OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:__stack_chk_guard
(Results
1 - 11
of
11
) sorted by null
/device/linaro/bootloader/edk2/ArmPkg/Library/GccLto/
liblto-aarch64.s
27
.long
__stack_chk_guard
- .
liblto-arm.s
27
.long
__stack_chk_guard
- .
/bionic/libc/private/
bionic_ssp.h
38
extern uintptr_t
__stack_chk_guard
;
/device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/aarch64/
asm_stack_protector.S
29
adrp x1,
__stack_chk_guard
30
str x0, [x1, #:lo12:
__stack_chk_guard
]
/device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/
stack_protector.c
17
__stack_chk_guard
= (u_register_t) 3288484550995823360ULL;
variable
/device/linaro/bootloader/arm-trusted-firmware/lib/stack_protector/aarch32/
asm_stack_protector.S
29
ldr r1, =
__stack_chk_guard
/device/linaro/bootloader/edk2/MdePkg/Library/BaseStackCheckLib/
BaseStackCheckGcc.c
5
__stack_chk_guard
"canary" value into the stack and check the value prior
26
VOID *
__stack_chk_guard
= (VOID*)0x0AFF;
variable
29
//void (*
__stack_chk_guard
)(void) = __stack_chk_fail;
/bionic/libc/bionic/
__libc_init_main_thread.cpp
45
uintptr_t
__stack_chk_guard
= 0;
variable
104
__libc_safe_arc4random_buf(&
__stack_chk_guard
, sizeof(
__stack_chk_guard
));
libc_init_dynamic.cpp
73
// inline functions requiring a stack protector check, but
__stack_chk_guard
is
75
// after
__stack_chk_guard
is initialized and therefore can safely have a stack
107
__stack_chk_guard
= reinterpret_cast<uintptr_t>(__get_tls()[TLS_SLOT_STACK_GUARD]);
pthread_create.cpp
71
tcb->tls_slot(TLS_SLOT_STACK_GUARD) = reinterpret_cast<void*>(
__stack_chk_guard
);
/bionic/tests/
stack_protector_test.cpp
35
extern uintptr_t
__stack_chk_guard
;
57
ASSERT_EQ(
__stack_chk_guard
, reinterpret_cast<uintptr_t>(guard));
96
ASSERT_NE(0U,
__stack_chk_guard
);
98
GTEST_SKIP() << "glibc doesn't have a global
__stack_chk_guard
";
Completed in 1081 milliseconds