Lines Matching defs:args

153 dtrace_safe_phdr(Phdr *phdrp, struct uarg *args, uintptr_t base)
165 args->thrptr = phdrp->p_vaddr + base;
174 mapexec_brand(vnode_t *vp, uarg_t *args, Ehdr *ehdr, Addr *uphdr_vaddr,
195 if (error = execpermissions(vp, &vat, args)) {
196 uprintf("%s: Cannot execute %s\n", exec_file, args->pathname);
204 uprintf("%s: Cannot read %s\n", exec_file, args->pathname);
209 uprintf("%s: Nothing to load in %s", exec_file, args->pathname);
219 uprintf("%s: Cannot map %s\n", exec_file, args->pathname);
249 elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap,
324 * Put data model that we're exec-ing to into the args passed to
331 args->to_model = DATAMODEL_ILP32;
334 args->to_model = DATAMODEL_LP64;
335 args->stk_prot &= ~PROT_EXEC;
337 args->dat_prot &= ~PROT_EXEC;
342 args->to_model = DATAMODEL_ILP32;
350 * args->to_model to see if the target is 32-bit or 64-bit without
355 error = BROP(p)->b_elfexec(vp, uap, args,
378 args->stk_prot = PROT_USER;
380 args->stk_prot |= PROT_READ;
382 args->stk_prot |= PROT_WRITE;
384 args->stk_prot |= PROT_EXEC;
401 /* Copy BSS permissions to args->dat_prot */
403 args->dat_prot = PROT_USER;
405 args->dat_prot |= PROT_READ;
407 args->dat_prot |= PROT_WRITE;
409 args->dat_prot |= PROT_EXEC;
447 args->auxsize = (9 + 5) * sizeof (aux_entry_t);
457 args->auxsize = (9 + 2) * sizeof (aux_entry_t);
459 args->auxsize = 9 * sizeof (aux_entry_t);
462 args->auxsize = 0;
469 if (args->emulator != NULL)
470 args->auxsize += sizeof (aux_entry_t);
478 args->auxsize += sizeof (aux_entry_t);
487 args->auxsize += 4 * sizeof (aux_entry_t);
508 if (args->to_model == DATAMODEL_LP64)
509 args->addr32 = 1;
517 * Move args to the user's stack.
520 if ((error = exec_args(uap, args, idatap, (void **)&aux)) != 0) {
548 if (dtrphdr != NULL && dtrace_safe_phdr(dtrphdr, args, voffset) != 0) {
595 if (_ptr = strrchr(args->pathname, '/')) {
596 len = _ptr - args->pathname;
600 bcopy(args->pathname, &pathbufp[curlen], len);
670 if ((error = execpermissions(nvp, &bigwad->vattr, args)) != 0) {
722 dtrace_safe_phdr(dtrphdr, args, voffset) != 0) {
773 args->auxp_auxflags =
774 (char *)((char *)args->stackend +
784 if (args->to_model == DATAMODEL_NATIVE) {
800 args->auxp_brand =
801 (char *)((char *)args->stackend +
813 if (args->commpage != NULL ||
814 (args->commpage = (uintptr_t)comm_page_mapin()) != NULL) {
815 ADDAUX(aux, AT_SUN_COMMPAGE, args->commpage)
836 if (postfixsize != args->auxsize) {
838 int, args->auxsize);
864 up->u_commpagep = args->commpage;
871 error = execpoststack(args, bigwad->elfargs, postfixsize);
893 args->entry = (uintptr_t)(ehdrp->e_entry + voffset);
2202 extern int elf32exec(vnode_t *vp, execa_t *uap, uarg_t *args,