = beg; end < size; end++) {
49 // fprintf(stderr, "pos %zd beg %zd end %zd \n", pos, beg, end);
50 if (beg <= pos && pos < end)
51 EXPECT_FALSE(__sanitizer::mem_is_zero(x + beg, end - beg));
53 EXPECT_TRUE(__sanitizer::mem_is_zero(x + beg, end - beg))
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/
asan_interface_test.cc 333 for (size_t beg = 0; beg < size + rz; beg++) { local in function:TEST
334 for (size_t end = beg; end < size + rz; end++) {
335 void *first_poisoned = __asan_region_is_poisoned(p + beg, end - beg);
336 if (beg == end) {
338 } else if (beg < size && end <= size) {
340 } else if (beg >= size) {
341 EXPECT_EQ(p + beg, first_poisoned)
    [all...]
  /src/sbin/scan_ffs/
scan_ffs.c 397 show_status(uintmax_t beg, uintmax_t total)
401 const uintmax_t done = blk - beg;
420 scan_disk(int fd, daddr_t beg, daddr_t end, int fflags)
436 const daddr_t total = end - beg;
437 for (blk = beg; blk <= end; blk += SBPASS) {
439 show_status(beg, total);
494 daddr_t end = -1, beg = 0; local in function:main
519 beg = atoi(optarg);
571 return scan_disk(fd, beg, end, flags);
  /src/sys/arch/hpcmips/dev/
plumvideo.c 616 u_int32_t *rgb, int beg, int cnt)
620 for (i = 0, beg *= 4; i < cnt; i++, beg += 4) {
621 *rgb++ = bus_space_read_4(iot, ioh, beg) &
627 plumvideo_clut_get(struct plumvideo_softc *sc, u_int32_t *rgb, int beg,
631 KASSERT(LEGAL_CLUT_INDEX(beg));
632 KASSERT(LEGAL_CLUT_INDEX(beg + cnt - 1));
633 __plumvideo_clut_access(sc, rgb, beg, cnt, __plumvideo_clut_get);
639 u_int32_t *rgb, int beg, int cnt)
643 for (i = 0, beg *= 4; i < cnt; i++, beg +=4)
    [all...]
  /src/usr.bin/whatis/
whatis.c 76 char *beg, *conffile, **p, *p_augment, *p_path; local in function:main
108 if ((beg = strrchr(*p, '/')))
109 *p = beg + 1;

Completed in 20 milliseconds

1 2 3