Home
last modified time | relevance | path

Searched refs:canary (Results 1 – 17 of 17) sorted by relevance

/Linux-v4.19/arch/x86/include/asm/
Dstackprotector.h63 u64 canary; in boot_init_stack_canary() local
75 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
77 canary += tsc + (tsc << 32UL); in boot_init_stack_canary()
78 canary &= CANARY_MASK; in boot_init_stack_canary()
80 current->stack_canary = canary; in boot_init_stack_canary()
82 this_cpu_write(irq_stack_union.stack_canary, canary); in boot_init_stack_canary()
84 this_cpu_write(stack_canary.canary, canary); in boot_init_stack_canary()
91 unsigned long canary = (unsigned long)&per_cpu(stack_canary, cpu); in setup_stack_canary_segment() local
96 set_desc_base(&desc, canary); in setup_stack_canary_segment()
Dprocessor.h431 unsigned long canary; member
/Linux-v4.19/arch/sh/include/asm/
Dstackprotector.h18 unsigned long canary; in boot_init_stack_canary() local
21 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
22 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary()
23 canary &= CANARY_MASK; in boot_init_stack_canary()
25 current->stack_canary = canary; in boot_init_stack_canary()
/Linux-v4.19/arch/arm64/include/asm/
Dstackprotector.h29 unsigned long canary; in boot_init_stack_canary() local
32 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
33 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary()
34 canary &= CANARY_MASK; in boot_init_stack_canary()
36 current->stack_canary = canary; in boot_init_stack_canary()
/Linux-v4.19/arch/mips/include/asm/
Dstackprotector.h31 unsigned long canary; in boot_init_stack_canary() local
34 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
35 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary()
37 current->stack_canary = canary; in boot_init_stack_canary()
/Linux-v4.19/arch/arm/include/asm/
Dstackprotector.h29 unsigned long canary; in boot_init_stack_canary() local
32 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
33 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary()
35 current->stack_canary = canary; in boot_init_stack_canary()
/Linux-v4.19/arch/xtensa/include/asm/
Dstackprotector.h30 unsigned long canary; in boot_init_stack_canary() local
33 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary()
34 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary()
36 current->stack_canary = canary; in boot_init_stack_canary()
/Linux-v4.19/arch/x86/xen/
Dxen-pvh.S110 mov $_pa(canary), %eax
125 movl $_pa(canary),%ecx
180 canary: label
/Linux-v4.19/arch/arm/mach-at91/
Dpm.c74 static int canary = 0xA5A5A5A5; variable
79 phys_addr_t canary; member
620 pm_bu->canary = __pa_symbol(&canary); in at91_pm_backup_init()
/Linux-v4.19/drivers/soc/qcom/
Dsmem.c216 u16 canary; /* bytes are the same so no swapping needed */ member
368 if (hdr->canary != SMEM_PRIVATE_CANARY) in qcom_smem_alloc_private()
383 hdr->canary = SMEM_PRIVATE_CANARY; in qcom_smem_alloc_private()
529 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private()
549 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private()
/Linux-v4.19/arch/x86/kernel/
Dasm-offsets_32.c61 OFFSET(stack_canary_offset, stack_canary, canary); in foo()
Dhead_32.S381 * relocation. Manually set base address in stack canary
/Linux-v4.19/drivers/tty/serial/8250/
D8250_core.c759 unsigned char canary = 0xa5; in serial8250_suspend_port() local
760 serial_out(up, UART_SCR, canary); in serial8250_suspend_port()
761 if (serial_in(up, UART_SCR) == canary) in serial8250_suspend_port()
762 up->canary = canary; in serial8250_suspend_port()
780 up->canary = 0; in serial8250_resume_port()
D8250_port.c3260 if (up->canary && (up->canary != serial_port_in(port, UART_SCR))) { in serial8250_console_write()
3262 up->canary = 0; in serial8250_console_write()
/Linux-v4.19/include/linux/
Dserial_8250.h113 unsigned char canary; /* non-zero during system sleep member
/Linux-v4.19/arch/
DKconfig426 - it has implemented a stack canary (e.g. __stack_chk_guard)
438 feature puts, at the beginning of functions, a canary value on
442 overwrite the canary, which gets detected and the attack is then
445 Functions will have the stack-protector canary logic added if they
451 On an x86 "defconfig" build, this feature adds canary checks to
461 Functions will have the stack-protector canary logic added in any
473 On an x86 "defconfig" build, this feature adds canary checks to
/Linux-v4.19/Documentation/security/
Dself-protection.rst158 is the presence of a stack canary between the stack variables and the
208 It should be noted that things like the stack canary discussed earlier
218 different canary per stack) and high entropy (e.g. is the RNG actually
271 addresses or other sensitive things like canary values).