/Linux-v4.19/arch/x86/include/asm/ |
D | stackprotector.h | 63 u64 canary; in boot_init_stack_canary() local 75 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 77 canary += tsc + (tsc << 32UL); in boot_init_stack_canary() 78 canary &= CANARY_MASK; in boot_init_stack_canary() 80 current->stack_canary = canary; in boot_init_stack_canary() 82 this_cpu_write(irq_stack_union.stack_canary, canary); in boot_init_stack_canary() 84 this_cpu_write(stack_canary.canary, canary); in boot_init_stack_canary() 91 unsigned long canary = (unsigned long)&per_cpu(stack_canary, cpu); in setup_stack_canary_segment() local 96 set_desc_base(&desc, canary); in setup_stack_canary_segment()
|
D | processor.h | 431 unsigned long canary; member
|
/Linux-v4.19/arch/sh/include/asm/ |
D | stackprotector.h | 18 unsigned long canary; in boot_init_stack_canary() local 21 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 22 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 23 canary &= CANARY_MASK; in boot_init_stack_canary() 25 current->stack_canary = canary; in boot_init_stack_canary()
|
/Linux-v4.19/arch/arm64/include/asm/ |
D | stackprotector.h | 29 unsigned long canary; in boot_init_stack_canary() local 32 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 33 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 34 canary &= CANARY_MASK; in boot_init_stack_canary() 36 current->stack_canary = canary; in boot_init_stack_canary()
|
/Linux-v4.19/arch/mips/include/asm/ |
D | stackprotector.h | 31 unsigned long canary; in boot_init_stack_canary() local 34 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 35 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 37 current->stack_canary = canary; in boot_init_stack_canary()
|
/Linux-v4.19/arch/arm/include/asm/ |
D | stackprotector.h | 29 unsigned long canary; in boot_init_stack_canary() local 32 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 33 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 35 current->stack_canary = canary; in boot_init_stack_canary()
|
/Linux-v4.19/arch/xtensa/include/asm/ |
D | stackprotector.h | 30 unsigned long canary; in boot_init_stack_canary() local 33 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 34 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 36 current->stack_canary = canary; in boot_init_stack_canary()
|
/Linux-v4.19/arch/x86/xen/ |
D | xen-pvh.S | 110 mov $_pa(canary), %eax 125 movl $_pa(canary),%ecx 180 canary: label
|
/Linux-v4.19/arch/arm/mach-at91/ |
D | pm.c | 74 static int canary = 0xA5A5A5A5; variable 79 phys_addr_t canary; member 620 pm_bu->canary = __pa_symbol(&canary); in at91_pm_backup_init()
|
/Linux-v4.19/drivers/soc/qcom/ |
D | smem.c | 216 u16 canary; /* bytes are the same so no swapping needed */ member 368 if (hdr->canary != SMEM_PRIVATE_CANARY) in qcom_smem_alloc_private() 383 hdr->canary = SMEM_PRIVATE_CANARY; in qcom_smem_alloc_private() 529 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private() 549 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private()
|
/Linux-v4.19/arch/x86/kernel/ |
D | asm-offsets_32.c | 61 OFFSET(stack_canary_offset, stack_canary, canary); in foo()
|
D | head_32.S | 381 * relocation. Manually set base address in stack canary
|
/Linux-v4.19/drivers/tty/serial/8250/ |
D | 8250_core.c | 759 unsigned char canary = 0xa5; in serial8250_suspend_port() local 760 serial_out(up, UART_SCR, canary); in serial8250_suspend_port() 761 if (serial_in(up, UART_SCR) == canary) in serial8250_suspend_port() 762 up->canary = canary; in serial8250_suspend_port() 780 up->canary = 0; in serial8250_resume_port()
|
D | 8250_port.c | 3260 if (up->canary && (up->canary != serial_port_in(port, UART_SCR))) { in serial8250_console_write() 3262 up->canary = 0; in serial8250_console_write()
|
/Linux-v4.19/include/linux/ |
D | serial_8250.h | 113 unsigned char canary; /* non-zero during system sleep member
|
/Linux-v4.19/arch/ |
D | Kconfig | 426 - it has implemented a stack canary (e.g. __stack_chk_guard) 438 feature puts, at the beginning of functions, a canary value on 442 overwrite the canary, which gets detected and the attack is then 445 Functions will have the stack-protector canary logic added if they 451 On an x86 "defconfig" build, this feature adds canary checks to 461 Functions will have the stack-protector canary logic added in any 473 On an x86 "defconfig" build, this feature adds canary checks to
|
/Linux-v4.19/Documentation/security/ |
D | self-protection.rst | 158 is the presence of a stack canary between the stack variables and the 208 It should be noted that things like the stack canary discussed earlier 218 different canary per stack) and high entropy (e.g. is the RNG actually 271 addresses or other sensitive things like canary values).
|