/openbmc/linux/arch/loongarch/include/asm/ |
H A D | stackprotector.h | 28 unsigned long canary; in boot_init_stack_canary() local 31 get_random_bytes(&canary, sizeof(canary)); in boot_init_stack_canary() 32 canary ^= LINUX_VERSION_CODE; in boot_init_stack_canary() 34 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/powerpc/include/asm/ |
H A D | stackprotector.h | 22 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 24 current->stack_canary = canary; in boot_init_stack_canary() 26 get_paca()->canary = canary; in boot_init_stack_canary()
|
H A D | paca.h | 276 unsigned long canary; member
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | stackprotector.h | 52 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 58 current->stack_canary = canary; in boot_init_stack_canary() 60 this_cpu_write(fixed_percpu_data.stack_canary, canary); in boot_init_stack_canary() 62 this_cpu_write(__stack_chk_guard, canary); in boot_init_stack_canary()
|
/openbmc/qemu/bsd-user/freebsd/ |
H A D | target_os_stack.h | 56 char canary[sizeof(abi_long) * 8]; in setup_initial_stack() local 79 qemu_guest_getrandom_nofail(canary, sizeof(canary)); in setup_initial_stack() 80 p -= roundup(sizeof(canary), sizeof(abi_ulong)); in setup_initial_stack() 81 if (memcpy_to_target(p, canary, sizeof(canary))) { in setup_initial_stack()
|
/openbmc/qemu/ |
H A D | pythondeps.toml | 15 # - canary: if specified, use this program name to present more 22 meson = { accepted = ">=1.5.0", installed = "1.5.0", canary = "meson" } 27 sphinx = { accepted = ">=3.4.3", installed = "5.3.0", canary = "sphinx-build" } 34 avocado-framework = { accepted = "(>=103.0, <104.0)", installed = "103.0", canary = "avocado" }
|
/openbmc/linux/drivers/misc/lkdtm/ |
H A D | bugs.c | 164 unsigned long *canary = (unsigned long *)stack; in __lkdtm_REPORT_STACK_CANARY() local 169 canary = (unsigned long *)stack + i; in __lkdtm_REPORT_STACK_CANARY() 171 if (*canary == current->stack_canary) in __lkdtm_REPORT_STACK_CANARY() 173 if (*canary == init_task.stack_canary) in __lkdtm_REPORT_STACK_CANARY() 197 canary = (unsigned long *)stack + current_offset; in __lkdtm_REPORT_STACK_CANARY() 199 stack_canary = *canary; in __lkdtm_REPORT_STACK_CANARY() 213 if (*canary == stack_canary) { in __lkdtm_REPORT_STACK_CANARY()
|
/openbmc/linux/arch/xtensa/include/asm/ |
H A D | stackprotector.h | 27 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 29 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/sh/include/asm/ |
H A D | stackprotector.h | 15 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 17 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/mips/include/asm/ |
H A D | stackprotector.h | 28 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 30 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/csky/include/asm/ |
H A D | stackprotector.h | 15 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 17 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/arm/include/asm/ |
H A D | stackprotector.h | 30 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 32 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/riscv/include/asm/ |
H A D | stackprotector.h | 16 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 18 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | stackprotector.h | 29 unsigned long canary = get_random_canary(); in boot_init_stack_canary() local 31 current->stack_canary = canary; in boot_init_stack_canary()
|
/openbmc/linux/arch/x86/platform/pvh/ |
H A D | head.S | 99 mov $_pa(canary), %eax 159 SYM_DATA_LOCAL(canary, .fill 48, 1, 0)
|
/openbmc/u-boot/drivers/smem/ |
H A D | msm_smem.c | 208 u16 canary; /* bytes are the same so no swapping needed */ member 351 if (hdr->canary != SMEM_PRIVATE_CANARY) { in qcom_smem_alloc_private() 371 hdr->canary = SMEM_PRIVATE_CANARY; in qcom_smem_alloc_private() 502 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private() 522 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private()
|
/openbmc/linux/drivers/net/ipa/ |
H A D | ipa_mem.c | 366 __le32 *canary; in ipa_mem_config() local 372 canary = ipa->mem_virt + ipa->mem_offset + ipa->mem[i].offset; in ipa_mem_config() 374 *--canary = IPA_MEM_CANARY_VAL; in ipa_mem_config()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/libmtp/libmtp/ |
H A D | 0002-util-mtp-hotplug.c-Enable-stack-memory-protection.patch | 11 cleanup operations, including stack canary checks.
|
/openbmc/linux/drivers/tty/serial/8250/ |
H A D | 8250_core.c | 791 unsigned char canary = 0xa5; in serial8250_suspend_port() local 793 serial_out(up, UART_SCR, canary); in serial8250_suspend_port() 794 if (serial_in(up, UART_SCR) == canary) in serial8250_suspend_port() 795 up->canary = canary; in serial8250_suspend_port() 813 up->canary = 0; in serial8250_resume_port()
|
/openbmc/linux/drivers/soc/qcom/ |
H A D | smem.c | 225 u16 canary; /* bytes are the same so no swapping needed */ member 421 if (hdr->canary != SMEM_PRIVATE_CANARY) in qcom_smem_alloc_private() 439 hdr->canary = SMEM_PRIVATE_CANARY; in qcom_smem_alloc_private() 600 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private() 636 if (e->canary != SMEM_PRIVATE_CANARY) in qcom_smem_get_private()
|
/openbmc/qemu/python/scripts/ |
H A D | mkvenv.py | 669 canary = None 690 canary = info.get("canary", None) 713 canary,
|
/openbmc/linux/include/linux/ |
H A D | serial_8250.h | 138 unsigned char canary; /* non-zero during system sleep member
|
/openbmc/linux/Documentation/security/ |
H A D | self-protection.rst | 157 is the presence of a stack canary between the stack variables and the 207 It should be noted that things like the stack canary discussed earlier 217 different canary per stack) and high entropy (e.g. is the RNG actually 270 addresses or other sensitive things like canary values).
|
/openbmc/linux/arch/arm/mach-at91/ |
H A D | pm.c | 46 phys_addr_t canary; member 185 static int canary = 0xA5A5A5A5; variable 1088 soc_pm.bu->canary = __pa_symbol(&canary); in at91_pm_backup_init()
|
/openbmc/linux/arch/ |
H A D | Kconfig | 633 - it has implemented a stack canary (e.g. __stack_chk_guard) 642 feature puts, at the beginning of functions, a canary value on 646 overwrite the canary, which gets detected and the attack is then 649 Functions will have the stack-protector canary logic added if they 655 On an x86 "defconfig" build, this feature adds canary checks to 665 Functions will have the stack-protector canary logic added in any 677 On an x86 "defconfig" build, this feature adds canary checks to 1270 to the compiler, so it will attempt to add canary checks regardless
|