Lines Matching defs:args

151 dtrace_safe_phdr(Phdr *phdrp, struct uarg *args, uintptr_t base)
163 args->thrptr = phdrp->p_vaddr + base;
207 mapexec_brand(vnode_t *vp, uarg_t *args, Ehdr *ehdr, Addr *uphdr_vaddr,
228 if (error = execpermissions(vp, &vat, args)) {
229 uprintf("%s: Cannot execute %s\n", exec_file, args->pathname);
237 uprintf("%s: Cannot read %s\n", exec_file, args->pathname);
242 uprintf("%s: Nothing to load in %s", exec_file, args->pathname);
252 uprintf("%s: Cannot map %s\n", exec_file, args->pathname);
282 elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap,
359 * Put data model that we're exec-ing to into the args passed to
366 args->to_model = DATAMODEL_ILP32;
369 args->to_model = DATAMODEL_LP64;
370 args->stk_prot &= ~PROT_EXEC;
372 args->dat_prot &= ~PROT_EXEC;
377 args->to_model = DATAMODEL_ILP32;
385 * args->to_model to see if the target is 32-bit or 64-bit without
396 error = BROP(p)->b_elfexec(vp, uap, args,
419 args->stk_prot = PROT_USER;
421 args->stk_prot |= PROT_READ;
423 args->stk_prot |= PROT_WRITE;
425 args->stk_prot |= PROT_EXEC;
445 /* Copy BSS permissions to args->dat_prot */
447 args->dat_prot = PROT_USER;
449 args->dat_prot |= PROT_READ;
451 args->dat_prot |= PROT_WRITE;
453 args->dat_prot |= PROT_EXEC;
491 args->auxsize = (9 + 5) * sizeof (aux_entry_t);
501 args->auxsize = (9 + 2) * sizeof (aux_entry_t);
503 args->auxsize = 9 * sizeof (aux_entry_t);
506 args->auxsize = 0;
513 if (args->emulator != NULL)
514 args->auxsize += sizeof (aux_entry_t);
522 args->auxsize += 4 * sizeof (aux_entry_t);
587 if (args->to_model == DATAMODEL_LP64)
588 args->addr32 = 1;
596 * Move args to the user's stack.
599 if ((error = exec_args(uap, args, idatap, (void **)&aux)) != 0) {
627 if (dtrphdr != NULL && dtrace_safe_phdr(dtrphdr, args, voffset) != 0) {
683 if (_ptr = strrchr(args->pathname, '/')) {
684 len = _ptr - args->pathname;
688 bcopy(args->pathname, &pathbufp[curlen], len);
758 if ((error = execpermissions(nvp, &bigwad->vattr, args)) != 0) {
810 dtrace_safe_phdr(dtrphdr, args, voffset) != 0) {
860 args->auxp_auxflags =
861 (char *)((char *)args->stackend +
872 if (args->to_model == DATAMODEL_NATIVE) {
888 args->auxp_brand =
889 (char *)((char *)args->stackend +
908 if (postfixsize != args->auxsize) {
910 int, args->auxsize);
942 error = execpoststack(args, bigwad->elfargs, postfixsize);
964 args->entry = (uintptr_t)(ehdrp->e_entry + voffset);
2309 extern int elf32exec(vnode_t *vp, execa_t *uap, uarg_t *args,