/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_procmaps_solaris.cc | 32 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 39 segment->start = (uptr)xmapentry->pr_vaddr; 40 segment->end = (uptr)(xmapentry->pr_vaddr + xmapentry->pr_size); 41 segment->offset = (uptr)xmapentry->pr_offset; 43 segment->protection = 0; 45 segment->protection |= kProtectionRead; 47 segment->protection |= kProtectionWrite; 49 segment->protection |= kProtectionExecute; 51 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
sanitizer_procmaps_linux.cc | 33 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 42 segment->start = ParseHex(&data_.current); 44 segment->end = ParseHex(&data_.current); 47 segment->protection = 0; 48 if (*data_.current++ == 'r') segment->protection |= kProtectionRead; 50 if (*data_.current++ == 'w') segment->protection |= kProtectionWrite; 52 if (*data_.current++ == 'x') segment->protection |= kProtectionExecute; 54 if (*data_.current++ == 's') segment->protection |= kProtectionShared; 56 segment->offset = ParseHex(&data_.current); 69 if (segment->filename) [all...] |
sanitizer_procmaps_bsd.cc | 101 bool MemoryMappingLayout::Next(MemoryMappedSegment *segment) { 109 segment->start = (uptr)VmEntry->kve_start; 110 segment->end = (uptr)VmEntry->kve_end; 111 segment->offset = (uptr)VmEntry->kve_offset; 113 segment->protection = 0; 115 segment->protection |= kProtectionRead; 117 segment->protection |= kProtectionWrite; 119 segment->protection |= kProtectionExecute; 122 if (segment->filename != NULL && segment->filename_size > 0) [all...] |
sanitizer_procmaps_mac.cc | 63 // data pointer, when there are no sections, or when the segment 96 // command size in bytes. We're interested only in segment load commands 101 // file offset of the current memory segment. 175 // NextSegmentLoad scans the current image for the next segment load command 177 // segment. 178 // Note that the segment addresses are not necessarily sorted. 180 static bool NextSegmentLoad(MemoryMappedSegment *segment, 192 // isn't actually the absolute segment address, but the offset portion 202 segment->start = (sc->vmaddr & addr_mask) + base_virt_addr; 203 segment->end = segment->start + sc->vmsize 354 MemoryMappedSegment segment(module_name.data(), kMaxPathLength); local in function:__sanitizer::MemoryMappingLayout::DumpListOfModules [all...] |
sanitizer_posix.cc | 238 MemoryMappedSegment segment; local in function:__sanitizer::MemoryRangeIsAvailable 239 while (proc_maps.Next(&segment)) { 240 if (segment.start == segment.end) continue; // Empty range. 241 CHECK_NE(0, segment.end); 242 if (!IntervalsAreSeparate(segment.start, segment.end - 1, range_start, 253 MemoryMappedSegment segment(filename, kBufSize); local in function:__sanitizer::DumpProcessMap 255 while (proc_maps.Next(&segment)) { 256 Printf("\t%p-%p\t%s\n", (void *)segment.start, (void *)segment.end 284 MemoryMappedSegment segment(buff.data(), kMaxPathLength); local in function:__sanitizer::GetCodeRangeForFile [all...] |
sanitizer_procmaps_common.cc | 125 MemoryMappedSegment segment(module_name.data(), module_name.size()); local in function:__sanitizer::MemoryMappingLayout::DumpListOfModules 126 for (uptr i = 0; Next(&segment); i++) { 127 const char *cur_name = segment.filename; 141 uptr base_address = (i ? segment.start : 0) - segment.offset; 144 segment.AddAddressRanges(&cur_module);
|
sanitizer_symbolizer_report.cc | 132 MemoryMappedSegment segment; local in function:__sanitizer::MaybeReportNonExecRegion 133 while (proc_maps.Next(&segment)) { 134 if (pc >= segment.start && pc < segment.end && !segment.IsExecutable())
|
sanitizer_procmaps.h | 72 bool Next(MemoryMappedSegment *segment);
|
sanitizer_linux_libcdep.cc | 110 MemoryMappedSegment segment; local in function:__sanitizer::GetThreadStackTopAndBottom 112 while (proc_maps.Next(&segment)) { 113 if ((uptr)&rl < segment.end) break; 114 prev_end = segment.end; 116 CHECK((uptr)&rl >= segment.start && (uptr)&rl < segment.end); 121 if (stacksize > segment.end - prev_end) stacksize = segment.end - prev_end; 127 *stack_top = segment.end; 128 *stack_bottom = segment.end - stacksize [all...] |
/src/sbin/fsck_lfs/ |
segwrite.h | 31 * Determine if it's OK to start a partial in this segment, or if we need 32 * to go on to a new segment. 43 void lfs_writefile(struct lfs *, struct segment *, struct uvnode *); 44 int lfs_writeinode(struct lfs *, struct segment *, struct inode *); 45 int lfs_gatherblock(struct segment *, struct ubuf *); 46 int lfs_gather(struct lfs *, struct segment *, struct uvnode *, 48 void lfs_updatemeta(struct segment *); 51 int lfs_writeseg(struct lfs *, struct segment *); 64 int lfs_writevnodes(struct lfs *, struct segment *, int);
|
/src/sys/arch/x86/include/ |
bios32.h | 68 u_int16_t segment; member in struct:bios32_entry
|
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
tsan_platform_posix.cc | 138 MemoryMappedSegment segment; local in function:__tsan::CheckAndProtect 139 while (proc_maps.Next(&segment)) { 140 if (IsAppMem(segment.start)) continue; 141 if (segment.start >= HeapMemEnd() && segment.start < HeapEnd()) continue; 142 if (segment.protection == 0) // Zero page or mprotected. 144 if (segment.start >= VdsoBeg()) // vdso 147 segment.start, segment.end);
|
tsan_platform_linux.cc | 186 MemoryMappedSegment segment(name, ARRAY_SIZE(name)); local in function:__tsan::MapRodata 187 while (proc_maps.Next(&segment)) { 188 if (segment.filename[0] != 0 && segment.filename[0] != '[' && 189 segment.IsReadable() && segment.IsExecutable() && 190 !segment.IsWritable() && IsAppMem(segment.start)) { 192 char *shadow_start = (char *)MemToShadow(segment.start); 193 char *shadow_end = (char *)MemToShadow(segment.end) [all...] |
/src/usr.sbin/altq/libaltq/ |
qop_hfsc.h | 34 struct segment { struct 35 LIST_ENTRY(segment) _next; 39 typedef LIST_HEAD(gen_sc, segment) gsc_head_t;
|
/src/sys/ufs/lfs/ |
lfs_extern.h | 108 struct segment; 177 void lfs_check_bpp(struct lfs *, struct segment *, char *, int); 178 void lfs_check_segsum(struct lfs *, struct segment *, char *, int); 201 int lfs_writefile(struct lfs *, struct segment *, struct vnode *); 202 int lfs_writeinode(struct lfs *, struct segment *, struct inode *); 203 int lfs_gatherblock(struct segment *, struct buf *, kmutex_t *); 204 int lfs_gather(struct lfs *, struct segment *, struct vnode *, int (*match )(struct lfs *, struct buf *)); 205 void lfs_update_single(struct lfs *, struct segment *, struct vnode *, 207 void lfs_updatemeta(struct segment *); 211 int lfs_writeseg(struct lfs *, struct segment *); [all...] |
lfs_kernel.h | 86 struct segment *seg; /* Segment structure, for LFS_CL_SYNC */
|
/src/sys/dev/acpi/ |
acpi_pci.c | 62 * Regarding PCI Segment Groups (ACPI 4.0, p. 277): 65 * evaluates to an integer that describes the PCI Segment Group (see PCI 68 * "PCI Segment Group is purely a software concept managed by system 73 * "PCI Segment Group supports more than 256 buses in a system by allowing 74 * the reuse of the PCI bus numbers. Within each PCI Segment Group, the bus 76 * Segment Group are permitted to have the same bus number." 86 * segment since it is the PCI bus number." 198 * to be in the PCI segment group 0 (ACPI 4.0, p. 277). 199 * The segment group number is conveyed in the lower 230 * denote a PCI device on the bridge's downstream bus segment 493 u_int segment; local in function:acpi_pci_bus_get_child_devhandle [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/dd/ |
dd_interceptors.cc | 274 MemoryMappedSegment segment(name, ARRAY_SIZE(name)); local in function:__dsan::InitDataSeg 276 while (proc_maps.Next(&segment)) { 277 bool is_data = segment.offset != 0 && segment.filename[0] != 0; 280 bool is_bss = segment.offset == 0 && 281 (segment.filename[0] == 0 || 282 internal_strcmp(segment.filename, "[heap]") == 0) && 284 if (g_data_start == 0 && is_data) g_data_start = segment.start; 285 if (is_bss) g_data_end = segment.end;
|
/src/dist/pf/sbin/pfctl/ |
pfctl.h | 103 struct segment { struct 104 LIST_ENTRY(segment) _next;
|
/src/sys/external/bsd/drm2/dist/drm/amd/display/dc/clk_mgr/dcn10/ |
amdgpu_rv1_clk_mgr_vbios_smu.c | 39 unsigned int segment[MAX_SEGMENT]; member in struct:IP_BASE_INSTANCE 68 (MP1_BASE.instance[0].segment[mm ## reg_name ## _BASE_IDX] + mm ## reg_name)
|
/src/sys/arch/i386/stand/pxeboot/ |
pxe.c | 133 uw->buffer.segment = VTOPSEG(pkt); 168 ur->buffer.segment = VTOPSEG(pkt); 361 bangpxe_seg = pxe->EntryPointSP.segment; 365 pxenv_seg = pxenv->RMEntry.segment; 369 * Pre-compute the segment/offset of the pxe_command_buf 386 pvbcopy((void *)((gci->Buffer.segment << 4) + gci->Buffer.offset),
|
/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_linux.cc | 219 MemoryMappedSegment segment(filename, sizeof(filename)); local in function:__asan::AsanCheckIncompatibleRT 220 while (proc_maps.Next(&segment)) { 221 if (IsDynamicRTName(segment.filename)) {
|
/src/sys/external/bsd/drm2/dist/drm/amd/display/dc/ |
dm_services.h | 172 dm_write_reg_func(ctx, reg + DCE_BASE.instance[0].segment[reg##_BASE_IDX] + inst_offset, value, __func__) 175 dm_read_reg_func(ctx, reg + DCE_BASE.instance[0].segment[reg##_BASE_IDX] + inst_offset, __func__) 178 generic_reg_update_ex(ctx, DCE_BASE.instance[0].segment[mm##reg_name##_BASE_IDX] + mm##reg_name + inst_offset, \ 182 generic_reg_set_ex(ctx, DCE_BASE.instance[0].segment[mm##reg_name##_BASE_IDX] + mm##reg_name + inst_offset, 0, \
|
/src/sys/arch/sun2/sun2/ |
locore.s | 93 | of the kernel text segment (not necessarily the same as kernbase).
|
/src/sys/arch/i386/stand/dosboot/ |
start_dos.S | 89 /* kernel code segment */ 95 /* kernel data segment */ 101 /* boot code segment, base will be patched */ 106 /* boot data segment, base will be patched */ 121 /* limits (etc) for data segment in real mode */ 223 # set up the protected mode segment registers : DS, SS, ES 246 # code segment, and an intersegment return does not give us that. 252 * Load the segment registers while still in protected mode. 272 ljmp $0, $xreal /* segment patched above */ 276 # set up the real mode segment registers : DS, SS, E [all...] |