HomeSort by: relevance | last modified time | path
    Searched refs:guard (Results 1 - 25 of 74) sorted by relevancy

1 2 3

  /src/sys/kern/
kern_ssp.c 69 long guard[__arraycount(stack_chk_guard)]; local in function:ssp_init
71 cprng_fast(guard, sizeof(guard));
73 for (i = 0; i < __arraycount(guard); i++)
74 stack_chk_guard[i] = guard[i];
76 for (i = 0; i < __arraycount(guard); i++)
77 aprint_debug("%lx ", guard[i]);
kern_ssp.c 69 long guard[__arraycount(stack_chk_guard)]; local in function:ssp_init
71 cprng_fast(guard, sizeof(guard));
73 for (i = 0; i < __arraycount(guard); i++)
74 stack_chk_guard[i] = guard[i];
76 for (i = 0; i < __arraycount(guard); i++)
77 aprint_debug("%lx ", guard[i]);
  /src/lib/libc/gen/
ctype_guard.h 63 * for the defined cases of the ctype(3) functions, we put a guard page
74 * beginning for a guard page. It is defined as an ordinary C
90 * Then, at startup, we mprotect the guard page PROT_NONE.
115 #define __ctype_table_size(name, guard, nelem, elemsize) \
116 __CTASSERT(sizeof((guard)[0]) == (elemsize)); \
117 __CTASSERT(sizeof(guard) == _CTYPE_GUARD_SIZE + (nelem)*(elemsize)); \
152 # define __ctype_table_guarded(name, guard, nelem, elemsize) \
155 __asm(_C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#guard) " + " \
157 __ctype_table_size(name, guard, nelem, elemsize)
176 # define __ctype_table_guarded(name, guard, nelem, elemsize)
    [all...]
ctype_guard.h 63 * for the defined cases of the ctype(3) functions, we put a guard page
74 * beginning for a guard page. It is defined as an ordinary C
90 * Then, at startup, we mprotect the guard page PROT_NONE.
115 #define __ctype_table_size(name, guard, nelem, elemsize) \
116 __CTASSERT(sizeof((guard)[0]) == (elemsize)); \
117 __CTASSERT(sizeof(guard) == _CTYPE_GUARD_SIZE + (nelem)*(elemsize)); \
152 # define __ctype_table_guarded(name, guard, nelem, elemsize) \
155 __asm(_C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#guard) " + " \
157 __ctype_table_size(name, guard, nelem, elemsize)
176 # define __ctype_table_guarded(name, guard, nelem, elemsize)
    [all...]
  /src/games/hack/
hack.vault.c 109 xchar gdx, gdy; /* goal of guard's walk */
115 {"guard", '@', 12, 12, -1, 4, 10, sizeof(struct egd)};
117 static struct monst *guard; variable in typeref:struct:monst *
128 struct egd *egd = monster_private(guard);
143 /* it seems he left the corridor - let the guard disappear */
144 mondead(guard);
145 guard = 0;
152 struct egd *egd = monster_private(guard);
166 guard = mtmp;
170 guard = 0
    [all...]
hack.vault.c 109 xchar gdx, gdy; /* goal of guard's walk */
115 {"guard", '@', 12, 12, -1, 4, 10, sizeof(struct egd)};
117 static struct monst *guard; variable in typeref:struct:monst *
128 struct egd *egd = monster_private(guard);
143 /* it seems he left the corridor - let the guard disappear */
144 mondead(guard);
145 guard = 0;
152 struct egd *egd = monster_private(guard);
166 guard = mtmp;
170 guard = 0
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/safestack/
safestack.cc 83 // protector pass to store the stack guard (see getStackCookieLocation()
101 static inline void *unsafe_stack_alloc(size_t size, size_t guard) {
102 CHECK_GE(size + guard, size);
103 void *addr = MmapOrDie(size + guard, "unsafe_stack_alloc");
104 MprotectNoAccess((uptr)addr, (uptr)guard);
105 return (char *)addr + guard;
108 static inline void unsafe_stack_setup(void *start, size_t size, size_t guard) {
110 CHECK_GE((char *)start + guard, (char *)start);
117 unsafe_stack_guard = guard;
223 size_t guard = 0 local in function:INTERCEPTOR
274 size_t guard = 4096; local in function:__safestack_init
    [all...]
safestack.cc 83 // protector pass to store the stack guard (see getStackCookieLocation()
101 static inline void *unsafe_stack_alloc(size_t size, size_t guard) {
102 CHECK_GE(size + guard, size);
103 void *addr = MmapOrDie(size + guard, "unsafe_stack_alloc");
104 MprotectNoAccess((uptr)addr, (uptr)guard);
105 return (char *)addr + guard;
108 static inline void unsafe_stack_setup(void *start, size_t size, size_t guard) {
110 CHECK_GE((char *)start + guard, (char *)start);
117 unsafe_stack_guard = guard;
223 size_t guard = 0 local in function:INTERCEPTOR
274 size_t guard = 4096; local in function:__safestack_init
    [all...]
  /src/usr.bin/make/unit-tests/
directive-include-guard.mk 1 # $NetBSD: directive-include-guard.mk,v 1.19 2025/04/11 17:21:31 rillig Exp $
5 # A file that is guarded by a multiple-inclusion guard has one of the
14 # .if !target(guard-target)
17 # When such a file is included for the second or later time, and the guard
18 # variable or the guard target is defined, the file is skipped completely, as
23 # https://gcc.gnu.org/onlinedocs/cppinternals/Guard-Macros.html
30 # This is the canonical form of a variable-based multiple-inclusion guard.
39 # A file that reuses a guard from a previous file (or whose guard is defined
50 # The guard variable cannot be a number, as numbers are interprete
    [all...]
directive-include-guard.mk 1 # $NetBSD: directive-include-guard.mk,v 1.19 2025/04/11 17:21:31 rillig Exp $
5 # A file that is guarded by a multiple-inclusion guard has one of the
14 # .if !target(guard-target)
17 # When such a file is included for the second or later time, and the guard
18 # variable or the guard target is defined, the file is skipped completely, as
23 # https://gcc.gnu.org/onlinedocs/cppinternals/Guard-Macros.html
30 # This is the canonical form of a variable-based multiple-inclusion guard.
39 # A file that reuses a guard from a previous file (or whose guard is defined
50 # The guard variable cannot be a number, as numbers are interprete
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_coverage_fuchsia.cc 10 // Sanitizer Coverage Controller for Trace PC Guard, Fuchsia-specific version.
51 // Collects trace-pc guard coverage.
56 // data called the "guard". At startup, we assign each guard slot a
59 // that index in the array. (Each later call with the same guard slot is
60 // presumed to be from the same PC.) Then it clears the guard slot back
66 // contiguous array of guard slots, and a constructor that calls here
83 void TracePcGuard(u32 *guard, uptr pc) {
84 atomic_uint32_t *guard_ptr = reinterpret_cast<atomic_uint32_t *>(guard);
207 SANITIZER_INTERFACE_WEAK_DEF(void, __sanitizer_cov_trace_pc_guard, u32 *guard) {
    [all...]
sanitizer_coverage_fuchsia.cc 10 // Sanitizer Coverage Controller for Trace PC Guard, Fuchsia-specific version.
51 // Collects trace-pc guard coverage.
56 // data called the "guard". At startup, we assign each guard slot a
59 // that index in the array. (Each later call with the same guard slot is
60 // presumed to be from the same PC.) Then it clears the guard slot back
66 // contiguous array of guard slots, and a constructor that calls here
83 void TracePcGuard(u32 *guard, uptr pc) {
84 atomic_uint32_t *guard_ptr = reinterpret_cast<atomic_uint32_t *>(guard);
207 SANITIZER_INTERFACE_WEAK_DEF(void, __sanitizer_cov_trace_pc_guard, u32 *guard) {
    [all...]
sanitizer_coverage_libcdep_new.cc 9 // Sanitizer Coverage Controller for Trace PC Guard.
106 // Collects trace-pc guard coverage.
129 void TracePcGuard(u32* guard, uptr pc) {
130 u32 idx = *guard;
175 SANITIZER_INTERFACE_WEAK_DEF(void, __sanitizer_cov_trace_pc_guard, u32* guard) {
176 if (!*guard) return;
177 __sancov::pc_guard_controller.TracePcGuard(guard, GET_CALLER_PC() - 1);
sanitizer_coverage_libcdep_new.cc 9 // Sanitizer Coverage Controller for Trace PC Guard.
106 // Collects trace-pc guard coverage.
129 void TracePcGuard(u32* guard, uptr pc) {
130 u32 idx = *guard;
175 SANITIZER_INTERFACE_WEAK_DEF(void, __sanitizer_cov_trace_pc_guard, u32* guard) {
176 if (!*guard) return;
177 __sancov::pc_guard_controller.TracePcGuard(guard, GET_CALLER_PC() - 1);
sanitizer_interface_internal.h 54 SANITIZER_INTERFACE_ATTRIBUTE void __sanitizer_cov(__sanitizer::u32 *guard);
  /src/sys/arch/hppa/spmath/
cnv_float.h 116 #define Dbl_to_sgl_mantissa(srcA,srcB,dest,inexact,guard,sticky,odd) \
118 guard = Dbit3p2(srcB); \
120 inexact = guard | sticky; \
123 #define Dbl_to_sgl_denormalized(srcA,srcB,exp,dest,inexact,guard,sticky,odd,tiny) \
129 guard = inexact >> 31; \
152 if (guard && (sticky || odd)) { \
162 guard = odd; \
164 inexact |= guard; \
172 guard = inexact >> 31; \
185 guard = inexact >> 31;
    [all...]
cnv_float.h 116 #define Dbl_to_sgl_mantissa(srcA,srcB,dest,inexact,guard,sticky,odd) \
118 guard = Dbit3p2(srcB); \
120 inexact = guard | sticky; \
123 #define Dbl_to_sgl_denormalized(srcA,srcB,exp,dest,inexact,guard,sticky,odd,tiny) \
129 guard = inexact >> 31; \
152 if (guard && (sticky || odd)) { \
162 guard = odd; \
164 inexact |= guard; \
172 guard = inexact >> 31; \
185 guard = inexact >> 31;
    [all...]
  /src/tests/lib/libc/string/
t_memmem.c 111 char *guard = mmap(src + pg, pg, local in function:ATF_TC_BODY
113 printf("%p\n", guard);
123 munmap(guard, pg);
t_memmem.c 111 char *guard = mmap(src + pg, pg, local in function:ATF_TC_BODY
113 printf("%p\n", guard);
123 munmap(guard, pg);
  /src/usr.bin/rpcgen/
rpc_main.c 498 char *guard, *tmp, *tmp2, *extdot; local in function:generate_guard
502 guard = strdup(filename);
503 if (guard == NULL) {
506 extdot = strrchr(guard, '.');
514 for (tmp = guard; *tmp; tmp++) {
535 if (guard[0] == '_' || guard[0] == '.') {
536 if (asprintf(&tmp2, "RPCGEN_%s", guard) == -1) {
539 free(guard);
540 guard = tmp2
561 char *guard; local in function:h_output
    [all...]
rpc_main.c 498 char *guard, *tmp, *tmp2, *extdot; local in function:generate_guard
502 guard = strdup(filename);
503 if (guard == NULL) {
506 extdot = strrchr(guard, '.');
514 for (tmp = guard; *tmp; tmp++) {
535 if (guard[0] == '_' || guard[0] == '.') {
536 if (asprintf(&tmp2, "RPCGEN_%s", guard) == -1) {
539 free(guard);
540 guard = tmp2
561 char *guard; local in function:h_output
    [all...]
  /src/tests/lib/libpthread/
t_stack.c 59 size_t guardsize; /* default guard size */
111 * Return the default guard size for threads created with
162 * be a stack guard (i.e., it should be empty), adjusting the
163 * requested bounds by the default stack guard size will leave us
273 * _does not_ have access to the start or end of its stack guard,
282 void *addr, *guard; local in function:checkguardaccessthread
286 * Get the the stack and stack guard parameters.
293 * Determine where the guard starts in virtual address space
297 guard = (char *)addr + size;
299 guard = (char *)addr - guardsize
    [all...]
t_stack.c 59 size_t guardsize; /* default guard size */
111 * Return the default guard size for threads created with
162 * be a stack guard (i.e., it should be empty), adjusting the
163 * requested bounds by the default stack guard size will leave us
273 * _does not_ have access to the start or end of its stack guard,
282 void *addr, *guard; local in function:checkguardaccessthread
286 * Get the the stack and stack guard parameters.
293 * Determine where the guard starts in virtual address space
297 guard = (char *)addr + size;
299 guard = (char *)addr - guardsize
    [all...]
  /src/lib/libpthread/
pthread_attr.c 170 pthread_attr_getguardsize(const pthread_attr_t *attr, size_t *guard)
178 *guard = pthread__guardsize;
180 *guard = p->ptap_guardsize;
187 pthread_attr_setguardsize(pthread_attr_t *attr, size_t guard)
198 p->ptap_guardsize = guard;
pthread_attr.c 170 pthread_attr_getguardsize(const pthread_attr_t *attr, size_t *guard)
178 *guard = pthread__guardsize;
180 *guard = p->ptap_guardsize;
187 pthread_attr_setguardsize(pthread_attr_t *attr, size_t guard)
198 p->ptap_guardsize = guard;

Completed in 30 milliseconds

1 2 3