Symbol: guard
libexec/rtld-elf/aarch64/reloc.c
92
struct arm64_guard_page_args guard;
libexec/rtld-elf/aarch64/reloc.c
94
guard.addr = (uintptr_t)obj->mapbase;
libexec/rtld-elf/aarch64/reloc.c
95
guard.len = obj->mapsize;
libexec/rtld-elf/aarch64/reloc.c
97
sysarch(ARM64_GUARD_PAGE, &guard);
sys/arm/arm/machdep_boot.c
148
cmdline_set_env(char *cmdline, const char *guard)
sys/arm/arm/machdep_boot.c
157
if (guard != NULL && guard[0] != '\0') {
sys/arm/arm/machdep_boot.c
158
guard_len = strlen(guard);
sys/arm/arm/machdep_boot.c
159
if (strncasecmp(cmdline, guard, guard_len) != 0)
sys/arm64/arm64/machdep_boot.c
140
cmdline_set_env(char *cmdline, const char *guard)
sys/arm64/arm64/machdep_boot.c
149
if (guard != NULL && guard[0] != '\0') {
sys/arm64/arm64/machdep_boot.c
150
guard_len = strlen(guard);
sys/arm64/arm64/machdep_boot.c
151
if (strncasecmp(cmdline, guard, guard_len) != 0)
sys/fs/nfsserver/nfs_nfsdserv.c
409
struct timespec guard = { 0, 0 };
sys/fs/nfsserver/nfs_nfsdserv.c
459
fxdr_nfsv3time(tl, &guard);
sys/fs/nfsserver/nfs_nfsdserv.c
462
(nva2.na_ctime.tv_sec != guard.tv_sec ||
sys/fs/nfsserver/nfs_nfsdserv.c
463
nva2.na_ctime.tv_nsec != guard.tv_nsec))
sys/kern/kern_proc.c
2629
bool guard, super;
sys/kern/kern_proc.c
2706
guard = (entry->eflags & MAP_ENTRY_GUARD) != 0;
sys/kern/kern_proc.c
2763
kve->kve_type = guard ? KVME_TYPE_GUARD :
sys/kern/stack_protector.c
22
long guard[nitems(__stack_chk_guard)];
sys/kern/stack_protector.c
24
arc4rand(guard, sizeof(guard), 0);
sys/kern/stack_protector.c
25
for (i = 0; i < nitems(guard); i++)
sys/kern/stack_protector.c
26
__stack_chk_guard[i] = guard[i];
sys/vm/vm_map.c
4705
vm_size_t grow_amount, guard, max_grow, sgp;
sys/vm/vm_map.c
4749
guard = ((curproc->p_flag2 & P2_STKGAP_DISABLE) != 0 ||
sys/vm/vm_map.c
4753
if (guard > max_grow)
sys/vm/vm_map.c
4755
max_grow -= guard;
tests/sys/vm/stack/stack_mprotect_exec_test.c
29
char *addr, *guard;
tests/sys/vm/stack/stack_mprotect_exec_test.c
45
guard = addr + alloc_size - SGROWSIZ;
tests/sys/vm/stack/stack_mprotect_exec_test.c
46
ATF_REQUIRE(mprotect(guard, pagesize, PROT_NONE) == 0);
tests/sys/vm/stack/stack_mprotect_exec_test.c
48
((volatile char *)guard)[-1];
usr.bin/rpcgen/rpc_main.c
519
char *guard, *tmp, *stopat;
usr.bin/rpcgen/rpc_main.c
523
guard = xstrdup(filename);
usr.bin/rpcgen/rpc_main.c
524
stopat = strrchr(guard, '.');
usr.bin/rpcgen/rpc_main.c
530
for (tmp = guard; *tmp != '\000'; ++tmp) {
usr.bin/rpcgen/rpc_main.c
535
else if (tmp == guard)
usr.bin/rpcgen/rpc_main.c
550
if (*guard == '_') {
usr.bin/rpcgen/rpc_main.c
551
for (tmp = guard; *tmp == '_'; ++tmp)
usr.bin/rpcgen/rpc_main.c
553
strcpy(guard, tmp);
usr.bin/rpcgen/rpc_main.c
555
tmp = guard;
usr.bin/rpcgen/rpc_main.c
556
guard = extendfile(guard, "_H_RPCGEN");
usr.bin/rpcgen/rpc_main.c
558
return (guard);
usr.bin/rpcgen/rpc_main.c
572
const char *guard;
usr.bin/rpcgen/rpc_main.c
582
guard = tmp = generate_guard(outfilename ? outfilename: infile);
usr.bin/rpcgen/rpc_main.c
584
guard = "STDIN_";
usr.bin/rpcgen/rpc_main.c
586
f_print(fout, "#ifndef _%s\n#define _%s\n\n", guard,
usr.bin/rpcgen/rpc_main.c
587
guard);
usr.bin/rpcgen/rpc_main.c
647
f_print(fout, "\n#endif /* !_%s */\n", guard);