HomeSort by relevance Sort by last modified time
    Searched refs:__stack_chk_guard (Results 1 - 11 of 11) sorted by null

  /device/linaro/bootloader/edk2/ArmPkg/Library/GccLto/
liblto-aarch64.s 27 .long __stack_chk_guard - .
liblto-arm.s 27 .long __stack_chk_guard - .
  /bionic/libc/private/
bionic_ssp.h 38 extern uintptr_t __stack_chk_guard;
  /device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/aarch64/
asm_stack_protector.S 29 adrp x1, __stack_chk_guard
30 str x0, [x1, #:lo12:__stack_chk_guard]
  /device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/
stack_protector.c 17 __stack_chk_guard = (u_register_t) 3288484550995823360ULL; variable
  /device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/aarch32/
asm_stack_protector.S 29 ldr r1, =__stack_chk_guard
  /device/linaro/bootloader/edk2/MdePkg/Library/BaseStackCheckLib/
BaseStackCheckGcc.c 5 __stack_chk_guard "canary" value into the stack and check the value prior
26 VOID *__stack_chk_guard = (VOID*)0x0AFF; variable
29 //void (*__stack_chk_guard)(void) = __stack_chk_fail;
  /bionic/libc/bionic/
__libc_init_main_thread.cpp 45 uintptr_t __stack_chk_guard = 0; variable
104 __libc_safe_arc4random_buf(&__stack_chk_guard, sizeof(__stack_chk_guard));
libc_init_dynamic.cpp 73 // inline functions requiring a stack protector check, but __stack_chk_guard is
75 // after __stack_chk_guard is initialized and therefore can safely have a stack
107 __stack_chk_guard = reinterpret_cast<uintptr_t>(__get_tls()[TLS_SLOT_STACK_GUARD]);
pthread_create.cpp 71 tcb->tls_slot(TLS_SLOT_STACK_GUARD) = reinterpret_cast<void*>(__stack_chk_guard);
  /bionic/tests/
stack_protector_test.cpp 35 extern uintptr_t __stack_chk_guard;
57 ASSERT_EQ(__stack_chk_guard, reinterpret_cast<uintptr_t>(guard));
96 ASSERT_NE(0U, __stack_chk_guard);
98 GTEST_SKIP() << "glibc doesn't have a global __stack_chk_guard";

Completed in 1081 milliseconds