| /OK3568_Linux_fs/kernel/arch/xtensa/include/asm/ |
| H A D | stackprotector.h | 20 extern unsigned long __stack_chk_guard; 37 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/mips/include/asm/ |
| H A D | stackprotector.h | 21 extern unsigned long __stack_chk_guard; 38 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/riscv/include/asm/ |
| H A D | stackprotector.h | 9 extern unsigned long __stack_chk_guard; 27 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/sh/include/asm/ |
| H A D | stackprotector.h | 8 extern unsigned long __stack_chk_guard; 26 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/csky/include/asm/ |
| H A D | stackprotector.h | 8 extern unsigned long __stack_chk_guard; 26 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/arm/include/asm/ |
| H A D | stackprotector.h | 23 extern unsigned long __stack_chk_guard; 41 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/arm64/include/asm/ |
| H A D | stackprotector.h | 20 extern unsigned long __stack_chk_guard; 40 __stack_chk_guard = current->stack_canary; in boot_init_stack_canary()
|
| /OK3568_Linux_fs/kernel/arch/sh/kernel/ |
| H A D | process.c | 16 unsigned long __stack_chk_guard __read_mostly; 17 EXPORT_SYMBOL(__stack_chk_guard);
|
| H A D | process_32.c | 155 __stack_chk_guard = next->stack_canary; in __switch_to()
|
| /OK3568_Linux_fs/kernel/arch/csky/kernel/ |
| H A D | process.c | 21 unsigned long __stack_chk_guard __read_mostly; 22 EXPORT_SYMBOL(__stack_chk_guard);
|
| /OK3568_Linux_fs/kernel/arch/riscv/kernel/ |
| H A D | process.c | 29 unsigned long __stack_chk_guard __read_mostly; 30 EXPORT_SYMBOL(__stack_chk_guard);
|
| /OK3568_Linux_fs/kernel/arch/xtensa/kernel/ |
| H A D | process.c | 60 unsigned long __stack_chk_guard __read_mostly; 61 EXPORT_SYMBOL(__stack_chk_guard);
|
| /OK3568_Linux_fs/kernel/arch/mips/kernel/ |
| H A D | r2300_switch.S | 40 PTR_LA t8, __stack_chk_guard
|
| H A D | r4k_switch.S | 35 PTR_LA t8, __stack_chk_guard
|
| /OK3568_Linux_fs/kernel/arch/mips/boot/compressed/ |
| H A D | decompress.c | 82 const unsigned long __stack_chk_guard = 0x000a0dff; variable
|
| /OK3568_Linux_fs/kernel/arch/arm/kernel/ |
| H A D | process.c | 43 unsigned long __stack_chk_guard __read_mostly; 44 EXPORT_SYMBOL(__stack_chk_guard);
|
| /OK3568_Linux_fs/kernel/arch/arm/boot/compressed/ |
| H A D | misc.c | 131 const unsigned long __stack_chk_guard = 0x000a0dff; variable
|
| /OK3568_Linux_fs/kernel/arch/sh/boot/compressed/ |
| H A D | misc.c | 107 const unsigned long __stack_chk_guard = 0x000a0dff; variable
|
| /OK3568_Linux_fs/buildroot/package/am33x-cm3/ |
| H A D | 0002-Makefile-unconditionally-disable-SSP.patch | 8 '__stack_chk_guard' and '__stack_chk_fail' if toolchain enforces
|
| /OK3568_Linux_fs/buildroot/package/sysvinit/ |
| H A D | 0001-Makefile-disable-stack-protector-strong.patch | 9 runlevel.c:(.text.startup+0x4): undefined reference to `__stack_chk_guard'
|
| /OK3568_Linux_fs/kernel/android/ |
| H A D | abi_gki_aarch64_fips140 | 131 __stack_chk_guard
|
| /OK3568_Linux_fs/buildroot/package/usbredir/ |
| H A D | 0002-meson-add-stack_protector-option.patch | 11 usbredirparser.c:(.text+0x1c4): undefined reference to `__stack_chk_guard'
|
| /OK3568_Linux_fs/kernel/arch/arm64/kernel/ |
| H A D | process.c | 64 unsigned long __stack_chk_guard __ro_after_init; 65 EXPORT_SYMBOL(__stack_chk_guard);
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0133-kern-efi-Add-initial-stack-protector-implementation.patch | 327 +grub_addr_t __stack_chk_guard; 358 + grub_memcpy (&__stack_chk_guard, stack_chk_guard_buf, sizeof (__stack_chk_guard)); 447 +extern grub_addr_t EXPORT_VAR (__stack_chk_guard);
|
| /OK3568_Linux_fs/buildroot/boot/opensbi/0.9/ |
| H A D | 0002-Makefile-unconditionally-disable-SSP.patch | 8 references to '__stack_chk_guard' and '__stack_chk_fail' if toolchain
|